磁力链接

magnet:?xt=urn:btih:B3F5A7B325EAC9F8146BD4D5E4BC40CC87EFFA51
推荐使用PIKPAK网盘下载资源,PIKPAK是目前最好用网盘,10T超大空间,不和谐任何资源,支持无限次数离线下载,视频在线观看

资源截图

API Integration

文件列表

  • ~Get Your Files Here !/3 - Reconnaissance & Scanning/1 - Introduction to Nmap Basics.mp4 233.4 MB
  • ~Get Your Files Here !/3 - Reconnaissance & Scanning/9 - Creating A Bash Script For Scanning Vulnerable Ports.mp4 224.6 MB
  • ~Get Your Files Here !/3 - Reconnaissance & Scanning/5 - Nmap NSE for Windows Services.mp4 219.2 MB
  • ~Get Your Files Here !/8 - Credential Attacks/3 - Password Cracking with Mimikatz.mp4 162.2 MB
  • ~Get Your Files Here !/3 - Reconnaissance & Scanning/8 - Using Shodan to Find Exposed Systems.mp4 158.7 MB
  • ~Get Your Files Here !/4 - Enumeration & Information Gathering/4 - Recon-ng for Windows Infrastructure.mp4 150.7 MB
  • ~Get Your Files Here !/5 - Exploitation/6 - Exploiting SQL Injection on Windows Sqlmap.mp4 147.9 MB
  • ~Get Your Files Here !/3 - Reconnaissance & Scanning/6 - Installing OpenVAS Using Docker.mp4 140.1 MB
  • ~Get Your Files Here !/7 - Privilege Escalation on Windows/3 - Windows Privilege Escalation - Unquoted Service Path.mp4 134.3 MB
  • ~Get Your Files Here !/2 - Building Your Lab Envirorment/6 - Creating a Virtual install of Server 2016.mp4 131.9 MB
  • ~Get Your Files Here !/6 - Post-Exploitation & Persistence/1 - Persistent Backdoor Using Service Persistence.mp4 122.1 MB
  • ~Get Your Files Here !/7 - Privilege Escalation on Windows/2 - Verify Windows Privilege Escalation Unquoted Service Path.mp4 117.6 MB
  • ~Get Your Files Here !/3 - Reconnaissance & Scanning/7 - Vulnerability Scanning with OpenVAS.mp4 104.6 MB
  • ~Get Your Files Here !/8 - Credential Attacks/5 - Brute-Forcing Windows Services (RDPSMB).mp4 104.4 MB
  • ~Get Your Files Here !/8 - Credential Attacks/6 - Brute Force the SMB Password.mp4 92.7 MB
  • ~Get Your Files Here !/2 - Building Your Lab Envirorment/3 - Creating a Virtaul Install of Kali Linux.mp4 91.6 MB
  • ~Get Your Files Here !/4 - Enumeration & Information Gathering/5 - Enumerate DNS Records Using DNSRecon.mp4 89.6 MB
  • ~Get Your Files Here !/8 - Credential Attacks/7 - Advanced Password Hacking Techniques with Metasploit.mp4 84.3 MB
  • ~Get Your Files Here !/5 - Exploitation/5 - HTML Smuggling Attack.mp4 84.0 MB
  • ~Get Your Files Here !/9 - Wireless & Network Attacks/5 - Exploiting HTTP PUT.mp4 79.8 MB
  • ~Get Your Files Here !/4 - Enumeration & Information Gathering/2 - Local Enumeration with WinPEAS.mp4 74.9 MB
  • ~Get Your Files Here !/6 - Post-Exploitation & Persistence/3 - Launch an Automated Meterpreter Session.mp4 73.9 MB
  • ~Get Your Files Here !/8 - Credential Attacks/2 - Password Cracking with Medusa.mp4 68.0 MB
  • ~Get Your Files Here !/5 - Exploitation/4 - Use Msfvenom to Create a BIND Shell Payload.mp4 62.2 MB
  • ~Get Your Files Here !/5 - Exploitation/9 - Pentesting with Netcat.mp4 62.0 MB
  • ~Get Your Files Here !/2 - Building Your Lab Envirorment/4 - Creating a Virtaul Install of Windows 10.mp4 60.0 MB
  • ~Get Your Files Here !/3 - Reconnaissance & Scanning/2 - Service & OS Detection Using Nmap.mp4 59.7 MB
