kingers Posted February 8 Report Share Posted February 8 6.07 GB | 19min 17s | mp4 | 1280X720 | 16:9Genre:eLearning |Language:EnglishFiles Included :1 -Course Promotion.mp4 (28.61 MB)2 -Course Introduction.mp4 (35.07 MB)1 -1 writing a basic keylogger.mp4 (24.16 MB)2 -2 global variables in keylogger.mp4 (34.01 MB)3 -3 logging special keys.mp4 (46.95 MB)4 -4 threading and recursion.mp4 (40.04 MB)5 -5 OOP, object oriented programming.mp4 (83.95 MB)6 -6 constructor methods and instance variables.mp4 (61.89 MB)7 -7 logging key-strikes and reporting by emails.mp4 (124.76 MB)1 -1 client - server communication and connection types.mp4 (16.97 MB)10 -10 changing directory in file systems.mp4 (118.4 MB)11 -11 downloading files from victim computers.mp4 (69.94 MB)12 -12 download any kind of file from hacked computer.mp4 (28.54 MB)2 -2 Connecting two remote computer using socket.mp4 (50.53 MB)3 -3 sending and receiving data over tcp.mp4 (39.42 MB)4 -4 execute system commond remotly.mp4 (86.63 MB)5 -5 implementing a server.mp4 (64.44 MB)6 -6 implementing skeleton for server - client communication.mp4 (52.84 MB)7 -7 Refactoring - Creating Listener Class.mp4 (54.81 MB)8 -8 Refactoring - Creating Backdoor class.mp4 (32.07 MB)9 -9 sending commands as list and implementing exit command.mp4 (50.65 MB)1 -1 Converting Python Programs To Windows Binary Executables.mp4 (56.5 MB)2 -2 Running Executables Silentely.mp4 (69.44 MB)3 -3 Persistencey.mp4 (43.2 MB)4 -4 running programs on startup.mp4 (175.77 MB)5 -5 Creating a Basic Trojan Using Download Execute Payload.mp4 (117.34 MB)6 -6 Creating a Trojan By Embedding Files In Program Code.mp4 (75.22 MB)7 -7 Adding an Icon to Generated Executables mp4.mp4 (67.42 MB)1 -1 installing metasploitable.mp4 (41.01 MB)10 -10 Recursively discovering all paths on a target website.mp4 (31.88 MB)2 -2 accessing metasploitable from kali.mp4 (41.18 MB)3 -3 sending get requests to web server.mp4 (65.27 MB)4 -4 Discovering Subdomains.mp4 (35.99 MB)5 -5 descovering google sub domain.mp4 (68.59 MB)6 -6 descovering hidden path.mp4 (89.95 MB)7 -7 extracting link from webpage using re.mp4 (91.35 MB)8 -8 filtering results.mp4 (135.79 MB)9 -9 getting only the unique link.mp4 (35.12 MB)1 -1 sending post requests to website.mp4 (72.85 MB)2 -2 guess login password.mp4 (82.13 MB)1 -1 get and post method.mp4 (35.26 MB)10 -10 descovering XSS vulnerabilities.mp4 (49.13 MB)11 -11 implementing code to discover xss in forms.mp4 (80.18 MB)12 -12 implementing code to discover xss in links.mp4 (62.26 MB)13 -15 Automatically Discovering Vulnerabilities Using the Vulnerability Scanner.mp4 (63.56 MB)2 -2 parsing html code.mp4 (61.45 MB)3 -3 extracting html attributes.mp4 (73.08 MB)4 -4 posting forms.mp4 (119.67 MB)5 -5 building basic structure for vulnerability scanner.mp4 (94.65 MB)6 -6 using default parameters.mp4 (16.37 MB)7 -7 sendig request to a session.mp4 (97.49 MB)8 -8 extracting submitting forms automatically.mp4 (173.49 MB)9 -9 Implementing a method to run scanner.mp4 (53.22 MB)1 -1 Lab Overview & Needed Software.mp4 (58.6 MB)2 -2 Installing Windows and kali linux on Virtual Box.mp4 (48.55 MB)3 -3 Installing VsCode in kali linux.mp4 (66.49 MB)4 -4 Some Basic Command of Kali linux.mp4 (34.32 MB)1 -1 Your