[ CourseMega.com ] Udemy - Learn Social Engineering From Scratch (updated 10 - 2021)

File Type Create Time File Size Seeders Leechers Updated
Movie 2021-11-17 3.99GB 0 3 6 months ago
Download
Magnet link   or   Save Instantly without Torrenting   or   Torrent download

To download this file, you need a free bitTorrent client such as qBittorrent.

Report Abuse
Tags
CourseMega  com  Udemy  Learn  Social  Engineering  From  Scratch  updated  2021  
Related Torrents
  1. [FreeCourseSite.com] Udemy - Learn Social Engineering From Scratch 1.60GB
  2. free-course-site.com-udemy-learn-social-engineering-from-scratch-1 2.88GB
  3. Udemy - Learn Social Engineering From Scratch 1.62GB
  4. [ DevCourseWeb.com ] Udemy - Learn Livewire V3 from Scratch - Practical Course 1.52GB
  5. [FreeTutorials.us] learn-social-engineering-from-scratch 2.17GB
  6. [ FreeCourseWeb.com ] Udemy - Learn Network Hacking From Scratch (WiFi & Wired) (updated 12-2019).zip 4.28GB
  7. [UdemyCourseDownloader] Learn Social Engineering From Scratch 2.90GB
  8. [FreeAllCourse.Com] Udemy - Learn HTML5 Programming From Scratch 4.59GB
  9. [FreeCourseLab.com] Udemy - Learn HTML5 Programming From Scratch 743.22MB
  10. [FreeCourseLab.com] Udemy - Learn Python Programming From Scratch 463.20MB
Files
  1. Get Bonus Downloads Here.url 180B
  2. ~Get Your Files Here !/1 - Preparation - Creating a Penetration Testing Lab/1 - 01-The-Lab.pdf 460.96KB
  3. ~Get Your Files Here !/1 - Preparation - Creating a Penetration Testing Lab/1 - Lab Overview & Needed Software.encrypted.m4a 2.89MB
  4. ~Get Your Files Here !/1 - Preparation - Creating a Penetration Testing Lab/1 - Lab Overview & Needed Software.encrypted.mp4 13.32MB
  5. ~Get Your Files Here !/1 - Preparation - Creating a Penetration Testing Lab/1 - Lab Overview & Needed Software_en.srt 7.62KB
  6. ~Get Your Files Here !/1 - Preparation - Creating a Penetration Testing Lab/2 - Initial Preparation.encrypted.m4a 4.36MB
  7. ~Get Your Files Here !/1 - Preparation - Creating a Penetration Testing Lab/2 - Initial Preparation.encrypted.mp4 76.55MB
  8. ~Get Your Files Here !/1 - Preparation - Creating a Penetration Testing Lab/2 - Initial Preparation_en.srt 11.54KB
  9. ~Get Your Files Here !/1 - Preparation - Creating a Penetration Testing Lab/3 - Installing Kali Linux as a VM on Windows.encrypted.m4a 4.35MB
  10. ~Get Your Files Here !/1 - Preparation - Creating a Penetration Testing Lab/3 - Installing Kali Linux as a VM on Windows.encrypted.mp4 39.47MB
  11. ~Get Your Files Here !/1 - Preparation - Creating a Penetration Testing Lab/3 - Installing Kali Linux as a VM on Windows_en.srt 12.08KB
  12. ~Get Your Files Here !/1 - Preparation - Creating a Penetration Testing Lab/4 - Installing Kali Linux as a VM on Apple Mac OS.encrypted.m4a 4.72MB
  13. ~Get Your Files Here !/1 - Preparation - Creating a Penetration Testing Lab/4 - Installing Kali Linux as a VM on Apple Mac OS.encrypted.mp4 17.29MB
  14. ~Get Your Files Here !/1 - Preparation - Creating a Penetration Testing Lab/4 - Installing Kali Linux as a VM on Apple Mac OS_en.srt 12.84KB
  15. ~Get Your Files Here !/1 - Preparation - Creating a Penetration Testing Lab/5 - Installing Kali Linux as a VM on Apple M1 Computers.encrypted.m4a 4.47MB
  16. ~Get Your Files Here !/1 - Preparation - Creating a Penetration Testing Lab/5 - Installing Kali Linux as a VM on Apple M1 Computers.encrypted.mp4 30.97MB
  17. ~Get Your Files Here !/1 - Preparation - Creating a Penetration Testing Lab/5 - Installing Kali Linux as a VM on Apple M1 Computers_en.srt 13.11KB
  18. ~Get Your Files Here !/1 - Preparation - Creating a Penetration Testing Lab/6 - Installing Kali Linux as a VM on Linux.encrypted.m4a 5.25MB
  19. ~Get Your Files Here !/1 - Preparation - Creating a Penetration Testing Lab/6 - Installing Kali Linux as a VM on Linux.encrypted.mp4 50.04MB
  20. ~Get Your Files Here !/1 - Preparation - Creating a Penetration Testing Lab/6 - Installing Kali Linux as a VM on Linux_en.srt 14.18KB
  21. ~Get Your Files Here !/1 - Preparation - Creating a Penetration Testing Lab/external-assets-links.txt 323B
  22. ~Get Your Files Here !/1 - Teaser - Hacking An Android Phone & Accessing The Camera/1 - Teaser - Hacking An Android Phone & Accessing The Camera.mp4 11.86MB
  23. ~Get Your Files Here !/1 - Teaser - Hacking An Android Phone & Accessing The Camera/1 - Teaser - Hacking An Android Phone & Accessing The Camera_en.srt 8.15KB
  24. ~Get Your Files Here !/1 - Teaser - Hacking An Android Phone & Accessing The Camera/2 - Introduction to Social Engineering.encrypted.m4a 1.58MB
  25. ~Get Your Files Here !/1 - Teaser - Hacking An Android Phone & Accessing The Camera/2 - Introduction to Social Engineering.encrypted.mp4 11.70MB
  26. ~Get Your Files Here !/1 - Teaser - Hacking An Android Phone & Accessing The Camera/2 - Introduction to Social Engineering_en.srt 4.55KB
  27. ~Get Your Files Here !/1 - Teaser - Hacking An Android Phone & Accessing The Camera/2 - What-is-Social-Engineering.pdf 98.73KB
  28. ~Get Your Files Here !/1 - Teaser - Hacking An Android Phone & Accessing The Camera/3 - 00-Intro-Perperation.pdf 364.17KB
  29. ~Get Your Files Here !/1 - Teaser - Hacking An Android Phone & Accessing The Camera/3 - Course Overview.encrypted.m4a 2.09MB
  30. ~Get Your Files Here !/1 - Teaser - Hacking An Android Phone & Accessing The Camera/3 - Course Overview.encrypted.mp4 15.60MB
  31. ~Get Your Files Here !/1 - Teaser - Hacking An Android Phone & Accessing The Camera/3 - Course Overview_en.srt 6.06KB
  32. ~Get Your Files Here !/10 - Windows Malware - Creating Trojans/1 - Embedding Evil Files With Any File Type Like An Image Or PDF.encrypted.m4a 5.01MB
