Download link
File List
-
01 Introduction/001 Introduction-en.srt 7.87 KB
01 Introduction/002 Teaser-en.srt 9.02 KB
01 Introduction/003 What is Programming What is Hacking Why Learn Them-en.srt 8.23 KB
01 Introduction/004 Lab Overview Needed Software-en.srt 4.88 KB
01 Introduction/004 Virtual-Box-Download-Page.txt 84 B
01 Introduction/005 How-to-Fix-Blank-Screen-After-Starting-Kali.txt 196 B
01 Introduction/005 How-to-Fix-Missing-Nat-Network-Issue.txt 88 B
01 Introduction/005 Installing Kali as a virtual Machine-en.srt 11.24 KB
01 Introduction/005 Kali-Linux-Download-Page.txt 180 B
01 Introduction/006 Basic Overview of Kali Linux-en.srt 6.52 KB
01 Introduction/007 The Terminal Linux Commands-en.srt 13.91 KB
01 Introduction/008 Python 2 VS Python 3 Writing Our First Program-en.srt 11.48 KB
01 Introduction/009 Installing Using a Python IDE-en.srt 11.33 KB
01 Introduction/Lesson 1. Introduction.mp4 141.5 MB
01 Introduction/Lesson 2. Teaser.mp4 102.01 MB
01 Introduction/Lesson 3. What is Programming, What is Hacking & Why Learn Them.mp4 139.66 MB
01 Introduction/Lesson 4. Lab Overview & Needed Software.mp4 57 MB
01 Introduction/Lesson 5. Installing Kali as a virtual Machine.mp4 104.05 MB
01 Introduction/Lesson 6. Basic Overview of Kali Linux.mp4 107.44 MB
01 Introduction/Lesson 7. The Terminal & Linux Commands.mp4 223.49 MB
01 Introduction/Lesson 8. Python 2 VS Python 3 & Writing Our First Program.mp4 193.68 MB
01 Introduction/Lesson 9. Installing & Using a Python IDE.mp4 115.46 MB
02 Writing a MAC Address Changer - Python Basics/010 What is MAC Address How To Change it-en.srt 9.31 KB
02 Writing a MAC Address Changer - Python Basics/010 mac-changer.pdf 980.54 KB
02 Writing a MAC Address Changer - Python Basics/011 Subprocess-Module-Documentation.txt 100 B
02 Writing a MAC Address Changer - Python Basics/011 Using Python Modules Executing System Commands-en.srt 12.33 KB
02 Writing a MAC Address Changer - Python Basics/012 Implementing a Very Basic MAC Changer-en.srt 6.68 KB
02 Writing a MAC Address Changer - Python Basics/013 Variables Strings-en.srt 12.35 KB
02 Writing a MAC Address Changer - Python Basics/014 Using Variables in MAC Changer-en.srt 5.71 KB
02 Writing a MAC Address Changer - Python Basics/015 Getting Input From The User-en.srt 7.7 KB
02 Writing a MAC Address Changer - Python Basics/016 Handling User Input-en.srt 11.73 KB
02 Writing a MAC Address Changer - Python Basics/017 Handling Command-line Arguments-en.srt 11.46 KB
02 Writing a MAC Address Changer - Python Basics/017 Optparse-Documentation-Page.txt 96 B
02 Writing a MAC Address Changer - Python Basics/018 Initialising Variables Based on Command-line Arguments-en.srt 9.05 KB
02 Writing a MAC Address Changer - Python Basics/019 Functions-en.srt 12.1 KB
02 Writing a MAC Address Changer - Python Basics/020 Returning Values From Functions-en.srt 8.53 KB
02 Writing a MAC Address Changer - Python Basics/021 Conditional Statements - Theory-en.srt 9.01 KB
02 Writing a MAC Address Changer - Python Basics/022 Using Conditional Statements in MAC Changer-en.srt 10.94 KB
02 Writing a MAC Address Changer - Python Basics/Lesson 10. What is MAC Address & How To Change it.mp4 105.32 MB
02 Writing a MAC Address Changer - Python Basics/Lesson 11. Using Python Modules & Executing System Commands.mp4 21.61 MB
02 Writing a MAC Address Changer - Python Basics/Lesson 12. Implementing a Very Basic MAC Changer.mp4 9.35 MB
02 Writing a MAC Address Changer - Python Basics/Lesson 13. Variables & Strings.mp4 19.48 MB
02 Writing a MAC Address Changer - Python Basics/Lesson 14. Using Variables in MAC Changer.mp4 9.12 MB
02 Writing a MAC Address Changer - Python Basics/Lesson 15. Getting Input From The User.mp4 12.25 MB
02 Writing a MAC Address Changer - Python Basics/Lesson 16. Handling User Input.mp4 15.18 MB
02 Writing a MAC Address Changer - Python Basics/Lesson 17. Handling Command-line Arguments.mp4 18.02 MB
02 Writing a MAC Address Changer - Python Basics/Lesson 18. Initialising Variables Based on Command-line Arguments.mp4 12.19 MB
02 Writing a MAC Address Changer - Python Basics/Lesson 19. Functions.mp4 22.49 MB
