磁力链接

magnet:?xt=urn:btih:CC615A34127852F9B7F0E4ABE80666EC34F6B1CB
推荐使用PIKPAK网盘下载资源,PIKPAK是目前最好用网盘,10T超大空间,不和谐任何资源,支持无限次数离线下载,视频在线观看

资源截图

API Integration

文件列表

  • 04 The Windows Operating System/019 Windows at a Glance.mp4 442.3 MB
  • 18 Reconnaissance/172 Active Recon - Port Scanning.mp4 436.1 MB
  • 19 Exploitation/193 SQL Injection SQLMap.mp4 417.9 MB
  • 16 Assembly Course/152 Arithmetic.mp4 331.0 MB
  • 25 Job Hunting/258 Analyzing the Job Post.mp4 312.1 MB
  • 20 Post Exploitation/201 Stabilizing Shells.mp4 285.1 MB
  • 20 Post Exploitation/210 MySQL.mp4 277.1 MB
  • 20 Post Exploitation/209 File Permissions.mp4 275.6 MB
  • 04 The Windows Operating System/023 Windows Internals - Permissions.mp4 272.0 MB
  • 18 Reconnaissance/177 Active Recon - Working with NC.mp4 271.6 MB
  • 23 Reporting/242 The Format.mp4 259.5 MB
  • 16 Assembly Course/149 Hello World.mp4 255.5 MB
  • 20 Post Exploitation/228 Pivoting.mp4 244.7 MB
  • 20 Post Exploitation/208 Common Configuration Issues.mp4 234.4 MB
  • 05 The Linux Operating System/041 Linux Command Line - Working with Data.mp4 230.5 MB
  • 20 Post Exploitation/227 SSH Tunneling.mp4 224.9 MB
  • 20 Post Exploitation/207 OS Version.mp4 223.6 MB
  • 07 Active Directory/074 Setting up Group Policies.mp4 216.9 MB
  • 19 Exploitation/187 Metasploit - Exploits and Payloads.mp4 205.0 MB
  • 04 The Windows Operating System/033 Windows Command Line - Working with Pipes.mp4 199.8 MB
  • 20 Post Exploitation/213 Unquoted Service Path.mp4 198.8 MB
  • 20 Post Exploitation/205 Linux Persistence.mp4 196.3 MB
  • 16 Assembly Course/155 Reading Files.mp4 187.9 MB
  • 20 Post Exploitation/211 Sudo.mp4 184.9 MB
  • 20 Post Exploitation/202 Breaking Out Of The Jail Shell.mp4 176.9 MB
  • 19 Exploitation/183 Finding Exploits.mp4 175.6 MB
  • 19 Exploitation/188 Metasploit - The Meterpreter.mp4 174.4 MB
  • 20 Post Exploitation/217 Pulling Hashes.mp4 173.1 MB
  • 16 Assembly Course/154 Logic Control.mp4 170.1 MB
  • 20 Post Exploitation/204 Windows Persistence.mp4 169.3 MB
  • 18 Reconnaissance/176 Active Recon - Sparta.mp4 168.7 MB
  • 19 Exploitation/196 Local File Inclusion.mp4 162.8 MB
  • 16 Assembly Course/151 Saving States.mp4 162.4 MB
  • 18 Reconnaissance/173 Active Recon - DNS.mp4 159.5 MB
  • 25 Job Hunting/256 Personal Brand.mp4 158.7 MB
  • 04 The Windows Operating System/021 Windows Logs.mp4 158.7 MB
  • 04 The Windows Operating System/032 Windows Command Line - Working with Files and Directories.mp4 157.5 MB
  • 22 Covering Your Tracks/238 Clearing Command History.mp4 155.9 MB
  • 20 Post Exploitation/214 Service Misconfigurations.mp4 155.7 MB
  • 04 The Windows Operating System/035 Windows Command Line - Managing Windows.mp4 153.9 MB
  • 18 Reconnaissance/178 Active Recon - Banner Grabbing.mp4 153.1 MB
  • 20 Post Exploitation/212 Relative Path Sudo Binary.mp4 151.2 MB
  • 05 The Linux Operating System/039 Linux Command Line - Working with Files and Directories.mp4 150.9 MB
  • 25 Job Hunting/253 The Resume.mp4 150.6 MB
  • 04 The Windows Operating System/018 Installing Using VirtualBox for Lab Virtualization.mp4 150.5 MB
  • 04 The Windows Operating System/031 Windows Command Line - Navigation.mp4 150.3 MB
  • 04 The Windows Operating System/025 Windows Internals - API Calls.mp4 149.6 MB
  • 25 Job Hunting/257 Searching for the Job.mp4 146.9 MB