  33. ~Get Your Files Here !/10 - Windows Malware - Creating Trojans/1 - Embedding Evil Files With Any File Type Like An Image Or PDF.encrypted.mp4 31.41MB
  34. ~Get Your Files Here !/10 - Windows Malware - Creating Trojans/1 - Embedding Evil Files With Any File Type Like An Image Or PDF_en.srt 13.86KB
  35. ~Get Your Files Here !/10 - Windows Malware - Creating Trojans/2 - Running Evil Files Silently In The Background.encrypted.m4a 3.89MB
  36. ~Get Your Files Here !/10 - Windows Malware - Creating Trojans/2 - Running Evil Files Silently In The Background.encrypted.mp4 33.57MB
  37. ~Get Your Files Here !/10 - Windows Malware - Creating Trojans/2 - Running Evil Files Silently In The Background_en.srt 9.92KB
  38. ~Get Your Files Here !/10 - Windows Malware - Creating Trojans/3 - Changing Trojan's Icon.encrypted.m4a 4.06MB
  39. ~Get Your Files Here !/10 - Windows Malware - Creating Trojans/3 - Changing Trojan's Icon.encrypted.mp4 31.54MB
  40. ~Get Your Files Here !/10 - Windows Malware - Creating Trojans/3 - Changing Trojan's Icon_en.srt 10.15KB
  41. ~Get Your Files Here !/10 - Windows Malware - Creating Trojans/4 - Spoofing File Extension from .exe to anything else (pdf, png ..etc).encrypted.m4a 5.61MB
  42. ~Get Your Files Here !/10 - Windows Malware - Creating Trojans/4 - Spoofing File Extension from .exe to anything else (pdf, png ..etc).encrypted.mp4 44.74MB
  43. ~Get Your Files Here !/10 - Windows Malware - Creating Trojans/4 - Spoofing File Extension from .exe to anything else (pdf, png ..etc)_en.srt 14.54KB
  44. ~Get Your Files Here !/10 - Windows Malware - Creating Trojans/5 - Download & Execute Payload (Method 2).encrypted.m4a 3.10MB
  45. ~Get Your Files Here !/10 - Windows Malware - Creating Trojans/5 - Download & Execute Payload (Method 2).encrypted.mp4 61.08MB
  46. ~Get Your Files Here !/10 - Windows Malware - Creating Trojans/5 - Download & Execute Payload (Method 2)_en.srt 8.60KB
  47. ~Get Your Files Here !/10 - Windows Malware - Creating Trojans/5 - autoit-download-and-execute.txt.part 0B
  48. ~Get Your Files Here !/10 - Windows Malware - Creating Trojans/6 - Embedding Evil Files With Any File Type Like An Image Or PDF (Method 2).encrypted.m4a 3.30MB
  49. ~Get Your Files Here !/10 - Windows Malware - Creating Trojans/6 - Embedding Evil Files With Any File Type Like An Image Or PDF (Method 2).encrypted.mp4 54.73MB
  50. ~Get Your Files Here !/10 - Windows Malware - Creating Trojans/6 - Embedding Evil Files With Any File Type Like An Image Or PDF (Method 2)_en.srt 8.88KB
  51. ~Get Your Files Here !/10 - Windows Malware - Creating Trojans/7 - Embedding a Backdoor In a Legitimate Microsoft Office Document.encrypted.m4a 4.29MB
  52. ~Get Your Files Here !/10 - Windows Malware - Creating Trojans/7 - Embedding a Backdoor In a Legitimate Microsoft Office Document.encrypted.mp4 67.35MB
  53. ~Get Your Files Here !/10 - Windows Malware - Creating Trojans/7 - Embedding a Backdoor In a Legitimate Microsoft Office Document_en.srt 10.21KB
  54. ~Get Your Files Here !/10 - Windows Malware - Creating Trojans/8 - Embedding Any Evil File In A Legitimate Microsoft Office Document.encrypted.m4a 5.05MB
  55. ~Get Your Files Here !/10 - Windows Malware - Creating Trojans/8 - Embedding Any Evil File In A Legitimate Microsoft Office Document.encrypted.mp4 34.26MB
  56. ~Get Your Files Here !/10 - Windows Malware - Creating Trojans/8 - Embedding Any Evil File In A Legitimate Microsoft Office Document_en.srt 12.76KB
  57. ~Get Your Files Here !/10 - Windows Malware - Creating Trojans/8 - download-and-execute-macro.txt.part 0B
  58. ~Get Your Files Here !/10 - Windows Malware - Creating Trojans/external-assets-links.txt 338B
  59. ~Get Your Files Here !/11 - Mac OS X Malware/1 - 04-Generating-Evil-Files-For-Mac-OS-X.pdf 141.49KB
  60. ~Get Your Files Here !/11 - Mac OS X Malware/1 - Introduction.encrypted.m4a 1.56MB
  61. ~Get Your Files Here !/11 - Mac OS X Malware/1 - Introduction.encrypted.mp4 26.07MB
  62. ~Get Your Files Here !/11 - Mac OS X Malware/1 - Introduction_en.srt 3.96KB
  63. ~Get Your Files Here !/11 - Mac OS X Malware/2 - Hacking Mac OS X Using A Meterpreter Backdoor.encrypted.m4a 5.90MB
  64. ~Get Your Files Here !/11 - Mac OS X Malware/2 - Hacking Mac OS X Using A Meterpreter Backdoor.encrypted.mp4 113.84MB
  65. ~Get Your Files Here !/11 - Mac OS X Malware/2 - Hacking Mac OS X Using A Meterpreter Backdoor_en.srt 14.17KB
  66. ~Get Your Files Here !/11 - Mac OS X Malware/3 - Hacking Mac OS X Using An Empire Stager.encrypted.m4a 3.22MB
  67. ~Get Your Files Here !/11 - Mac OS X Malware/3 - Hacking Mac OS X Using An Empire Stager.encrypted.mp4 14.76MB
  68. ~Get Your Files Here !/11 - Mac OS X Malware/3 - Hacking Mac OS X Using An Empire Stager_en.srt 8.87KB
  69. ~Get Your Files Here !/11 - Mac OS X Malware/4 - Converting Basic Backdoor To An Executable.encrypted.m4a 1.75MB
  70. ~Get Your Files Here !/11 - Mac OS X Malware/4 - Converting Basic Backdoor To An Executable.encrypted.mp4 15.12MB
  71. ~Get Your Files Here !/11 - Mac OS X Malware/4 - Converting Basic Backdoor To An Executable_en.srt 4.35KB
  72. ~Get Your Files Here !/11 - Mac OS X Malware/5 - Embedding A Normal File With Backdoor.encrypted.m4a 4.57MB
  73. ~Get Your Files Here !/11 - Mac OS X Malware/5 - Embedding A Normal File With Backdoor.encrypted.mp4 73.32MB
  74. ~Get Your Files Here !/11 - Mac OS X Malware/5 - Embedding A Normal File With Backdoor_en.srt 12.40KB
  75. ~Get Your Files Here !/11 - Mac OS X Malware/6 - Generating a Basic Trojan For Max OS X.encrypted.m4a 3.34MB
  76. ~Get Your Files Here !/11 - Mac OS X Malware/6 - Generating a Basic Trojan For Max OS X.encrypted.mp4 55.80MB
