搜索
[Coursera] Python for Cybersecurity Specialization - 5 course series
磁力链接/BT种子名称
[Coursera] Python for Cybersecurity Specialization - 5 course series
磁力链接/BT种子简介
种子哈希:
1c7d77a44a6fee4baceaf1bd7278a0ea9fc4dc51
文件大小:
1.12G
已经下载:
3020
次
下载速度:
极快
收录时间:
2024-05-20
最近下载:
2024-11-22
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:1C7D77A44A6FEE4BACEAF1BD7278A0EA9FC4DC51
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
91视频
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
抖阴破解版
暗网禁地
91短视频
TikTok成人版
PornHub
草榴社区
乱伦社区
最近搜索
质量高
math
芳草
奇怪的女人
2024福建兄妹 暑假作业 我本初中
abs-083
ki201117
私拍
abp-588
skyler luv
microsoft access
girlsdelta 守澤暖子
gachi523
抖音风混剪 绿帽小视频
原档
绿帽大神媚黑
东京热e系列
rogue-city-yts
痛苦贴
nnpj254
全身推油按摩
parasited
raisa
母狗+sm
andor
abp984
princess
悠久
咲鵺まこ sakuya_mako
无码破解julia
文件列表
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_03_alternative-protocol.mp4
61.8 MB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_05_network-sniffing.mp4
42.0 MB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_04_network-scanning.mp4
32.5 MB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_05_protocol-decoding.mp4
31.5 MB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_07_behavioral-analytics.mp4
29.2 MB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_03_registry-autorun.mp4
29.0 MB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_05_hijacked-execution-flow.mp4
27.5 MB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_06_dns-exploration.mp4
27.3 MB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_05_system-activity-monitoring.mp4
26.6 MB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_03_pcap-collection.mp4
26.0 MB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_03_encrypted-channel.mp4
25.8 MB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_05_scheduled-execution.mp4
25.8 MB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_03_user-account-discovery.mp4
25.4 MB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_03_logon-scripts.mp4
24.6 MB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_03_data-encryption.mp4
23.6 MB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_05_alternate-data-streams.mp4
22.4 MB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_03_default-account-discovery.mp4
21.7 MB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_05_autorun-scripts.mp4
21.2 MB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_03_impair-avs.mp4
20.8 MB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_03_credentials-from-web-browsers.mp4
20.7 MB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_07_decoy-credentials.mp4
19.7 MB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_03_decoy-processes.mp4
18.5 MB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_05_protocol-tunneling.mp4
18.2 MB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_07_burn-in.mp4
17.2 MB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_05_file-and-directory-discovery.mp4
16.7 MB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_03_network-monitoring.mp4
16.5 MB
pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/01_03_introduction-to-mitre-att-ck-and-shield.mp4
16.4 MB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_05_account-access-removal.mp4
15.1 MB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_05_web-session-cookie.mp4
15.0 MB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_05_python-library-injection.mp4
14.3 MB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_03_introduction-to-scapy.mp4
14.2 MB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_03_malicious-links.mp4
13.8 MB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_03_clipboard-data.mp4
13.3 MB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_03_smb-windows-admin-shares.mp4
12.2 MB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_04_introduction-to-process-injection.mp4
10.1 MB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_05_decoy-content.mp4
10.0 MB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_01_mitre-pre-att-ck.mp4
9.8 MB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_06_behavioral-analytics-for-active-defense.mp4
9.4 MB
pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/01_02_introduction-to-python.mp4
9.3 MB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_04_introduction-to-use-alternative-authentication-material.mp4
9.0 MB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_02_introduction-to-impair-defenses.mp4
8.8 MB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_04_introduction-to-hide-artifacts.mp4
8.8 MB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_04_system-activity-monitoring-for-active-defense.mp4
8.8 MB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_02_decoy-processes-for-active-defense.mp4
8.6 MB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_02_introduction-to-valid-accounts.mp4
8.6 MB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_04_introduction-to-replication-through-removable-media.mp4
8.5 MB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_01_introduction-to-decoys.mp4
8.5 MB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_02_introduction-to-clipboard-data.mp4
8.4 MB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_02_introduction-to-network-scanning.mp4
8.4 MB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_04_decoy-content-for-active-defense.mp4
8.2 MB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_02_introduction-to-encrypted-channels.mp4
8.2 MB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_06_decoy-credentials-for-active-defense.mp4
8.1 MB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_05_introduction-to-open-technical-databases.mp4
8.1 MB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_04_introduction-to-hijack-execution-flow.mp4
