MuerBT磁力搜索 BT种子搜索利器 免费下载BT种子,超5000万条种子数据

the-redteam-blueprint

磁力链接/BT种子名称

the-redteam-blueprint

磁力链接/BT种子简介

种子哈希:cc615a34127852f9b7f0e4abe80666ec34f6b1cb
文件大小: 20.39G
已经下载:368次
下载速度:极快
收录时间:2021-03-06
最近下载:2025-08-28

移花宫入口

移花宫.com邀月.com怜星.com花无缺.comyhgbt.icuyhgbt.top

磁力链接下载

magnet:?xt=urn:btih:CC615A34127852F9B7F0E4ABE80666EC34F6B1CB
推荐使用PIKPAK网盘下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看

下载BT种子文件

磁力链接 迅雷下载 PIKPAK在线播放 世界之窗 91视频 含羞草 欲漫涩 逼哩逼哩 成人快手 51品茶 抖阴破解版 极乐禁地 91短视频 她趣 TikTok成人版 PornHub 听泉鉴鲍 草榴社区 哆哔涩漫 呦乐园 萝莉岛

最近搜索

鸡巴 小人物 virtualrealjapan 国外小萝莉 外国小萝莉 边自慰 反差女 男娘 2020.10.20 光衣服 巴套子 丝里丝 jul-721 mvsd-555-uc 偷拍 酒店 图图 高潮脸 高跟插 伦大神 慕佩灵 3p调教 イーグル 新年特 长相甜美 露脸 母狗 美魔女的 展 아리 玩跳弹 小温