  • 07 Active Directory/070 The AD Tree.mp4 146.4 MB
  • 07 Active Directory/069 Install AD DS.mp4 143.0 MB
  • 04 The Windows Operating System/024 Windows Internals - Alternate Data Streams.mp4 141.9 MB
  • 20 Post Exploitation/222 Network Traffic.mp4 137.4 MB
  • 18 Reconnaissance/167 Passive Recon - Google.mp4 137.0 MB
  • 05 The Linux Operating System/047 Linux Processes.mp4 134.9 MB
  • 20 Post Exploitation/215 LinuxPrivChecker.mp4 134.6 MB
  • 07 Active Directory/073 Adding Machine to the Domain.mp4 134.0 MB
  • 19 Exploitation/194 XSS.mp4 133.0 MB
  • 25 Job Hunting/261 Salary Requirements.mp4 132.7 MB
  • 04 The Windows Operating System/020 The Windows File System.mp4 131.4 MB
  • 20 Post Exploitation/223 ARP Poisoning.mp4 131.0 MB
  • 25 Job Hunting/255 Certifications.mp4 130.8 MB
  • 18 Reconnaissance/166 Installing Kali.mp4 130.0 MB
  • 25 Job Hunting/264 The Interview Process - The Technical Screening Interview.mp4 127.3 MB
  • 18 Reconnaissance/174 Active Recon - Nikto.mp4 124.8 MB
  • 19 Exploitation/192 The OWASP Top 10.mp4 123.7 MB
  • 04 The Windows Operating System/029 Windows Internals - PE Files DLLs.mp4 123.1 MB
  • 05 The Linux Operating System/045 Linux Command Line - Hex.mp4 119.0 MB
  • 21 Password Cracking/231 Hashcat.mp4 116.1 MB
  • 19 Exploitation/189 Metasploit - Adding an Exploit to Metasploit.mp4 115.0 MB
  • 07 Active Directory/071 OUs and their Permissions.mp4 114.7 MB
  • 18 Reconnaissance/170 Passive Recon - Netcraft.mp4 113.1 MB
  • 13 Configuring PFSense Firewalls/121 The Firewall UI.mp4 112.6 MB
  • 19 Exploitation/186 Metasploit - What is Metasploit.mp4 112.0 MB
  • 07 Active Directory/068 Basic Windows Server Configuration.mp4 111.9 MB
  • 25 Job Hunting/260 The Future Company.mp4 111.5 MB
  • 22 Covering Your Tracks/236 Clearing Linux Logs.mp4 108.5 MB
  • 18 Reconnaissance/171 Passive Recon - Job Posting.mp4 107.2 MB
  • 03 Penetration Testing Process/008 Metrics Why They Are Important.mp4 106.4 MB
  • 20 Post Exploitation/226 Password Spraying.mp4 106.1 MB
  • 19 Exploitation/190 Metasploit - MSFVenom.mp4 105.2 MB
  • 20 Post Exploitation/219 SSH Keys.mp4 104.4 MB
  • 15 Python Course/141 Inheritance.mp4 103.7 MB
  • 19 Exploitation/197 Remote File Inclusion.mp4 103.7 MB
  • 15 Python Course/134 IfElse.mp4 103.6 MB
  • 16 Assembly Course/156 Writing Files.mp4 103.4 MB
  • 18 Reconnaissance/169 Passive Recon - Whois.mp4 102.1 MB
  • 16 Assembly Course/150 Variables.mp4 102.0 MB
  • 04 The Windows Operating System/030 Windows Command Line - Accessing the Command Line.mp4 100.1 MB
  • 16 Assembly Course/157 Op Code.mp4 99.9 MB
  • 24 Attacking Active Directory (Realistic Scenario)/252 Getting Domain Admin.mp4 99.5 MB
  • 13 Configuring PFSense Firewalls/120 Installing PFSense.mp4 98.6 MB
  • 25 Job Hunting/263 The Interview Process - Prepping for the Technical Interviews.mp4 97.9 MB
  • 18 Reconnaissance/175 Active Recon - Dirb.mp4 93.7 MB
  • 18 Reconnaissance/180 Active Recon - Browsing.mp4 91.3 MB
  • 03 Penetration Testing Process/015 Building Working with an Enterprise Budget.mp4 90.5 MB
  • 21 Password Cracking/230 John The Ripper.mp4 89.6 MB
  • 22 Covering Your Tracks/237 Quick Talk on Logging.mp4 88.7 MB
  • 20 Post Exploitation/206 What is Privilege Escalation.mp4 87.8 MB
  • 07 Active Directory/072 Managing Users and Groups.mp4 86.0 MB