8.1 MB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_04_introduction-to-network-sniffing.mp4
7.9 MB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_04_introduction-to-email-collection.mp4
7.9 MB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_04_introduction-to-protocol-tunneling.mp4
7.8 MB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_04_introduction-to-account-access-removal.mp4
7.8 MB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_01_mitre-att-ck-credential-access.mp4
7.7 MB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_02_introduction-to-account-discovery.mp4
7.7 MB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_05_local-email-collection.mp4
7.7 MB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_01_mitre-att-ck onehack.us.mp4
7.6 MB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_02_introduction-to-boot-or-logon-autostart-execution.mp4
7.5 MB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_06_burn-in-for-active-defense.mp4
7.4 MB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_02_network-monitoring-for-active-defense.mp4
7.2 MB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_04_protocol-decoding-for-active-defense.mp4
7.2 MB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_05_non-application-layer-protocol.mp4
7.1 MB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_01_mitre-att-ck-initial-access.mp4
7.0 MB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_02_introduction-to-credentials-from-password-stores.mp4
7.0 MB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_04_introduction-to-non-application-layer-protocol.mp4
6.8 MB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_01_mitre-att-ck-defense-evasion.mp4
6.8 MB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_01_mitre-att-ck-discovery.mp4
6.6 MB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_04_introduction-to-scheduled-tasks-and-jobs.mp4
6.6 MB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_02_pcap-collection-for-active-defense.mp4
6.6 MB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_01_mitre-att-ck-persistence.mp4
6.5 MB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_02_introduction-to-boot-or-logon-autostart-execution.mp4
6.5 MB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_01_mitre-att-ck-execution.mp4
6.4 MB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_02_introduction-to-remote-services.mp4
6.4 MB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_01_mitre-att-ck-exfiltration.mp4
6.3 MB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_02_introduction-to-data-encrypted-for-impact.mp4
6.2 MB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_01_mitre-att-ck-privilege-escalation.mp4
6.1 MB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_02_introduction-to-exfiltration-over-alternative-protocols.mp4
6.1 MB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_04_introduction-to-file-and-directory-discovery.mp4
6.1 MB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_01_mitre-att-ck-impact.mp4
6.0 MB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_01_mitre-att-ck-lateral-movement.mp4
5.4 MB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_01_mitre-att-ck-collection.mp4
5.2 MB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_01_active-defense-on-the-network.mp4
5.1 MB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_02_introduction-to-user-execution.mp4
5.0 MB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_01_monitoring-for-active-defense.mp4
4.6 MB
pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/01_01_introduction-to-python-for-cybersecurity.mp4
4.1 MB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_03_alternative-protocol.en.srt
39.9 kB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_05_network-sniffing.en.srt
32.5 kB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_04_network-scanning.en.srt
30.4 kB
pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/01_04_python-for-cybersecurity-resources_Python_for_Cybersecurity_Handout.pdf
25.6 kB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_03_user-account-discovery.en.srt
22.7 kB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_03_alternative-protocol.en.txt
21.0 kB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_03_encrypted-channel.en.srt
20.5 kB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_05_protocol-decoding.en.srt
20.4 kB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_07_behavioral-analytics.en.srt
20.3 kB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_05_system-activity-monitoring.en.srt
20.2 kB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_06_dns-exploration.en.srt
20.1 kB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_03_logon-scripts.en.srt
19.5 kB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_05_hijacked-execution-flow.en.srt
18.5 kB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_03_registry-autorun.en.srt
18.4 kB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_03_pcap-collection.en.srt
18.1 kB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_05_autorun-scripts.en.srt
17.9 kB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_05_network-sniffing.en.txt
17.0 kB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_03_default-account-discovery.en.srt
16.9 kB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_05_alternate-data-streams.en.srt
16.5 kB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_07_decoy-credentials.en.srt
16.3 kB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_04_network-scanning.en.txt
15.9 kB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_05_scheduled-execution.en.srt
15.2 kB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_07_burn-in.en.srt
15.0 kB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_03_decoy-processes.en.srt
14.5 kB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_03_network-monitoring.en.srt