文件列表

  • 04 The Windows Operating System/019 Windows at a Glance.mp4 442.3 MB
  • 18 Reconnaissance/172 Active Recon - Port Scanning.mp4 436.1 MB
  • 19 Exploitation/193 SQL Injection SQLMap.mp4 417.9 MB
  • 16 Assembly Course/152 Arithmetic.mp4 331.0 MB
  • 25 Job Hunting/258 Analyzing the Job Post.mp4 312.1 MB
  • 20 Post Exploitation/201 Stabilizing Shells.mp4 285.1 MB
  • 20 Post Exploitation/210 MySQL.mp4 277.1 MB
  • 20 Post Exploitation/209 File Permissions.mp4 275.6 MB
  • 04 The Windows Operating System/023 Windows Internals - Permissions.mp4 272.0 MB
  • 18 Reconnaissance/177 Active Recon - Working with NC.mp4 271.6 MB
  • 23 Reporting/242 The Format.mp4 259.5 MB
  • 16 Assembly Course/149 Hello World.mp4 255.5 MB
  • 20 Post Exploitation/228 Pivoting.mp4 244.7 MB
  • 20 Post Exploitation/208 Common Configuration Issues.mp4 234.4 MB
  • 05 The Linux Operating System/041 Linux Command Line - Working with Data.mp4 230.5 MB
  • 20 Post Exploitation/227 SSH Tunneling.mp4 224.9 MB
  • 20 Post Exploitation/207 OS Version.mp4 223.6 MB
  • 07 Active Directory/074 Setting up Group Policies.mp4 216.9 MB
  • 19 Exploitation/187 Metasploit - Exploits and Payloads.mp4 205.0 MB
  • 04 The Windows Operating System/033 Windows Command Line - Working with Pipes.mp4 199.8 MB
  • 20 Post Exploitation/213 Unquoted Service Path.mp4 198.8 MB
  • 20 Post Exploitation/205 Linux Persistence.mp4 196.3 MB
  • 16 Assembly Course/155 Reading Files.mp4 187.9 MB
  • 20 Post Exploitation/211 Sudo.mp4 184.9 MB
  • 20 Post Exploitation/202 Breaking Out Of The Jail Shell.mp4 176.9 MB
  • 19 Exploitation/183 Finding Exploits.mp4 175.6 MB
  • 19 Exploitation/188 Metasploit - The Meterpreter.mp4 174.4 MB
  • 20 Post Exploitation/217 Pulling Hashes.mp4 173.1 MB
  • 16 Assembly Course/154 Logic Control.mp4 170.1 MB
  • 20 Post Exploitation/204 Windows Persistence.mp4 169.3 MB
  • 18 Reconnaissance/176 Active Recon - Sparta.mp4 168.7 MB
  • 19 Exploitation/196 Local File Inclusion.mp4 162.8 MB
  • 16 Assembly Course/151 Saving States.mp4 162.4 MB
  • 18 Reconnaissance/173 Active Recon - DNS.mp4 159.5 MB
  • 25 Job Hunting/256 Personal Brand.mp4 158.7 MB
  • 04 The Windows Operating System/021 Windows Logs.mp4 158.7 MB
  • 04 The Windows Operating System/032 Windows Command Line - Working with Files and Directories.mp4 157.5 MB
  • 22 Covering Your Tracks/238 Clearing Command History.mp4 155.9 MB
  • 20 Post Exploitation/214 Service Misconfigurations.mp4 155.7 MB
  • 04 The Windows Operating System/035 Windows Command Line - Managing Windows.mp4 153.9 MB
  • 18 Reconnaissance/178 Active Recon - Banner Grabbing.mp4 153.1 MB
  • 20 Post Exploitation/212 Relative Path Sudo Binary.mp4 151.2 MB
  • 05 The Linux Operating System/039 Linux Command Line - Working with Files and Directories.mp4 150.9 MB
  • 25 Job Hunting/253 The Resume.mp4 150.6 MB
  • 04 The Windows Operating System/018 Installing Using VirtualBox for Lab Virtualization.mp4 150.5 MB
  • 04 The Windows Operating System/031 Windows Command Line - Navigation.mp4 150.3 MB
  • 04 The Windows Operating System/025 Windows Internals - API Calls.mp4 149.6 MB
  • 25 Job Hunting/257 Searching for the Job.mp4 146.9 MB
  • 07 Active Directory/070 The AD Tree.mp4 146.4 MB
  • 07 Active Directory/069 Install AD DS.mp4 143.0 MB
  • 04 The Windows Operating System/024 Windows Internals - Alternate Data Streams.mp4 141.9 MB
  • 20 Post Exploitation/222 Network Traffic.mp4 137.4 MB
  • 18 Reconnaissance/167 Passive Recon - Google.mp4 137.0 MB
  • 05 The Linux Operating System/047 Linux Processes.mp4 134.9 MB
  • 20 Post Exploitation/215 LinuxPrivChecker.mp4 134.6 MB
  • 07 Active Directory/073 Adding Machine to the Domain.mp4 134.0 MB
  • 19 Exploitation/194 XSS.mp4 133.0 MB
  • 25 Job Hunting/261 Salary Requirements.mp4 132.7 MB