02 Writing a MAC Address Changer - Python Basics/Lesson 20. Returning Values From Functions.mp4 10.72 MB
02 Writing a MAC Address Changer - Python Basics/Lesson 21. Decision Making - Theory.mp4 16.7 MB
02 Writing a MAC Address Changer - Python Basics/Lesson 22. Using Conditional Statements in MAC Changer.mp4 19.98 MB
03 MAC Changer - Algorithm Design/023 What is an Algorithm-en.srt 4.53 KB
03 MAC Changer - Algorithm Design/024 Check-call-Manuall-Page.txt 100 B
03 MAC Changer - Algorithm Design/024 Reading Output Returned By System Commands-en.srt 8.39 KB
03 MAC Changer - Algorithm Design/025 Pythex.org.txt 40 B
03 MAC Changer - Algorithm Design/025 Regular Expressions (Regex)-en.srt 10.5 KB
03 MAC Changer - Algorithm Design/026 Extracting a Substring Using Regex-en.srt 8.15 KB
03 MAC Changer - Algorithm Design/026 Re-Module-Manual-Page.txt 84 B
03 MAC Changer - Algorithm Design/027 Refactoring Housekeeping-en.srt 15.14 KB
03 MAC Changer - Algorithm Design/028 Implementing The Algorithm to Check The Mac Did Change-en.srt 8.23 KB
03 MAC Changer - Algorithm Design/Lesson 23. What is an Algorithm.mp4 7.03 MB
03 MAC Changer - Algorithm Design/Lesson 24. Reading Output Returned By System Commands.mp4 14.5 MB
03 MAC Changer - Algorithm Design/Lesson 25. Regular Expressions (Regex).mp4 18.04 MB
03 MAC Changer - Algorithm Design/Lesson 26. Extracting a Substring Using Regex.mp4 15.8 MB
03 MAC Changer - Algorithm Design/Lesson 27. Refactoring & Housekeeping.mp4 17.64 MB
03 MAC Changer - Algorithm Design/Lesson 28. Implementing The Algorithm to Check The Mac Did Change.mp4 12.73 MB
04 Programming a Network Scanner/029 ADAPTER-LINKS-ADAPTER-LINKS.txt 36 B
04 Programming a Network Scanner/029 Introduction Teaser-en.srt 12.37 KB
04 Programming a Network Scanner/029 network-scanner.pdf 719.09 KB
04 Programming a Network Scanner/030 Installing Windows as a Virtual Machine-en.srt 4.78 KB
04 Programming a Network Scanner/031 What is ARP What its Used For-en.srt 11.9 KB
04 Programming a Network Scanner/032 Designing an Algorithm To Discover Clients Connected To The Same Network-en.srt 4.99 KB
04 Programming a Network Scanner/033 Scapy-Documentation.txt 96 B
04 Programming a Network Scanner/033 Using Scapy To Create an ARP Request-en.srt 8.39 KB
04 Programming a Network Scanner/034 Combining Frames To Broadcast Packets-en.srt 11.21 KB
04 Programming a Network Scanner/035 Scapy-Documentation.txt 96 B
04 Programming a Network Scanner/035 Sending Receiving Packets-en.srt 9.06 KB
04 Programming a Network Scanner/036 Lists-en.srt 10.74 KB
04 Programming a Network Scanner/036 More-info-about-python-lists.txt 110 B
04 Programming a Network Scanner/037 Iterating Over Lists Analysing Packet-en.srt 12.73 KB
04 Programming a Network Scanner/038 Using Escape Characters To Enhance Program Output-en.srt 8.13 KB
04 Programming a Network Scanner/039 Dictionaries-en.srt 12.82 KB
04 Programming a Network Scanner/040 Improving the Program Using a List of Dictionaries-en.srt 11.42 KB
04 Programming a Network Scanner/040 More-info-about-python-dictionaries.txt 120 B
04 Programming a Network Scanner/041 Refactoring Housekeeping-en.srt 9.3 KB
04 Programming a Network Scanner/042 Python 3 Compatibility-en.srt 9.32 KB
04 Programming a Network Scanner/Lesson 29. Introduction & Teaser.mp4 109.63 MB
04 Programming a Network Scanner/Lesson 30. Installing Windows as a Virtual Machine.mp4 60.59 MB
04 Programming a Network Scanner/Lesson 31. What is ARP & What its Used For.mp4 16.58 MB
04 Programming a Network Scanner/Lesson 32. Designing an Algorithm To Discover Clients Connected To The Same Network.mp4 11.89 MB
04 Programming a Network Scanner/Lesson 33. Using Scapy To Create an ARP Request.mp4 11.6 MB
04 Programming a Network Scanner/Lesson 34. Combining Frames To Broadcast Packets.mp4 21.18 MB
04 Programming a Network Scanner/Lesson 35. Sending & Receiving Packets.mp4 10.74 MB
04 Programming a Network Scanner/Lesson 36. Lists.mp4 19.09 MB
04 Programming a Network Scanner/Lesson 37. Iterating Over Lists & Analysing Packet.mp4 18.36 MB
04 Programming a Network Scanner/Lesson 38. Using Escape Characters To Enhance Program Output.mp4 11.04 MB
