589689.xyz

[] PacktPub - Offensive Hacking Unfolded - Become a Pro Pentester in 2023!

  • 收录时间:2023-09-14 22:53:21
  • 文件大小:5GB
  • 下载次数:1
  • 最近下载:2023-09-14 22:53:21
  • 磁力链接:

文件列表

  1. 5. Exploitation/1. LAB 1 - Exploitation with Metasploit Framework.mp4 259MB
  2. 6. Web Penetration Test/3. CMS Hacking - General Brute Forcing & Exploitation.mp4 238MB
  3. 4. Vulnerability Analysis/2. Manually Identify, Analyze and Rank Vulnerabilities.mp4 235MB
  4. 5. Exploitation/2. LAB 2 - Exploitation using Manual Public Exploits.mp4 225MB
  5. 8. Security Controls Evasion/4. #2 Bypass Antivirus - The Actual Evasion Technique!.mp4 221MB
  6. 7. Network PenTesting/3. The Core of Network Testing - Part 2.mp4 213MB
  7. 6. Web Penetration Test/6. Important Specific Vulnerabilities such as SQL Injection in-depth.mp4 195MB
  8. 2. Fundamentals/4. Theoretical Basics [EXTREMELY IMPORTANT].mp4 184MB
  9. 6. Web Penetration Test/4. Do you know the Power of Version Numbers - Part 1.mp4 180MB
  10. 7. Network PenTesting/11. Privilege Escalation Techniques - Part 4.mp4 167MB
  11. 7. Network PenTesting/8. Privilege Escalation Techniques - Part 1.mp4 158MB
  12. 4. Vulnerability Analysis/3. Automated Vulnerability Assessment using Nessus.mp4 157MB
  13. 6. Web Penetration Test/7. Important Specific Vulnerabilities such as XSS in-depth.mp4 145MB
  14. 7. Network PenTesting/9. Privilege Escalation Techniques - Part 2.mp4 143MB
  15. 9. Writing Great Reports/1. Clean Documentation in a Professional Test.mp4 141MB
  16. 3. Information Gathering/2. Passive Reconnaissance - Part 2.mp4 137MB
  17. 3. Information Gathering/3. Passive Reconnaissance - Part 3.mp4 129MB
  18. 7. Network PenTesting/2. The Core of Network Testing - Part 1.mp4 129MB
  19. 6. Web Penetration Test/5. Do you know the Power of Version Numbers - Part 2.mp4 125MB
  20. 6. Web Penetration Test/8. Important Specific Vulnerabilities such as File Upload & Command Injection.mp4 124MB
  21. 6. Web Penetration Test/9. Part 1 Web Server Hacking Intro & Enumeration Ideas.mp4 124MB
  22. 6. Web Penetration Test/10. Part 2 Web Server Hacking Risky PUT & DELETE Methods.mp4 120MB
  23. 3. Information Gathering/6. Active Reconnaissance - Part 2.mp4 119MB
  24. 7. Network PenTesting/5. Post Exploitation using Metasploit - Part 1.mp4 114MB
  25. 3. Information Gathering/1. Passive Reconnaissance - Part 1.mp4 114MB
  26. 6. Web Penetration Test/1. CMS Hacking - Initial Information Gathering.mp4 112MB
  27. 6. Web Penetration Test/2. CMS Hacking - Directory Busting and CMS Scanning.mp4 111MB
  28. 2. Fundamentals/1. Lab Setup using the VMware Player.mp4 111MB
  29. 7. Network PenTesting/4. The Core of Network Testing - Part 3.mp4 101MB
  30. 3. Information Gathering/5. Active Reconnaissance - Part 1.mp4 87MB
  31. 7. Network PenTesting/6. Post Exploitation using Metasploit - Part 2.mp4 81MB
  32. 7. Network PenTesting/7. Post Exploitation using Metasploit - Part 3.mp4 79MB
  33. 3. Information Gathering/7. Active Reconnaissance - Part 3.mp4 76MB
  34. 8. Security Controls Evasion/3. #1 Bypass Antivirus - Making the Base Payload.mp4 65MB
  35. 4. Vulnerability Analysis/4. Automated Vulnerability Assessment - Nmap & VEGA.mp4 60MB