  • 04 The Windows Operating System/020 The Windows File System.mp4 131.4 MB
  • 20 Post Exploitation/223 ARP Poisoning.mp4 131.0 MB
  • 25 Job Hunting/255 Certifications.mp4 130.8 MB
  • 18 Reconnaissance/166 Installing Kali.mp4 130.0 MB
  • 25 Job Hunting/264 The Interview Process - The Technical Screening Interview.mp4 127.3 MB
  • 18 Reconnaissance/174 Active Recon - Nikto.mp4 124.8 MB
  • 19 Exploitation/192 The OWASP Top 10.mp4 123.7 MB
  • 04 The Windows Operating System/029 Windows Internals - PE Files DLLs.mp4 123.1 MB
  • 05 The Linux Operating System/045 Linux Command Line - Hex.mp4 119.0 MB
  • 21 Password Cracking/231 Hashcat.mp4 116.1 MB
  • 19 Exploitation/189 Metasploit - Adding an Exploit to Metasploit.mp4 115.0 MB
  • 07 Active Directory/071 OUs and their Permissions.mp4 114.7 MB
  • 18 Reconnaissance/170 Passive Recon - Netcraft.mp4 113.1 MB
  • 13 Configuring PFSense Firewalls/121 The Firewall UI.mp4 112.6 MB
  • 19 Exploitation/186 Metasploit - What is Metasploit.mp4 112.0 MB
  • 07 Active Directory/068 Basic Windows Server Configuration.mp4 111.9 MB
  • 25 Job Hunting/260 The Future Company.mp4 111.5 MB
  • 22 Covering Your Tracks/236 Clearing Linux Logs.mp4 108.5 MB
  • 18 Reconnaissance/171 Passive Recon - Job Posting.mp4 107.2 MB
  • 03 Penetration Testing Process/008 Metrics Why They Are Important.mp4 106.4 MB
  • 20 Post Exploitation/226 Password Spraying.mp4 106.1 MB
  • 19 Exploitation/190 Metasploit - MSFVenom.mp4 105.2 MB
  • 20 Post Exploitation/219 SSH Keys.mp4 104.4 MB
  • 15 Python Course/141 Inheritance.mp4 103.7 MB
  • 19 Exploitation/197 Remote File Inclusion.mp4 103.7 MB
  • 15 Python Course/134 IfElse.mp4 103.6 MB
  • 16 Assembly Course/156 Writing Files.mp4 103.4 MB
  • 18 Reconnaissance/169 Passive Recon - Whois.mp4 102.1 MB
  • 16 Assembly Course/150 Variables.mp4 102.0 MB
  • 04 The Windows Operating System/030 Windows Command Line - Accessing the Command Line.mp4 100.1 MB
  • 16 Assembly Course/157 Op Code.mp4 99.9 MB
  • 24 Attacking Active Directory (Realistic Scenario)/252 Getting Domain Admin.mp4 99.5 MB
  • 13 Configuring PFSense Firewalls/120 Installing PFSense.mp4 98.6 MB
  • 25 Job Hunting/263 The Interview Process - Prepping for the Technical Interviews.mp4 97.9 MB
  • 18 Reconnaissance/175 Active Recon - Dirb.mp4 93.7 MB
  • 18 Reconnaissance/180 Active Recon - Browsing.mp4 91.3 MB
  • 03 Penetration Testing Process/015 Building Working with an Enterprise Budget.mp4 90.5 MB
  • 21 Password Cracking/230 John The Ripper.mp4 89.6 MB
  • 22 Covering Your Tracks/237 Quick Talk on Logging.mp4 88.7 MB
  • 20 Post Exploitation/206 What is Privilege Escalation.mp4 87.8 MB
  • 07 Active Directory/072 Managing Users and Groups.mp4 86.0 MB
  • 03 Penetration Testing Process/014 Routine Assessments Part 6 - Building an Assessment Plan.mp4 84.7 MB
  • 20 Post Exploitation/218 Pass The Hash.mp4 84.3 MB
  • 15 Python Course/140 Classes.mp4 82.8 MB
  • 04 The Windows Operating System/022 Windows Internals - UAC.mp4 82.6 MB
  • 18 Reconnaissance/181 Active Recon - Manual vs Automated.mp4 81.7 MB
  • 13 Configuring PFSense Firewalls/122 Configuring a DMZ.mp4 80.4 MB
  • 15 Python Course/137 Lists.mp4 79.5 MB
  • 15 Python Course/145 Sockets.mp4 76.9 MB
  • 16 Assembly Course/153 Loops.mp4 76.5 MB
  • 13 Configuring PFSense Firewalls/123 Configuring a VPN.mp4 76.2 MB
  • 05 The Linux Operating System/038 Linux Command Line - Navigation.mp4 75.5 MB
  • 05 The Linux Operating System/050 Symbolic Links.mp4 75.4 MB
  • 24 Attacking Active Directory (Realistic Scenario)/250 Finding New Access.mp4 75.1 MB
  • 04 The Windows Operating System/034 Windows Command Line - Standard IOE.mp4 75.1 MB
  • 05 The Linux Operating System/046 Linux Command Line - Network Connections Recap.mp4 73.7 MB
  • 15 Python Course/136 The Dictionary.mp4 73.2 MB