14.2 kB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_05_protocol-tunneling.en.srt
14.2 kB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_05_file-and-directory-discovery.en.srt
13.7 kB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_03_impair-avs.en.srt
13.6 kB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_03_data-encryption.en.srt
13.2 kB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_05_protocol-decoding.en.txt
13.0 kB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_06_dns-exploration.en.txt
12.9 kB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_07_behavioral-analytics.en.txt
12.8 kB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_05_web-session-cookie.en.srt
12.4 kB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_03_introduction-to-scapy.en.srt
12.0 kB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_03_user-account-discovery.en.txt
11.9 kB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_05_hijacked-execution-flow.en.txt
11.8 kB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_05_python-library-injection.en.srt
11.7 kB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_03_registry-autorun.en.txt
11.6 kB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_05_account-access-removal.en.srt
11.6 kB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_03_pcap-collection.en.txt
11.4 kB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_03_credentials-from-web-browsers.en.srt
11.2 kB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_03_malicious-links.en.srt
11.1 kB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_03_encrypted-channel.en.txt
10.8 kB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_05_system-activity-monitoring.en.txt
10.6 kB
pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/01_03_introduction-to-mitre-att-ck-and-shield.en.srt
10.5 kB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_03_logon-scripts.en.txt
10.3 kB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_03_clipboard-data.en.srt
10.0 kB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_05_autorun-scripts.en.txt
9.5 kB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_03_default-account-discovery.en.txt
9.0 kB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_03_impair-avs.en.txt
8.7 kB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_05_alternate-data-streams.en.txt
8.6 kB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_04_introduction-to-process-injection.en.srt
8.6 kB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_07_decoy-credentials.en.txt
8.6 kB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_03_smb-windows-admin-shares.en.srt
8.5 kB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_03_data-encryption.en.txt
8.5 kB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_04_introduction-to-hide-artifacts.en.srt
8.0 kB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_05_decoy-content.en.srt
8.0 kB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_05_scheduled-execution.en.txt
7.9 kB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_07_burn-in.en.txt
7.8 kB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_03_decoy-processes.en.txt
7.7 kB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_03_network-monitoring.en.txt
7.5 kB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_05_protocol-tunneling.en.txt
7.5 kB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_01_mitre-pre-att-ck.en.srt
7.4 kB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_04_introduction-to-replication-through-removable-media.en.srt
7.4 kB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_05_python-library-injection.en.txt
7.4 kB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_05_account-access-removal.en.txt
7.3 kB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_05_file-and-directory-discovery.en.txt
7.3 kB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_04_introduction-to-email-collection.en.srt
7.3 kB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_02_introduction-to-network-scanning.en.srt
7.2 kB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_02_introduction-to-valid-accounts.en.srt
7.2 kB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_02_introduction-to-encrypted-channels.en.srt
7.1 kB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_03_malicious-links.en.txt
7.1 kB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_02_introduction-to-impair-defenses.en.srt
7.1 kB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_02_introduction-to-account-discovery.en.srt
7.0 kB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_03_credentials-from-web-browsers.en.txt
7.0 kB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_04_introduction-to-account-access-removal.en.srt
6.9 kB
pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/01_02_introduction-to-python.en.srt
6.9 kB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_02_decoy-processes-for-active-defense.en.srt
6.8 kB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_04_introduction-to-network-sniffing.en.srt
6.8 kB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_05_local-email-collection.en.srt
6.8 kB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_06_behavioral-analytics-for-active-defense.en.srt
6.8 kB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_01_introduction-to-decoys.en.srt
6.6 kB
pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/01_03_introduction-to-mitre-att-ck-and-shield.en.txt
6.6 kB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_05_non-application-layer-protocol.en.srt
6.6 kB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_06_decoy-credentials-for-active-defense.en.srt
6.5 kB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_05_introduction-to-open-technical-databases.en.srt