04 Programming a Network Scanner/Lesson 39. Dictionaries.mp4 15.28 MB
04 Programming a Network Scanner/Lesson 40. Improving the Program Using a List of Dictionaries.mp4 14.78 MB
04 Programming a Network Scanner/Lesson 41. Refactoring & Housekeeping.mp4 12.56 MB
04 Programming a Network Scanner/Lesson 42. Python 3 Compatibility.mp4 12.69 MB
05 Writing an ARP Spoofer/043 What is ARP Spoofing-en.srt 6.95 KB
05 Writing an ARP Spoofer/043 arp-spoof.pdf 709.19 KB
05 Writing an ARP Spoofer/044 Redirecting the Flow of Packets in a Network Using arpspoof-en.srt 6.09 KB
05 Writing an ARP Spoofer/045 Creating an ARP Response-en.srt 8.78 KB
05 Writing an ARP Spoofer/046 Sending ARP Responses-en.srt 7 KB
05 Writing an ARP Spoofer/047 Extracting MAC Address From Responses-en.srt 8.3 KB
05 Writing an ARP Spoofer/048 Loops-en.srt 11.1 KB
05 Writing an ARP Spoofer/049 Using an Infinite Loop To Prominently Redirect Packets-en.srt 10.74 KB
05 Writing an ARP Spoofer/050 Dynamic Printing-en.srt 8.73 KB
05 Writing an ARP Spoofer/051 Handling Exceptions-en.srt 6.83 KB
05 Writing an ARP Spoofer/052 Implementing a Restore Function-en.srt 14.63 KB
05 Writing an ARP Spoofer/053 Restoring ARP Tables When an Exception Occures-en.srt 6.28 KB
05 Writing an ARP Spoofer/Lesson 43. What is ARP Spoofing.mp4 112.24 MB
05 Writing an ARP Spoofer/Lesson 44. Redirecting the Flow of Packets in a Network Using arpspoof.mp4 56.99 MB
05 Writing an ARP Spoofer/Lesson 45. Creating an ARP Response.mp4 10.56 MB
05 Writing an ARP Spoofer/Lesson 46. Sending ARP Responses.mp4 9.02 MB
05 Writing an ARP Spoofer/Lesson 47. Extracting MAC Address From Responses.mp4 10.92 MB
05 Writing an ARP Spoofer/Lesson 48. Loops.mp4 16.76 MB
05 Writing an ARP Spoofer/Lesson 49. Using an Infinite Loop To Prominently Redirect Packets.mp4 11.61 MB
05 Writing an ARP Spoofer/Lesson 50. Dynamic Printing.mp4 10.1 MB
05 Writing an ARP Spoofer/Lesson 51. Handling Exceptions.mp4 7.8 MB
05 Writing an ARP Spoofer/Lesson 52. Implementing a Restore Function.mp4 20.5 MB
05 Writing an ARP Spoofer/Lesson 53. Restoring ARP Tables When an Exception Occures.mp4 9.29 MB
06 Writing a Packet Sniffer/054 Introduction Teaser-en.srt 6.11 KB
06 Writing a Packet Sniffer/054 Sniffer.pdf 556.34 KB
06 Writing a Packet Sniffer/055 Sniffing Packets Using Scapy-en.srt 9.97 KB
06 Writing a Packet Sniffer/056 Berkeley-Packet-Filter-BPF-syntax.txt 68 B
06 Writing a Packet Sniffer/056 Extracting data From a Specific Layer-en.srt 8.21 KB
06 Writing a Packet Sniffer/056 Scapy-http-Git-Repo.txt 82 B
06 Writing a Packet Sniffer/057 Analysing Sniffed Packets Extracting Fields From Layers-en.srt 13.79 KB
06 Writing a Packet Sniffer/058 Analysing Fields Extracting Passwords-en.srt 13.79 KB
06 Writing a Packet Sniffer/059 Extracting URLs-en.srt 9.15 KB
06 Writing a Packet Sniffer/060 Capturing Passwords From Any Computer Connected to the Same Network-en.srt 9.49 KB
06 Writing a Packet Sniffer/Lesson 54. Introduction & Teaser.mp4 85.79 MB
06 Writing a Packet Sniffer/Lesson 55. Sniffing Packets Using Scapy.mp4 11.83 MB
06 Writing a Packet Sniffer/Lesson 56. Extracting data From a Specific Layer.mp4 16.37 MB
06 Writing a Packet Sniffer/Lesson 57. Analysing Sniffed Packets & Extracting Fields From Layers.mp4 28.98 MB
06 Writing a Packet Sniffer/Lesson 58. Analysing Fields & Extracting Passwords.mp4 21.17 MB
06 Writing a Packet Sniffer/Lesson 59. Extracting URLs.mp4 20.38 MB
06 Writing a Packet Sniffer/Lesson 60. Capturing Passwords From Any Computer Connected to the Same Network.mp4 15.15 MB
07 Writing a DNS Spoofer/061 Intercepting Packets - Creating a Proxy-en.srt 16.12 KB
07 Writing a DNS Spoofer/061 interceptor.pdf 1.81 MB
07 Writing a DNS Spoofer/062 Converting Packets to Scapy Packets-en.srt 10.63 KB
07 Writing a DNS Spoofer/063 What is DNS Spoofing-en.srt 8.52 KB
07 Writing a DNS Spoofer/064 Analysing DNS Responses-en.srt 7.92 KB
07 Writing a DNS Spoofer/065 Crafting a Custom DNS Response-en.srt 9.78 KB
07 Writing a DNS Spoofer/066 Modifying Packets On The Fly-en.srt 9.44 KB
07 Writing a DNS Spoofer/067 Redirecting DNS Responses-en.srt 6.71 KB
