01 Introduction/001 1.About-Myself.pdf 415.39 KB
01 Introduction/001 About the instructor.mp4 3.76 MB
01 Introduction/002 What is Social Engineering. What to expect from this course.mp4 10.29 MB
01 Introduction/002 What-to-expect.pdf 61.77 KB
01 Introduction/003 Techniques-and-Terms.pdf 4.2 MB
01 Introduction/003 Types of Social Engineering.mp4 32.7 MB
01 Introduction/004 Join Our Online Classroom.html 2.61 KB
02 Information Gathering/005 Info-gathering-using-Search-engines.pdf 4.62 MB
02 Information Gathering/005 Information Gathering using Search Engines and Social Networks - part 1.mp4 117.71 MB
02 Information Gathering/006 Information Gathering using Search Engines and Social Networks - part 2.mp4 136.13 MB
02 Information Gathering/007 Introduction to Maltego.mp4 36.46 MB
02 Information Gathering/007 Maltego.pdf 759.71 KB
02 Information Gathering/008 Maltego - demo.mp4 28.06 MB
03 Social Engineering Toolkit (SET)/009 Introduction to SET.mp4 3.39 MB
03 Social Engineering Toolkit (SET)/009 SET.pdf 228.82 KB
03 Social Engineering Toolkit (SET)/010 Social Engineering Toolkit - Demo Harvest Facebook Credentials.mp4 17.51 MB
03 Social Engineering Toolkit (SET)/010 User-Manual.pdf 1.13 MB
04 Social Engineering using Metasploit/011 Introduction to Metasploit.mp4 5.22 MB
04 Social Engineering using Metasploit/011 Introduction-to-Metasploit.pdf 3.08 MB
04 Social Engineering using Metasploit/012 Backdoor in Windows using Metasploit.mp4 47.2 MB
04 Social Engineering using Metasploit/012 msfvenom-Shells.pdf 67.89 KB
04 Social Engineering using Metasploit/013 android-backdoor.pdf 104.53 KB
04 Social Engineering using Metasploit/013 Backdoor in Android using Metasploit.mp4 27.12 MB
05 Attacking the users trough websites - XSS and Beef-XSS/014 Cross-Site-Scripting.Attacking-users.pdf 251.7 KB
05 Attacking the users trough websites - XSS and Beef-XSS/014 Introduction to Cross-Site Scripting and Beef-XSS.mp4 15.35 MB
05 Attacking the users trough websites - XSS and Beef-XSS/015 XSS example - reflected.mp4 73.95 MB
05 Attacking the users trough websites - XSS and Beef-XSS/016 XSS example - stored.mp4 57.33 MB
05 Attacking the users trough websites - XSS and Beef-XSS/017 Beef-XSS Demo.mp4 38.44 MB
06 Final words/018 Countermeasures for Social Engineering.mp4 12.67 MB
06 Final words/018 Countermeasures.pdf 548.68 KB
06 Final words/019 This is (not) the end.mp4 1.11 MB
07 (Bonus) Web attacks/020 Usernames and Passwords Brute-Forcing using Burp.mp4 231.47 MB
07 (Bonus) Web attacks/021 Spider and Analyze a Website using Burp.mp4 68.76 MB
07 (Bonus) Web attacks/022 Brute-frocing Web Resources using Dirb and Dirbuster.mp4 106.47 MB
07 (Bonus) Web attacks/023 Bonus - OWASP Top 10 Vulnerabilities.mp4 33.26 MB
08 (Bonus) Network Attacks/024 Demo - Exploiting FTP Server Vulnerability using Metasploit.mp4 113.18 MB
08 (Bonus) Network Attacks/025 Demo - Hack SSH passwords using Hydra.mp4 33.12 MB
08 (Bonus) Network Attacks/026 Hack Linux Passwords using John the Ripper.mp4 22.87 MB
08 (Bonus) Network Attacks/027 Penetration Testing on Wireless Networks.mp4 14.64 MB
08 (Bonus) Network Attacks/028 Case Study Windows Hosted Network Bug or Feature.mp4 71.87 MB
09 (Bonus) Android reverse Engineering/029 APK file Structure. AndroidManifest XML file.mp4 13.82 MB
09 (Bonus) Android reverse Engineering/030 Reversing to get Source code of the Application - decompiling with dex2jar.mp4 23.53 MB
09 (Bonus) Android reverse Engineering/031 Reversing and Re-compiling With APKTool.mp4 24.9 MB
09 (Bonus) Android reverse Engineering/032 Static Analysis of Android Application using QARK.mp4 49.3 MB
09 (Bonus) Android reverse Engineering/033 Further information.html 1.26 KB
Download Info
Tips
“UD303” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.
DMCA Notice and Takedown Procedure
If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.