6.5 kB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_05_web-session-cookie.en.txt
6.5 kB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_04_introduction-to-protocol-tunneling.en.srt
6.5 kB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_04_introduction-to-use-alternative-authentication-material.en.srt
6.5 kB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_02_introduction-to-clipboard-data.en.srt
6.4 kB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_03_clipboard-data.en.txt
6.4 kB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_03_introduction-to-scapy.en.txt
6.3 kB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_04_introduction-to-scheduled-tasks-and-jobs.en.srt
6.2 kB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_04_introduction-to-hijack-execution-flow.en.srt
6.1 kB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_02_introduction-to-boot-or-logon-autostart-execution.en.srt
6.1 kB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_02_introduction-to-credentials-from-password-stores.en.srt
6.1 kB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_04_system-activity-monitoring-for-active-defense.en.srt
6.0 kB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_06_burn-in-for-active-defense.en.srt
6.0 kB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_01_mitre-att-ck-command-and-control.en.srt
6.0 kB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_04_protocol-decoding-for-active-defense.en.srt
6.0 kB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_02_pcap-collection-for-active-defense.en.srt
5.7 kB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_01_mitre-att-ck-initial-access.en.srt
5.7 kB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_04_decoy-content-for-active-defense.en.srt
5.6 kB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_02_network-monitoring-for-active-defense.en.srt
5.6 kB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_03_smb-windows-admin-shares.en.txt
5.4 kB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_01_mitre-att-ck-credential-access.en.srt
5.3 kB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_02_introduction-to-data-encrypted-for-impact.en.srt
5.2 kB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_01_mitre-att-ck-execution.en.srt
5.2 kB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_01_mitre-att-ck-persistence.en.srt
5.2 kB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_02_introduction-to-remote-services.en.srt
5.2 kB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_04_introduction-to-non-application-layer-protocol.en.srt
5.1 kB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_08_decoys_quiz.html
5.1 kB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_06_python-for-privilege-escalation_quiz.html
5.0 kB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_02_introduction-to-boot-or-logon-autostart-execution.en.srt
4.9 kB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_01_mitre-att-ck-privilege-escalation.en.srt
4.9 kB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_06_python-for-lateral-movement_quiz.html
4.8 kB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_06_python-for-collection_exam.html
4.7 kB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_06_python-for-command-and-control_quiz.html
4.7 kB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_06_python-for-impact_exam.html
4.7 kB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_01_mitre-att-ck-defense-evasion.en.srt
4.6 kB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_08_monitoring_exam.html
4.6 kB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_01_mitre-att-ck-discovery.en.srt
4.6 kB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_04_introduction-to-process-injection.en.txt
4.6 kB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_02_introduction-to-exfiltration-over-alternative-protocols.en.srt
4.6 kB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_04_introduction-to-file-and-directory-discovery.en.srt
4.5 kB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_06_python-for-initial-access_exam.html
4.5 kB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_06_python-for-defense-evasion_exam.html
4.4 kB
pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/01_02_introduction-to-python.en.txt
4.4 kB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_08_network_quiz.html
4.3 kB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_01_mitre-att-ck-exfiltration.en.srt
4.3 kB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_02_introduction-to-user-execution.en.srt
4.3 kB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_06_behavioral-analytics-for-active-defense.en.txt
4.3 kB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_06_python-for-execution_quiz.html
4.2 kB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_05_decoy-content.en.txt
4.2 kB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_01_mitre-att-ck-impact.en.srt
4.2 kB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_04_introduction-to-hide-artifacts.en.txt
4.2 kB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_06_python-for-credential-access_quiz.html
4.2 kB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_06_python-for-persistence_quiz.html
4.2 kB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_04_introduction-to-protocol-tunneling.en.txt
4.1 kB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_04_introduction-to-use-alternative-authentication-material.en.txt
4.1 kB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_06_decoy-credentials-for-active-defense.en.txt
4.1 kB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_06_python-for-exfiltration_quiz.html
4.1 kB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_06_python-for-discovery_quiz.html
4.1 kB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_02_introduction-to-clipboard-data.en.txt