  • ~Get Your Files Here !/9 - Wireless & Network Attacks/4 - Perform a Vulnerability Scan Using OWASP ZAP Attack Proxy.mp4 56.4 MB
  • ~Get Your Files Here !/9 - Wireless & Network Attacks/3 - Spoof Fake TCP IP Packets Using Hping3.mp4 56.1 MB
  • ~Get Your Files Here !/6 - Post-Exploitation & Persistence/2 - Remote Access via PowerShell Reverse Shell.mp4 55.9 MB
  • ~Get Your Files Here !/4 - Enumeration & Information Gathering/1 - Banner Grabbing & Service Fingerprinting.mp4 55.7 MB
  • ~Get Your Files Here !/3 - Reconnaissance & Scanning/4 - Nmap Host Detection.mp4 55.1 MB
  • ~Get Your Files Here !/5 - Exploitation/1 - Use Msfvenom to Create a Reverse TCP Payload.mp4 53.9 MB
  • ~Get Your Files Here !/2 - Building Your Lab Envirorment/5 - Creating a Virtual Install of Metasploitable3 (W2k08).mp4 53.7 MB
  • ~Get Your Files Here !/5 - Exploitation/2 - Use Msfvenom to Create an HTTPS Payload.mp4 53.4 MB
  • ~Get Your Files Here !/8 - Credential Attacks/1 - Password Cracking with Hydra.mp4 48.5 MB
  • ~Get Your Files Here !/8 - Credential Attacks/4 - Password Cracking with Hydra.mp4 48.5 MB
  • ~Get Your Files Here !/9 - Wireless & Network Attacks/1 - Quickly Transfer files Using Python's SimpleHTTPServer.mp4 46.7 MB
  • ~Get Your Files Here !/5 - Exploitation/3 - Use Msfvenom to Create Hidden Bind TCP Payload.mp4 39.3 MB
  • ~Get Your Files Here !/2 - Building Your Lab Envirorment/1 - Installing Oracle VirtualBox on Windows 10_11.mp4 36.5 MB
  • ~Get Your Files Here !/5 - Exploitation/7 - Exploiting the UNIX_Linux rlogin Vulnerability.mp4 29.2 MB
  • ~Get Your Files Here !/5 - Exploitation/8 - Exploiting VSFTPD v2.3.4 Using Metasploit.mp4 28.3 MB
  • ~Get Your Files Here !/3 - Reconnaissance & Scanning/3 - Nmap Service and Open Port scan.mp4 26.0 MB
  • ~Get Your Files Here !/2 - Building Your Lab Envirorment/2 - Installing the VirtualBox Extension Pack.mp4 23.1 MB
  • ~Get Your Files Here !/1 - Course Overview/1 - Introduction.mp4 20.9 MB
  • ~Get Your Files Here !/6 - Post-Exploitation & Persistence/4 - Disable UAC on Windows using PowerShell.mp4 19.1 MB
  • ~Get Your Files Here !/7 - Privilege Escalation on Windows/1 - Disable UAC on Windows 10 Using Powershell.mp4 19.1 MB
  • ~Get Your Files Here !/9 - Wireless & Network Attacks/2 - Web Application Firewall Detection Using WAFW00F.mp4 18.3 MB
  • ~Get Your Files Here !/4 - Enumeration & Information Gathering/3 - Credential Dumping with netsh (Wi-Fi).mp4 13.2 MB
  • ~Get Your Files Here !/4 - Enumeration & Information Gathering/5 - Enumerate DNS Records Us.PDF 1.4 MB
  • ~Get Your Files Here !/3 - Reconnaissance & Scanning/7 - Lab - Perform a Vulnerability Scan Using OpenVAS.pdf 1.3 MB
  • ~Get Your Files Here !/8 - Credential Attacks/7 - LABADV~1.PDF 1.3 MB
  • ~Get Your Files Here !/3 - Reconnaissance & Scanning/1 - Lab - Introduction to Nmap.pdf 1.2 MB
  • ~Get Your Files Here !/4 - Enumeration & Information Gathering/4 - LAB-GA~1.PDF 1.2 MB
  • ~Get Your Files Here !/8 - Credential Attacks/3 - Lab - Password Cracking Using Mimikatz.pdf 1.1 MB
  • ~Get Your Files Here !/6 - Post-Exploitation & Persistence/1 - LABCRE~1.PDF 1.1 MB
  • ~Get Your Files Here !/8 - Credential Attacks/5 - Lab - Performing an RDP Brute Force Attack.pdf 950.8 kB