07 Writing a DNS Spoofer/Lesson 61. Intercepting Packets - Creating a Proxy.mp4 155.19 MB
07 Writing a DNS Spoofer/Lesson 62. Converting Packets to Scapy Packets.mp4 83.93 MB
07 Writing a DNS Spoofer/Lesson 63. What is DNS Spoofing.mp4 123.57 MB
07 Writing a DNS Spoofer/Lesson 64. Analysing DNS Responses.mp4 70.56 MB
07 Writing a DNS Spoofer/Lesson 65. Crafting a Custom DNS Response.mp4 79.84 MB
07 Writing a DNS Spoofer/Lesson 66. Modifying Packets On The Fly.mp4 86.85 MB
07 Writing a DNS Spoofer/Lesson 67. Redirecting DNS Responses.mp4 60.96 MB
08 Writing a File Interceptor/068 Introduction Teaser-en.srt 5.47 KB
08 Writing a File Interceptor/069 Filtering Traffic Based on the Port Used-en.srt 10.74 KB
08 Writing a File Interceptor/070 Analysing HTTP Requests-en.srt 6.78 KB
08 Writing a File Interceptor/071 Modifying HTTP Requests on the Fly-en.srt 11.81 KB
08 Writing a File Interceptor/072 Replacing HTTP Requests-en.srt 12.58 KB
08 Writing a File Interceptor/073 Intercepting Replacing Downloads on The Network-en.srt 11.34 KB
08 Writing a File Interceptor/Lesson 68. Introduction & Teaser.mp4 72.99 MB
08 Writing a File Interceptor/Lesson 69. Filtering Traffic Based on the Port Used.mp4 93.17 MB
08 Writing a File Interceptor/Lesson 70. Analysing HTTP Requests.mp4 55.62 MB
08 Writing a File Interceptor/Lesson 71. Modifying HTTP Requests on the Fly.mp4 104.22 MB
08 Writing a File Interceptor/Lesson 72. Replacing HTTP Requests.mp4 102.69 MB
08 Writing a File Interceptor/Lesson 73. Intercepting & Replacing Downloads on The Network.mp4 100.47 MB
09 Writing a Code Injector/074 Introduction Teaser-en.srt 1.65 KB
09 Writing a Code Injector/075 Analysing HTTP Responses-en.srt 8.24 KB
09 Writing a Code Injector/076 Replacing a Substring Using Regex-en.srt 8.21 KB
09 Writing a Code Injector/077 Decoding HTTP Responses-en.srt 11.77 KB
09 Writing a Code Injector/078 Modifying HTTP Responses Injecting Javascript Code in HTML Pages-en.srt 10.2 KB
09 Writing a Code Injector/079 Refactoring Housekeeping-en.srt 10.77 KB
09 Writing a Code Injector/080 Debugging Issues-en.srt 7.57 KB
09 Writing a Code Injector/081 Using Groups None-capturing Regex-en.srt 10.87 KB
09 Writing a Code Injector/082 Recalculating Content Length-en.srt 13.13 KB
09 Writing a Code Injector/083 BeEF Overview Basic Hook Method-en.srt 8.14 KB
09 Writing a Code Injector/084 Hooking Computers Using code_injector-en.srt 7.02 KB
09 Writing a Code Injector/085 Basic BeEF Commands-en.srt 6 KB
09 Writing a Code Injector/086 Delivering Malware Using BeEF-en.srt 7.5 KB
09 Writing a Code Injector/Lesson 74. Introduction & Teaser.mp4 30.14 MB
09 Writing a Code Injector/Lesson 75. Analysing HTTP Responses.mp4 77.92 MB
09 Writing a Code Injector/Lesson 76. Replacing a Substring Using Regex.mp4 64.7 MB
09 Writing a Code Injector/Lesson 77. Decoding HTTP Responses.mp4 104.26 MB
09 Writing a Code Injector/Lesson 78. Modifying HTTP Responses & Injecting Javascript Code in HTML Pages.mp4 113.09 MB
09 Writing a Code Injector/Lesson 79. Refactoring & Housekeeping.mp4 79.06 MB
09 Writing a Code Injector/Lesson 80. Debugging Issues.mp4 75.34 MB
09 Writing a Code Injector/Lesson 81. Using Groups & None-capturing Regex.mp4 93.05 MB
09 Writing a Code Injector/Lesson 82. Recalculating Content Length.mp4 124.42 MB
09 Writing a Code Injector/Lesson 83. BeEF Overview & Basic Hook Method.mp4 107.35 MB
09 Writing a Code Injector/Lesson 84. Hooking Computers Using code_injector.mp4 48.48 MB
09 Writing a Code Injector/Lesson 85. Basic BeEF Commands.mp4 52.94 MB
09 Writing a Code Injector/Lesson 86. Delivering Malware Using BeEF.mp4 69.99 MB
10 Bypassing HTTPS/087 How to Bypass HTTPS-en.srt 12.88 KB
10 Bypassing HTTPS/087 Moxie-explaining-how-SSLstrip-works.txt 104 B
10 Bypassing HTTPS/088 Bypassing HTTPS Sniffing Login Credentials-en.srt 9.74 KB
10 Bypassing HTTPS/089 Replacing Downloads on HTTPS Pages-en.srt 12.95 KB
10 Bypassing HTTPS/090 Injecting Code in HTTPS Pages-en.srt 9.82 KB
10 Bypassing HTTPS/Lesson 87. How to Bypass HTTPS.mp4 163.68 MB
10 Bypassing HTTPS/Lesson 88. Bypassing HTTPS & Sniffing Login Credentials.mp4 67.74 MB