  77. ~Get Your Files Here !/11 - Mac OS X Malware/6 - Generating a Basic Trojan For Max OS X_en.srt 9.24KB
  78. ~Get Your Files Here !/11 - Mac OS X Malware/7 - Changing Trojan's Icon.encrypted.m4a 3.21MB
  79. ~Get Your Files Here !/11 - Mac OS X Malware/7 - Changing Trojan's Icon.encrypted.mp4 32.47MB
  80. ~Get Your Files Here !/11 - Mac OS X Malware/7 - Changing Trojan's Icon_en.srt 8.26KB
  81. ~Get Your Files Here !/11 - Mac OS X Malware/8 - Configuring The Trojan To Run Silently.encrypted.m4a 3.05MB
  82. ~Get Your Files Here !/11 - Mac OS X Malware/8 - Configuring The Trojan To Run Silently.encrypted.mp4 54.27MB
  83. ~Get Your Files Here !/11 - Mac OS X Malware/8 - Configuring The Trojan To Run Silently_en.srt 7.55KB
  84. ~Get Your Files Here !/11 - Mac OS X Malware/9 - Embedding Backdoor In A Legitimate Microsoft Office Document.mp4 13.88MB
  85. ~Get Your Files Here !/11 - Mac OS X Malware/9 - Embedding Backdoor In A Legitimate Microsoft Office Document_en.srt 7.39KB
  86. ~Get Your Files Here !/12 - Linux Malware/1 - Installing Ubuntu As a Virtual Machine.encrypted.m4a 2.70MB
  87. ~Get Your Files Here !/12 - Linux Malware/1 - Installing Ubuntu As a Virtual Machine.encrypted.mp4 12.03MB
  88. ~Get Your Files Here !/12 - Linux Malware/1 - Installing Ubuntu As a Virtual Machine_en.srt 8.23KB
  89. ~Get Your Files Here !/12 - Linux Malware/10 - Backdooring a Legitimate Android App.encrypted.m4a 5.98MB
  90. ~Get Your Files Here !/12 - Linux Malware/10 - Backdooring a Legitimate Android App.encrypted.mp4 38.33MB
  91. ~Get Your Files Here !/12 - Linux Malware/10 - Backdooring a Legitimate Android App_en.srt 14.55KB
  92. ~Get Your Files Here !/12 - Linux Malware/2 - 05-Generating-Evil-Files-For-Linux.pdf 246.70KB
  93. ~Get Your Files Here !/12 - Linux Malware/2 - Hacking Into Linux-Like Systems Using One Command.encrypted.m4a 4.36MB
  94. ~Get Your Files Here !/12 - Linux Malware/2 - Hacking Into Linux-Like Systems Using One Command.encrypted.mp4 36.28MB
  95. ~Get Your Files Here !/12 - Linux Malware/2 - Hacking Into Linux-Like Systems Using One Command_en.srt 11.73KB
  96. ~Get Your Files Here !/12 - Linux Malware/3 - More Advanced Linux Backdoor.encrypted.m4a 3.22MB
  97. ~Get Your Files Here !/12 - Linux Malware/3 - More Advanced Linux Backdoor.encrypted.mp4 18.58MB
  98. ~Get Your Files Here !/12 - Linux Malware/3 - More Advanced Linux Backdoor_en.srt 8.54KB
  99. ~Get Your Files Here !/12 - Linux Malware/4 - Using A Remote Keylogger To Capture Key Strikes Including Passwords.mp4 100.14MB
  100. ~Get Your Files Here !/12 - Linux Malware/4 - Using A Remote Keylogger To Capture Key Strikes Including Passwords_en.srt 11.55KB
  101. ~Get Your Files Here !/12 - Linux Malware/5 - Recovering Saved Passwords From A Local Machine.encrypted.m4a 3.53MB
  102. ~Get Your Files Here !/12 - Linux Malware/5 - Recovering Saved Passwords From A Local Machine.encrypted.mp4 27.60MB
  103. ~Get Your Files Here !/12 - Linux Malware/5 - Recovering Saved Passwords From A Local Machine_en.srt 8.94KB
  104. ~Get Your Files Here !/12 - Linux Malware/6 - Execute & Report Payload.encrypted.m4a 3.40MB
  105. ~Get Your Files Here !/12 - Linux Malware/6 - Execute & Report Payload.encrypted.mp4 15.33MB
  106. ~Get Your Files Here !/12 - Linux Malware/6 - Execute & Report Payload_en.srt 9.28KB
  107. ~Get Your Files Here !/12 - Linux Malware/7 - Recovering Saved Passwords From A Remote Machine.encrypted.m4a 3.37MB
  108. ~Get Your Files Here !/12 - Linux Malware/7 - Recovering Saved Passwords From A Remote Machine.encrypted.mp4 23.10MB
  109. ~Get Your Files Here !/12 - Linux Malware/7 - Recovering Saved Passwords From A Remote Machine_en.srt 8.28KB
  110. ~Get Your Files Here !/12 - Linux Malware/8 - Embedding Evil Code In A Legitimate Linux Package - Part 1.encrypted.m4a 6.18MB
  111. ~Get Your Files Here !/12 - Linux Malware/8 - Embedding Evil Code In A Legitimate Linux Package - Part 1.encrypted.mp4 25.28MB
  112. ~Get Your Files Here !/12 - Linux Malware/8 - Embedding Evil Code In A Legitimate Linux Package - Part 1_en.srt 18.12KB
  113. ~Get Your Files Here !/12 - Linux Malware/9 - Embedding Evil Code In A Legitimate Linux Package - Part 2.encrypted.m4a 2.44MB
  114. ~Get Your Files Here !/12 - Linux Malware/9 - Embedding Evil Code In A Legitimate Linux Package - Part 2.encrypted.mp4 20.14MB
  115. ~Get Your Files Here !/12 - Linux Malware/9 - Embedding Evil Code In A Legitimate Linux Package - Part 2_en.srt 6.41KB
  116. ~Get Your Files Here !/12 - Linux Malware/external-assets-links.txt 297B
  117. ~Get Your Files Here !/13 - Delivery Methods/1 - 06-Delivery-Methods.pdf 127.02KB
  118. ~Get Your Files Here !/13 - Delivery Methods/1 - Introduction.mp4 6.21MB
  119. ~Get Your Files Here !/13 - Delivery Methods/1 - Introduction_en.srt 2.61KB
  120. ~Get Your Files Here !/13 - Delivery Methods/10 - URL Manipulation.mp4 54.85MB
  121. ~Get Your Files Here !/13 - Delivery Methods/10 - URL Manipulation_en.srt 13.52KB
  122. ~Get Your Files Here !/13 - Delivery Methods/11 - Luring Targets Into Accessing Evil URL Without Direct Interaction.encrypted.m4a 5.25MB
  123. ~Get Your Files Here !/13 - Delivery Methods/11 - Luring Targets Into Accessing Evil URL Without Direct Interaction.encrypted.mp4 61.87MB
  124. ~Get Your Files Here !/13 - Delivery Methods/11 - Luring Targets Into Accessing Evil URL Without Direct Interaction_en.srt 13.55KB
  125. ~Get Your Files Here !/13 - Delivery Methods/12 - Basic BeEF Commands.encrypted.m4a 2.16MB
  126. ~Get Your Files Here !/13 - Delivery Methods/12 - Basic BeEF Commands.encrypted.mp4 9.11MB
  127. ~Get Your Files Here !/13 - Delivery Methods/12 - Basic BeEF Commands_en.srt 5.99KB