  • 03 Penetration Testing Process/014 Routine Assessments Part 6 - Building an Assessment Plan.mp4 84.7 MB
  • 20 Post Exploitation/218 Pass The Hash.mp4 84.3 MB
  • 15 Python Course/140 Classes.mp4 82.8 MB
  • 04 The Windows Operating System/022 Windows Internals - UAC.mp4 82.6 MB
  • 18 Reconnaissance/181 Active Recon - Manual vs Automated.mp4 81.7 MB
  • 13 Configuring PFSense Firewalls/122 Configuring a DMZ.mp4 80.4 MB
  • 15 Python Course/137 Lists.mp4 79.5 MB
  • 15 Python Course/145 Sockets.mp4 76.9 MB
  • 16 Assembly Course/153 Loops.mp4 76.5 MB
  • 13 Configuring PFSense Firewalls/123 Configuring a VPN.mp4 76.2 MB
  • 05 The Linux Operating System/038 Linux Command Line - Navigation.mp4 75.5 MB
  • 05 The Linux Operating System/050 Symbolic Links.mp4 75.4 MB
  • 24 Attacking Active Directory (Realistic Scenario)/250 Finding New Access.mp4 75.1 MB
  • 04 The Windows Operating System/034 Windows Command Line - Standard IOE.mp4 75.1 MB
  • 05 The Linux Operating System/046 Linux Command Line - Network Connections Recap.mp4 73.7 MB
  • 15 Python Course/136 The Dictionary.mp4 73.2 MB
  • 05 The Linux Operating System/049 Working with Open Files.mp4 72.9 MB
  • 20 Post Exploitation/225 Account Directory Attacks.mp4 70.9 MB
  • 05 The Linux Operating System/054 Linux Logs.mp4 68.5 MB
  • 05 The Linux Operating System/052 Linux Pipes.mp4 68.2 MB
  • 22 Covering Your Tracks/235 Clearing Windows Logs.mp4 68.1 MB
  • 18 Reconnaissance/168 Passive Recon - Shodan.mp4 67.7 MB
  • 05 The Linux Operating System/043 Linux Command Line - Man Pages.mp4 66.5 MB
  • 05 The Linux Operating System/040 Linux Command Line - Standard IOE Recap.mp4 65.4 MB
  • 15 Python Course/135 Loops.mp4 63.4 MB
  • 25 Job Hunting/259 Applying for the Job.mp4 60.8 MB
  • 06 Operating System Internals/064 Debuggers.mp4 60.4 MB
  • 20 Post Exploitation/216 Im Root Now What.mp4 59.8 MB
  • 24 Attacking Active Directory (Realistic Scenario)/251 Moving Up In The World.mp4 58.8 MB
  • 15 Python Course/144 Error Handling.mp4 58.4 MB
  • 22 Covering Your Tracks/239 Persistent Backdoors.mp4 57.3 MB
  • 15 Python Course/130 Hello World.mp4 56.2 MB
  • 05 The Linux Operating System/044 Linux Command Line - Base64.mp4 54.8 MB
  • 15 Python Course/146 Threading.mp4 54.5 MB
  • 05 The Linux Operating System/051 The IDs.mp4 54.4 MB
  • 15 Python Course/131 Variables.mp4 53.8 MB
  • 13 Configuring PFSense Firewalls/124 Backup Logging.mp4 53.7 MB
  • 19 Exploitation/198 The Authenticated Unauthenticated Pages.mp4 53.4 MB
  • 07 Active Directory/075 Cached Credentials.mp4 51.9 MB
  • 24 Attacking Active Directory (Realistic Scenario)/248 Exploitation.mp4 50.2 MB
  • 06 Operating System Internals/055 The Kernel.mp4 50.1 MB
  • 10 Networking/098 TCPIP.mp4 49.5 MB
  • 22 Covering Your Tracks/240 The Clean Up.mp4 48.6 MB
  • 05 The Linux Operating System/048 What are INodes.mp4 48.5 MB
  • 15 Python Course/129 Installing Python.mp4 47.9 MB
  • 24 Attacking Active Directory (Realistic Scenario)/249 Post Exploitation.mp4 47.7 MB
  • 05 The Linux Operating System/042 Linux Command Line - Working with File Permissions.mp4 47.6 MB
  • 04 The Windows Operating System/028 Windows Internals - Named Pipes.mp4 47.6 MB
  • 25 Job Hunting/267 The Interview Process - The Offer.mp4 47.3 MB
  • 15 Python Course/139 Modules.mp4 47.2 MB
  • 15 Python Course/143 Logging.mp4 46.4 MB