  36. 6. Web Penetration Test/11. Part 3 Web Server Hacking SSH Brute Forcing w Hydra.mp4 58MB
  37. 7. Network PenTesting/10. Privilege Escalation Techniques - Part 3.mp4 55MB
  38. 1. Opening Lectures/1. Introduction to the Course - Do Not Skip.mp4 44MB
  39. 1. Opening Lectures/4. What can you do to get the most out of this course.mp4 36MB
  40. 1. Opening Lectures/5. How to get answers to your questions and help with problems.mp4 36MB
  41. 10. Happy Ending Lectures/2. Unlock your certificate and upgrade your LinkedIn profile using this course!.mp4 16MB
  42. 10. Happy Ending Lectures/4. Thank you very much for completing this course!.mp4 5MB
  43. 9. Writing Great Reports/2.1 PenTest Report (OHU).docx 974KB
  44. 9. Writing Great Reports/2.2 PenTest Report (OHU).pdf 813KB
  45. 5. Exploitation/1. LAB 1 - Exploitation with Metasploit Framework.srt 42KB
  46. 5. Exploitation/2. LAB 2 - Exploitation using Manual Public Exploits.srt 39KB
  47. 2. Fundamentals/4. Theoretical Basics [EXTREMELY IMPORTANT].srt 37KB
  48. 6. Web Penetration Test/6. Important Specific Vulnerabilities such as SQL Injection in-depth.srt 35KB
  49. 6. Web Penetration Test/3. CMS Hacking - General Brute Forcing & Exploitation.srt 34KB
  50. 4. Vulnerability Analysis/2. Manually Identify, Analyze and Rank Vulnerabilities.srt 34KB
  51. 9. Writing Great Reports/1. Clean Documentation in a Professional Test.srt 33KB
  52. 4. Vulnerability Analysis/3. Automated Vulnerability Assessment using Nessus.srt 29KB
  53. 8. Security Controls Evasion/4. #2 Bypass Antivirus - The Actual Evasion Technique!.srt 28KB
  54. 6. Web Penetration Test/4. Do you know the Power of Version Numbers - Part 1.srt 25KB
  55. 7. Network PenTesting/3. The Core of Network Testing - Part 2.srt 23KB
  56. 7. Network PenTesting/8. Privilege Escalation Techniques - Part 1.srt 23KB
  57. 7. Network PenTesting/9. Privilege Escalation Techniques - Part 2.srt 22KB
  58. 6. Web Penetration Test/7. Important Specific Vulnerabilities such as XSS in-depth.srt 22KB
  59. 7. Network PenTesting/2. The Core of Network Testing - Part 1.srt 22KB
  60. 7. Network PenTesting/11. Privilege Escalation Techniques - Part 4.srt 20KB
  61. 6. Web Penetration Test/1. CMS Hacking - Initial Information Gathering.srt 19KB
  62. 6. Web Penetration Test/5. Do you know the Power of Version Numbers - Part 2.srt 19KB
  63. 6. Web Penetration Test/8. Important Specific Vulnerabilities such as File Upload & Command Injection.srt 19KB
  64. 6. Web Penetration Test/10. Part 2 Web Server Hacking Risky PUT & DELETE Methods.srt 18KB
  65. 6. Web Penetration Test/2. CMS Hacking - Directory Busting and CMS Scanning.srt 18KB
  66. 2. Fundamentals/1. Lab Setup using the VMware Player.srt 18KB
  67. 7. Network PenTesting/5. Post Exploitation using Metasploit - Part 1.srt 18KB
  68. 3. Information Gathering/6. Active Reconnaissance - Part 2.srt 17KB
  69. 6. Web Penetration Test/9. Part 1 Web Server Hacking Intro & Enumeration Ideas.srt 16KB
  70. 3. Information Gathering/2. Passive Reconnaissance - Part 2.srt 16KB
  71. 7. Network PenTesting/6. Post Exploitation using Metasploit - Part 2.srt 15KB
  72. 3. Information Gathering/1. Passive Reconnaissance - Part 1.srt 15KB