  • 05 The Linux Operating System/049 Working with Open Files.mp4 72.9 MB
  • 20 Post Exploitation/225 Account Directory Attacks.mp4 70.9 MB
  • 05 The Linux Operating System/054 Linux Logs.mp4 68.5 MB
  • 05 The Linux Operating System/052 Linux Pipes.mp4 68.2 MB
  • 22 Covering Your Tracks/235 Clearing Windows Logs.mp4 68.1 MB
  • 18 Reconnaissance/168 Passive Recon - Shodan.mp4 67.7 MB
  • 05 The Linux Operating System/043 Linux Command Line - Man Pages.mp4 66.5 MB
  • 05 The Linux Operating System/040 Linux Command Line - Standard IOE Recap.mp4 65.4 MB
  • 15 Python Course/135 Loops.mp4 63.4 MB
  • 25 Job Hunting/259 Applying for the Job.mp4 60.8 MB
  • 06 Operating System Internals/064 Debuggers.mp4 60.4 MB
  • 20 Post Exploitation/216 Im Root Now What.mp4 59.8 MB
  • 24 Attacking Active Directory (Realistic Scenario)/251 Moving Up In The World.mp4 58.8 MB
  • 15 Python Course/144 Error Handling.mp4 58.4 MB
  • 22 Covering Your Tracks/239 Persistent Backdoors.mp4 57.3 MB
  • 15 Python Course/130 Hello World.mp4 56.2 MB
  • 05 The Linux Operating System/044 Linux Command Line - Base64.mp4 54.8 MB
  • 15 Python Course/146 Threading.mp4 54.5 MB
  • 05 The Linux Operating System/051 The IDs.mp4 54.4 MB
  • 15 Python Course/131 Variables.mp4 53.8 MB
  • 13 Configuring PFSense Firewalls/124 Backup Logging.mp4 53.7 MB
  • 19 Exploitation/198 The Authenticated Unauthenticated Pages.mp4 53.4 MB
  • 07 Active Directory/075 Cached Credentials.mp4 51.9 MB
  • 24 Attacking Active Directory (Realistic Scenario)/248 Exploitation.mp4 50.2 MB
  • 06 Operating System Internals/055 The Kernel.mp4 50.1 MB
  • 10 Networking/098 TCPIP.mp4 49.5 MB
  • 22 Covering Your Tracks/240 The Clean Up.mp4 48.6 MB
  • 05 The Linux Operating System/048 What are INodes.mp4 48.5 MB
  • 15 Python Course/129 Installing Python.mp4 47.9 MB
  • 24 Attacking Active Directory (Realistic Scenario)/249 Post Exploitation.mp4 47.7 MB
  • 05 The Linux Operating System/042 Linux Command Line - Working with File Permissions.mp4 47.6 MB
  • 04 The Windows Operating System/028 Windows Internals - Named Pipes.mp4 47.6 MB
  • 25 Job Hunting/267 The Interview Process - The Offer.mp4 47.3 MB
  • 15 Python Course/139 Modules.mp4 47.2 MB
  • 15 Python Course/143 Logging.mp4 46.4 MB
  • 07 Active Directory/067 What is Active Directory.mp4 45.9 MB
  • 06 Operating System Internals/058 The CPU Registers.mp4 45.8 MB
  • 10 Networking/104 DNS.mp4 44.4 MB
  • 02 The 3 Teams/003 The Red Team.mp4 43.8 MB
  • 20 Post Exploitation/224 Web Servers.mp4 43.3 MB
  • 04 The Windows Operating System/027 Windows Internals - Tokens.mp4 42.9 MB
  • 03 Penetration Testing Process/011 Routine Assessments Part 3 - Quarterly Assessments.mp4 42.6 MB
  • 19 Exploitation/195 Insecure Direct Object Reference.mp4 42.6 MB
  • 19 Exploitation/199 Broken Authentication and Session Management.mp4 42.3 MB
  • 11 VPNs/114 What is IPSEC.mp4 40.8 MB
  • 24 Attacking Active Directory (Realistic Scenario)/247 Reconnaissance.mp4 39.1 MB
  • 10 Networking/096 What is Networking.mp4 37.9 MB
  • 15 Python Course/142 Configuration Files.mp4 37.6 MB
  • 20 Post Exploitation/221 Duel Homed Machines.mp4 37.1 MB
  • 03 Penetration Testing Process/007 Penetration Testing Methodology.mp4 36.6 MB
  • 08 Kerberos/079 The Ticket Granting Server.mp4 36.4 MB
  • 20 Post Exploitation/220 Checking Logs.mp4 36.3 MB
  • 15 Python Course/132 Type Casting.mp4 35.5 MB
  • 21 Password Cracking/232 Rainbow Tables.mp4 35.0 MB
  • 17 Scope Identification/161 Stability Considerations.mp4 34.5 MB
  • 25 Job Hunting/262 The Interview Process - The Screening Call.mp4 34.3 MB
  • 04 The Windows Operating System/026 Windows Internals - The SID.mp4 33.9 MB
  • 15 Python Course/133 Operators.mp4 33.1 MB
  • 17 Scope Identification/163 Prepping.mp4 32.7 MB