  128. ~Get Your Files Here !/13 - Delivery Methods/13 - Stealing Credentials Passwords Using A Fake Login Prompt.encrypted.m4a 1.12MB
  129. ~Get Your Files Here !/13 - Delivery Methods/13 - Stealing Credentials Passwords Using A Fake Login Prompt.encrypted.mp4 7.44MB
  130. ~Get Your Files Here !/13 - Delivery Methods/13 - Stealing Credentials Passwords Using A Fake Login Prompt_en.srt 3.16KB
  131. ~Get Your Files Here !/13 - Delivery Methods/14 - Hacking Windows 10 Using A Fake Update.encrypted.m4a 2.29MB
  132. ~Get Your Files Here !/13 - Delivery Methods/14 - Hacking Windows 10 Using A Fake Update.encrypted.mp4 18.00MB
  133. ~Get Your Files Here !/13 - Delivery Methods/14 - Hacking Windows 10 Using A Fake Update_en.srt 6.17KB
  134. ~Get Your Files Here !/13 - Delivery Methods/15 - Hacking Mac OS X Using A Fake Update.encrypted.m4a 2.20MB
  135. ~Get Your Files Here !/13 - Delivery Methods/15 - Hacking Mac OS X Using A Fake Update.encrypted.mp4 10.28MB
  136. ~Get Your Files Here !/13 - Delivery Methods/15 - Hacking Mac OS X Using A Fake Update_en.srt 5.82KB
  137. ~Get Your Files Here !/13 - Delivery Methods/16 - Hacking Linux Using A Fake Update.encrypted.m4a 2.33MB
  138. ~Get Your Files Here !/13 - Delivery Methods/16 - Hacking Linux Using A Fake Update.encrypted.mp4 13.97MB
  139. ~Get Your Files Here !/13 - Delivery Methods/16 - Hacking Linux Using A Fake Update_en.srt 5.76KB
  140. ~Get Your Files Here !/13 - Delivery Methods/2 - Mail Deliver - Setting up an SMTP Server.encrypted.m4a 3.36MB
  141. ~Get Your Files Here !/13 - Delivery Methods/2 - Mail Deliver - Setting up an SMTP Server.encrypted.mp4 19.50MB
  142. ~Get Your Files Here !/13 - Delivery Methods/2 - Mail Deliver - Setting up an SMTP Server_en.srt 9.17KB
  143. ~Get Your Files Here !/13 - Delivery Methods/3 - Mail Delivery - Spoofing Emails.encrypted.m4a 5.79MB
  144. ~Get Your Files Here !/13 - Delivery Methods/3 - Mail Delivery - Spoofing Emails.encrypted.mp4 71.41MB
  145. ~Get Your Files Here !/13 - Delivery Methods/3 - Mail Delivery - Spoofing Emails_en.srt 15.22KB
  146. ~Get Your Files Here !/13 - Delivery Methods/4 - Mail Delivery - Spoofing Emails (method 2).encrypted.m4a 5.12MB
  147. ~Get Your Files Here !/13 - Delivery Methods/4 - Mail Delivery - Spoofing Emails (method 2).encrypted.mp4 55.63MB
  148. ~Get Your Files Here !/13 - Delivery Methods/4 - Mail Delivery - Spoofing Emails (method 2)_en.srt 15.54KB
  149. ~Get Your Files Here !/13 - Delivery Methods/4 - mailer-make-sure-you-rename-this-file-to-send.php.txt 1.73KB
  150. ~Get Your Files Here !/13 - Delivery Methods/5 - Hacking OS X & Linux Using Pure Social Engineering Without Sending Any Files.encrypted.m4a 4.97MB
  151. ~Get Your Files Here !/13 - Delivery Methods/5 - Hacking OS X & Linux Using Pure Social Engineering Without Sending Any Files.encrypted.mp4 72.86MB
  152. ~Get Your Files Here !/13 - Delivery Methods/5 - Hacking OS X & Linux Using Pure Social Engineering Without Sending Any Files_en.srt 13.75KB
  153. ~Get Your Files Here !/13 - Delivery Methods/6 - Creating A Replica Of Any Website Login Page.encrypted.m4a 2.96MB
  154. ~Get Your Files Here !/13 - Delivery Methods/6 - Creating A Replica Of Any Website Login Page.encrypted.mp4 26.27MB
  155. ~Get Your Files Here !/13 - Delivery Methods/6 - Creating A Replica Of Any Website Login Page_en.srt 7.62KB
  156. ~Get Your Files Here !/13 - Delivery Methods/7 - Stealing Login Info Using Fake A Login Page.mp4 83.00MB
  157. ~Get Your Files Here !/13 - Delivery Methods/7 - Stealing Login Info Using Fake A Login Page_en.srt 14.90KB
  158. ~Get Your Files Here !/13 - Delivery Methods/8 - BeEF Overview & Basic Hook Method.encrypted.m4a 3.49MB
  159. ~Get Your Files Here !/13 - Delivery Methods/8 - BeEF Overview & Basic Hook Method.encrypted.mp4 20.76MB
  160. ~Get Your Files Here !/13 - Delivery Methods/8 - BeEF Overview & Basic Hook Method_en.srt 9.39KB
  161. ~Get Your Files Here !/13 - Delivery Methods/9 - Injecting BeEF's Hook In Any Webpage.encrypted.m4a 2.43MB
  162. ~Get Your Files Here !/13 - Delivery Methods/9 - Injecting BeEF's Hook In Any Webpage.encrypted.mp4 21.08MB
  163. ~Get Your Files Here !/13 - Delivery Methods/9 - Injecting BeEF's Hook In Any Webpage_en.srt 6.04KB
  164. ~Get Your Files Here !/13 - Delivery Methods/external-assets-links.txt 199B
  165. ~Get Your Files Here !/14 - Using The Above Attacks Outside The Local Network/1 - Overview of the Setup.mp4 96.38MB
  166. ~Get Your Files Here !/14 - Using The Above Attacks Outside The Local Network/1 - Overview of the Setup_en.srt 9.04KB
  167. ~Get Your Files Here !/14 - Using The Above Attacks Outside The Local Network/2 - Ex1 - Generating a Backdoor That Works Outside The Network.encrypted.m4a 2.64MB
  168. ~Get Your Files Here !/14 - Using The Above Attacks Outside The Local Network/2 - Ex1 - Generating a Backdoor That Works Outside The Network.encrypted.mp4 21.28MB
  169. ~Get Your Files Here !/14 - Using The Above Attacks Outside The Local Network/2 - Ex1 - Generating a Backdoor That Works Outside The Network_en.srt 7.11KB
  170. ~Get Your Files Here !/14 - Using The Above Attacks Outside The Local Network/3 - Configuring The Router To Forward Connections To Kali.encrypted.m4a 3.41MB
  171. ~Get Your Files Here !/14 - Using The Above Attacks Outside The Local Network/3 - Configuring The Router To Forward Connections To Kali.encrypted.mp4 24.50MB
  172. ~Get Your Files Here !/14 - Using The Above Attacks Outside The Local Network/3 - Configuring The Router To Forward Connections To Kali_en.srt 8.81KB
