磁力搜索 BT种子搜索利器 免费下载BT种子,超4000万条种子数据
为您找到约 421 个磁力链接/BT种子,耗时 1 毫秒。
排序: 相关程度 热度 文件大小 添加时间 最近访问

[FreeCourseSite.com] Udemy - Metasploit Framework Penetration Testing with Metasploit

  • 7 - PostExploitation Meterpreter/87 - Pivoting.mp4 174.0 MB
  • 8 - Antivirus Evasion and Cleaning/96 - MSFvenom.mp4 128.4 MB
  • 4 - Enumeration/48 - HTTP Enumeration.mp4 126.6 MB
  • 6 - Exploitation and Gaining Access/71 - Using Resource Files.mp4 123.7 MB
  • 8 - Antivirus Evasion and Cleaning/99 - Using Custom Payload Generators.mp4 122.7 MB
  • 6 - Exploitation and Gaining Access/64 - SunOracle GlassFish Server Authenticated Code Execution glassfishdeployer.mp4 118.5 MB
  • 7 - PostExploitation Meterpreter/94 - Meterpreter Backdoor and Persistency Modules.mp4 101.6 MB
  • 7 - PostExploitation Meterpreter/82 - Extracting Cleartext Passwords.mp4 98.5 MB
  • 4 - Enumeration/51 - Using Shodan with MSF.mp4 96.0 MB
  • 4 - Enumeration/46 - FTP Enumeration.mp4 92.4 MB
  • 7 - PostExploitation Meterpreter/84 - Enabling Remote Desktop.mp4 91.8 MB
  • 7 - PostExploitation Meterpreter/85 - Searching for Critical Information.mp4 91.6 MB
  • 7 - PostExploitation Meterpreter/77 - Privilege Escalation.mp4 85.9 MB
  • 6 - Exploitation and Gaining Access/60 - PHP CGI Argument Injection phpcgiarginjection.mp4 85.1 MB
  • 6 - Exploitation and Gaining Access/65 - JenkinsCI ScriptConsole Java Execution jenkinsscriptconsole.mp4 84.4 MB
  • 7 - PostExploitation Meterpreter/90 - Meterpreter Python Powershell Extension.mp4 84.2 MB
  • 4 - Enumeration/43 - Nmap Integration and Port Scanning.mp4 80.7 MB
  • 7 - PostExploitation Meterpreter/74 - Basic Meterpreter Commands 1.mp4 80.6 MB
  • 8 - Antivirus Evasion and Cleaning/98 - MSFVenom Using Custom Executable Template.mp4 80.5 MB
  • 4 - Enumeration/44 - SMB and Samba Enumeration.mp4 79.2 MB
[磁力链接] 添加时间:2023-12-24 大小:4.7 GB 最近下载:2025-12-29 热度:3720

[FreeCourseSite.com] Udemy - Complete Web Application Hacking & Penetration Testing

  • 08 - Input Validation Testing/002 Reflected Cross-Site Scripting Attacks.mp4 107.4 MB
  • 08 - Input Validation Testing/017 XMLXPATH Injection.mp4 89.1 MB
  • 08 - Input Validation Testing/004 Stored Cross-Site Scripting Attacks.mp4 87.9 MB
  • 06 - Authentication and Authorization Testing/004 Attacking Insecure Login Mechanisms.mp4 84.0 MB
  • 01 - Welcome to Advanced Web Application Penetration Testing/002 Current Issues of Web Security.mp4 84.0 MB
  • 08 - Input Validation Testing/006 Inband SQL Injection over a Search Form.mp4 81.3 MB
  • 08 - Input Validation Testing/012 Detecting and Exploiting SQL Injection with SQLmap.mp4 80.9 MB
  • 11 - Other Attacks in ethical hacking, certified ethical hacking, Ethical Intelligenc/002 XML External Entity Attack.mp4 77.1 MB
  • 07 - Session Management Testing/006 Stealing and Bypassing AntiCSRF Tokens.mp4 71.0 MB
  • 02 - Setting Up Virtual Lab Environment/007 Connectivity and Snapshots.mp4 69.7 MB
  • 04 - Modern Web Applications/004 Core Technologies Web Browsers.mp4 68.8 MB
  • 08 - Input Validation Testing/008 Error-Based SQL Injection over a Login Form.mp4 68.7 MB
  • 02 - Setting Up Virtual Lab Environment/006 Installing Vulnerable Virtual Machine BeeBox.mp4 65.9 MB
  • 04 - Modern Web Applications/015 Introduction to Burp Capturing HTTP Traffic and Setting FoxyProxy.mp4 64.6 MB
  • 08 - Input Validation Testing/007 Inband SQL Injection over a Select Form.mp4 62.9 MB
  • 10 - Using Known Vulnerable Components/004 SQLite Manager XSS (CVE-2012-5105).mp4 57.6 MB
  • 05 - Reconnaissance and Discovery/008 Extracting Directory Structure Crawling.mp4 56.6 MB
  • 01 - Welcome to Advanced Web Application Penetration Testing/005 Guidelines for Application Security.mp4 56.2 MB
  • 06 - Authentication and Authorization Testing/009 Path Traversal File.mp4 56.1 MB
  • 06 - Authentication and Authorization Testing/006 Attacking Improper Password Recovery Mechanisms.mp4 55.5 MB
[磁力链接] 添加时间:2023-12-23 大小:3.4 GB 最近下载:2025-12-22 热度:2327