10 Bypassing HTTPS/Lesson 89. Replacing Downloads on HTTPS Pages.mp4 115.94 MB
10 Bypassing HTTPS/Lesson 90. Injecting Code in HTTPS Pages.mp4 100.22 MB
11 Writing an ARP Spoof Detector/091 Running Python Programs on Windows-en.srt 12.37 KB
11 Writing an ARP Spoof Detector/092 Capturing Analysing ARP Responses-en.srt 7.98 KB
11 Writing an ARP Spoof Detector/093 Detecting ARP Spoofing Attacks-en.srt 8.99 KB
11 Writing an ARP Spoof Detector/Lesson 91. Running Python Programs on Windows.mp4 106.8 MB
11 Writing an ARP Spoof Detector/Lesson 92. Capturing & Analysing ARP Responses.mp4 55.59 MB
11 Writing an ARP Spoof Detector/Lesson 93. Detecting ARP Spoofing Attacks.mp4 67.81 MB
12 Writing Malware/094 Evil-Files.pdf 1.34 MB
12 Writing Malware/094 Introduction Teaser-en.srt 2.35 KB
12 Writing Malware/095 Execute System Command Payload-en.srt 11.99 KB
12 Writing Malware/096 Sending Reports By Email-en.srt 13.63 KB
12 Writing Malware/097 Filtering Command Output Using Regex-en.srt 12.71 KB
12 Writing Malware/098 Stealing WiFi Passwords Saved on a Computer-en.srt 12.1 KB
12 Writing Malware/099 Downloading Files From Program-en.srt 9.97 KB
12 Writing Malware/100 File-Modes-In-Python.txt 116 B
12 Writing Malware/100 Writing Files on Disk-en.srt 14.17 KB
12 Writing Malware/101 LaZagne-Git-Repo.txt 96 B
12 Writing Malware/101 Password Recovery Basics-en.srt 10.78 KB
12 Writing Malware/102 Using all the Above to Steal Saved Passwords Remotely-en.srt 10.1 KB
12 Writing Malware/103 Interacting With The File System-en.srt 12.15 KB
12 Writing Malware/103 OS-Library-Documentation.txt 84 B
12 Writing Malware/Lesson 100. Writing Files on Disk.mp4 69.1 MB
12 Writing Malware/Lesson 101. Password Recovery Basics.mp4 93.72 MB
12 Writing Malware/Lesson 102. Using all the Above to Steal Saved Passwords Remotely.mp4 62.79 MB
12 Writing Malware/Lesson 103. Interacting With The File System.mp4 76.9 MB
12 Writing Malware/Lesson 94. Introduction & Teaser.mp4 44.09 MB
12 Writing Malware/Lesson 95. Execute System Command Payload.mp4 91.27 MB
12 Writing Malware/Lesson 96. Sending Reports By Email.mp4 89.92 MB
12 Writing Malware/Lesson 97. Filtering Command Output Using Regex.mp4 90.59 MB
12 Writing Malware/Lesson 98. Stealing WiFi Passwords Saved on a Computer.mp4 118.43 MB
12 Writing Malware/Lesson 99. Downloading Files From Program.mp4 89.62 MB
13 Writing Malware - Keylogger/104 Introduction Teaser-en.srt 4.55 KB
13 Writing Malware - Keylogger/105 Pynput-Documentation.txt 66 B
13 Writing Malware - Keylogger/105 Writing a Basic Local Keylogger-en.srt 13.09 KB
13 Writing Malware - Keylogger/106 Global Variables-en.srt 10.25 KB
13 Writing Malware - Keylogger/107 Logging Special Keys-en.srt 8.23 KB
13 Writing Malware - Keylogger/108 Threading Recursion-en.srt 13.51 KB
13 Writing Malware - Keylogger/109 OOP - Object Oriented Programming Basics-en.srt 18.93 KB
13 Writing Malware - Keylogger/110 Constructor Methods Instance Variables-en.srt 9.41 KB
13 Writing Malware - Keylogger/111 Logging Key-strikes and Reporting Them By Email-en.srt 14.59 KB
13 Writing Malware - Keylogger/Lesson 104. Introduction & Teaser.mp4 63.19 MB
13 Writing Malware - Keylogger/Lesson 105. Writing a Basic Local Keylogger.mp4 78.3 MB
13 Writing Malware - Keylogger/Lesson 106. Global Variables.mp4 54.79 MB
13 Writing Malware - Keylogger/Lesson 107. Logging Special Keys.mp4 54.93 MB
13 Writing Malware - Keylogger/Lesson 108. Threading & Recursion.mp4 84.42 MB
13 Writing Malware - Keylogger/Lesson 109. OOP - Object Oriented Programming Basics.mp4 116.48 MB
13 Writing Malware - Keylogger/Lesson 110. Constructor Methods & Instance Variables.mp4 66.13 MB
13 Writing Malware - Keylogger/Lesson 111. Logging Key-strikes and Reporting Them By Email.mp4 83.79 MB
14 Writing Malware - Backdoors/112 Introduction Teaser-en.srt 7.28 KB
14 Writing Malware - Backdoors/113 Client - Server Communication Connection Types-en.srt 9.95 KB
14 Writing Malware - Backdoors/114 Connecting Two Remote Computers Using Sockets-en.srt 12.9 KB
14 Writing Malware - Backdoors/114 Sockets-Official-Documentation.txt 92 B