  • 07 Active Directory/067 What is Active Directory.mp4 45.9 MB
  • 06 Operating System Internals/058 The CPU Registers.mp4 45.8 MB
  • 10 Networking/104 DNS.mp4 44.4 MB
  • 02 The 3 Teams/003 The Red Team.mp4 43.8 MB
  • 20 Post Exploitation/224 Web Servers.mp4 43.3 MB
  • 04 The Windows Operating System/027 Windows Internals - Tokens.mp4 42.9 MB
  • 03 Penetration Testing Process/011 Routine Assessments Part 3 - Quarterly Assessments.mp4 42.6 MB
  • 19 Exploitation/195 Insecure Direct Object Reference.mp4 42.6 MB
  • 19 Exploitation/199 Broken Authentication and Session Management.mp4 42.3 MB
  • 11 VPNs/114 What is IPSEC.mp4 40.8 MB
  • 24 Attacking Active Directory (Realistic Scenario)/247 Reconnaissance.mp4 39.1 MB
  • 10 Networking/096 What is Networking.mp4 37.9 MB
  • 15 Python Course/142 Configuration Files.mp4 37.6 MB
  • 20 Post Exploitation/221 Duel Homed Machines.mp4 37.1 MB
  • 03 Penetration Testing Process/007 Penetration Testing Methodology.mp4 36.6 MB
  • 08 Kerberos/079 The Ticket Granting Server.mp4 36.4 MB
  • 20 Post Exploitation/220 Checking Logs.mp4 36.3 MB
  • 15 Python Course/132 Type Casting.mp4 35.5 MB
  • 21 Password Cracking/232 Rainbow Tables.mp4 35.0 MB
  • 17 Scope Identification/161 Stability Considerations.mp4 34.5 MB
  • 25 Job Hunting/262 The Interview Process - The Screening Call.mp4 34.3 MB
  • 04 The Windows Operating System/026 Windows Internals - The SID.mp4 33.9 MB
  • 15 Python Course/133 Operators.mp4 33.1 MB
  • 17 Scope Identification/163 Prepping.mp4 32.7 MB
  • 03 Penetration Testing Process/013 Routine Assessments Part 5 - Constant Assessments.mp4 32.4 MB
  • 10 Networking/101 Routers Gateways.mp4 32.4 MB
  • 18 Reconnaissance/182 Reconnaissance Hands On.mp4 31.3 MB
  • 11 VPNs/115 What is IKE.mp4 31.1 MB
  • 15 Python Course/138 Tuples.mp4 30.6 MB
  • 10 Networking/105 DHCP.mp4 30.5 MB
  • 10 Networking/103 ICMP.mp4 30.1 MB
  • 06 Operating System Internals/061 The Stack.mp4 29.4 MB
  • 06 Operating System Internals/056 One Ring to Rule Them All.mp4 29.3 MB
  • 17 Scope Identification/160 Goal Scope Identification.mp4 29.1 MB
  • 01 Welcome Who Is This Guy/001 Introduction.mp4 28.8 MB
  • 25 Job Hunting/254 Professional Email.mp4 28.7 MB
  • 02 The 3 Teams/005 The Purple Team.mp4 27.7 MB
  • 03 Penetration Testing Process/010 Routine Assessments Part 2 - Yearly Assessments.mp4 27.3 MB
  • 10 Networking/108 What is an IPS.mp4 26.4 MB
  • 10 Networking/106 ARP.mp4 26.4 MB
  • 02 The 3 Teams/004 The Blue Team.mp4 25.5 MB
  • 25 Job Hunting/266 The Interview Process - The Onsite.mp4 25.4 MB
  • 23 Reporting/244 Business Risks on Findings.mp4 25.3 MB
  • 18 Reconnaissance/179 Active Recon - Vulnerability Scanners.mp4 25.2 MB
  • 05 The Linux Operating System/037 The Linux File System.mp4 25.0 MB
  • 19 Exploitation/200 Faulty Redirects.mp4 24.8 MB
  • 10 Networking/112 Quick Talk on Databases.mp4 24.2 MB
  • 10 Networking/100 The Switch.mp4 24.1 MB
  • 21 Password Cracking/229 What is Password Cracking.mp4 23.6 MB
  • 09 Data Manipulation/089 Base64 Encoding.mp4 23.0 MB
  • 06 Operating System Internals/066 A Quick Word About AntiVirus.mp4 22.5 MB
  • 09 Data Manipulation/082 Asymmetric Encryption.mp4 22.4 MB
  • 10 Networking/109 What is HA.mp4 22.1 MB
  • 10 Networking/097 The OSI Model.mp4 22.0 MB
  • 06 Operating System Internals/063 Extra information on Memory.mp4 21.5 MB