  73. 3. Information Gathering/3. Passive Reconnaissance - Part 3.srt 15KB
  74. 8. Security Controls Evasion/3. #1 Bypass Antivirus - Making the Base Payload.srt 14KB
  75. 7. Network PenTesting/4. The Core of Network Testing - Part 3.srt 14KB
  76. 7. Network PenTesting/7. Post Exploitation using Metasploit - Part 3.srt 14KB
  77. 3. Information Gathering/7. Active Reconnaissance - Part 3.srt 14KB
  78. 3. Information Gathering/5. Active Reconnaissance - Part 1.srt 13KB
  79. 4. Vulnerability Analysis/4. Automated Vulnerability Assessment - Nmap & VEGA.srt 13KB
  80. 6. Web Penetration Test/11. Part 3 Web Server Hacking SSH Brute Forcing w Hydra.srt 11KB
  81. 3. Information Gathering/8.1 Target DB.xlsx 10KB
  82. 7. Network PenTesting/10. Privilege Escalation Techniques - Part 3.srt 10KB
  83. 1. Opening Lectures/1. Introduction to the Course - Do Not Skip.srt 10KB
  84. 1. Opening Lectures/5. How to get answers to your questions and help with problems.srt 7KB
  85. 1. Opening Lectures/4. What can you do to get the most out of this course.srt 7KB
  86. 2. Fundamentals/2. Terminal - Few Survival Commands to know (Optional).html 6KB
  87. 3. Information Gathering/4. Store Passive Data in the Right Way.html 4KB
  88. 8. Security Controls Evasion/2. Introduction to Virus and Antivirus Software.html 3KB
  89. 10. Happy Ending Lectures/4. Thank you very much for completing this course!.srt 3KB
  90. 10. Happy Ending Lectures/1. How to go more advanced with this course.html 3KB
  91. 10. Happy Ending Lectures/2. Unlock your certificate and upgrade your LinkedIn profile using this course!.srt 3KB
  92. 1. Opening Lectures/3. Thankyou for taking this course. What should you expect.html 2KB
  93. 7. Network PenTesting/13. Spawning Stable Shells.html 2KB
  94. 11. BONUS Section/1. Bonus Lecture.html 2KB
  95. 2. Fundamentals/3. Terminal - Tips and Tricks you should apply now (Optional).html 2KB
  96. 1. Opening Lectures/2. Disclaimer.html 2KB
  97. 7. Network PenTesting/1. Upcoming Lectures with their Exact Release Date!.html 2KB
  98. 10. Happy Ending Lectures/3. What's your next step after doing this course.html 1KB
  99. 5. Exploitation/3. Essential Things You Should Know.html 1KB
  100. 8. Security Controls Evasion/1. Upcoming Lectures with their Exact Release Date!.html 1KB
  101. 4. Vulnerability Analysis/1. What is a Vulnerability Assessment.html 995B
  102. 9. Writing Great Reports/2. Report Writing with Perfect Examples.html 990B
  103. 3. Information Gathering/8. Store Active Data in the Right Way.html 662B
  104. 2. Fundamentals/1.2 Kali Linux Virtual Machine File - OHU.html 133B
  105. 0. Websites you may like/[CourseClub.Me].url 122B
  106. 1. Opening Lectures/[CourseClub.Me].url 122B
  107. 11. BONUS Section/[CourseClub.Me].url 122B
  108. 7. Network PenTesting/[CourseClub.Me].url 122B
  109. [CourseClub.Me].url 122B
  110. 2. Fundamentals/1.1 First Target Machine Basic PenTesting 1.html 114B
  111. 0. Websites you may like/[GigaCourse.Com].url 49B
  112. 1. Opening Lectures/[GigaCourse.Com].url 49B
  113. 11. BONUS Section/[GigaCourse.Com].url 49B
  114. 7. Network PenTesting/[GigaCourse.Com].url 49B
  115. [GigaCourse.Com].url 49B