  • 03 Penetration Testing Process/013 Routine Assessments Part 5 - Constant Assessments.mp4 32.4 MB
  • 10 Networking/101 Routers Gateways.mp4 32.4 MB
  • 18 Reconnaissance/182 Reconnaissance Hands On.mp4 31.3 MB
  • 11 VPNs/115 What is IKE.mp4 31.1 MB
  • 15 Python Course/138 Tuples.mp4 30.6 MB
  • 10 Networking/105 DHCP.mp4 30.5 MB
  • 10 Networking/103 ICMP.mp4 30.1 MB
  • 06 Operating System Internals/061 The Stack.mp4 29.4 MB
  • 06 Operating System Internals/056 One Ring to Rule Them All.mp4 29.3 MB
  • 17 Scope Identification/160 Goal Scope Identification.mp4 29.1 MB
  • 01 Welcome Who Is This Guy/001 Introduction.mp4 28.8 MB
  • 25 Job Hunting/254 Professional Email.mp4 28.7 MB
  • 02 The 3 Teams/005 The Purple Team.mp4 27.7 MB
  • 03 Penetration Testing Process/010 Routine Assessments Part 2 - Yearly Assessments.mp4 27.3 MB
  • 10 Networking/108 What is an IPS.mp4 26.4 MB
  • 10 Networking/106 ARP.mp4 26.4 MB
  • 02 The 3 Teams/004 The Blue Team.mp4 25.5 MB
  • 25 Job Hunting/266 The Interview Process - The Onsite.mp4 25.4 MB
  • 23 Reporting/244 Business Risks on Findings.mp4 25.3 MB
  • 18 Reconnaissance/179 Active Recon - Vulnerability Scanners.mp4 25.2 MB
  • 05 The Linux Operating System/037 The Linux File System.mp4 25.0 MB
  • 19 Exploitation/200 Faulty Redirects.mp4 24.8 MB
  • 10 Networking/112 Quick Talk on Databases.mp4 24.2 MB
  • 10 Networking/100 The Switch.mp4 24.1 MB
  • 21 Password Cracking/229 What is Password Cracking.mp4 23.6 MB
  • 09 Data Manipulation/089 Base64 Encoding.mp4 23.0 MB
  • 06 Operating System Internals/066 A Quick Word About AntiVirus.mp4 22.5 MB
  • 09 Data Manipulation/082 Asymmetric Encryption.mp4 22.4 MB
  • 10 Networking/109 What is HA.mp4 22.1 MB
  • 10 Networking/097 The OSI Model.mp4 22.0 MB
  • 06 Operating System Internals/063 Extra information on Memory.mp4 21.5 MB
  • 09 Data Manipulation/090 Hex Encoding.mp4 21.4 MB
  • 19 Exploitation/185 Looking for 0 days.mp4 20.8 MB
  • 14 Program Theory/127 What is a Linker.mp4 20.7 MB
  • 03 Penetration Testing Process/012 Routine Assessments Part 4- Monthly Assessments.mp4 20.0 MB
  • 22 Covering Your Tracks/234 Why Cover Your Tracks.mp4 19.7 MB
  • 09 Data Manipulation/087 SHA Hashing.mp4 19.6 MB
  • 25 Job Hunting/265 The Interview Process - Prepping for the On Site Final Interview.mp4 19.5 MB
  • 03 Penetration Testing Process/009 Routine Assessments Part 1 - What Are Routine Assessments.mp4 19.4 MB
  • 05 The Linux Operating System/053 Linux Run Levels.mp4 19.4 MB
  • 14 Program Theory/126 What is a Compiler.mp4 19.0 MB
  • 03 Penetration Testing Process/016 Specialties.mp4 18.0 MB
  • 09 Data Manipulation/093 Lossless vs Lossy Compression.mp4 18.0 MB
  • 08 Kerberos/076 What is Kerberos.mp4 17.9 MB
  • 19 Exploitation/184 Misconfigurations.mp4 17.9 MB
  • 05 The Linux Operating System/036 Where is the GUI.mp4 17.9 MB
  • 12 Firewalls/116 What is a Firewall.mp4 17.8 MB
  • 15 Python Course/128 Why Python.mp4 17.6 MB
  • 18 Reconnaissance/165 What is Reconnaissance.mp4 17.4 MB
  • 10 Networking/107 What is an IDS.mp4 17.3 MB
  • 09 Data Manipulation/081 Symmetric Encryption.mp4 17.3 MB
  • 06 Operating System Internals/060 What is Memory How does it work.mp4 17.0 MB
  • 23 Reporting/243 The Audience.mp4 16.9 MB
  • 06 Operating System Internals/062 The Heap.mp4 16.8 MB
  • 08 Kerberos/078 The Authentication Server.mp4 16.5 MB
  • 16 Assembly Course/158 Bit Operators.mp4 15.9 MB
  • 09 Data Manipulation/080 What is Encryption.mp4 15.8 MB
  • 09 Data Manipulation/091 URL Encoding.mp4 15.4 MB
  • 19 Exploitation/191 Metasploit - Hands On.mp4 15.1 MB
  • 03 Penetration Testing Process/006 Module Overview - Penetration Testing Process.mp4 14.9 MB
  • 03 Penetration Testing Process/017 The CIA Triangle.mp4 14.9 MB
  • 10 Networking/110 Proxys.mp4 14.3 MB