The Complete Penetration Testing Bootcamp

  • 02 - Setting Up Your Environment/001 How To Setup A Virtual Penetration Testing Environment.mp4 413.6 MB
  • 12 - Wired and WIreless attacks/003 WPAWPA2 Hacking & Exploitation With Aircrack-ng & airgeddon Pixie Dust Attack.mp4 282.3 MB
  • 11 - Exploitation/005 BeEF browser exploitation - Client side attacks.mp4 241.6 MB
  • 09 - Getting started with Metasploit/001 Metasploit for beginners - Modules, Exploits and Payloads.mp4 232.6 MB
  • 12 - Wired and WIreless attacks/001 MITM - ARP spoofing with arpspoof.mp4 201.5 MB
  • 11 - Exploitation/007 Veil Evasion - How to generate undetectable payloads.mp4 192.9 MB
  • 11 - Exploitation/001 WordPress hacking with WPScan.mp4 169.9 MB
  • 10 - Web Server Hacking/001 Web server hacking with Metasploit - Gaining Access.mp4 156.7 MB
  • 03 - Anonymity/003 How to use a VPN with Proxychains - Maximum anonymity.mp4 148.3 MB
  • 13 - Post Exploitation & Privilege Escalation/001 The Complete Meterpreter guide - Privilege escalation and clearning tracks.mp4 100.3 MB
  • 07 - Active Information Gathering/003 Installing Nmap on Windows.mp4 99.8 MB
  • 12 - Wired and WIreless attacks/002 MITM - ARP Poisoning with Ettercap.mp4 80.5 MB
  • 11 - Exploitation/004 Bruteforce password cracking with Medusa.mp4 80.1 MB
  • 06 - Passive Information Gathering/002 Gathering Emails - theharvester.mp4 69.9 MB
  • 13 - Post Exploitation & Privilege Escalation/002 Generating a PHP backdoor with Weevely - Post exploitation.mp4 60.2 MB
  • 06 - Passive Information Gathering/001 Information Gathering - Whois Lookup & DNS Reconnaisance.mp4 51.8 MB
  • 03 - Anonymity/002 How to setup Anonsurf on Kali Linux.mp4 49.8 MB
  • 09 - Getting started with Metasploit/002 Metasploit for beginners - Understanding Metasploit Modules.mp4 46.6 MB
  • 11 - Exploitation/003 Bruteforce password cracking with Hydra - SSH.mp4 44.7 MB
  • 02 - Setting Up Your Environment/004 How To Install Kali Linux On VMware.mp4 44.6 MB
[磁力链接] 添加时间:2023-12-23 大小:3.8 GB 最近下载:2026-01-11 热度:7401

SANS SEC588 - Cloud penetration testing-2022

  • SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/6. Azure Compute/7. LAB 33 AZURE VMS.mp4 107.5 MB
  • SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/11. Kubernetes and Service Meshes/22. LAB 46 PEIRATES LAB.mp4 106.3 MB
  • SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/7. Scaled Host and Port Discovery hide01.cyou @SansPentest linuxia.ir/13. LAB 13 PORTSCANS IN THE CLOUD.mp4 82.5 MB
  • SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/7. Command Line Injections in Applications/9. LAB 43 COMMAND LINE INJECTIONS.mp4 81.7 MB
  • SEC588 Video/6. Capstone Event hide01.cyou @SansPentest linuxia.ir/1. Capstone Event hide01.cyou @SansPentest linuxia.ir/2. CAPSTONE EVENT RULES.mp4 79.9 MB
  • SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/8. Finding Secrets and Keys within Repositories/8. LAB 14 FINDING SECRETS IN GIT.mp4 72.9 MB
  • SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/11. Microsoft Graph/8. LAB 37 POSTMAN AND MICROSOFT GRAPH API.mp4 70.2 MB
  • SEC588 PDF/SEC588 Book hide01.cyou @SansPentest linuxia.ir.pdf 64.6 MB
  • SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/9. SQL Injection in a Hosted Environment/16. LAB 45 SQL INJECTIONS.mp4 61.6 MB
  • SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/6. Domain and Host Discovery Tools/10. LAB 12 CLOUD DISCOVERY LAB.mp4 58.7 MB
  • SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/3. AWS CLI/9. LAB 22 AWS CLI TOUR.mp4 55.4 MB
  • SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/7. AWS IAM Privilege Escalations/12. LAB 24 AMAZON IAM PRIVILEGE ESCALATIONS PART 1.mp4 53.8 MB
  • SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/8. Serverless Function Attacks with Lambda hide01.cyou @SansPentest linuxia.ir/8. LAB 44 SERVERLESS ATTACKS.mp4 53.7 MB
  • SEC588 Video/1. Discovery Recon and Architecture at Scale hide01.cyou @SansPentest linuxia.ir/9. Exposed Databases and Configuration Flaws hide01.cyou @SansPentest linuxia.ir/14. LAB 15 DATABASES AND EXPOSED PORTS.mp4 52.7 MB
  • SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/5. Mapping Subdomains and Routes/7. LAB 23 MAPPING WITH COMMONSPEAK2.mp4 51.2 MB
  • SEC588 Video/5. Exploitation and Red Team in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Backdooring Containers/16. LAB 52 BACKDOORING CONTAINERS.mp4 43.3 MB
  • SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/9. AWS Lambda/7. LAB 25 AMAZON IAM PRIVILEGE ESCALATIONS PART 2.mp4 40.1 MB
  • SEC588 Video/2. Mapping Authentication and Cloud Services hide01.cyou @SansPentest linuxia.ir/2. Postman hide01.cyou @SansPentest linuxia.ir/15. LAB 21 HTTP AND POSTMAN TOUR.mp4 39.4 MB
  • SEC588 Video/3. Azure and Windows Services in the Cloud hide01.cyou @SansPentest linuxia.ir/4. Golden SAML Attacks/7. LAB 32 APIS AND POSTMAN.mp4 37.6 MB
  • SEC588 Video/4. Vulnerabilities in Cloud Native Applicatons hide01.cyou @SansPentest linuxia.ir/4. Ngrok and Connecting to External Sources hide01.cyou @SansPentest linuxia.ir/7. LAB 41 ABUSING CICD PIPELINES.mp4 37.0 MB
[磁力链接] 添加时间:2023-12-22 大小:2.8 GB 最近下载:2025-12-28 热度:3776

[ FreeCourseWeb.com ] Linkedin - Penetration Testing Essential Training (2021)

