Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
[TGx]Downloaded from torrentgalaxy.to .txt |
585B |
0 |
47B |
1 |
321B |
1. The Course Overview.mp4 |
45.83MB |
1. The Course Overview.mp4 |
21.10MB |
1. The Course Overview-en_US.srt |
3.53KB |
1. The Course Overview-en_US.srt |
3.03KB |
10 |
307.21KB |
10. Using Maltego.mp4 |
100.54MB |
10. Using Maltego-en_US.srt |
11.27KB |
10. Using Public Exploits.mp4 |
186.27MB |
10. Using Public Exploits-en_US.srt |
19.14KB |
11 |
403.56KB |
11. Exploiting with Metasploit.mp4 |
87.81MB |
11. Exploiting with Metasploit-en_US.srt |
10.50KB |
11. Installing OpenVAS.mp4 |
29.45MB |
11. Installing OpenVAS-en_US.srt |
4.60KB |
12 |
31.37KB |
12. Scanning with OpenVAS.mp4 |
42.78MB |
12. Scanning with OpenVAS-en_US.srt |
5.60KB |
12. Social Engineering.mp4 |
132.45MB |
12. Social Engineering-en_US.srt |
14.43KB |
13 |
358.12KB |
13. Evading Anti-Virus.mp4 |
288.78MB |
13. Evading Anti-Virus-en_US.srt |
29.22KB |
13. Installing Nessus.mp4 |
72.08MB |
13. Installing Nessus-en_US.srt |
8.82KB |
14 |
466.13KB |
14. Final Word on Exploitation.mp4 |
6.35MB |
14. Final Word on Exploitation-en_US.srt |
2.49KB |
14. Scanning with Nessus.mp4 |
30.61MB |
14. Scanning with Nessus-en_US.srt |
6.39KB |
15 |
728.25KB |
15. About Post-Exploitation.mp4 |
5.13MB |
15. About Post-Exploitation-en_US.srt |
2.34KB |
15. Exploiting with Metasploit.mp4 |
29.92MB |
15. Exploiting with Metasploit-en_US.srt |
5.50KB |
16 |
4.16KB |
16. Metasploit and MSFvenom.mp4 |
117.61MB |
16. Metasploit and MSFvenom-en_US.srt |
9.81KB |
16. Meterpreter.mp4 |
107.97MB |
16. Meterpreter-en_US.srt |
12.88KB |
17 |
973.47KB |
17. Privilege Escalation.mp4 |
125.70MB |
17. Privilege Escalation-en_US.srt |
17.70KB |
17. Using Armitage.mp4 |
64.76MB |
17. Using Armitage-en_US.srt |
7.83KB |
18 |
190.48KB |
18. Collecting Credentials.mp4 |
97.00MB |
18. Collecting Credentials-en_US.srt |
14.38KB |
18. Other Ways to Exploit.mp4 |
99.29MB |
18. Other Ways to Exploit-en_US.srt |
6.93KB |
19 |
257.64KB |
19. Password Brute-Force.mp4 |
80.45MB |
19. Password Brute-Force-en_US.srt |
13.84KB |
19. What Is Yuki and How Do We Install It.mp4 |
71.92MB |
19. What Is Yuki and How Do We Install It-en_US.srt |
7.73KB |
2 |
233.20KB |
2. Disclaimer.mp4 |
5.55MB |
2. Disclaimer-en_US.srt |
2.09KB |
2. Pre-Installed Kali Linux.mp4 |
95.05MB |
2. Pre-Installed Kali Linux-en_US.srt |
11.60KB |
20 |
383.38KB |
20. Achieving Persistence.mp4 |
397.94MB |
20. Achieving Persistence-en_US.srt |
37.49KB |
20. Scanning with Yuki.mp4 |
55.40MB |
20. Scanning with Yuki-en_US.srt |
4.66KB |
21 |
564.81KB |
21. Installing, Configuring, and Scanning with Sniper.mp4 |
59.67MB |
21. Installing, Configuring, and Scanning with Sniper-en_US.srt |
6.91KB |
21. Pivoting.mp4 |
85.63MB |
21. Pivoting-en_US.srt |
15.15KB |
22 |
473.99KB |
22. Pass-the-Hash Attack.mp4 |
200.10MB |
22. Pass-the-Hash Attack-en_US.srt |
26.67KB |
22. Using Individual Tools.mp4 |
59.80MB |
22. Using Individual Tools-en_US.srt |
6.92KB |
23 |
943.71KB |
23. Review And Next Steps.mp4 |
33.49MB |
23. Review And Next Steps-en_US.srt |
2.20KB |