  • 06 Operating System Internals/065 Taking a look at ASLR.mp4 13.9 MB
  • 23 Reporting/245 Remediation Options.mp4 13.7 MB
  • 09 Data Manipulation/092 What is Compression.mp4 13.6 MB
  • 10 Networking/111 The DMZ.mp4 13.3 MB
  • 12 Firewalls/118 Stateful Inspecting Firewalls.mp4 13.0 MB
  • 09 Data Manipulation/085 What is Hashing.mp4 12.2 MB
  • 15 Python Course/147 Python Hands On.mp4 11.9 MB
  • 17 Scope Identification/162 Briefing Stake Holders.mp4 11.7 MB
  • 06 Operating System Internals/059 The CPU Flags.mp4 11.6 MB
  • 20 Post Exploitation/203 What is Persistence.mp4 11.6 MB
  • 06 Operating System Internals/057 What is a CPU.mp4 11.4 MB
  • 10 Networking/099 UDP.mp4 11.4 MB
  • 11 VPNs/113 What is a VPN.mp4 11.2 MB
  • 09 Data Manipulation/086 MD5 Hashing.mp4 11.1 MB
  • 09 Data Manipulation/094 LZ77 LZ78 Compression Algorithms.mp4 10.3 MB
  • 23 Reporting/246 Working With The Blue Team.mp4 10.2 MB
  • 17 Scope Identification/164 Scope Identification Hands On.mp4 10.2 MB
  • 09 Data Manipulation/083 RSA Encryption.mp4 10.0 MB
  • 12 Firewalls/119 Web Application Firewalls.mp4 10.0 MB
  • 13 Configuring PFSense Firewalls/125 PFsense Hands On.mp4 9.9 MB
  • 08 Kerberos/077 Kerberos Realms.mp4 9.7 MB
  • 09 Data Manipulation/088 What is Encoding.mp4 9.3 MB
  • 16 Assembly Course/148 Why Assembly.mp4 8.6 MB
  • 09 Data Manipulation/095 Data Manipulation - Hands On.mp4 8.4 MB
  • 09 Data Manipulation/084 AES Encryption.mp4 8.3 MB
  • 25 Job Hunting/268 Congratulations.mp4 8.0 MB
  • 21 Password Cracking/233 Password Cracking Hands On.mp4 6.2 MB
  • 10 Networking/102 What is a Protocol.mp4 6.1 MB
  • 16 Assembly Course/159 Assembly Hands On.mp4 6.0 MB
  • 12 Firewalls/117 Packet Filtering Firewalls.mp4 5.7 MB
  • 02 The 3 Teams/002 Module Overview - The 3 Teams.mp4 4.6 MB
  • 22 Covering Your Tracks/241 Covering Your Tracks Hands On.mp4 3.4 MB
  • 06 Operating System Internals/064 Debugger.pptx 455.3 kB
  • 10 Networking/100 The-Switch.pptx 414.7 kB
  • 04 The Windows Operating System/022 Windows-UAC.pptx 167.9 kB
  • 04 The Windows Operating System/026 SID.pptx 138.8 kB
  • 05 The Linux Operating System/042 Linux-File-Permissions.pptx 137.3 kB
  • 06 Operating System Internals/055 The-Kernel.pptx 122.7 kB
  • 06 Operating System Internals/058 Registers.pptx 122.4 kB
  • 04 The Windows Operating System/029 PE-Files-and-DLLs.pptx 121.1 kB
  • 05 The Linux Operating System/047 Processes.pptx 119.9 kB
  • 23 Reporting/242 Report-Template.docx 114.6 kB
  • 09 Data Manipulation/089 Base64.pptx 112.6 kB
  • 05 The Linux Operating System/049 Open-FIles.pptx 110.4 kB
  • 05 The Linux Operating System/037 The-Linux-File-System.pptx 110.2 kB
  • 10 Networking/096 What-is-Networking.pptx 110.1 kB
  • 03 Penetration Testing Process/007 Penetration-Testing-Methodology.pptx 109.0 kB
  • 10 Networking/097 OSI-Model.pptx 105.9 kB
  • 05 The Linux Operating System/050 Symbolic-Links.pptx 105.3 kB
  • 06 Operating System Internals/056 One-Ring-to-Rule-Them-All.pptx 104.8 kB
  • 08 Kerberos/079 The-Ticket-Granting-Server.pptx 104.7 kB
  • 11 VPNs/114 What-is-a-IPSEC.pptx 104.6 kB
  • 04 The Windows Operating System/027 Tokens.pptx 104.5 kB
  • 04 The Windows Operating System/020 The-Windows-File-System.pptx 104.2 kB
  • 06 Operating System Internals/066 AntiVirus.pptx 104.1 kB
  • 06 Operating System Internals/063 More-on-Memory.pptx 104.1 kB
  • 09 Data Manipulation/082 Asymmetric-Encryption.pptx 103.9 kB
  • 06 Operating System Internals/065 ASLR.pptx 103.8 kB
  • 11 VPNs/115 What-is-a-IKE.pptx 103.3 kB
  • 03 Penetration Testing Process/006 Penetration-Testing-Process-Module-Overview.pptx 103.1 kB
  • 10 Networking/105 DHCP.pptx 102.8 kB
  • 19 Exploitation/199 Broken-Auth.pptx 102.8 kB
  • 10 Networking/098 TCPIP.pptx 102.7 kB
  • 04 The Windows Operating System/028 Windows-Pipes.pptx 102.5 kB
