~Get Your Files Here !/4. Actions on Objectives and Data Exfiltration with Python/6. Demo - Exfiltrating Data via Cloud Object Storage Services.mp4 18.9 MB
~Get Your Files Here !/3. Post Exploitation with Python/4. Demo - Establishing Persistence via Windows Service.mp4 15.0 MB
~Get Your Files Here !/3. Post Exploitation with Python/2. Interacting with Windows Internals.mp4 13.6 MB
~Get Your Files Here !/4. Actions on Objectives and Data Exfiltration with Python/2. Avoiding Signature Detections and DLP.mp4 12.5 MB
~Get Your Files Here !/4. Actions on Objectives and Data Exfiltration with Python/4. Demo - Encrypting Data with Python.mp4 12.2 MB
~Get Your Files Here !/02. Initial Access and Network Scanning with Python/03. Demo - Crafting DNS and Ping Requests.mp4 11.7 MB
~Get Your Files Here !/02. Initial Access and Network Scanning with Python/05. Demo - Performing Network and Port Scanning with Scapy.mp4 11.5 MB
~Get Your Files Here !/3. Post Exploitation with Python/3. Demo - Identifying and Exploiting Local Scripts.mp4 10.7 MB
~Get Your Files Here !/02. Initial Access and Network Scanning with Python/06. Parsing PCAP Files with Scapy.mp4 9.7 MB
~Get Your Files Here !/02. Initial Access and Network Scanning with Python/08. Demo - Performing ARP MitM with Scapy.mp4 9.6 MB
~Get Your Files Here !/4. Actions on Objectives and Data Exfiltration with Python/5. Demo - Exfiltrating Data via SMTP.mp4 8.3 MB
~Get Your Files Here !/02. Initial Access and Network Scanning with Python/09. Abusing Common Network Protocols.mp4 8.1 MB
~Get Your Files Here !/02. Initial Access and Network Scanning with Python/02. Getting Started with Scapy.mp4 6.7 MB
~Get Your Files Here !/02. Initial Access and Network Scanning with Python/01. Introduction.mp4 6.7 MB
~Get Your Files Here !/02. Initial Access and Network Scanning with Python/04. Performing Network Discovery with Scapy.mp4 6.0 MB
~Get Your Files Here !/4. Actions on Objectives and Data Exfiltration with Python/1. Introduction.mp4 5.0 MB
~Get Your Files Here !/3. Post Exploitation with Python/1. Introduction.mp4 4.8 MB
~Get Your Files Here !/4. Actions on Objectives and Data Exfiltration with Python/3. Demo - Encoding and Compressing Data with Python.mp4 4.8 MB
~Get Your Files Here !/02. Initial Access and Network Scanning with Python/07. Overview of Man-in-the-Middle Attacks.mp4 4.6 MB
~Get Your Files Here !/1. Course Overview/1. Course Overview.mp4 4.0 MB
~Get Your Files Here !/4. Actions on Objectives and Data Exfiltration with Python/7. Summary.mp4 3.8 MB
~Get Your Files Here !/3. Post Exploitation with Python/5. Summary.mp4 1.7 MB
~Get Your Files Here !/02. Initial Access and Network Scanning with Python/10. Summary.mp4 1.5 MB
~Get Your Files Here !/4. Actions on Objectives and Data Exfiltration with Python/6. Demo - Exfiltrating Data via Cloud Object Storage Services.vtt 7.9 kB
~Get Your Files Here !/4. Actions on Objectives and Data Exfiltration with Python/2. Avoiding Signature Detections and DLP.vtt 6.3 kB
~Get Your Files Here !/3. Post Exploitation with Python/4. Demo - Establishing Persistence via Windows Service.vtt 6.3 kB
~Get Your Files Here !/02. Initial Access and Network Scanning with Python/05. Demo - Performing Network and Port Scanning with Scapy.vtt 6.1 kB
~Get Your Files Here !/02. Initial Access and Network Scanning with Python/03. Demo - Crafting DNS and Ping Requests.vtt 5.5 kB
~Get Your Files Here !/3. Post Exploitation with Python/3. Demo - Identifying and Exploiting Local Scripts.vtt 5.5 kB
~Get Your Files Here !/4. Actions on Objectives and Data Exfiltration with Python/4. Demo - Encrypting Data with Python.vtt 5.1 kB
~Get Your Files Here !/3. Post Exploitation with Python/2. Interacting with Windows Internals.vtt 5.0 kB
~Get Your Files Here !/02. Initial Access and Network Scanning with Python/09. Abusing Common Network Protocols.vtt 4.6 kB
~Get Your Files Here !/02. Initial Access and Network Scanning with Python/06. Parsing PCAP Files with Scapy.vtt 4.5 kB
~Get Your Files Here !/02. Initial Access and Network Scanning with Python/02. Getting Started with Scapy.vtt 4.4 kB
~Get Your Files Here !/02. Initial Access and Network Scanning with Python/01. Introduction.vtt 4.3 kB
~Get Your Files Here !/4. Actions on Objectives and Data Exfiltration with Python/5. Demo - Exfiltrating Data via SMTP.vtt 4.1 kB
~Get Your Files Here !/02. Initial Access and Network Scanning with Python/08. Demo - Performing ARP MitM with Scapy.vtt 4.1 kB
~Get Your Files Here !/02. Initial Access and Network Scanning with Python/04. Performing Network Discovery with Scapy.vtt 4.0 kB
~Get Your Files Here !/3. Post Exploitation with Python/1. Introduction.vtt 3.3 kB
~Get Your Files Here !/4. Actions on Objectives and Data Exfiltration with Python/3. Demo - Encoding and Compressing Data with Python.vtt 3.2 kB
~Get Your Files Here !/4. Actions on Objectives and Data Exfiltration with Python/1. Introduction.vtt 2.9 kB
~Get Your Files Here !/4. Actions on Objectives and Data Exfiltration with Python/7. Summary.vtt 2.6 kB
~Get Your Files Here !/02. Initial Access and Network Scanning with Python/07. Overview of Man-in-the-Middle Attacks.vtt 2.6 kB
~Get Your Files Here !/playlist.m3u 2.0 kB
~Get Your Files Here !/1. Course Overview/1. Course Overview.vtt 1.7 kB
~Get Your Files Here !/3. Post Exploitation with Python/5. Summary.vtt 1.2 kB
~Get Your Files Here !/02. Initial Access and Network Scanning with Python/10. Summary.vtt 1.1 kB
~Get Your Files Here !/Bonus Resources.txt 386 Bytes