  • ~Get Your Files Here !/[8] 7. Understanding Exploit Code/[2] Understand code injection.mp4 47.4 MB
  • ~Get Your Files Here !/[8] 7. Understanding Exploit Code/[3] Understand buffer overflows.mp4 32.2 MB
  • ~Get Your Files Here !/[5] 4. Python Scripting/[1] Refresh your Python skills.mp4 28.8 MB
  • ~Get Your Files Here !/[3] 2. Pen Testing Tools/[3] Capture packets with tcpdump.mp4 23.1 MB
  • ~Get Your Files Here !/[6] 5. Kali and Metasploit/[5] Exploit with Armitage.mp4 21.2 MB
  • ~Get Your Files Here !/[3] 2. Pen Testing Tools/[1] Scan networks with Nmap.mp4 20.7 MB
  • ~Get Your Files Here !/[7] 6. Web Testing/[5] Web server penetration using sqlmap.mp4 20.2 MB
  • ~Get Your Files Here !/[3] 2. Pen Testing Tools/[5] Script with PowerShell.mp4 18.4 MB
  • ~Get Your Files Here !/[6] 5. Kali and Metasploit/[4] Using Metasploit.mp4 18.0 MB
  • ~Get Your Files Here !/[3] 2. Pen Testing Tools/[6] Extend PowerShell with Nishang.mp4 17.9 MB
  • ~Get Your Files Here !/[6] 5. Kali and Metasploit/[6] Scan targets with GVM.mp4 15.7 MB
  • ~Get Your Files Here !/[2] 1. What Is Pen Testing/[1] Pen testing overview.mp4 15.7 MB
  • ~Get Your Files Here !/[7] 6. Web Testing/[4] Fingerprint web servers.mp4 13.5 MB
  • ~Get Your Files Here !/[5] 4. Python Scripting/[4] Work with websites.mp4 13.1 MB
  • ~Get Your Files Here !/[8] 7. Understanding Exploit Code/[1] Exploit a target.mp4 12.6 MB
  • ~Get Your Files Here !/[2] 1. What Is Pen Testing/[3] The MITRE ATT&CK repository.mp4 11.7 MB
  • ~Get Your Files Here !/[2] 1. What Is Pen Testing/[2] The cyber kill chain.mp4 11.5 MB
  • ~Get Your Files Here !/[3] 2. Pen Testing Tools/[2] A Netcat refresher.mp4 11.0 MB
  • ~Get Your Files Here !/[6] 5. Kali and Metasploit/[1] A Kali refresher.mp4 10.5 MB
  • ~Get Your Files Here !/[7] 6. Web Testing/[2] Test websites with Burp Suite.mp4 10.0 MB
[磁力链接] 添加时间:2023-12-21 大小:485.9 MB 最近下载:2025-11-24 热度:314

WiFi Penetration Testing for Beginners Basic WiFi Theory

  • 4 - Into the Weeds/17 - Setting up your USB Wireless Card.mp4 89.4 MB
  • 2 - WiFi Theory Optional/7 - How Does WiFI Work.mp4 68.7 MB
  • 4 - Into the Weeds/22 - Wifite.mp4 68.5 MB
  • 4 - Into the Weeds/23 - Reaver.mp4 49.0 MB
  • 4 - Into the Weeds/24 - Evil Twin Access Point.mp4 46.6 MB
  • 4 - Into the Weeds/21 - Cracking WiFi Networks with WPA WPA2 Encryption.mp4 43.9 MB
  • 4 - Into the Weeds/19 - Finding Hidden Wireless Networks.mp4 29.1 MB
  • 4 - Into the Weeds/20 - Performing a Deauth Attack.mp4 22.0 MB
  • 2 - WiFi Theory Optional/5 - WiFi Releases Bands.mp4 19.9 MB
  • 4 - Into the Weeds/25 - Other OS Tools.mp4 18.1 MB
  • 3 - Getting Started/15 - Setting up VirtualBox Kali Linux.mp4 14.6 MB
  • 5 - Where to now/26 - Thank you.mp4 11.4 MB
  • 3 - Getting Started/14 - Downloading VirtualBox Kali Linux.mp4 9.4 MB
  • 3 - Getting Started/16 - Getting Comfortable using Kali Linux.mp4 8.5 MB
  • 4 - Into the Weeds/18 - Monitor Mode Troubleshooting.mp4 7.5 MB
  • 2 - WiFi Theory Optional/8 - WEP WPA WPA2 Encryption Explained.mp4 6.3 MB
  • 2 - WiFi Theory Optional/4 - The So What Why Learning WiFi Theory is Beneficial.mp4 5.9 MB
  • 1 - Introduction/2 - Course Requirements.mp4 5.8 MB
  • 1 - Introduction/1 - General Introduction.mp4 4.7 MB
  • 3 - Getting Started/13 - Why Kali Linux.mp4 4.3 MB
[磁力链接] 添加时间:2023-12-21 大小:541.7 MB 最近下载:2026-01-11 热度:7091

INE Security Penetration Testing Student v2 (2023)

  • no desc_34.ts 293.2 MB
  • no desc_33.ts 228.1 MB
  • INE - Host & Network Penetration Testing- System_Host Based Attacks_3.ts 190.7 MB
  • no desc_2.ts 188.9 MB
  • INE - Host & Network Penetration Testing- System_Host Based Attacks_2.ts 188.2 MB
  • no desc_76.ts 167.3 MB
  • no desc_99.ts 158.5 MB
  • no desc_102.ts 153.1 MB
  • no desc_115.ts 143.8 MB
  • no desc_95.ts 138.0 MB
  • no desc_7.ts 137.8 MB
  • no desc_4.ts 136.3 MB
  • no desc_100.ts 133.8 MB
  • no desc_6.ts 132.0 MB
  • no desc_50.ts 123.3 MB
  • no desc_85.ts 122.8 MB
  • no desc_78.ts 120.6 MB
  • no desc_88.ts 120.1 MB
  • no desc_53.ts 119.8 MB
  • no desc_69.ts 119.0 MB
[磁力链接] 添加时间:2023-12-20 大小:13.8 GB 最近下载:2026-01-10 热度:2439

