• Files list
  • 0. Websites you may like,0. (1Hack.Us) Premium Tutorials-Guides-Articles _ Community based Forum.url 377.00Bytes
  • 0. Websites you may like,1. (FreeCoursesOnline.Me) Download Udacity, Masterclass, Lynda, PHLearn, Pluralsight Free.url 286.00Bytes
  • 0. Websites you may like,3. (FTUApps.com) Download Cracked Developers Applications For Free.url 239.00Bytes
  • 0. Websites you may like,How you can help our Group!.txt 208.00Bytes
  • 1 - Reading, Modifying, and Testing an Exploit Script,01 - The Course Overview.mp4 13.51MB
  • 1 - Reading, Modifying, and Testing an Exploit Script,02 - Setting Up Your Virtual Environment.mp4 11.20MB
  • 1 - Reading, Modifying, and Testing an Exploit Script,03 - Finding an Exploit Script.mp4 9.87MB
  • 1 - Reading, Modifying, and Testing an Exploit Script,04 - Understanding the Script.mp4 11.48MB
  • 1 - Reading, Modifying, and Testing an Exploit Script,05 - Modifying the Script.mp4 19.16MB
  • 1 - Reading, Modifying, and Testing an Exploit Script,06 - Testing the Script.mp4 13.99MB
  • 2 - Analyzing a Packet Capture File,07 - Viewing a Packet Capture File in Wireshark.mp4 20.40MB
  • 2 - Analyzing a Packet Capture File,08 - Understanding Normal Traffic Patterns.mp4 16.98MB
  • 2 - Analyzing a Packet Capture File,09 - Writing a Python Script to Look for Malicious Network Traffic.mp4 17.76MB
  • 2 - Analyzing a Packet Capture File,10 - Writing a Python Script to Calculate a Network Traffic Baseline.mp4 22.12MB
  • 2 - Analyzing a Packet Capture File,11 - Writing a Python Script to Compare a Baseline Against Network Traffic.mp4 18.01MB
  • 3 - Gathering Open-Source Intelligence,12 - What OSINT Is.mp4 12.05MB
  • 3 - Gathering Open-Source Intelligence,13 - Enumerating Domain Names with Python.mp4 15.43MB
  • 3 - Gathering Open-Source Intelligence,14 - What Is Google Dorking.mp4 12.90MB
  • 3 - Gathering Open-Source Intelligence,15 - Automating Google Dorking with Python.mp4 12.96MB
  • 3 - Gathering Open-Source Intelligence,16 - Web Directory Enumeration with Python.mp4 15.47MB
  • 4 - Analyzing a Log File,17 - Reading a Log File.mp4 15.85MB
  • 4 - Analyzing a Log File,18 - Understanding Normal Log Messages.mp4 14.58MB
  • 4 - Analyzing a Log File,19 - Writing a Python Script to Look for Logs Indicating Malicious Activity.mp4 17.55MB
  • 4 - Analyzing a Log File,20 - Writing a Python Script to Calculate a Log Message Baseline.mp4 17.58MB
  • 4 - Analyzing a Log File,21 - Writing a Python Script to Compare a Baseline Against a Log File.mp4 14.69MB
  • 5 - Writing a Python Replacement for Netcat,22 - What Is Netcat.mp4 13.65MB
  • 5 - Writing a Python Replacement for Netcat,23 - Writing the Input Arguments.mp4 20.10MB
  • 5 - Writing a Python Replacement for Netcat,24 - Writing the Client.mp4 14.01MB
  • 5 - Writing a Python Replacement for Netcat,25 - Writing the Server.mp4 17.28MB
  • 5 - Writing a Python Replacement for Netcat,26 - Testing Your Program.mp4 13.47MB
  • 6 - Collecting Network Packets Off the Wire,27 - Introduction to Passive Network Capture.mp4 8.51MB
  • 6 - Collecting Network Packets Off the Wire,28 - Writing a Python Packet Sniffer.mp4 14.36MB
  • 6 - Collecting Network Packets Off the Wire,29 - Capturing Plain-Text Credentials from Network Packets with Python.mp4 15.18MB
  • 6 - Collecting Network Packets Off the Wire,30 - Introduction to ARP Cache Poisoning.mp4 9.15MB
  • 6 - Collecting Network Packets Off the Wire,31 - Writing a Python ARP Cache Poisoner.mp4 17.88MB
  • 7 - Building a Penetration Testing Tool,32 - Introduction to the Metasploit Framework.mp4 20.79MB
  • 7 - Building a Penetration Testing Tool,33 - Writing the Discovery Module.mp4 16.51MB
  • 7 - Building a Penetration Testing Tool,34 - Writing the Exploit Framework.mp4 19.07MB
  • 7 - Building a Penetration Testing Tool,35 - Stitching It All Together with an Interactive Command Shell.mp4 23.65MB
  • 7 - Building a Penetration Testing Tool,36 - Testing MSFPY.mp4 15.29MB
  • 9781838828219_Code.zip 9.72MB