First program in python.mp4 (26.35 MB)10 -10 while loops in python.mp4 (38.41 MB)11 -11 for loops in python.mp4 (32.9 MB)12 -12 function in python.mp4 (54.97 MB)13 -13 learning builds-in function from chatgpt in vscode.mp4 (42.93 MB)14 -14 Installing some package and use it.mp4 (50.1 MB)2 -2 Python Variables.mp4 (35.03 MB)3 -3 DataType in Python.mp4 (29.82 MB)4 -4 Casting in python.mp4 (24.28 MB)5 -5 List in python.mp4 (26.68 MB)6 -6 tuple in python.mp4 (21.63 MB)7 -7 sets in python.mp4 (23.07 MB)8 -7 dictionary in python.mp4 (23.07 MB)9 -9 if condition in python.mp4 (26.01 MB)1 -1 what is Mac address and how to change it.mp4 (58.09 MB)10 -10 Decision Making in MAC Changer.mp4 (70.52 MB)2 -2 Runing System command using subproccess modules.mp4 (37.46 MB)3 -3 Implementing a very basic MAC changer.mp4 (28.83 MB)4 -4 Implementing variables in MAC changer.mp4 (35.37 MB)5 -5 Implementing the input function with MAC changer.mp4 (43.52 MB)6 -6 handling Hijacking problem.mp4 (45.78 MB)7 -7 Handling Command Line argument.mp4 (41.47 MB)8 -8 Initialising variables base on command line arguments.mp4 (38.72 MB)9 -9 uisng functions for Mac Changer.mp4 (42.83 MB)1 -1 What is an algorithm and read the output.mp4 (38.08 MB)2 -2 REgular Expression.mp4 (41.92 MB)3 -3 Extracting Substring using Regex.mp4 (74.54 MB)4 -4 Rfactoring the Housekeeping.mp4 (39.59 MB)5 -5 Implementing the algorithm to check if the mac did changed.mp4 (38.28 MB)1 -1 whati is ARP and what is it used for.mp4 (40.62 MB)2 -2 design and algorithm to descover client connected to the same network.mp4 (16.08 MB)3 -3 using scapy to create an arp request.mp4 (35.7 MB)4 -4 combining frames to broadcast packets.mp4 (48.3 MB)5 -5 sending and receiving packets.mp4 (29.75 MB)6 -6 iterating over lists analysing packet.mp4 (62 MB)7 -7 using excape characters to engance program output.mp4 (34.13 MB)8 -8 iterating over nested data structures.mp4 (60.49 MB)1 -1 what is arp spoofing program and how does it work.mp4 (33.47 MB)2 -2 using arpspoof program.mp4 (38.51 MB)3 -3 creating and sending ARP response.mp4 (37.22 MB)4 -4 Extracting mac address from response.mp4 (55.1 MB)5 -5 using loops in arp spoofing.mp4 (63.91 MB)6 -6 improving the program by using counter.mp4 (33.76 MB)7 -7 Dynamic Printing.mp4 (23.31 MB)8 -8 Handling Exceptions.mp4 (24.81 MB)9 -9 restoring arp table when an exception occures.mp4 (118.31 MB)1 -1 sniffing packets using scapy.mp4 (67.89 MB)2 -2 extracting data from a specific layer.mp4 (51.29 MB)3 -3 Analysing Sniffed Packets Extracting Fields From Layers.mp4 (68.9 MB)4 -4 Analysing Fields Extracting Passwords.mp4 (70.57 MB)5 -5 Extracting URL.mp4 (68.52 MB)6 -6 Extracting data from windows.mp4 (100.44 MB)1 -1 Running Python Programs on Windows.mp4 (51.77 MB)2 -2 capturing and analyzing arp responses.mp4 (44.47 MB)3 -3 detecting arp spoofing attacks.mp4 (80.44 MB)]ScreenshotTurboBithttps://turbobit.net/x3y5me3ehntd.htmlhttps://turbobit.net/oho9hlaf0brq.htmlhttps://turbobit.net/y0eetaalu0ri.htmlRapidGatorhttps://rapidgator.net/file/75e4e1bdc0fe05300098ee739626d04b/https://rapidgator.net/file/886a4d8c449ba3add54ad54f2d2380e2/https://rapidgator.net/file/05a1002b77eabeab446566b6862b43fb/ Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now