Web Application Penetration Testing SQL Injection Attacks

  • [TutsNode.net] - Web Application Penetration Testing SQL Injection Attacks/16. Exploiting Error-Based SQL Injection Vulnerabilities - Part 2.mp4 1.1 GB
  • [TutsNode.net] - Web Application Penetration Testing SQL Injection Attacks/13. Finding SQL Injection Vulnerabilities Manually - Part 1.mp4 840.7 MB
  • [TutsNode.net] - Web Application Penetration Testing SQL Injection Attacks/18. Exploiting Union-Based SQL Injection Vulnerabilities - Part 1.mp4 834.4 MB
  • [TutsNode.net] - Web Application Penetration Testing SQL Injection Attacks/21. Exploiting Boolean-Based SQL Injection Vulnerabilities - Part 2.mp4 749.9 MB
  • [TutsNode.net] - Web Application Penetration Testing SQL Injection Attacks/12. Finding SQL Injection Vulnerabilities Manually - Part 1.mp4 659.0 MB
  • [TutsNode.net] - Web Application Penetration Testing SQL Injection Attacks/23. Exploiting Time-Based SQL Injection Vulnerabilities - Part 2.mp4 638.0 MB
  • [TutsNode.net] - Web Application Penetration Testing SQL Injection Attacks/14. Finding SQL Injection Vulnerabilities with OWASP ZAP.mp4 633.8 MB
  • [TutsNode.net] - Web Application Penetration Testing SQL Injection Attacks/20. Exploiting Boolean-Based SQL Injection Vulnerabilities - Part 1.mp4 534.3 MB
  • [TutsNode.net] - Web Application Penetration Testing SQL Injection Attacks/25. NoSQL Fundamentals - Part 2.mp4 459.8 MB
  • [TutsNode.net] - Web Application Penetration Testing SQL Injection Attacks/2. Introduction to SQL Injection.mp4 306.0 MB
  • [TutsNode.net] - Web Application Penetration Testing SQL Injection Attacks/9. SQL Fundamentals - Part 2.mp4 295.4 MB
  • [TutsNode.net] - Web Application Penetration Testing SQL Injection Attacks/19. Introduction to Boolean-Based SQL Injection Vulnerabilities.mp4 253.3 MB
  • [TutsNode.net] - Web Application Penetration Testing SQL Injection Attacks/8. SQL Fundamentals - Part 1.mp4 250.5 MB
  • [TutsNode.net] - Web Application Penetration Testing SQL Injection Attacks/15. Exploiting Error-Based SQL Injection Vulnerabilities - Part 1.mp4 243.2 MB
  • [TutsNode.net] - Web Application Penetration Testing SQL Injection Attacks/7. Introduction to SQL.mp4 227.5 MB
  • [TutsNode.net] - Web Application Penetration Testing SQL Injection Attacks/4. Types of SQL Injection Vulnerabilities.mp4 227.2 MB
  • [TutsNode.net] - Web Application Penetration Testing SQL Injection Attacks/11. Hunting for SQL Injection Vulnerabilities - Part 2.mp4 210.8 MB
  • [TutsNode.net] - Web Application Penetration Testing SQL Injection Attacks/10. Hunting for SQL Injection Vulnerabilities - Part 1.mp4 181.1 MB
  • [TutsNode.net] - Web Application Penetration Testing SQL Injection Attacks/17. Exploiting Union-Based SQL Injection Vulnerabilities - Part 1.mp4 162.7 MB
  • [TutsNode.net] - Web Application Penetration Testing SQL Injection Attacks/3. Anatomy of an SQL Injection Attack.mp4 157.9 MB
[磁力链接] 添加时间:2023-12-20 大小:9.8 GB 最近下载:2026-01-10 热度:12633

Hacking Web Applications Security Penetration Testing for Today's DevOps and Cloud Environments

  • Lesson 6 Exploiting Injection-Based Vulnerabilities/005. 6.4 Exploiting SQL Injection Vulnerabilities.mp4 128.4 MB
  • Lesson 5 Authentication and Session Management Vulnerabilities/002. 5.1 Understanding Authentication Schemes in Web Applications and Related Vulnerabilities.mp4 111.5 MB
  • Lesson 8 Exploiting Weak Cryptographic Implementations/002. 8.1 Introducing Cryptography, Encryption, and Hashing Protocols.mp4 108.5 MB
  • Lesson 4 Reconnaissance and Profiling Web Applications/009. 4.8 Introducing the Burp Suite.mp4 88.4 MB
  • Lesson 3 Build Your Own Web Application Lab/002. 3.1 Exploring Kali Linux.mp4 87.2 MB
  • Lesson 4 Reconnaissance and Profiling Web Applications/004. 4.3 Exploring Shodan, Maltego, Recon-NG, SpiderFoot, and TheHarvester.mp4 82.3 MB
  • Lesson 5 Authentication and Session Management Vulnerabilities/003. 5.2 Exploring Session Management Mechanisms and Related Vulnerabilities.mp4 73.3 MB
  • Lesson 8 Exploiting Weak Cryptographic Implementations/003. 8.2 Identifying Common Flaws in Data Storage and Transmission.mp4 52.4 MB
  • Lesson 11 Additional Web Application Security Vulnerabilities and Attacks/003. 11.2 Exploiting Insecure Direct Object References and Path Traversal.mp4 50.0 MB
  • Lesson 11 Additional Web Application Security Vulnerabilities and Attacks/005. 11.4 Fuzzing Web Applications.mp4 49.7 MB
  • Lesson 7 Cross-Site Scripting (XSS) and Cross-Site Request Forgery Vulnerabilities/009. 7.8 Mitigating XSS and CSRF Vulnerabilities.mp4 45.5 MB
  • Lesson 4 Reconnaissance and Profiling Web Applications/011. 4.10 Introducing OpenVAS.mp4 43.1 MB
  • Lesson 2 Overview of Web Applications for Security Professionals/002. 2.1 Understanding the Web Application Protocols.mp4 38.1 MB
  • Lesson 10 Client-side Attacks/003. 10.2 Understanding HTML5 Implementations.mp4 37.9 MB
  • Lesson 2 Overview of Web Applications for Security Professionals/004. 2.3 Surveying Session Management and Cookies.mp4 37.6 MB
  • Lesson 4 Reconnaissance and Profiling Web Applications/010. 4.9 Introducing OWASP Zed Application Proxy (ZAP).mp4 36.4 MB
  • Lesson 7 Cross-Site Scripting (XSS) and Cross-Site Request Forgery Vulnerabilities/008. 7.7 Evading Web Application Security Controls.mp4 35.9 MB
  • Lesson 4 Reconnaissance and Profiling Web Applications/002. 4.1 Understanding Passive vs. Active Reconnaissance.mp4 33.6 MB
  • Lesson 2 Overview of Web Applications for Security Professionals/008. 2.7 Surveying Docker Containers.mp4 32.5 MB
  • Lesson 10 Client-side Attacks/002. 10.1 Surveying the Client-side Code and Storage.mp4 28.6 MB
[磁力链接] 添加时间:2023-12-20 大小:2.0 GB 最近下载:2026-01-07 热度:5796