14 Writing Malware - Backdoors/114 Tutorials-Point-Socket-Documentation.txt 120 B
14 Writing Malware - Backdoors/115 Sending Receiving Data Over TCP-en.srt 6.41 KB
14 Writing Malware - Backdoors/116 Executing System Commands Remotely-en.srt 12.22 KB
14 Writing Malware - Backdoors/117 Implementing a Server-en.srt 10.54 KB
14 Writing Malware - Backdoors/118 Implementing Skeleton For Server - Client Communication-en.srt 8.56 KB
14 Writing Malware - Backdoors/119 Refactoring - Creating a Listener Class-en.srt 9.54 KB
14 Writing Malware - Backdoors/120 Refactoring - Creating a Backdoor Class-en.srt 6.82 KB
14 Writing Malware - Backdoors/121 Serialisation - Theory-en.srt 13.68 KB
14 Writing Malware - Backdoors/122 Serialisation - Implementing Reliable Methods to Send Receive Data Over TCP-en.srt 9.37 KB
14 Writing Malware - Backdoors/123 Serialisation - Reliably Sending Receiving Data-en.srt 7.22 KB
14 Writing Malware - Backdoors/124 Sending Commands as List Implementing Exit Command-en.srt 10.01 KB
14 Writing Malware - Backdoors/125 Interacting With the File System - Implementing cd Command-en.srt 10.66 KB
14 Writing Malware - Backdoors/126 Reading Files-en.srt 8.9 KB
14 Writing Malware - Backdoors/127 Writing Files-en.srt 8.07 KB
14 Writing Malware - Backdoors/128 Downloading Files From Hacked Computer-en.srt 8.28 KB
14 Writing Malware - Backdoors/129 Implementing Upload Functionality in Listener-en.srt 8.94 KB
14 Writing Malware - Backdoors/130 Implementing Upload Functionality in Backdoor-en.srt 7.12 KB
14 Writing Malware - Backdoors/131 Handling Unknown Exceptions-en.srt 11.55 KB
14 Writing Malware - Backdoors/132 Using the Backdoor to Hack Windows Linux OS X-en.srt 14.78 KB
14 Writing Malware - Backdoors/Lesson 112. Introduction & Teaser.mp4 76.63 MB
14 Writing Malware - Backdoors/Lesson 113. Client - Server Communication & Connection Types.mp4 120.14 MB
14 Writing Malware - Backdoors/Lesson 114. Connecting Two Remote Computers Using Sockets.mp4 66.79 MB
14 Writing Malware - Backdoors/Lesson 115. Sending & Receiving Data Over TCP.mp4 32.14 MB
14 Writing Malware - Backdoors/Lesson 116. Executing System Commands Remotely.mp4 73.3 MB
14 Writing Malware - Backdoors/Lesson 117. Implementing a Server.mp4 52.47 MB
14 Writing Malware - Backdoors/Lesson 118. Implementing Skeleton For Server - Client Communication.mp4 54.78 MB
14 Writing Malware - Backdoors/Lesson 119. Refactoring - Creating a Listener Class.mp4 71.87 MB
14 Writing Malware - Backdoors/Lesson 120. Refactoring - Creating a Backdoor Class.mp4 43.41 MB
14 Writing Malware - Backdoors/Lesson 121. Serialisation - Theory.mp4 164.44 MB
14 Writing Malware - Backdoors/Lesson 122. Serialisation - Implementing Reliable Methods to Send & Receive Data Over TCP.mp4 81.88 MB
14 Writing Malware - Backdoors/Lesson 123. Serialisation - Reliably Sending & Receiving Data.mp4 58.96 MB
14 Writing Malware - Backdoors/Lesson 124. Sending Commands as List & Implementing Exit Command.mp4 73.14 MB
14 Writing Malware - Backdoors/Lesson 125. Interacting With the File System - Implementing cd Command.mp4 77.77 MB
14 Writing Malware - Backdoors/Lesson 126. Reading Files.mp4 73.85 MB
14 Writing Malware - Backdoors/Lesson 127. Writing Files.mp4 56.67 MB
14 Writing Malware - Backdoors/Lesson 128. Downloading Files From Hacked Computer.mp4 77.29 MB
14 Writing Malware - Backdoors/Lesson 129. Implementing Upload Functionality in Listener.mp4 97.87 MB
14 Writing Malware - Backdoors/Lesson 130. Implementing Upload Functionality in Backdoor.mp4 61.67 MB
14 Writing Malware - Backdoors/Lesson 131. Handling Unknown Exceptions.mp4 97.84 MB
14 Writing Malware - Backdoors/Lesson 132. Using the Backdoor to Hack Windows, Linux & OS X.mp4 126.99 MB
15 Writing Malware - Packaging/133 Introduction Teaser-en.srt 4.1 KB
15 Writing Malware - Packaging/134 Converting Python Programs To Windows Binary Executables-en.srt 8.24 KB
15 Writing Malware - Packaging/135 Running Executables Silentely-en.srt 8.29 KB
15 Writing Malware - Packaging/136 Installing Windows Pyinstaller on Linux-en.srt 9.06 KB
15 Writing Malware - Packaging/137 Packaging Programs For Windows From Linux-en.srt 10.04 KB