4.0 kB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_01_mitre-pre-att-ck.en.txt
4.0 kB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_07_python-for-pre-att-ck_quiz.html
4.0 kB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_01_active-defense-on-the-network.en.srt
4.0 kB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_04_introduction-to-replication-through-removable-media.en.txt
4.0 kB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_04_introduction-to-email-collection.en.txt
3.9 kB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_02_introduction-to-valid-accounts.en.txt
3.9 kB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_02_introduction-to-network-scanning.en.txt
3.8 kB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_04_system-activity-monitoring-for-active-defense.en.txt
3.8 kB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_01_mitre-att-ck-collection.en.srt
3.8 kB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_02_introduction-to-account-discovery.en.txt
3.8 kB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_02_decoy-processes-for-active-defense.en.txt
3.7 kB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_02_introduction-to-encrypted-channels.en.txt
3.7 kB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_04_introduction-to-network-sniffing.en.txt
3.7 kB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_05_local-email-collection.en.txt
3.7 kB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_02_introduction-to-impair-defenses.en.txt
3.7 kB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_04_introduction-to-account-access-removal.en.txt
3.7 kB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_04_decoy-content-for-active-defense.en.txt
3.7 kB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_01_mitre-att-ck-lateral-movement.en.srt
3.6 kB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_01_introduction-to-decoys.en.txt
3.6 kB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_05_non-application-layer-protocol.en.txt
3.5 kB
pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/01_05_python-for-cybersecurity_quiz.html
3.5 kB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_05_introduction-to-open-technical-databases.en.txt
3.5 kB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_01_mitre-att-ck-credential-access.en.txt
3.4 kB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_01_monitoring-for-active-defense.en.srt
3.3 kB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_04_introduction-to-non-application-layer-protocol.en.txt
3.3 kB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_02_introduction-to-boot-or-logon-autostart-execution.en.txt
3.3 kB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_04_introduction-to-hijack-execution-flow.en.txt
3.3 kB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_04_introduction-to-scheduled-tasks-and-jobs.en.txt
3.3 kB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_02_introduction-to-credentials-from-password-stores.en.txt
3.2 kB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_01_mitre-att-ck-command-and-control.en.txt
3.2 kB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_06_burn-in-for-active-defense.en.txt
3.2 kB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_04_protocol-decoding-for-active-defense.en.txt
3.2 kB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_01_mitre-att-ck-initial-access.en.txt
3.1 kB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_02_pcap-collection-for-active-defense.en.txt
3.0 kB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_02_network-monitoring-for-active-defense.en.txt
3.0 kB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_01_mitre-att-ck-discovery.en.txt
2.9 kB
pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/01_01_introduction-to-python-for-cybersecurity.en.srt
2.9 kB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_04_introduction-to-file-and-directory-discovery.en.txt
2.8 kB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_01_mitre-att-ck-execution.en.txt
2.8 kB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_01_mitre-att-ck-persistence.en.txt
2.8 kB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_01_mitre-att-ck-exfiltration.en.txt
2.7 kB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_02_introduction-to-data-encrypted-for-impact.en.txt
2.7 kB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_02_introduction-to-remote-services.en.txt
2.7 kB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_01_mitre-att-ck-impact.en.txt
2.7 kB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_02_introduction-to-boot-or-logon-autostart-execution.en.txt
2.6 kB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_01_mitre-att-ck-privilege-escalation.en.txt
2.6 kB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_01_mitre-att-ck-defense-evasion.en.txt
2.5 kB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_02_introduction-to-exfiltration-over-alternative-protocols.en.txt
2.4 kB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_01_mitre-att-ck-collection.en.txt
2.4 kB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_02_introduction-to-user-execution.en.txt
2.3 kB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_01_mitre-att-ck-lateral-movement.en.txt
2.3 kB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_01_active-defense-on-the-network.en.txt
2.2 kB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_01_monitoring-for-active-defense.en.txt
2.1 kB
pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/01_01_introduction-to-python-for-cybersecurity.en.txt
1.8 kB
pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/01_04_python-for-cybersecurity-resources_instructions.html
1.1 kB
0. Join Our Discord for More Awesome Stuff!.txt
156 Bytes
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!
>