  • 09 Data Manipulation/090 Hex Encoding.mp4 21.4 MB
  • 19 Exploitation/185 Looking for 0 days.mp4 20.8 MB
  • 14 Program Theory/127 What is a Linker.mp4 20.7 MB
  • 03 Penetration Testing Process/012 Routine Assessments Part 4- Monthly Assessments.mp4 20.0 MB
  • 22 Covering Your Tracks/234 Why Cover Your Tracks.mp4 19.7 MB
  • 09 Data Manipulation/087 SHA Hashing.mp4 19.6 MB
  • 25 Job Hunting/265 The Interview Process - Prepping for the On Site Final Interview.mp4 19.5 MB
  • 03 Penetration Testing Process/009 Routine Assessments Part 1 - What Are Routine Assessments.mp4 19.4 MB
  • 05 The Linux Operating System/053 Linux Run Levels.mp4 19.4 MB
  • 14 Program Theory/126 What is a Compiler.mp4 19.0 MB
  • 03 Penetration Testing Process/016 Specialties.mp4 18.0 MB
  • 09 Data Manipulation/093 Lossless vs Lossy Compression.mp4 18.0 MB
  • 08 Kerberos/076 What is Kerberos.mp4 17.9 MB
  • 19 Exploitation/184 Misconfigurations.mp4 17.9 MB
  • 05 The Linux Operating System/036 Where is the GUI.mp4 17.9 MB
  • 12 Firewalls/116 What is a Firewall.mp4 17.8 MB
  • 15 Python Course/128 Why Python.mp4 17.6 MB
  • 18 Reconnaissance/165 What is Reconnaissance.mp4 17.4 MB
  • 10 Networking/107 What is an IDS.mp4 17.3 MB
  • 09 Data Manipulation/081 Symmetric Encryption.mp4 17.3 MB
  • 06 Operating System Internals/060 What is Memory How does it work.mp4 17.0 MB
  • 23 Reporting/243 The Audience.mp4 16.9 MB
  • 06 Operating System Internals/062 The Heap.mp4 16.8 MB
  • 08 Kerberos/078 The Authentication Server.mp4 16.5 MB
  • 16 Assembly Course/158 Bit Operators.mp4 15.9 MB
  • 09 Data Manipulation/080 What is Encryption.mp4 15.8 MB
  • 09 Data Manipulation/091 URL Encoding.mp4 15.4 MB
  • 19 Exploitation/191 Metasploit - Hands On.mp4 15.1 MB
  • 03 Penetration Testing Process/006 Module Overview - Penetration Testing Process.mp4 14.9 MB
  • 03 Penetration Testing Process/017 The CIA Triangle.mp4 14.9 MB
  • 10 Networking/110 Proxys.mp4 14.3 MB
  • 06 Operating System Internals/065 Taking a look at ASLR.mp4 13.9 MB
  • 23 Reporting/245 Remediation Options.mp4 13.7 MB
  • 09 Data Manipulation/092 What is Compression.mp4 13.6 MB
  • 10 Networking/111 The DMZ.mp4 13.3 MB
  • 12 Firewalls/118 Stateful Inspecting Firewalls.mp4 13.0 MB
  • 09 Data Manipulation/085 What is Hashing.mp4 12.2 MB
  • 15 Python Course/147 Python Hands On.mp4 11.9 MB
  • 17 Scope Identification/162 Briefing Stake Holders.mp4 11.7 MB
  • 06 Operating System Internals/059 The CPU Flags.mp4 11.6 MB
  • 20 Post Exploitation/203 What is Persistence.mp4 11.6 MB
  • 06 Operating System Internals/057 What is a CPU.mp4 11.4 MB
  • 10 Networking/099 UDP.mp4 11.4 MB
  • 11 VPNs/113 What is a VPN.mp4 11.2 MB
  • 09 Data Manipulation/086 MD5 Hashing.mp4 11.1 MB
  • 09 Data Manipulation/094 LZ77 LZ78 Compression Algorithms.mp4 10.3 MB
  • 23 Reporting/246 Working With The Blue Team.mp4 10.2 MB
  • 17 Scope Identification/164 Scope Identification Hands On.mp4 10.2 MB
  • 09 Data Manipulation/083 RSA Encryption.mp4 10.0 MB
  • 12 Firewalls/119 Web Application Firewalls.mp4 10.0 MB
  • 13 Configuring PFSense Firewalls/125 PFsense Hands On.mp4 9.9 MB
  • 08 Kerberos/077 Kerberos Realms.mp4 9.7 MB
  • 09 Data Manipulation/088 What is Encoding.mp4 9.3 MB
  • 16 Assembly Course/148 Why Assembly.mp4 8.6 MB
  • 09 Data Manipulation/095 Data Manipulation - Hands On.mp4 8.4 MB