15 Writing Malware - Packaging/138 Persistence Idea-en.srt 9.75 KB
15 Writing Malware - Packaging/139 Python-OS-Library-Documentation.txt 84 B
15 Writing Malware - Packaging/139 Python-Shutil-Library-Documentation.txt 92 B
15 Writing Malware - Packaging/139 Running Programs on Startup-en.srt 16.82 KB
15 Writing Malware - Packaging/140 Creating a Basic Trojan Using Download Execute Payload-en.srt 13.14 KB
15 Writing Malware - Packaging/141 Creating a Trojan By Embedding Files In Program Code-en.srt 9.95 KB
15 Writing Malware - Packaging/141 Pyinstaller-Documentation.txt 120 B
15 Writing Malware - Packaging/142 Bypassing Anti-Virus Programs - Theory-en.srt 6.58 KB
15 Writing Malware - Packaging/143 Bypassing Anti-Virus Programs - Practical-en.srt 10.53 KB
15 Writing Malware - Packaging/144 Adding an Icons to Generated Executables-en.srt 5.99 KB
15 Writing Malware - Packaging/144 Easyicon-a-website-to-convert-images-to-icons.txt 90 B
15 Writing Malware - Packaging/144 Iconfinder-a-website-to-download-icons.txt 56 B
15 Writing Malware - Packaging/145 Spoofing File Extension-en.srt 10.8 KB
15 Writing Malware - Packaging/146 Converting Python Programs To OS X Executables-en.srt 10.73 KB
15 Writing Malware - Packaging/147 Converting Python Programs to Linux Executables-en.srt 9.65 KB
15 Writing Malware - Packaging/Lesson 133. Introduction & Teaser.mp4 68.27 MB
15 Writing Malware - Packaging/Lesson 134. Converting Python Programs To Windows Binary Executables.mp4 82.04 MB
15 Writing Malware - Packaging/Lesson 135. Running Executables Silentely.mp4 66.54 MB
15 Writing Malware - Packaging/Lesson 136. Installing Windows Pyinstaller on Linux.mp4 67.22 MB
15 Writing Malware - Packaging/Lesson 137. Packaging Programs For Windows From Linux.mp4 58.22 MB
15 Writing Malware - Packaging/Lesson 138. Persistence Idea.mp4 104.42 MB
15 Writing Malware - Packaging/Lesson 139. Running Programs on Startup.mp4 119.02 MB
15 Writing Malware - Packaging/Lesson 140. Creating a Basic Trojan Using Download & Execute Payload.mp4 94.54 MB
15 Writing Malware - Packaging/Lesson 141. Creating a Trojan By Embedding Files In Program Code.mp4 61.52 MB
15 Writing Malware - Packaging/Lesson 142. Bypassing Anti-Virus Programs - Theory.mp4 81.2 MB
15 Writing Malware - Packaging/Lesson 143. Bypassing Anti-Virus Programs - Practical.mp4 81.37 MB
15 Writing Malware - Packaging/Lesson 144. Adding an Icons to Generated Executables.mp4 44.43 MB
15 Writing Malware - Packaging/Lesson 145. Spoofing File Extension.mp4 146.11 MB
15 Writing Malware - Packaging/Lesson 146. Converting Python Programs To OS X Executables.mp4 103.51 MB
15 Writing Malware - Packaging/Lesson 147. Converting Python Programs to Linux Executables.mp4 61.71 MB
16 Website Web Application Hacking/148 Introduction Teaser-en.srt 8.95 KB
16 Website Web Application Hacking/148 Website-Hacking.pdf 346.3 KB
16 Website Web Application Hacking/149 What is a Website-en.srt 5.42 KB
16 Website Web Application Hacking/150 How to Hack a Website-en.srt 7.88 KB
16 Website Web Application Hacking/151 Sending GET Requests To Web Servers-en.srt 11.46 KB
16 Website Web Application Hacking/Lesson 148. Introduction & Teaser.mp4 136.43 MB
16 Website Web Application Hacking/Lesson 149. What is a Website.mp4 86 MB
16 Website Web Application Hacking/Lesson 150. How to Hack a Website.mp4 103.13 MB
17 Website Hacking - Writing a Crawler/152 Discovering Subdomains-en.srt 12.61 KB
17 Website Hacking - Writing a Crawler/153 Discovering Hidden Paths in Websites-en.srt 12.78 KB
17 Website Hacking - Writing a Crawler/154 Reading Response Content-en.srt 7.64 KB
17 Website Hacking - Writing a Crawler/155 Extracting Useful Data From Response-en.srt 8.33 KB
17 Website Hacking - Writing a Crawler/156 Filtering Rsults-en.srt 8.49 KB
17 Website Hacking - Writing a Crawler/157 Extracting Unique Links Storing Them In a List-en.srt 7.74 KB
17 Website Hacking - Writing a Crawler/158 Recursively Discovering All Paths On a Target Website-en.srt 11.85 KB
17 Website Hacking - Writing a Crawler/Lesson 151. Sending GET Requests To Web Servers.mp4 94.39 MB