  173. ~Get Your Files Here !/14 - Using The Above Attacks Outside The Local Network/4 - Ex2 - Using BeEF Outside The Network.encrypted.m4a 2.85MB
  174. ~Get Your Files Here !/14 - Using The Above Attacks Outside The Local Network/4 - Ex2 - Using BeEF Outside The Network.encrypted.mp4 14.81MB
  175. ~Get Your Files Here !/14 - Using The Above Attacks Outside The Local Network/4 - Ex2 - Using BeEF Outside The Network_en.srt 7.16KB
  176. ~Get Your Files Here !/14 - Using The Above Attacks Outside The Local Network/external-assets-links.txt 86B
  177. ~Get Your Files Here !/15 - Post Exploitation/1 - Introduction.encrypted.m4a 1.07MB
  178. ~Get Your Files Here !/15 - Post Exploitation/1 - Introduction.encrypted.mp4 5.48MB
  179. ~Get Your Files Here !/15 - Post Exploitation/1 - Introduction_en.srt 3.23KB
  180. ~Get Your Files Here !/15 - Post Exploitation/2 - Upgrading Basic Shell Access To A Meterpreter Empire Access.encrypted.m4a 4.46MB
  181. ~Get Your Files Here !/15 - Post Exploitation/2 - Upgrading Basic Shell Access To A Meterpreter Empire Access.encrypted.mp4 12.14MB
  182. ~Get Your Files Here !/15 - Post Exploitation/2 - Upgrading Basic Shell Access To A Meterpreter Empire Access_en.srt 12.25KB
  183. ~Get Your Files Here !/16 - Post Exploitation - Meterpreter/1 - Meterpreter Basics.encrypted.m4a 3.12MB
  184. ~Get Your Files Here !/16 - Post Exploitation - Meterpreter/1 - Meterpreter Basics.encrypted.mp4 21.51MB
  185. ~Get Your Files Here !/16 - Post Exploitation - Meterpreter/1 - Meterpreter Basics_en.srt 7.66KB
  186. ~Get Your Files Here !/16 - Post Exploitation - Meterpreter/2 - File System Commands.encrypted.m4a 2.53MB
  187. ~Get Your Files Here !/16 - Post Exploitation - Meterpreter/2 - File System Commands.encrypted.mp4 15.58MB
  188. ~Get Your Files Here !/16 - Post Exploitation - Meterpreter/2 - File System Commands_en.srt 5.55KB
  189. ~Get Your Files Here !/16 - Post Exploitation - Meterpreter/3 - Maintaining Access Basic Methods.encrypted.m4a 2.51MB
  190. ~Get Your Files Here !/16 - Post Exploitation - Meterpreter/3 - Maintaining Access Basic Methods.encrypted.mp4 13.64MB
  191. ~Get Your Files Here !/16 - Post Exploitation - Meterpreter/3 - Maintaining Access Basic Methods_en.srt 7.13KB
  192. ~Get Your Files Here !/16 - Post Exploitation - Meterpreter/4 - Maintaining Access - Using a Reliable & undetectable Method.encrypted.m4a 3.37MB
  193. ~Get Your Files Here !/16 - Post Exploitation - Meterpreter/4 - Maintaining Access - Using a Reliable & undetectable Method.encrypted.mp4 39.57MB
  194. ~Get Your Files Here !/16 - Post Exploitation - Meterpreter/4 - Maintaining Access - Using a Reliable & undetectable Method_en.srt 7.94KB
  195. ~Get Your Files Here !/16 - Post Exploitation - Meterpreter/5 - Spying - Capturing Key Strikes & Taking Screen Shots.encrypted.m4a 1.31MB
  196. ~Get Your Files Here !/16 - Post Exploitation - Meterpreter/5 - Spying - Capturing Key Strikes & Taking Screen Shots.encrypted.mp4 5.27MB
  197. ~Get Your Files Here !/16 - Post Exploitation - Meterpreter/5 - Spying - Capturing Key Strikes & Taking Screen Shots_en.srt 3.28KB
  198. ~Get Your Files Here !/16 - Post Exploitation - Meterpreter/6 - Pivoting - Theory (What is Pivoting ).encrypted.m4a 3.48MB
  199. ~Get Your Files Here !/16 - Post Exploitation - Meterpreter/6 - Pivoting - Theory (What is Pivoting ).encrypted.mp4 34.30MB
  200. ~Get Your Files Here !/16 - Post Exploitation - Meterpreter/6 - Pivoting - Theory (What is Pivoting )_en.srt 7.72KB
  201. ~Get Your Files Here !/16 - Post Exploitation - Meterpreter/7 - Pivoting - Exploiting Devices on The Same Network As a Hacked Computer.encrypted.m4a 4.00MB
  202. ~Get Your Files Here !/16 - Post Exploitation - Meterpreter/7 - Pivoting - Exploiting Devices on The Same Network As a Hacked Computer.encrypted.mp4 25.15MB
  203. ~Get Your Files Here !/16 - Post Exploitation - Meterpreter/7 - Pivoting - Exploiting Devices on The Same Network As a Hacked Computer_en.srt 10.42KB
  204. ~Get Your Files Here !/16 - Post Exploitation - Meterpreter/8 - Controlling Android Phone & Accessing Mic, Camera, Messages, File System & More.encrypted.m4a 4.27MB
  205. ~Get Your Files Here !/16 - Post Exploitation - Meterpreter/8 - Controlling Android Phone & Accessing Mic, Camera, Messages, File System & More.encrypted.mp4 29.22MB
  206. ~Get Your Files Here !/16 - Post Exploitation - Meterpreter/8 - Controlling Android Phone & Accessing Mic, Camera, Messages, File System & More_en.srt 12.03KB
  207. ~Get Your Files Here !/16 - Post Exploitation - Meterpreter/9 - Maintaining Access On OS X.encrypted.m4a 5.12MB
  208. ~Get Your Files Here !/16 - Post Exploitation - Meterpreter/9 - Maintaining Access On OS X.encrypted.mp4 45.54MB
  209. ~Get Your Files Here !/16 - Post Exploitation - Meterpreter/9 - Maintaining Access On OS X_en.srt 12.89KB
  210. ~Get Your Files Here !/17 - Post Exploitation - Empire/1 - Basics Of Empire Agents.encrypted.m4a 3.14MB
  211. ~Get Your Files Here !/17 - Post Exploitation - Empire/1 - Basics Of Empire Agents.encrypted.mp4 10.71MB
  212. ~Get Your Files Here !/17 - Post Exploitation - Empire/1 - Basics Of Empire Agents_en.srt 9.58KB
  213. ~Get Your Files Here !/17 - Post Exploitation - Empire/2 - File System Commands.encrypted.m4a 2.93MB
  214. ~Get Your Files Here !/17 - Post Exploitation - Empire/2 - File System Commands.encrypted.mp4 22.05MB
  215. ~Get Your Files Here !/17 - Post Exploitation - Empire/2 - File System Commands_en.srt 8.15KB
  216. ~Get Your Files Here !/17 - Post Exploitation - Empire/3 - Upload & Execute Shell Commands.encrypted.m4a 2.23MB
  217. ~Get Your Files Here !/17 - Post Exploitation - Empire/3 - Upload & Execute Shell Commands.encrypted.mp4 16.25MB