  • 09 Data Manipulation/084 AES Encryption.mp4 8.3 MB
  • 25 Job Hunting/268 Congratulations.mp4 8.0 MB
  • 21 Password Cracking/233 Password Cracking Hands On.mp4 6.2 MB
  • 10 Networking/102 What is a Protocol.mp4 6.1 MB
  • 16 Assembly Course/159 Assembly Hands On.mp4 6.0 MB
  • 12 Firewalls/117 Packet Filtering Firewalls.mp4 5.7 MB
  • 02 The 3 Teams/002 Module Overview - The 3 Teams.mp4 4.6 MB
  • 22 Covering Your Tracks/241 Covering Your Tracks Hands On.mp4 3.4 MB
  • 06 Operating System Internals/064 Debugger.pptx 455.3 kB
  • 10 Networking/100 The-Switch.pptx 414.7 kB
  • 04 The Windows Operating System/022 Windows-UAC.pptx 167.9 kB
  • 04 The Windows Operating System/026 SID.pptx 138.8 kB
  • 05 The Linux Operating System/042 Linux-File-Permissions.pptx 137.3 kB
  • 06 Operating System Internals/055 The-Kernel.pptx 122.7 kB
  • 06 Operating System Internals/058 Registers.pptx 122.4 kB
  • 04 The Windows Operating System/029 PE-Files-and-DLLs.pptx 121.1 kB
  • 05 The Linux Operating System/047 Processes.pptx 119.9 kB
  • 23 Reporting/242 Report-Template.docx 114.6 kB
  • 09 Data Manipulation/089 Base64.pptx 112.6 kB
  • 05 The Linux Operating System/049 Open-FIles.pptx 110.4 kB
  • 05 The Linux Operating System/037 The-Linux-File-System.pptx 110.2 kB
  • 10 Networking/096 What-is-Networking.pptx 110.1 kB
  • 03 Penetration Testing Process/007 Penetration-Testing-Methodology.pptx 109.0 kB
  • 10 Networking/097 OSI-Model.pptx 105.9 kB
  • 05 The Linux Operating System/050 Symbolic-Links.pptx 105.3 kB
  • 06 Operating System Internals/056 One-Ring-to-Rule-Them-All.pptx 104.8 kB
  • 08 Kerberos/079 The-Ticket-Granting-Server.pptx 104.7 kB
  • 11 VPNs/114 What-is-a-IPSEC.pptx 104.6 kB
  • 04 The Windows Operating System/027 Tokens.pptx 104.5 kB
  • 04 The Windows Operating System/020 The-Windows-File-System.pptx 104.2 kB
  • 06 Operating System Internals/066 AntiVirus.pptx 104.1 kB
  • 06 Operating System Internals/063 More-on-Memory.pptx 104.1 kB
  • 09 Data Manipulation/082 Asymmetric-Encryption.pptx 103.9 kB
  • 06 Operating System Internals/065 ASLR.pptx 103.8 kB
  • 11 VPNs/115 What-is-a-IKE.pptx 103.3 kB
  • 03 Penetration Testing Process/006 Penetration-Testing-Process-Module-Overview.pptx 103.1 kB
  • 10 Networking/105 DHCP.pptx 102.8 kB
  • 19 Exploitation/199 Broken-Auth.pptx 102.8 kB
  • 10 Networking/098 TCPIP.pptx 102.7 kB
  • 04 The Windows Operating System/028 Windows-Pipes.pptx 102.5 kB
  • 05 The Linux Operating System/053 Run-Levels.pptx 102.2 kB
  • 05 The Linux Operating System/048 Inodes.pptx 101.9 kB
  • 21 Password Cracking/232 Rainbow-Tables.pptx 101.7 kB
  • 03 Penetration Testing Process/011 Quarterly-Assessments.pptx 101.4 kB
  • 10 Networking/104 DNS.pptx 101.4 kB
  • 21 Password Cracking/229 What-is-Password-Cracking.pptx 101.2 kB
  • 03 Penetration Testing Process/017 CIA-Triangle.pptx 101.0 kB
  • 06 Operating System Internals/061 The-Stack.pptx 100.9 kB
  • 03 Penetration Testing Process/016 Specialties.pptx 100.7 kB
  • 06 Operating System Internals/057 What-is-a-CPU.pptx 100.5 kB
  • 16 Assembly Course/158 Bit-Operators.pptx 100.3 kB
  • 03 Penetration Testing Process/013 Constant-Assessments.pptx 99.8 kB
  • 02 The 3 Teams/004 The-Blue-Team.pptx 99.8 kB
  • 02 The 3 Teams/003 The-Red-Team.pptx 99.7 kB
  • 17 Scope Identification/160 Goal-and-Scope-Identification.pptx 99.6 kB