17 Website Hacking - Writing a Crawler/Lesson 152. Discovering Subdomains.mp4 101.25 MB
17 Website Hacking - Writing a Crawler/Lesson 153. Discovering Hidden Paths in Websites.mp4 136.81 MB
17 Website Hacking - Writing a Crawler/Lesson 154. Reading Response Content.mp4 91.43 MB
17 Website Hacking - Writing a Crawler/Lesson 155. Extracting Useful Data From Response.mp4 112.71 MB
17 Website Hacking - Writing a Crawler/Lesson 156. Filtering Rsults.mp4 112.07 MB
17 Website Hacking - Writing a Crawler/Lesson 157. Extracting Unique Links & Storing Them In a List.mp4 96.37 MB
17 Website Hacking - Writing a Crawler/Lesson 158. Recursively Discovering All Paths On a Target Website.mp4 106.25 MB
18 Writing a Program To Guess Login Information/159 Sending Post Requests to Websites-en.srt 14.02 KB
18 Writing a Program To Guess Login Information/160 Guessing Login Information on Login Pages-en.srt 10.72 KB
18 Writing a Program To Guess Login Information/Lesson 159. Sending Post Requests to Websites.mp4 106.29 MB
18 Writing a Program To Guess Login Information/Lesson 160. Guessing Login Information on Login Pages.mp4 91.58 MB
19 Writing a Vulnerability Scanner/161 Introduction Teaser-en.srt 3.28 KB
19 Writing a Vulnerability Scanner/162 HTTP Requests - POST VS GET-en.srt 8.05 KB
19 Writing a Vulnerability Scanner/163 Parsing HTML Code-en.srt 8.79 KB
19 Writing a Vulnerability Scanner/164 Extracting HTML Attributes-en.srt 11.7 KB
19 Writing a Vulnerability Scanner/165 Posting Forms-en.srt 10.67 KB
19 Writing a Vulnerability Scanner/166 Building Basic Structure For Vulnerability Scanner-en.srt 13.83 KB
19 Writing a Vulnerability Scanner/167 Using Default Parameters-en.srt 5.96 KB
19 Writing a Vulnerability Scanner/168 Sending Requests in a Session-en.srt 10.3 KB
19 Writing a Vulnerability Scanner/169 Extracting Submitting Forms Automatically-en.srt 11.24 KB
19 Writing a Vulnerability Scanner/170 Implementing a Method To Run The Scanner-en.srt 7.02 KB
19 Writing a Vulnerability Scanner/171 Discovering XSS Vulnerabilities-en.srt 11.46 KB
19 Writing a Vulnerability Scanner/172 Exploiting XSS Vulnerabilities-en.srt 6.12 KB
19 Writing a Vulnerability Scanner/173 Implementing Code To Discover XSS in Forms-en.srt 8.64 KB
19 Writing a Vulnerability Scanner/174 Implementing Code To Discover XSS in Parameters-en.srt 8.43 KB
19 Writing a Vulnerability Scanner/175 Automatically Discovering Vulnerabilities Using the Vulnerability Scanner-en.srt 10.28 KB
19 Writing a Vulnerability Scanner/Lesson 161. Introduction & Teaser.mp4 44.51 MB
19 Writing a Vulnerability Scanner/Lesson 162. HTTP Requests - POST VS GET.mp4 89.25 MB
19 Writing a Vulnerability Scanner/Lesson 163. Parsing HTML Code.mp4 95.29 MB
19 Writing a Vulnerability Scanner/Lesson 164. Extracting HTML Attributes.mp4 137.61 MB
19 Writing a Vulnerability Scanner/Lesson 165. Posting Forms.mp4 136.19 MB
19 Writing a Vulnerability Scanner/Lesson 166. Building Basic Structure For Vulnerability Scanner.mp4 118.98 MB
19 Writing a Vulnerability Scanner/Lesson 167. Using Default Parameters.mp4 41.42 MB
19 Writing a Vulnerability Scanner/Lesson 168. Sending Requests in a Session.mp4 83.22 MB
19 Writing a Vulnerability Scanner/Lesson 169. Extracting & Submitting Forms Automatically.mp4 124.8 MB
19 Writing a Vulnerability Scanner/Lesson 170. Implementing a Method To Run The Scanner.mp4 58.93 MB
19 Writing a Vulnerability Scanner/Lesson 171. Discovering XSS Vulnerabilities.mp4 147.82 MB
19 Writing a Vulnerability Scanner/Lesson 172. Exploiting XSS Vulnerabilities.mp4 96.07 MB
19 Writing a Vulnerability Scanner/Lesson 173. Implementing Code To Discover XSS in Forms.mp4 94.99 MB
19 Writing a Vulnerability Scanner/Lesson 174. Implementing Code To Discover XSS in Parameters.mp4 71.85 MB
19 Writing a Vulnerability Scanner/Lesson 175. Automatically Discovering Vulnerabilities Using the Vulnerability Scanner.mp4 89.8 MB
Download Info
-
Tips
“Udemy Learn Ethical Hacking From Scratch” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.
-
DMCA Notice and Takedown Procedure
If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.