  • ~Get Your Files Here !/3 - Reconnaissance & Scanning/5 - Lab - Using the Nmap Scripting Engine (NSE).pdf 939.1 kB
  • ~Get Your Files Here !/9 - Wireless & Network Attacks/5 - Lab - Exploiting HTTP PUT.pdf 871.0 kB
  • ~Get Your Files Here !/3 - Reconnaissance & Scanning/9 - LABB-C~1.PDF 857.8 kB
  • ~Get Your Files Here !/3 - Reconnaissance & Scanning/6 - Lab - Installing OpenVAS Using Docker.pdf 850.9 kB
  • ~Get Your Files Here !/2 - Building Your Lab Envirorment/3 - LAB-CR~1.PDF 834.1 kB
  • ~Get Your Files Here !/2 - Building Your Lab Envirorment/6 - LAB-CR~1.PDF 815.2 kB
  • ~Get Your Files Here !/5 - Exploitation/2 - Lab - Use Msfvenom to Create an HTTPS Payload.pdf 782.4 kB
  • ~Get Your Files Here !/6 - Post-Exploitation & Persistence/3 - LAB-LA~1.PDF 772.2 kB
  • ~Get Your Files Here !/5 - Exploitation/1 - Lab - Use Msfvenom to Create a Reverse TCP Payload.pdf 771.5 kB
  • ~Get Your Files Here !/5 - Exploitation/5 - Lab - HTML Smuggling Attack.pdf 696.4 kB
  • ~Get Your Files Here !/2 - Building Your Lab Envirorment/5 - LAB-CR~1.PDF 668.0 kB
  • ~Get Your Files Here !/8 - Credential Attacks/2 - Lab – Password Cracking Using Medusa.pdf 628.1 kB
  • ~Get Your Files Here !/5 - Exploitation/3 - LAB-US~1.PDF 622.2 kB
  • ~Get Your Files Here !/4 - Enumeration & Information Gathering/2 - Lab - Enumerating Windows 10 Using WinPEAS.pdf 562.5 kB
  • ~Get Your Files Here !/4 - Enumeration & Information Gathering/1 - LAB-US~1.PDF 539.6 kB
  • ~Get Your Files Here !/9 - Wireless & Network Attacks/4 - PERFOR~1.PDF 514.9 kB
  • ~Get Your Files Here !/9 - Wireless & Network Attacks/3 - Lab - Spoof Fake TCPIP Packets Using Hping3.pdf 510.9 kB
  • ~Get Your Files Here !/8 - Credential Attacks/6 - Lab – Brute Force the SMB Password on a Windows Server.pdf 507.8 kB
  • ~Get Your Files Here !/3 - Reconnaissance & Scanning/8 - LABUSI~1.PDF 436.9 kB
  • ~Get Your Files Here !/5 - Exploitation/6 - Lab - SQL Injection Attack using SQLMap.pdf 427.3 kB
  • ~Get Your Files Here !/6 - Post-Exploitation & Persistence/2 - LABCRE~1.PDF 406.0 kB
  • ~Get Your Files Here !/8 - Credential Attacks/1 - Lab - Using Hydra to Brute Force a Password.docx 391.1 kB
  • ~Get Your Files Here !/8 - Credential Attacks/4 - Lab - Using Hydra to Brute Force a Password.docx 391.1 kB
  • ~Get Your Files Here !/2 - Building Your Lab Envirorment/1 - LABINS~1.DOC 364.1 kB
  • ~Get Your Files Here !/2 - Building Your Lab Envirorment/4 - LABINS~1.DOC 364.1 kB
  • ~Get Your Files Here !/5 - Exploitation/9 - Lab - Pentesting with Netcat.pdf 354.8 kB
  • ~Get Your Files Here !/9 - Wireless & Network Attacks/1 - Lab – Quickly Transfer files Using Python.pdf 265.1 kB
  • ~Get Your Files Here !/6 - Post-Exploitation & Persistence/4 - LABDIS~1.PDF 186.4 kB
  • ~Get Your Files Here !/4 - Enumeration & Information Gathering/3 - LAB-DU~1.PDF 134.9 kB
  • ~Get Your Files Here !/7 - Privilege Escalation on Windows/3 - LAB-WI~1.PDF 117.9 kB
  • ~Get Your Files Here !/2 - Building Your Lab Envirorment/5 - REACTI~1.TXT 625 Bytes
  • Get Bonus Downloads Here.url 180 Bytes
  • ~Get Your Files Here !/Bonus Resources.txt 70 Bytes

温馨提示

本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!