  218. ~Get Your Files Here !/17 - Post Exploitation - Empire/3 - Upload & Execute Shell Commands_en.srt 5.55KB
  219. ~Get Your Files Here !/17 - Post Exploitation - Empire/4 - Injecting a Backdoor In a System Processes.encrypted.m4a 4.71MB
  220. ~Get Your Files Here !/17 - Post Exploitation - Empire/4 - Injecting a Backdoor In a System Processes.encrypted.mp4 71.06MB
  221. ~Get Your Files Here !/17 - Post Exploitation - Empire/4 - Injecting a Backdoor In a System Processes_en.srt 12.77KB
  222. ~Get Your Files Here !/17 - Post Exploitation - Empire/5 - 2 Methods to Escalating Privileges On OS X.encrypted.m4a 3.56MB
  223. ~Get Your Files Here !/17 - Post Exploitation - Empire/5 - 2 Methods to Escalating Privileges On OS X.encrypted.mp4 50.51MB
  224. ~Get Your Files Here !/17 - Post Exploitation - Empire/5 - 2 Methods to Escalating Privileges On OS X_en.srt 9.07KB
  225. ~Get Your Files Here !/17 - Post Exploitation - Empire/6 - Maintaining Access On OS X.mp4 12.18MB
  226. ~Get Your Files Here !/17 - Post Exploitation - Empire/6 - Maintaining Access On OS X_en.srt 7.00KB
  227. ~Get Your Files Here !/18 - Security/1 - Detecting Fake Spoofed Emails.encrypted.m4a 3.01MB
  228. ~Get Your Files Here !/18 - Security/1 - Detecting Fake Spoofed Emails.encrypted.mp4 13.83MB
  229. ~Get Your Files Here !/18 - Security/1 - Detecting Fake Spoofed Emails_en.srt 8.72KB
  230. ~Get Your Files Here !/18 - Security/1 - Security.pdf 100.01KB
  231. ~Get Your Files Here !/18 - Security/2 - How to Protect Against BeEF & Other Browser Exploits.encrypted.m4a 2.10MB
  232. ~Get Your Files Here !/18 - Security/2 - How to Protect Against BeEF & Other Browser Exploits.encrypted.mp4 21.37MB
  233. ~Get Your Files Here !/18 - Security/2 - How to Protect Against BeEF & Other Browser Exploits_en.srt 5.33KB
  234. ~Get Your Files Here !/18 - Security/3 - Detecting Trojans Manually.encrypted.m4a 2.71MB
  235. ~Get Your Files Here !/18 - Security/3 - Detecting Trojans Manually.encrypted.mp4 26.21MB
  236. ~Get Your Files Here !/18 - Security/3 - Detecting Trojans Manually_en.srt 6.46KB
  237. ~Get Your Files Here !/18 - Security/4 - Detecting Trojans Using a Sandbox.encrypted.m4a 1.60MB
  238. ~Get Your Files Here !/18 - Security/4 - Detecting Trojans Using a Sandbox.encrypted.mp4 13.57MB
  239. ~Get Your Files Here !/18 - Security/4 - Detecting Trojans Using a Sandbox_en.srt 4.19KB
  240. ~Get Your Files Here !/18 - Security/external-assets-links.txt 53B
  241. ~Get Your Files Here !/19 - Bonus Section/1 - Bonus Lecture - What's Next.html 6.80KB
  242. ~Get Your Files Here !/2 - Preparation - Linux Basics/1 - Basic Overview Of Kali Linux.encrypted.m4a 2.53MB
  243. ~Get Your Files Here !/2 - Preparation - Linux Basics/1 - Basic Overview Of Kali Linux.encrypted.mp4 13.44MB
  244. ~Get Your Files Here !/2 - Preparation - Linux Basics/1 - Basic Overview Of Kali Linux_en.srt 6.81KB
  245. ~Get Your Files Here !/2 - Preparation - Linux Basics/2 - The Linux Terminal & Basic Linux Commands.encrypted.m4a 6.41MB
  246. ~Get Your Files Here !/2 - Preparation - Linux Basics/2 - The Linux Terminal & Basic Linux Commands.encrypted.mp4 145.76MB
  247. ~Get Your Files Here !/2 - Preparation - Linux Basics/2 - The Linux Terminal & Basic Linux Commands_en.srt 15.30KB
  248. ~Get Your Files Here !/2 - Preparation - Linux Basics/2 - The Linux Terminal & Basic Linux Commands_en.vtt 14.71KB
  249. ~Get Your Files Here !/3 - Information Gathering/1 - 02-Information-Gathering.pdf 87.98KB
  250. ~Get Your Files Here !/3 - Information Gathering/1 - Introduction.encrypted.m4a 939.91KB
  251. ~Get Your Files Here !/3 - Information Gathering/1 - Introduction.encrypted.mp4 4.69MB
  252. ~Get Your Files Here !/3 - Information Gathering/1 - Introduction_en.srt 2.60KB
  253. ~Get Your Files Here !/4 - Information Gathering - Gathering Info About A Company Website/1 - Maltego Overview.mp4 104.63MB
  254. ~Get Your Files Here !/4 - Information Gathering - Gathering Info About A Company Website/1 - Maltego Overview_en.srt 9.70KB
  255. ~Get Your Files Here !/4 - Information Gathering - Gathering Info About A Company Website/2 - Discovering Domain Info & Emails Associated With Target.encrypted.m4a 3.62MB
  256. ~Get Your Files Here !/4 - Information Gathering - Gathering Info About A Company Website/2 - Discovering Domain Info & Emails Associated With Target.encrypted.mp4 12.04MB
  257. ~Get Your Files Here !/4 - Information Gathering - Gathering Info About A Company Website/2 - Discovering Domain Info & Emails Associated With Target_en.srt 9.52KB
  258. ~Get Your Files Here !/4 - Information Gathering - Gathering Info About A Company Website/3 - Discovering Information About Hosting Company, Support Team Emails & Admin Email.encrypted.m4a 3.39MB
  259. ~Get Your Files Here !/4 - Information Gathering - Gathering Info About A Company Website/3 - Discovering Information About Hosting Company, Support Team Emails & Admin Email.encrypted.mp4 18.87MB
  260. ~Get Your Files Here !/4 - Information Gathering - Gathering Info About A Company Website/3 - Discovering Information About Hosting Company, Support Team Emails & Admin Email_en.srt 8.48KB
  261. ~Get Your Files Here !/4 - Information Gathering - Gathering Info About A Company Website/4 - Discovering Files, Links, Websites & Other Companies Related To Target.encrypted.m4a 2.55MB
  262. ~Get Your Files Here !/4 - Information Gathering - Gathering Info About A Company Website/4 - Discovering Files, Links, Websites & Other Companies Related To Target.encrypted.mp4 19.94MB
  263. ~Get Your Files Here !/4 - Information Gathering - Gathering Info About A Company Website/4 - Discovering Files, Links, Websites & Other Companies Related To Target_en.srt 6.03KB