  • 05 The Linux Operating System/053 Run-Levels.pptx 102.2 kB
  • 05 The Linux Operating System/048 Inodes.pptx 101.9 kB
  • 21 Password Cracking/232 Rainbow-Tables.pptx 101.7 kB
  • 03 Penetration Testing Process/011 Quarterly-Assessments.pptx 101.4 kB
  • 10 Networking/104 DNS.pptx 101.4 kB
  • 21 Password Cracking/229 What-is-Password-Cracking.pptx 101.2 kB
  • 03 Penetration Testing Process/017 CIA-Triangle.pptx 101.0 kB
  • 06 Operating System Internals/061 The-Stack.pptx 100.9 kB
  • 03 Penetration Testing Process/016 Specialties.pptx 100.7 kB
  • 06 Operating System Internals/057 What-is-a-CPU.pptx 100.5 kB
  • 16 Assembly Course/158 Bit-Operators.pptx 100.3 kB
  • 03 Penetration Testing Process/013 Constant-Assessments.pptx 99.8 kB
  • 02 The 3 Teams/004 The-Blue-Team.pptx 99.8 kB
  • 02 The 3 Teams/003 The-Red-Team.pptx 99.7 kB
  • 17 Scope Identification/160 Goal-and-Scope-Identification.pptx 99.6 kB
  • 25 Job Hunting/267 The-Offer.pptx 99.5 kB
  • 08 Kerberos/078 The-Authentication-Sever.pptx 99.4 kB
  • 23 Reporting/244 Buisness-Risk-on-Findings.pptx 99.3 kB
  • 02 The 3 Teams/005 The-Purple-Team.pptx 99.3 kB
  • 09 Data Manipulation/081 Symmetric-Encryption.pptx 99.2 kB
  • 22 Covering Your Tracks/234 Why-Cover-Your-Tracks.pptx 99.1 kB
  • 06 Operating System Internals/059 Flags.pptx 98.7 kB
  • 09 Data Manipulation/092 What-is-Compression.pptx 98.5 kB
  • 03 Penetration Testing Process/010 Yearly-Assessments.pptx 98.5 kB
  • 06 Operating System Internals/060 Memory.pptx 98.4 kB
  • 03 Penetration Testing Process/012 Monthly-Assessments.pptx 98.4 kB
  • 23 Reporting/243 The-Audience.pptx 98.4 kB
  • 12 Firewalls/116 What-is-a-Firewall.pptx 98.4 kB
  • 14 Program Theory/126 What-is-a-Compiler.pptx 98.3 kB
  • 10 Networking/112 Quick-Talk-on-Databases.pptx 98.3 kB
  • 10 Networking/103 ICMP.pptx 98.1 kB
  • 10 Networking/106 ARP.pptx 98.1 kB
  • 10 Networking/108 What-is-an-IPS.pptx 98.1 kB
  • 17 Scope Identification/161 Stability-Considerations.pptx 98.0 kB
  • 09 Data Manipulation/090 Hex.pptx 98.0 kB
  • 10 Networking/107 What-is-an-IDS.pptx 97.9 kB
  • 08 Kerberos/076 What-is-Kerberos.pptx 97.8 kB
  • 18 Reconnaissance/179 Vuln-Scanners.pptx 97.8 kB
  • 10 Networking/101 Routers-and-Gateways.pptx 97.8 kB
  • 05 The Linux Operating System/036 The-GUI.pptx 97.8 kB
  • 20 Post Exploitation/203 What-is-Persistence.pptx 97.7 kB
  • 06 Operating System Internals/062 The-Heap.pptx 97.6 kB
  • 07 Active Directory/067 What-is-Active-Directory.pptx 97.4 kB
  • 25 Job Hunting/262 The-Screening-Call.pptx 97.3 kB
  • 19 Exploitation/184 Misconfigurations.pptx 97.1 kB
  • 25 Job Hunting/265 Prepping-for-the-on-site-Interview.pptx 97.0 kB
  • 04 The Windows Operating System/025 API-Calls.pptx 97.0 kB
  • 12 Firewalls/118 Stateful-Inspection-Firewalls.pptx 96.8 kB
  • 03 Penetration Testing Process/009 What-Are-Routine-Assessments.pptx 96.8 kB
  • 09 Data Manipulation/080 What-is-Encryption.pptx 96.8 kB
  • 09 Data Manipulation/088 What-is-Encoding.pptx 96.6 kB
  • 09 Data Manipulation/091 URL.pptx 96.5 kB
  • 08 Kerberos/077 Kerberos-Realm.pptx 96.5 kB
  • 09 Data Manipulation/085 What-is-Hashing.pptx 96.5 kB
  • 14 Program Theory/127 What-is-a-Linker.pptx 96.5 kB
  • 12 Firewalls/117 Packet-Filtering-Firewalls.pptx 96.3 kB
  • 10 Networking/109 What-is-HA.pptx 96.3 kB
  • 17 Scope Identification/162 Briefing-Stake-Holders.pptx 96.2 kB
  • 09 Data Manipulation/093 Lossless-vs-Lossy.pptx 96.0 kB
  • 15 Python Course/147 Hands-On-Python.pptx 95.9 kB
  • 25 Job Hunting/266 Onsite-Interview.pptx 95.8 kB
  • 18 Reconnaissance/165 What-is-Recon.pptx 95.7 kB
  • 09 Data Manipulation/094 LZ77-and-LZ78.pptx 95.6 kB
  • 17 Scope Identification/164 Scope-Identification-Hands-On.pptx 95.4 kB
  • 21 Password Cracking/233 Password-Cracking-Hands-On.pptx 95.2 kB