  • 25 Job Hunting/267 The-Offer.pptx 99.5 kB
  • 08 Kerberos/078 The-Authentication-Sever.pptx 99.4 kB
  • 23 Reporting/244 Buisness-Risk-on-Findings.pptx 99.3 kB
  • 02 The 3 Teams/005 The-Purple-Team.pptx 99.3 kB
  • 09 Data Manipulation/081 Symmetric-Encryption.pptx 99.2 kB
  • 22 Covering Your Tracks/234 Why-Cover-Your-Tracks.pptx 99.1 kB
  • 06 Operating System Internals/059 Flags.pptx 98.7 kB
  • 09 Data Manipulation/092 What-is-Compression.pptx 98.5 kB
  • 03 Penetration Testing Process/010 Yearly-Assessments.pptx 98.5 kB
  • 06 Operating System Internals/060 Memory.pptx 98.4 kB
  • 03 Penetration Testing Process/012 Monthly-Assessments.pptx 98.4 kB
  • 23 Reporting/243 The-Audience.pptx 98.4 kB
  • 12 Firewalls/116 What-is-a-Firewall.pptx 98.4 kB
  • 14 Program Theory/126 What-is-a-Compiler.pptx 98.3 kB
  • 10 Networking/112 Quick-Talk-on-Databases.pptx 98.3 kB
  • 10 Networking/103 ICMP.pptx 98.1 kB
  • 10 Networking/106 ARP.pptx 98.1 kB
  • 10 Networking/108 What-is-an-IPS.pptx 98.1 kB
  • 17 Scope Identification/161 Stability-Considerations.pptx 98.0 kB
  • 09 Data Manipulation/090 Hex.pptx 98.0 kB
  • 10 Networking/107 What-is-an-IDS.pptx 97.9 kB
  • 08 Kerberos/076 What-is-Kerberos.pptx 97.8 kB
  • 18 Reconnaissance/179 Vuln-Scanners.pptx 97.8 kB
  • 10 Networking/101 Routers-and-Gateways.pptx 97.8 kB
  • 05 The Linux Operating System/036 The-GUI.pptx 97.8 kB
  • 20 Post Exploitation/203 What-is-Persistence.pptx 97.7 kB
  • 06 Operating System Internals/062 The-Heap.pptx 97.6 kB
  • 07 Active Directory/067 What-is-Active-Directory.pptx 97.4 kB
  • 25 Job Hunting/262 The-Screening-Call.pptx 97.3 kB
  • 19 Exploitation/184 Misconfigurations.pptx 97.1 kB
  • 25 Job Hunting/265 Prepping-for-the-on-site-Interview.pptx 97.0 kB
  • 04 The Windows Operating System/025 API-Calls.pptx 97.0 kB
  • 12 Firewalls/118 Stateful-Inspection-Firewalls.pptx 96.8 kB
  • 03 Penetration Testing Process/009 What-Are-Routine-Assessments.pptx 96.8 kB
  • 09 Data Manipulation/080 What-is-Encryption.pptx 96.8 kB
  • 09 Data Manipulation/088 What-is-Encoding.pptx 96.6 kB
  • 09 Data Manipulation/091 URL.pptx 96.5 kB
  • 08 Kerberos/077 Kerberos-Realm.pptx 96.5 kB
  • 09 Data Manipulation/085 What-is-Hashing.pptx 96.5 kB
  • 14 Program Theory/127 What-is-a-Linker.pptx 96.5 kB
  • 12 Firewalls/117 Packet-Filtering-Firewalls.pptx 96.3 kB
  • 10 Networking/109 What-is-HA.pptx 96.3 kB
  • 17 Scope Identification/162 Briefing-Stake-Holders.pptx 96.2 kB
  • 09 Data Manipulation/093 Lossless-vs-Lossy.pptx 96.0 kB
  • 15 Python Course/147 Hands-On-Python.pptx 95.9 kB
  • 25 Job Hunting/266 Onsite-Interview.pptx 95.8 kB
  • 18 Reconnaissance/165 What-is-Recon.pptx 95.7 kB
  • 09 Data Manipulation/094 LZ77-and-LZ78.pptx 95.6 kB
  • 17 Scope Identification/164 Scope-Identification-Hands-On.pptx 95.4 kB
  • 21 Password Cracking/233 Password-Cracking-Hands-On.pptx 95.2 kB
  • 23 Reporting/246 Working-With-The-Blue-Team.pptx 95.2 kB
  • 12 Firewalls/119 Web-Application-Firewalls.pptx 95.0 kB
  • 10 Networking/110 Proxys.pptx 95.0 kB
  • 19 Exploitation/185 0Days.pptx 94.9 kB
  • 09 Data Manipulation/083 RSA.pptx 94.9 kB
  • 09 Data Manipulation/087 SHA.pptx 94.8 kB
  • 16 Assembly Course/148 Why-ASM.pptx 94.8 kB
  • 09 Data Manipulation/084 AES.pptx 94.8 kB
  • 09 Data Manipulation/086 MD5.pptx 94.8 kB