  264. ~Get Your Files Here !/4 - Information Gathering - Gathering Info About A Company Website/5 - Using The Gathered Info To Build An Attack Strategy.encrypted.m4a 2.09MB
  265. ~Get Your Files Here !/4 - Information Gathering - Gathering Info About A Company Website/5 - Using The Gathered Info To Build An Attack Strategy.encrypted.mp4 9.26MB
  266. ~Get Your Files Here !/4 - Information Gathering - Gathering Info About A Company Website/5 - Using The Gathered Info To Build An Attack Strategy_en.srt 6.00KB
  267. ~Get Your Files Here !/4 - Information Gathering - Gathering Info About A Company Website/external-assets-links.txt 146B
  268. ~Get Your Files Here !/5 - Information Gathering - Gathering Info About A Person/1 - Discovering Websites, Links & Social Networking Accounts.encrypted.m4a 4.63MB
  269. ~Get Your Files Here !/5 - Information Gathering - Gathering Info About A Person/1 - Discovering Websites, Links & Social Networking Accounts.encrypted.mp4 16.70MB
  270. ~Get Your Files Here !/5 - Information Gathering - Gathering Info About A Person/1 - Discovering Websites, Links & Social Networking Accounts_en.srt 13.62KB
  271. ~Get Your Files Here !/5 - Information Gathering - Gathering Info About A Person/2 - Discovering Twitter Friends & Associated Accounts.encrypted.m4a 2.42MB
  272. ~Get Your Files Here !/5 - Information Gathering - Gathering Info About A Person/2 - Discovering Twitter Friends & Associated Accounts.encrypted.mp4 13.33MB
  273. ~Get Your Files Here !/5 - Information Gathering - Gathering Info About A Person/2 - Discovering Twitter Friends & Associated Accounts_en.srt 6.52KB
  274. ~Get Your Files Here !/5 - Information Gathering - Gathering Info About A Person/3 - Discovering Emails Of The Target's Friends.encrypted.m4a 2.28MB
  275. ~Get Your Files Here !/5 - Information Gathering - Gathering Info About A Person/3 - Discovering Emails Of The Target's Friends.encrypted.mp4 12.61MB
  276. ~Get Your Files Here !/5 - Information Gathering - Gathering Info About A Person/3 - Discovering Emails Of The Target's Friends_en.srt 5.91KB
  277. ~Get Your Files Here !/5 - Information Gathering - Gathering Info About A Person/4 - Analysing The Gathered Info & Building An Attack Strategy.encrypted.m4a 4.25MB
  278. ~Get Your Files Here !/5 - Information Gathering - Gathering Info About A Person/4 - Analysing The Gathered Info & Building An Attack Strategy.encrypted.mp4 14.92MB
  279. ~Get Your Files Here !/5 - Information Gathering - Gathering Info About A Person/4 - Analysing The Gathered Info & Building An Attack Strategy_en.srt 11.73KB
  280. ~Get Your Files Here !/6 - Windows Malware/1 - 03-Generating-Evil-Files-For-Windows.pdf 692.07KB
  281. ~Get Your Files Here !/6 - Windows Malware/1 - Introduction.mp4 5.05MB
  282. ~Get Your Files Here !/6 - Windows Malware/1 - Introduction_en.srt 2.92KB
  283. ~Get Your Files Here !/6 - Windows Malware/2 - Installing Windows As a Virtual Machine.encrypted.m4a 3.01MB
  284. ~Get Your Files Here !/6 - Windows Malware/2 - Installing Windows As a Virtual Machine.encrypted.mp4 20.38MB
  285. ~Get Your Files Here !/6 - Windows Malware/2 - Installing Windows As a Virtual Machine_en.srt 8.08KB
  286. ~Get Your Files Here !/6 - Windows Malware/external-assets-links.txt 96B
  287. ~Get Your Files Here !/7 - Windows Malware - Generating Undetectable Backdoors/1 - Installing Veil Framework.mp4 49.68MB
  288. ~Get Your Files Here !/7 - Windows Malware - Generating Undetectable Backdoors/1 - Installing Veil Framework_en.srt 5.88KB
  289. ~Get Your Files Here !/7 - Windows Malware - Generating Undetectable Backdoors/1 - install-veil 250B
  290. ~Get Your Files Here !/7 - Windows Malware - Generating Undetectable Backdoors/1 - install-veil-kali-2021 79B
  291. ~Get Your Files Here !/7 - Windows Malware - Generating Undetectable Backdoors/10 - Modifying Backdoor Source To Bypass All Anti-virus Programs.encrypted.m4a 3.93MB
  292. ~Get Your Files Here !/7 - Windows Malware - Generating Undetectable Backdoors/10 - Modifying Backdoor Source To Bypass All Anti-virus Programs.encrypted.mp4 18.68MB
  293. ~Get Your Files Here !/7 - Windows Malware - Generating Undetectable Backdoors/10 - Modifying Backdoor Source To Bypass All Anti-virus Programs_en.srt 10.84KB
  294. ~Get Your Files Here !/7 - Windows Malware - Generating Undetectable Backdoors/2 - Veil Overview & Payload Basics.encrypted.m4a 3.59MB
  295. ~Get Your Files Here !/7 - Windows Malware - Generating Undetectable Backdoors/2 - Veil Overview & Payload Basics.encrypted.mp4 12.83MB
  296. ~Get Your Files Here !/7 - Windows Malware - Generating Undetectable Backdoors/2 - Veil Overview & Payload Basics_en.srt 10.37KB
  297. ~Get Your Files Here !/7 - Windows Malware - Generating Undetectable Backdoors/3 - Generating Undetectable Backdoors For Windows.mp4 83.00MB
  298. ~Get Your Files Here !/7 - Windows Malware - Generating Undetectable Backdoors/3 - Generating Undetectable Backdoors For Windows_en.srt 13.43KB
  299. ~Get Your Files Here !/7 - Windows Malware - Generating Undetectable Backdoors/4 - Listening For Incoming Connections.mp4 29.08MB
  300. ~Get Your Files Here !/7 - Windows Malware - Generating Undetectable Backdoors/4 - Listening For Incoming Connections_en.srt 9.31KB
  301. ~Get Your Files Here !/7 - Windows Malware - Generating Undetectable Backdoors/5 - Hacking A Windows 10 Machine Using The Generated Backdoor.encrypted.m4a 3.53MB
  302. ~Get Your Files Here !/7 - Windows Malware - Generating Undetectable Backdoors/5 - Hacking A Windows 10 Machine Using The Generated Backdoor.encrypted.mp4 23.37MB