[FreeCourseSite.com] Udemy - Website Hacking Penetration Testing

  • [FreeCourseSite.com] Udemy - Website Hacking Penetration Testing.part1.rar 2.1 GB
  • [FreeCourseSite.com] Udemy - Website Hacking Penetration Testing.part2.rar 993.0 MB
[磁力链接] 添加时间:2023-12-20 大小:3.1 GB 最近下载:2026-01-06 热度:4132

Learn Wi-Fi Password Penetration Testing (WEP_WPA_WPA2).rar

  • Learn Wi-Fi Password Penetration Testing (WEP_WPA_WPA2).rar 656.3 MB
[磁力链接] 添加时间:2023-12-19 大小:656.3 MB 最近下载:2025-07-02 热度:484

[ CourseLala.com ] Linkedin - Penetration Testing Active Directory

  • ~Get Your Files Here !/02 - 1. Introduction to Identities/07 - Access LDAP services with a GUI client.mp4 18.7 MB
  • ~Get Your Files Here !/04 - 3. Advanced Penetration Testing/06 - Set the BloodHound loose.mp4 18.2 MB
  • ~Get Your Files Here !/04 - 3. Advanced Penetration Testing/05 - Forge a golden ticket.mp4 17.6 MB
  • ~Get Your Files Here !/03 - 2. Testing Active Directory/01 - Set up for testing.mp4 14.6 MB
  • ~Get Your Files Here !/02 - 1. Introduction to Identities/05 - What is Active Directory.mp4 14.3 MB
  • ~Get Your Files Here !/04 - 3. Advanced Penetration Testing/04 - Run a no-preauthentication attack.mp4 13.6 MB
  • ~Get Your Files Here !/02 - 1. Introduction to Identities/01 - Understand Active Directory's role in security.mp4 12.8 MB
  • ~Get Your Files Here !/02 - 1. Introduction to Identities/08 - Add users and computers to a domain.mp4 12.1 MB
  • ~Get Your Files Here !/03 - 2. Testing Active Directory/02 - Extract the AD hashes.mp4 8.4 MB
  • ~Get Your Files Here !/02 - 1. Introduction to Identities/03 - Interact with LDAP at the command line.mp4 8.4 MB
  • ~Get Your Files Here !/03 - 2. Testing Active Directory/05 - Use CrackMapExec to access and enumerate AD.mp4 7.6 MB
  • ~Get Your Files Here !/03 - 2. Testing Active Directory/03 - Password spraying Active Directory.mp4 7.4 MB
  • ~Get Your Files Here !/03 - 2. Testing Active Directory/06 - Investigate the SYSVOL share.mp4 6.7 MB
  • ~Get Your Files Here !/03 - 2. Testing Active Directory/04 - Kerberos brute-forcing attacks.mp4 6.4 MB
  • ~Get Your Files Here !/04 - 3. Advanced Penetration Testing/02 - Remote extraction of AD hashes.mp4 5.6 MB
  • ~Get Your Files Here !/03 - 2. Testing Active Directory/07 - Take advantage of legacy data.mp4 5.4 MB
  • ~Get Your Files Here !/04 - 3. Advanced Penetration Testing/03 - Carry out a Kerberos roasting.mp4 4.7 MB
  • ~Get Your Files Here !/02 - 1. Introduction to Identities/02 - The LDAP protocol.mp4 4.1 MB
  • ~Get Your Files Here !/02 - 1. Introduction to Identities/09 - Active Directory security audit.mp4 3.8 MB
  • ~Get Your Files Here !/02 - 1. Introduction to Identities/06 - Interact with Active Directory at the command line.mp4 3.8 MB
[磁力链接] 添加时间:2023-12-19 大小:210.3 MB 最近下载:2026-01-12 热度:2907

Security Penetration Testing

  • Lesson 3 Passive Reconnaissance/007. 3.6 Surveying Essential Tools for Passive Reconnaissance Recon-ng.mp4 169.3 MB
  • Lesson 11 Powershell Attacks/003. 11.2 Pwning Windows Using PowerShell Empire Components, Setup, and Basic Exploits.mp4 133.6 MB
  • Lesson 8 Hacking Networking Devices/011. 8.10 Hacking the Management Plane.mp4 128.0 MB
  • Lesson 6 Hacking User Credentials/006. 6.5 Cracking Passwords with John the Ripper.mp4 127.3 MB
  • Lesson 8 Hacking Networking Devices/009. 8.8 Reviewing Router Fundamentals.mp4 105.2 MB
  • Lesson 8 Hacking Networking Devices/006. 8.5 Hacking Switches Reviewing Ethernet Fundamentals.mp4 99.0 MB
  • Lesson 9 Fundamentals of Wireless Hacking/005. 9.4 Hacking WEP, WPA, and Other Protocols.mp4 98.5 MB
  • Lesson 7 Hacking Databases/003. 7.2 Attacking a Database Discovery, Validation, and Exploitation.mp4 95.4 MB
  • Lesson 4 Active Reconnaissance/004. 4.3 Surveying Essential Tools for Active Reconnaissance Port Scanning and Web Service Review.mp4 94.2 MB
  • Lesson 11 Powershell Attacks/004. 11.3 Pwning Windows Using PowerShell Empire Modules and Advanced Exploits.mp4 85.9 MB
  • Lesson 14 Maintaining Persistence, Pivoting, and Data Exfiltration/003. 14.2 Gaining Network Access.mp4 85.5 MB
  • Lesson 3 Passive Reconnaissance/003. 3.2 Exploring Passive Reconnaissance Methodologies Discovering Host and Port Information.mp4 83.0 MB
  • Lesson 14 Maintaining Persistence, Pivoting, and Data Exfiltration/004. 14.3 Gaining Network Access with SMB Relay Attacks, NetBIOS Name Service and .mp4 82.7 MB
  • Lesson 13 Social Engineering/002. 13.1 Understanding Social Engineering.mp4 81.7 MB
  • Lesson 13 Social Engineering/005. 13.4 Surveying Social Engineering Case Studies.mp4 81.3 MB
  • Lesson 8 Hacking Networking Devices/010. 8.9 Examining ICMP, First Hop Redundancy and Routing Protocol Attacks.mp4 80.6 MB
  • Lesson 9 Fundamentals of Wireless Hacking/006. 9.5 Understanding Hacking Wireless Clients.mp4 77.2 MB
  • Lesson 6 Hacking User Credentials/007. 6.6 Cracking Passwords with hashcat.mp4 75.2 MB
  • Lesson 8 Hacking Networking Devices/012. 8.11 Understanding Firewall Fundamentals and Levels of Inspection.mp4 73.5 MB
  • Lesson 14 Maintaining Persistence, Pivoting, and Data Exfiltration/006. 14.5 Understanding Pivoting and Lateral Movement.mp4 73.0 MB
[磁力链接] 添加时间:2023-12-19 大小:4.8 GB 最近下载:2026-01-11 热度:4956