  • 23 Reporting/246 Working-With-The-Blue-Team.pptx 95.2 kB
  • 12 Firewalls/119 Web-Application-Firewalls.pptx 95.0 kB
  • 10 Networking/110 Proxys.pptx 95.0 kB
  • 19 Exploitation/185 0Days.pptx 94.9 kB
  • 09 Data Manipulation/083 RSA.pptx 94.9 kB
  • 09 Data Manipulation/087 SHA.pptx 94.8 kB
  • 16 Assembly Course/148 Why-ASM.pptx 94.8 kB
  • 09 Data Manipulation/084 AES.pptx 94.8 kB
  • 09 Data Manipulation/086 MD5.pptx 94.8 kB
  • 11 VPNs/113 What-is-a-VPN.pptx 94.8 kB
  • 19 Exploitation/191 Metasploit-Hands-On.pptx 94.7 kB
  • 23 Reporting/245 Remediation-Options.pptx 94.7 kB
  • 13 Configuring PFSense Firewalls/125 PFSense-Hands-On.pptx 94.5 kB
  • 16 Assembly Course/159 Assembly-Hands-On.pptx 94.4 kB
  • 02 The 3 Teams/002 The-3-Teams.pptx 93.7 kB
  • 10 Networking/102 What-is-a-Protocol.pptx 93.7 kB
  • 09 Data Manipulation/095 Data-Manipulation-Hands-On.pptx 93.7 kB
  • 15 Python Course/128 Why-Python.pptx 93.5 kB
  • 10 Networking/111 DMZ.pptx 93.4 kB
  • 10 Networking/099 UDP.pptx 93.3 kB
  • 03 Penetration Testing Process/008 Metrics.xlsx 37.6 kB
  • 17 Scope Identification/163 Assessment-Document-Template.docx 34.7 kB
  • 03 Penetration Testing Process/015 Budget-Sample.xlsx 28.4 kB
  • 03 Penetration Testing Process/014 Assessment-Template.xlsx 25.0 kB
  • 03 Penetration Testing Process/015 Budget-Template.xlsx 24.5 kB
  • 25 Job Hunting/253 Resume.docx 19.5 kB
  • 15 Python Course/133 Operators.py 2.4 kB
  • 15 Python Course/134 IfElse.py 2.3 kB
  • 16 Assembly Course/152 Arithmetic.asm.zip 2.2 kB
  • 15 Python Course/136 Dictionary.py 2.0 kB
  • 15 Python Course/141 Inheritance.py 1.7 kB
  • 15 Python Course/142 Configs.zip 1.6 kB
  • 16 Assembly Course/153 Loops.asm.zip 1.6 kB
  • 15 Python Course/137 Lists.py 1.6 kB
  • 16 Assembly Course/155 ReadingFiles.asm.zip 1.5 kB
  • 16 Assembly Course/156 WritingFiles.asm.zip 1.4 kB
  • 15 Python Course/143 Logging.py 1.4 kB
  • 16 Assembly Course/151 SavingState.asm.zip 1.4 kB
  • 15 Python Course/140 Classes.py 1.4 kB
  • 15 Python Course/135 Loops.py 1.3 kB
  • 15 Python Course/144 ErrorHandling.py 1.3 kB
  • 15 Python Course/142 Configs.py 1.3 kB
  • 16 Assembly Course/154 Logic.asm.zip 1.3 kB
  • 16 Assembly Course/149 HelloWorld.asm.zip 1.2 kB
  • 15 Python Course/131 Variables.py 1.2 kB
  • 15 Python Course/145 SocketsServer.py 1.2 kB
  • 15 Python Course/138 Tuples.py 1.2 kB
  • 16 Assembly Course/150 DataTypes.asm.zip 1.1 kB
  • 04 The Windows Operating System/external-assets-links.txt 1.0 kB
  • 15 Python Course/132 TypeCasting.py 1.0 kB
  • 15 Python Course/141 Account.py 961 Bytes
  • 15 Python Course/145 SocketsClient.py 929 Bytes
  • 15 Python Course/140 Person.py 878 Bytes
  • 15 Python Course/146 Threading.py 845 Bytes
  • 20 Post Exploitation/226 spray.py 831 Bytes
  • 15 Python Course/141 CheckingAccount.py 822 Bytes
  • 15 Python Course/139 Modules.py 810 Bytes
  • 20 Post Exploitation/external-assets-links.txt 798 Bytes
  • 18 Reconnaissance/external-assets-links.txt 635 Bytes
  • 15 Python Course/130 HelloWorld.py 583 Bytes
  • 09 Data Manipulation/external-assets-links.txt 520 Bytes
  • 19 Exploitation/195 idor.txt 496 Bytes
  • 19 Exploitation/external-assets-links.txt 479 Bytes
  • 21 Password Cracking/external-assets-links.txt 251 Bytes
  • 05 The Linux Operating System/external-assets-links.txt 200 Bytes
  • 06 Operating System Internals/external-assets-links.txt 130 Bytes
  • 15 Python Course/external-assets-links.txt 103 Bytes
  • 01 Welcome Who Is This Guy/external-assets-links.txt 92 Bytes
  • 07 Active Directory/external-assets-links.txt 83 Bytes
  • 13 Configuring PFSense Firewalls/external-assets-links.txt 57 Bytes
  • 10 Networking/external-assets-links.txt 54 Bytes

随机展示

相关说明

本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!