  303. ~Get Your Files Here !/7 - Windows Malware - Generating Undetectable Backdoors/5 - Hacking A Windows 10 Machine Using The Generated Backdoor_en.srt 8.94KB
  304. ~Get Your Files Here !/7 - Windows Malware - Generating Undetectable Backdoors/6 - Introduction to The Fat Rat.encrypted.m4a 3.08MB
  305. ~Get Your Files Here !/7 - Windows Malware - Generating Undetectable Backdoors/6 - Introduction to The Fat Rat.encrypted.mp4 40.76MB
  306. ~Get Your Files Here !/7 - Windows Malware - Generating Undetectable Backdoors/6 - Introduction to The Fat Rat_en.srt 8.24KB
  307. ~Get Your Files Here !/7 - Windows Malware - Generating Undetectable Backdoors/7 - Generating An Undetectable Backdoor For Windows - Method 2.encrypted.m4a 5.62MB
  308. ~Get Your Files Here !/7 - Windows Malware - Generating Undetectable Backdoors/7 - Generating An Undetectable Backdoor For Windows - Method 2.encrypted.mp4 155.79MB
  309. ~Get Your Files Here !/7 - Windows Malware - Generating Undetectable Backdoors/7 - Generating An Undetectable Backdoor For Windows - Method 2_en.srt 14.01KB
  310. ~Get Your Files Here !/7 - Windows Malware - Generating Undetectable Backdoors/8 - Introduction to Empire.encrypted.m4a 4.11MB
  311. ~Get Your Files Here !/7 - Windows Malware - Generating Undetectable Backdoors/8 - Introduction to Empire.encrypted.mp4 27.97MB
  312. ~Get Your Files Here !/7 - Windows Malware - Generating Undetectable Backdoors/8 - Introduction to Empire_en.srt 12.43KB
  313. ~Get Your Files Here !/7 - Windows Malware - Generating Undetectable Backdoors/9 - Creating a Windows Powershell Stager & Hacking Windows 10.encrypted.m4a 3.93MB
  314. ~Get Your Files Here !/7 - Windows Malware - Generating Undetectable Backdoors/9 - Creating a Windows Powershell Stager & Hacking Windows 10.encrypted.mp4 14.36MB
  315. ~Get Your Files Here !/7 - Windows Malware - Generating Undetectable Backdoors/9 - Creating a Windows Powershell Stager & Hacking Windows 10_en.srt 11.73KB
  316. ~Get Your Files Here !/7 - Windows Malware - Generating Undetectable Backdoors/external-assets-links.txt 306B
  317. ~Get Your Files Here !/8 - Windows Malware - Spying/1 - Introduction to Keyloggers.encrypted.m4a 3.21MB
  318. ~Get Your Files Here !/8 - Windows Malware - Spying/1 - Introduction to Keyloggers.encrypted.mp4 52.52MB
  319. ~Get Your Files Here !/8 - Windows Malware - Spying/1 - Introduction to Keyloggers_en.srt 8.34KB
  320. ~Get Your Files Here !/8 - Windows Malware - Spying/2 - Creating A Remote Keylogger.encrypted.m4a 4.42MB
  321. ~Get Your Files Here !/8 - Windows Malware - Spying/2 - Creating A Remote Keylogger.encrypted.mp4 39.00MB
  322. ~Get Your Files Here !/8 - Windows Malware - Spying/2 - Creating A Remote Keylogger_en.srt 10.91KB
  323. ~Get Your Files Here !/8 - Windows Malware - Spying/3 - Using A Remote Keylogger To Capture Key Strikes Including Passwords.encrypted.m4a 3.68MB
  324. ~Get Your Files Here !/8 - Windows Malware - Spying/3 - Using A Remote Keylogger To Capture Key Strikes Including Passwords.encrypted.mp4 46.97MB
  325. ~Get Your Files Here !/8 - Windows Malware - Spying/3 - Using A Remote Keylogger To Capture Key Strikes Including Passwords_en.srt 9.10KB
  326. ~Get Your Files Here !/8 - Windows Malware - Spying/4 - Password Recovery Basics.encrypted.m4a 3.66MB
  327. ~Get Your Files Here !/8 - Windows Malware - Spying/4 - Password Recovery Basics.encrypted.mp4 19.73MB
  328. ~Get Your Files Here !/8 - Windows Malware - Spying/4 - Password Recovery Basics_en.srt 9.76KB
  329. ~Get Your Files Here !/8 - Windows Malware - Spying/5 - Recovering Saved Passwords From Local Machine.encrypted.m4a 1.61MB
  330. ~Get Your Files Here !/8 - Windows Malware - Spying/5 - Recovering Saved Passwords From Local Machine.encrypted.mp4 11.20MB
  331. ~Get Your Files Here !/8 - Windows Malware - Spying/5 - Recovering Saved Passwords From Local Machine_en.srt 3.90KB
  332. ~Get Your Files Here !/8 - Windows Malware - Spying/6 - Recovering Saved Passwords From A Remote Machine.encrypted.m4a 5.80MB
  333. ~Get Your Files Here !/8 - Windows Malware - Spying/6 - Recovering Saved Passwords From A Remote Machine.encrypted.mp4 38.58MB
  334. ~Get Your Files Here !/8 - Windows Malware - Spying/6 - Recovering Saved Passwords From A Remote Machine_en.srt 14.82KB
  335. ~Get Your Files Here !/8 - Windows Malware - Spying/6 - run-laZagne.txt 862B
  336. ~Get Your Files Here !/8 - Windows Malware - Spying/external-assets-links.txt 113B
  337. ~Get Your Files Here !/9 - Windows Malware - Enhancing Malware/1 - Bypassing All Anti-Virus Programs By Modifying Hex Vales.encrypted.m4a 5.18MB
  338. ~Get Your Files Here !/9 - Windows Malware - Enhancing Malware/1 - Bypassing All Anti-Virus Programs By Modifying Hex Vales.encrypted.mp4 36.93MB
  339. ~Get Your Files Here !/9 - Windows Malware - Enhancing Malware/1 - Bypassing All Anti-Virus Programs By Modifying Hex Vales_en.srt 13.17KB
  340. ~Get Your Files Here !/9 - Windows Malware - Enhancing Malware/2 - Download & Execute Payload.encrypted.m4a 3.09MB
  341. ~Get Your Files Here !/9 - Windows Malware - Enhancing Malware/2 - Download & Execute Payload.encrypted.mp4 60.77MB
  342. ~Get Your Files Here !/9 - Windows Malware - Enhancing Malware/2 - Download & Execute Payload_en.srt 8.60KB
  343. ~Get Your Files Here !/9 - Windows Malware - Enhancing Malware/2 - download-and-execute.txt.part 0B
  344. ~Get Your Files Here !/9 - Windows Malware - Enhancing Malware/3 - Creating The Perfect Spying Tool.mp4 14.53MB
  345. ~Get Your Files Here !/9 - Windows Malware - Enhancing Malware/3 - Creating The Perfect Spying Tool_en.srt 9.15KB
  346. ~Get Your Files Here !/Bonus Resources.txt 357B