Vijay Kumar Velu - Mastering Kali Linux for Advanced Penetration Testing, Fourth Edition - 2022

  • Vijay Kumar Velu - Mastering Kali Linux for Advanced Penetration Testing, Fourth Edition - 2022.epub 122.4 MB
  • Vijay Kumar Velu - Mastering Kali Linux for Advanced Penetration Testing, Fourth Edition - 2022.mobi 73.9 MB
  • Vijay Kumar Velu - Mastering Kali Linux for Advanced Penetration Testing, Fourth Edition - 2022.pdf 48.7 MB
  • Code/SoftwareHardwareList.pdf 123.9 kB
  • Code/Chapter14/Chapter-14 3.5 kB
  • Code/Chapter11/Chapter-11_BufferOverFlow.py 2.4 kB
  • Code/Chapter13/Chapter-13 2.2 kB
  • Code/Chapter11/Chapter-11 1.5 kB
  • Code/Chapter03/Chapter-03_massnmap.sh 1.5 kB
  • Code/Chapter06/Chapter-06 1.4 kB
  • Code/Chapter10/Chapter-10 1.3 kB
  • Code/Chapter03/Chapter-03 1.3 kB
  • Code/Chapter08/Chapter-08 1.2 kB
  • Code/Chapter09/Chapter-09 1.2 kB
  • Code/Chapter05/Chapter-05 1.2 kB
  • Code/Chapter02/Chapter-02_gather_OSINT.sh 1.1 kB
  • Code/Chapter07/Chapter-07 1.1 kB
  • Code/Chapter12/Chapter-12 910 Bytes
  • Code/Chapter04/Chapter-04 743 Bytes
  • Code/Chapter04/Chapter-04_custom.nse 381 Bytes
[磁力链接] 添加时间:2023-12-19 大小:245.1 MB 最近下载:2026-01-12 热度:15104

[ FreeCourseWeb.com ] Udemy - Android Penetration Testing.zip

  • [ FreeCourseWeb.com ] Udemy - Android Penetration Testing.zip 685.8 MB
[磁力链接] 添加时间:2023-12-19 大小:685.8 MB 最近下载:2026-01-12 热度:65

SANS SEC542 Web App Penetration Testing and Ethical Hacking

  • Section 5/5.1 CROSS-SITE REQUEST FORGERY/SEC542- SANS OnDemand.webm 284.4 MB
  • Section 6/6.1 CAPTURE THE FLAG/SEC542- SANS OnDemand_3_2.webm 284.4 MB
  • Section 5/5.3 PYTHON FOR WEB APP PEN TESTERS/SEC542- SANS OnDemand_19.webm 124.6 MB
  • Section 3/3.8-Discovering SQLI/SEC542- SANS OnDemand_22.webm 113.6 MB
  • Section 2/2.9 USERNAME HARVESTING/SEC542- SANS OnDemand_12_2.webm 113.2 MB
  • Section 3/3.3-Bypass Flaws/SEC542- SANS OnDemand_5.webm 109.2 MB
  • Section 4/4.11 DATA ATTACKS/SEC542- SANS OnDemand_10.webm 96.2 MB
  • Section 3/3.10-SQli Tools/SEC542- SANS OnDemand_17.webm 88.3 MB
  • Section 5/5.1 CROSS-SITE REQUEST FORGERY/SEC542- SANS OnDemand_12.webm 87.8 MB
  • Section 4/4.8 BeEF/SEC542- SANS OnDemand_12_2.webm 82.4 MB
  • Section 3/3.6-File Inclusion & Directory Traversal/SEC542- SANS OnDemand_9.webm 79.3 MB
  • Section 5/5.7 WHEN TOOLS FAIL/SEC542- SANS OnDemand_9.webm 74.8 MB
  • Section 3/3.5-Command Injection/SEC542- SANS OnDemand_7.webm 74.6 MB
  • Section 4/4.4 CLASSES OF XSS/SEC542- SANS OnDemand_24.webm 73.5 MB
  • SANS SEC542 Web App Penetration Testing and Ethical Hacking.pdf 70.6 MB
  • Section 2/SANS SEC542 Web App Penetration Testing and Ethical Hacking.pdf 70.6 MB
  • Section 1/1.11 BURP SUITE/SEC542- SANS OnDemand_18.webm 67.4 MB
  • Section 5/5.4 WPScan/SEC542- SANS OnDemand_5_2.webm 66.1 MB
  • Section 2/2.8 AUTHENTICATION/SEC542- SANS OnDemand_16.webm 66.1 MB
  • Section 2/2.3 SHELL SHOCKING/SEC542- SANS OnDemand_12.webm 61.3 MB
[磁力链接] 添加时间:2023-12-19 大小:4.7 GB 最近下载:2026-01-12 热度:4388