  • 11 VPNs/113 What-is-a-VPN.pptx 94.8 kB
  • 19 Exploitation/191 Metasploit-Hands-On.pptx 94.7 kB
  • 23 Reporting/245 Remediation-Options.pptx 94.7 kB
  • 13 Configuring PFSense Firewalls/125 PFSense-Hands-On.pptx 94.5 kB
  • 16 Assembly Course/159 Assembly-Hands-On.pptx 94.4 kB
  • 02 The 3 Teams/002 The-3-Teams.pptx 93.7 kB
  • 10 Networking/102 What-is-a-Protocol.pptx 93.7 kB
  • 09 Data Manipulation/095 Data-Manipulation-Hands-On.pptx 93.7 kB
  • 15 Python Course/128 Why-Python.pptx 93.5 kB
  • 10 Networking/111 DMZ.pptx 93.4 kB
  • 10 Networking/099 UDP.pptx 93.3 kB
  • 03 Penetration Testing Process/008 Metrics.xlsx 37.6 kB
  • 17 Scope Identification/163 Assessment-Document-Template.docx 34.7 kB
  • 03 Penetration Testing Process/015 Budget-Sample.xlsx 28.4 kB
  • 03 Penetration Testing Process/014 Assessment-Template.xlsx 25.0 kB
  • 03 Penetration Testing Process/015 Budget-Template.xlsx 24.5 kB
  • 25 Job Hunting/253 Resume.docx 19.5 kB
  • 15 Python Course/133 Operators.py 2.4 kB
  • 15 Python Course/134 IfElse.py 2.3 kB
  • 16 Assembly Course/152 Arithmetic.asm.zip 2.2 kB
  • 15 Python Course/136 Dictionary.py 2.0 kB
  • 15 Python Course/141 Inheritance.py 1.7 kB
  • 15 Python Course/142 Configs.zip 1.6 kB
  • 16 Assembly Course/153 Loops.asm.zip 1.6 kB
  • 15 Python Course/137 Lists.py 1.6 kB
  • 16 Assembly Course/155 ReadingFiles.asm.zip 1.5 kB
  • 16 Assembly Course/156 WritingFiles.asm.zip 1.4 kB
  • 15 Python Course/143 Logging.py 1.4 kB
  • 16 Assembly Course/151 SavingState.asm.zip 1.4 kB
  • 15 Python Course/140 Classes.py 1.4 kB
  • 15 Python Course/135 Loops.py 1.3 kB
  • 15 Python Course/144 ErrorHandling.py 1.3 kB
  • 15 Python Course/142 Configs.py 1.3 kB
  • 16 Assembly Course/154 Logic.asm.zip 1.3 kB
  • 16 Assembly Course/149 HelloWorld.asm.zip 1.2 kB
  • 15 Python Course/131 Variables.py 1.2 kB
  • 15 Python Course/145 SocketsServer.py 1.2 kB
  • 15 Python Course/138 Tuples.py 1.2 kB
  • 16 Assembly Course/150 DataTypes.asm.zip 1.1 kB
  • 04 The Windows Operating System/external-assets-links.txt 1.0 kB
  • 15 Python Course/132 TypeCasting.py 1.0 kB
  • 15 Python Course/141 Account.py 961 Bytes
  • 15 Python Course/145 SocketsClient.py 929 Bytes
  • 15 Python Course/140 Person.py 878 Bytes
  • 15 Python Course/146 Threading.py 845 Bytes
  • 20 Post Exploitation/226 spray.py 831 Bytes
  • 15 Python Course/141 CheckingAccount.py 822 Bytes
  • 15 Python Course/139 Modules.py 810 Bytes
  • 20 Post Exploitation/external-assets-links.txt 798 Bytes
  • 18 Reconnaissance/external-assets-links.txt 635 Bytes
  • 15 Python Course/130 HelloWorld.py 583 Bytes
  • 09 Data Manipulation/external-assets-links.txt 520 Bytes
  • 19 Exploitation/195 idor.txt 496 Bytes
  • 19 Exploitation/external-assets-links.txt 479 Bytes
  • 21 Password Cracking/external-assets-links.txt 251 Bytes
  • 05 The Linux Operating System/external-assets-links.txt 200 Bytes
  • 06 Operating System Internals/external-assets-links.txt 130 Bytes
  • 15 Python Course/external-assets-links.txt 103 Bytes
  • 01 Welcome Who Is This Guy/external-assets-links.txt 92 Bytes
  • 07 Active Directory/external-assets-links.txt 83 Bytes
  • 13 Configuring PFSense Firewalls/external-assets-links.txt 57 Bytes
  • 10 Networking/external-assets-links.txt 54 Bytes

温馨提示

本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!