23. Understanding Cross-Site Scripting.mp4 |
12.62MB |
23. Understanding Cross-Site Scripting-en_US.srt |
4.10KB |
24 |
85.87KB |
24. Implementing an XSS Attack.mp4 |
101.65MB |
24. Implementing an XSS Attack-en_US.srt |
8.19KB |
25 |
708.91KB |
25. SQL Injection Theory.mp4 |
5.94MB |
25. SQL Injection Theory-en_US.srt |
2.20KB |
26 |
248.43KB |
26. Implementing a SQL Attack.mp4 |
76.54MB |
26. Implementing a SQL Attack-en_US.srt |
11.80KB |
27 |
692.27KB |
27. Cracking Passwords with John the Ripper.mp4 |
61.95MB |
27. Cracking Passwords with John the Ripper-en_US.srt |
7.29KB |
28 |
54.11KB |
28. Cracking Passwords with Hydra.mp4 |
36.01MB |
28. Cracking Passwords with Hydra-en_US.srt |
5.51KB |
29 |
385.22KB |
29. Checking AD Password Strengths of Users.mp4 |
86.75MB |
29. Checking AD Password Strengths of Users-en_US.srt |
8.32KB |
3 |
184.13KB |
3. Installing Kali Linux from Scratch.mp4 |
35.08MB |
3. Installing Kali Linux from Scratch-en_US.srt |
9.19KB |
3. Test Lab Architecture.mp4 |
5.73MB |
3. Test Lab Architecture-en_US.srt |
2.65KB |
30 |
201.79KB |
30. Using Software to Bypass Local Passwords.mp4 |
27.45MB |
30. Using Software to Bypass Local Passwords-en_US.srt |
5.27KB |
31 |
338.02KB |
31. Monitoring Resources.mp4 |
36.24MB |
31. Monitoring Resources-en_US.srt |
5.58KB |
32 |
185.53KB |
32. Gathering Your Findings.mp4 |
30.70MB |
32. Gathering Your Findings-en_US.srt |
6.17KB |
33 |
611.72KB |
33. Report Presentation.mp4 |
65.31MB |
33. Report Presentation-en_US.srt |
10.74KB |
34 |
638.09KB |
35 |
321.33KB |
36 |
170.04KB |
37 |
227.93KB |
38 |
282.74KB |
39 |
777.28KB |
4 |
926.02KB |
4. Setting Up Kali.mp4 |
42.72MB |
4. Setting Up Kali-en_US.srt |
4.41KB |
4. Updating, Downloading and Installing Apps.mp4 |
133.27MB |
4. Updating, Downloading and Installing Apps-en_US.srt |
10.58KB |
40 |
1012.72KB |
41 |
942.76KB |
42 |
517.56KB |
43 |
303.06KB |
44 |
400.11KB |
45 |
84.50KB |
46 |
565.87KB |
47 |
564.27KB |
48 |
921.05KB |
49 |
393.32KB |
5 |
752.33KB |
5. Running Services on Kali.mp4 |
51.69MB |
5. Running Services on Kali-en_US.srt |
4.58KB |
5. Setting Up Target Win 10.mp4 |
228.50MB |
5. Setting Up Target Win 10-en_US.srt |
20.58KB |
50 |
511.50KB |
51 |
664.13KB |
52 |
61.33KB |
53 |
277.60KB |
54 |
463.27KB |
6 |
528.01KB |
6. Setting Up Target Win 2016.mp4 |
56.82MB |
6. Setting Up Target Win 2016-en_US.srt |
5.80KB |
6. Understanding Different Types of Tools.mp4 |
6.50MB |
6. Understanding Different Types of Tools-en_US.srt |
3.69KB |
7 |
145.97KB |
7. Creating the Domain.mp4 |
152.86MB |
7. Creating the Domain-en_US.srt |
14.51KB |
7. Footprinting the Network.mp4 |
64.32MB |
7. Footprinting the Network-en_US.srt |
10.15KB |
8 |
747.73KB |
8. Manipulating Google.mp4 |
61.62MB |
8. Manipulating Google-en_US.srt |
8.90KB |
8. Scanning.mp4 |
204.82MB |
8. Scanning-en_US.srt |
23.02KB |
9 |
560.19KB |
9. Scanning with NMAP and Zenmap.mp4 |
53.38MB |
9. Scanning with NMAP and Zenmap-en_US.srt |
9.81KB |
9. Service Identification.mp4 |
172.48MB |
9. Service Identification-en_US.srt |
22.42KB |
Pentesting-with-kali-linux.zip |
207B |
TutsNode.com.txt |
63B |