Penetration Testing Active Directory

  • [TutsNode.com] - Penetration Testing Active Directory/02 - 1. Introduction to Identities/07 - Access LDAP services with a GUI client.mp4 18.7 MB
  • [TutsNode.com] - Penetration Testing Active Directory/04 - 3. Advanced Penetration Testing/06 - Set the BloodHound loose.mp4 18.2 MB
  • [TutsNode.com] - Penetration Testing Active Directory/04 - 3. Advanced Penetration Testing/05 - Forge a golden ticket.mp4 17.6 MB
  • [TutsNode.com] - Penetration Testing Active Directory/03 - 2. Testing Active Directory/01 - Set up for testing.mp4 14.6 MB
  • [TutsNode.com] - Penetration Testing Active Directory/02 - 1. Introduction to Identities/05 - What is Active Directory.mp4 14.3 MB
  • [TutsNode.com] - Penetration Testing Active Directory/04 - 3. Advanced Penetration Testing/04 - Run a no-preauthentication attack.mp4 13.6 MB
  • [TutsNode.com] - Penetration Testing Active Directory/02 - 1. Introduction to Identities/01 - Understand Active Directory's role in security.mp4 12.8 MB
  • [TutsNode.com] - Penetration Testing Active Directory/02 - 1. Introduction to Identities/08 - Add users and computers to a domain.mp4 12.1 MB
  • [TutsNode.com] - Penetration Testing Active Directory/03 - 2. Testing Active Directory/02 - Extract the AD hashes.mp4 8.4 MB
  • [TutsNode.com] - Penetration Testing Active Directory/02 - 1. Introduction to Identities/03 - Interact with LDAP at the command line.mp4 8.4 MB
  • [TutsNode.com] - Penetration Testing Active Directory/03 - 2. Testing Active Directory/05 - Use CrackMapExec to access and enumerate AD.mp4 7.6 MB
  • [TutsNode.com] - Penetration Testing Active Directory/03 - 2. Testing Active Directory/03 - Password spraying Active Directory.mp4 7.4 MB
  • [TutsNode.com] - Penetration Testing Active Directory/03 - 2. Testing Active Directory/06 - Investigate the SYSVOL share.mp4 6.7 MB
  • [TutsNode.com] - Penetration Testing Active Directory/03 - 2. Testing Active Directory/04 - Kerberos brute-forcing attacks.mp4 6.4 MB
  • [TutsNode.com] - Penetration Testing Active Directory/04 - 3. Advanced Penetration Testing/02 - Remote extraction of AD hashes.mp4 5.6 MB
  • [TutsNode.com] - Penetration Testing Active Directory/03 - 2. Testing Active Directory/07 - Take advantage of legacy data.mp4 5.4 MB
  • [TutsNode.com] - Penetration Testing Active Directory/04 - 3. Advanced Penetration Testing/03 - Carry out a Kerberos roasting.mp4 4.7 MB
  • [TutsNode.com] - Penetration Testing Active Directory/02 - 1. Introduction to Identities/02 - The LDAP protocol.mp4 4.1 MB
  • [TutsNode.com] - Penetration Testing Active Directory/02 - 1. Introduction to Identities/09 - Active Directory security audit.mp4 3.8 MB
  • [TutsNode.com] - Penetration Testing Active Directory/02 - 1. Introduction to Identities/06 - Interact with Active Directory at the command line.mp4 3.8 MB
[磁力链接] 添加时间:2023-12-18 大小:213.1 MB 最近下载:2025-12-26 热度:2746

Cyber Security Penetration Testing with Python

  • [TutsNode.com] - Cyber Security Penetration Testing with Python/2. Building a Basic Email Scraper/8. Debugging and Running.mp4 104.3 MB
  • [TutsNode.com] - Cyber Security Penetration Testing with Python/1. Press Play/5. Resource Development Kali Linux PIMPED!.mp4 92.0 MB
  • [TutsNode.com] - Cyber Security Penetration Testing with Python/2. Building a Basic Email Scraper/2. Importing (and Understanding) our Python modules.mp4 60.2 MB
  • [TutsNode.com] - Cyber Security Penetration Testing with Python/2. Building a Basic Email Scraper/4. Scraping Content.mp4 59.5 MB
  • [TutsNode.com] - Cyber Security Penetration Testing with Python/2. Building a Basic Email Scraper/3. Gathering User Input for the URL.mp4 59.3 MB
  • [TutsNode.com] - Cyber Security Penetration Testing with Python/2. Building a Basic Email Scraper/6. Email Extraction.mp4 52.1 MB
  • [TutsNode.com] - Cyber Security Penetration Testing with Python/2. Building a Basic Email Scraper/7. Crawling the Webpages.mp4 45.1 MB
  • [TutsNode.com] - Cyber Security Penetration Testing with Python/2. Building a Basic Email Scraper/1. MITRE ATT&CK T1114 Collection.mp4 42.7 MB
  • [TutsNode.com] - Cyber Security Penetration Testing with Python/1. Press Play/7. Resource Development VSCode Themes.mp4 35.0 MB
  • [TutsNode.com] - Cyber Security Penetration Testing with Python/1. Press Play/3. Resource Development Kali Linux Download.mp4 33.2 MB
  • [TutsNode.com] - Cyber Security Penetration Testing with Python/1. Press Play/6. Resource Development Kali Linux TMUX!.mp4 29.3 MB
  • [TutsNode.com] - Cyber Security Penetration Testing with Python/1. Press Play/1. Resource Development VMWare Workstation Download.mp4 23.2 MB
  • [TutsNode.com] - Cyber Security Penetration Testing with Python/1. Press Play/2. Resource Development VMWare Workstation Installation.mp4 22.4 MB
  • [TutsNode.com] - Cyber Security Penetration Testing with Python/1. Press Play/8. Resource Development Python Extensions.mp4 21.8 MB
  • [TutsNode.com] - Cyber Security Penetration Testing with Python/2. Building a Basic Email Scraper/5. Making Requests.mp4 21.7 MB
  • [TutsNode.com] - Cyber Security Penetration Testing with Python/1. Press Play/4. Resource Development Kali Linux Import + Config.mp4 21.6 MB
  • .pad/6 493.2 kB
  • .pad/4 447.6 kB
  • .pad/0 418.7 kB
  • .pad/11 410.2 kB
[磁力链接] 添加时间:2023-12-18 大小:727.8 MB 最近下载:2026-01-12 热度:6014

[ DevCourseWeb.com ] Udemy - Hacking Web Applications and Penetration Testing - Fast Start

  • ~Get Your Files Here !/3 - An Automated Tool OWASP ZAP Zed Attack Proxy/33 - Scanning a Website Which Requires Authentication.mp4 127.0 MB
  • ~Get Your Files Here !/6 - Authentication and Authorization/45 - An Online Dictionary Attack with Hydra.mp4 71.3 MB
  • ~Get Your Files Here !/3 - An Automated Tool OWASP ZAP Zed Attack Proxy/30 - Installation of OWASP ZAP & a Quick Scan.mp4 68.0 MB
  • ~Get Your Files Here !/5 - Input Output Manipulation/41 - SQL Injection Part 2.mp4 63.8 MB
  • ~Get Your Files Here !/8 - Information Gathering Through the Internet/59 - Maltego.mp4 60.6 MB
  • ~Get Your Files Here !/1 - Introduction to Ethical Hacking/11 - Installing Kali using the ISO file for VMware Step 2.mp4 57.5 MB
  • ~Get Your Files Here !/5 - Input Output Manipulation/39 - BeEF.mp4 46.4 MB
  • ~Get Your Files Here !/3 - An Automated Tool OWASP ZAP Zed Attack Proxy/31 - Using OWASP ZAP as a Personal Proxy.mp4 44.9 MB
  • ~Get Your Files Here !/8 - Information Gathering Through the Internet/57 - FOCA Fingerprinting Organisations with Collected Archives.mp4 41.5 MB
  • ~Get Your Files Here !/1 - Introduction to Ethical Hacking/6 - Install & Run Oracle VM VirtualBox.mp4 38.7 MB
  • ~Get Your Files Here !/2 - Technologies & Standards/24 - Basic Terms & Standards.mp4 35.4 MB
  • ~Get Your Files Here !/5 - Input Output Manipulation/42 - SQL Injection Part 3.mp4 35.3 MB
  • ~Get Your Files Here !/7 - Session Management and Cross Site Request Forgery/50 - Cross Site Request Forgery.mp4 34.6 MB
  • ~Get Your Files Here !/1 - Introduction to Ethical Hacking/7 - Installing Kali using the VMware Image Step 1.mp4 32.9 MB
  • ~Get Your Files Here !/6 - Authentication and Authorization/44 - Authentication Attacks.mp4 32.7 MB
  • ~Get Your Files Here !/1 - Introduction to Ethical Hacking/20 - Download & Install OWASPBWA.mp4 32.7 MB
  • ~Get Your Files Here !/4 - Information Gathering & Configuration Management/34 - Information Gathering & Configuration Management Part 1.mp4 32.5 MB
  • ~Get Your Files Here !/2 - Technologies & Standards/26 - Intercepting HTTP Traffic with Burp Suite.mp4 30.1 MB
  • ~Get Your Files Here !/1 - Introduction to Ethical Hacking/18 - Installing Kali using the ISO file for VirtualBox.mp4 28.7 MB
  • ~Get Your Files Here !/1 - Introduction to Ethical Hacking/15 - Installing Kali on VirtualBox using the OVA file.mp4 28.0 MB
[磁力链接] 添加时间:2023-12-18 大小:1.4 GB 最近下载:2026-01-02 热度:867

[ DevCourseWeb.com ] Udemy - Learn Wi-Fi Password Penetration Testing (WEP - WPA - WPA2)

  • ~Get Your Files Here !/09-Linux_Terminal_and_Basic_Commands.mkv 287.0 MB
  • ~Get Your Files Here !/12-What_is_MAC_Address_and_How_To_Change_It.mkv 149.7 MB
  • ~Get Your Files Here !/33-WPS_Lock-What_Is_It_and_How_To_Bypass_it.mkv 132.2 MB
  • ~Get Your Files Here !/36-Creating_a_Wordlist.mkv 116.0 MB
  • ~Get Your Files Here !/20-Bypassing_Mac_Filtering_(Blacklists_and_Whitelists).mkv 110.8 MB
  • ~Get Your Files Here !/07-Installing_Kali_Linux_as_a_VM_on_Linux.mkv 104.6 MB
  • ~Get Your Files Here !/49-How_to_Configure_Wireless_Security_Settings_To_Secure_Your_Network.mkv 87.8 MB
  • ~Get Your Files Here !/04-Installing_Kali_Linux_as_a_VM_on_Windows.mkv 79.8 MB
  • ~Get Your Files Here !/06-Installing_Kali_Linux_as_a_VM_on_Apple_M1_Computers.mkv 70.2 MB
  • ~Get Your Files Here !/27-Fragmentation_Attack.mkv 65.1 MB
  • ~Get Your Files Here !/05-Installing_Kali_Linux_as_a_VM_on_Apple_Mac_OS.mkv 64.8 MB
  • ~Get Your Files Here !/34-Unlocking_WPS.mkv 64.1 MB
  • ~Get Your Files Here !/48-Securing_Systems_From_The_Above_Attacks.mkv 61.9 MB
  • ~Get Your Files Here !/17-Deauthentication_Attack_(Disconnecting_Any_Device_From_The_Network).mkv 52.5 MB
  • ~Get Your Files Here !/47-Cracking_Login_Credentials.mkv 52.0 MB
  • ~Get Your Files Here !/43-Cracking_WPAWPA2_Much_Faster_Using_GPU-Part_2.mkv 49.0 MB
  • ~Get Your Files Here !/11-Connecting_a_Wireless_Adapter_To_Kali.mkv 48.8 MB
  • ~Get Your Files Here !/32-Bypassing_0x3_and_0x4_Errors.mkv 46.0 MB
  • ~Get Your Files Here !/22-Theory_Behind_Cracking_WEP.mkv 45.6 MB
  • ~Get Your Files Here !/03-Initial_Preparation.mkv 44.7 MB
[磁力链接] 添加时间:2023-12-18 大小:2.5 GB 最近下载:2025-12-31 热度:2549


共22页 上一页 1 2 3 4 5 6 7 8 下一页