09 Windows Evil Files - Enhancing Evil Files/039 Bypassing All Anti-Virus Programs By Modifying Hex Vales.mp4 37MB
10 Windows Evil Files - Converting Evil File To A Trojan/041 Embedding Evil Files With Any File Type Like An Image Or PDF.mp4 37MB
07 Windows Evil Files - Generating Undetectable Backdoors/028 Generating An Undetectable Backdoor Using TheFatRat.mp4 37MB
11 Mac OS X Evil Files/057 Configuring The Trojan To Run Silently.mp4 35MB
10 Windows Evil Files - Converting Evil File To A Trojan/049 Embedding Any Evil File In A Legitimate Microsoft Office Document.mp4 35MB
11 Mac OS X Evil Files/051 Hacking Mac OS X Using A Meterpreter Backdoor.mp4 35MB
05 Information Gathering - Gathering Info About A Person/020 Analysing The Gathered Info Building An Attack Strategy.mp4 33MB
05 Information Gathering - Gathering Info About A Person/017 Discovering Websites Links Social Networking Accounts.mp4 33MB
10 Windows Evil Files - Converting Evil File To A Trojan/042 Download Execute Payload.mp4 31MB
13 Delivery Methods/071 Hacking OS X Linux Using Pure Social Engineering Without Sending Any Files.mp4 29MB
10 Windows Evil Files - Converting Evil File To A Trojan/048 Embedding backdoor In A Legitimate Microsoft Office Document.mp4 29MB
13 Delivery Methods/076 Luring Target Into Accessing Evil URL Without Direct Interaction.mp4 29MB
12 Linux Evil Files/059 Hacking Into Linux-Like Systems Using One Command.mp4 27MB
09 Windows Evil Files - Enhancing Evil Files/040 Creating The Perfect Spying Tool.mp4 27MB
04 Information Gathering - Gathering Info About A CompanyWebsite/014 Discovering Information About Hosting Company Support Team Emails Admin Email.mp4 27MB
02 Preparation - Linux Basics/010 Creating Using Snapshots.mp4 27MB
11 Mac OS X Evil Files/054 Embedding A Normal File With Backdoor.mp4 27MB
13 Delivery Methods/073 Stealing Login Info Using Fake A Login Page.mp4 26MB
16 Post Exploitation - Meterpreter/093 Pivoting - Theory (What is Pivoting).mp4 26MB
12 Linux Evil Files/065 Embedding Evil Code In A Legitimate Linux Package - Part 1.mp4 25MB
04 Information Gathering - Gathering Info About A CompanyWebsite/013 Discovering Domain Info Emails Associated With Target.mp4 25MB
17 Post Exploitation - Empire/100 Injecting Backdoor Process In System Processes.mp4 25MB
12 Linux Evil Files/062 Recovering Saved Passwords From A Local Machine.mp4 24MB
07 Windows Evil Files - Generating Undetectable Backdoors/026 Hacking A Windows 10 Machine Using The Generated Backdoor.mp4 24MB
17 Post Exploitation - Empire/101 Stealing root Password Escalating Privileges On OS X-en.srt 9KB
07 Windows Evil Files - Generating Undetectable Backdoors/026 Hacking A Windows 10 Machine Using The Generated Backdoor-pt.srt 9KB
12 Linux Evil Files/062 Recovering Saved Passwords From A Local Machine-pt.srt 9KB
12 Linux Evil Files/063 Execute Report Payload-en.srt 9KB
11 Mac OS X Evil Files/055 Download Execute Payload-pt.srt 9KB
02 Preparation - Linux Basics/010 Creating Using Snapshots-es.srt 9KB
07 Windows Evil Files - Generating Undetectable Backdoors/025 Listening For Incoming Connections-en.srt 9KB
14 Using The Above Attacks Outside The Local Network/084 Configuring The Router To Forward Connections To Kali-en.srt 9KB
04 Information Gathering - Gathering Info About A CompanyWebsite/014 Discovering Information About Hosting Company Support Team Emails Admin Email-es.srt 9KB
12 Linux Evil Files/062 Recovering Saved Passwords From A Local Machine-en.srt 9KB
11 Mac OS X Evil Files/055 Download Execute Payload-en.srt 9KB
08 Windows Evil Files - Spying/035 Using A Remote Keylogger To Capture Key Strikes Including Passwords-en.srt 9KB
10 Windows Evil Files - Converting Evil File To A Trojan/047 Embedding Evil Files With Any File Type Like An Image Or PDF (Method 2)-es.srt 9KB
10 Windows Evil Files - Converting Evil File To A Trojan/042 Download Execute Payload-pt.srt 9KB
10 Windows Evil Files - Converting Evil File To A Trojan/042 Download Execute Payload-en.srt 9KB
08 Windows Evil Files - Spying/033 What Is A Keylogger-es.srt 9KB
07 Windows Evil Files - Generating Undetectable Backdoors/030 Creating An Empire Listener-es.srt 9KB
10 Windows Evil Files - Converting Evil File To A Trojan/047 Embedding Evil Files With Any File Type Like An Image Or PDF (Method 2)-pt.srt 9KB
17 Post Exploitation - Empire/098 File System Commands-es.srt 9KB
17 Post Exploitation - Empire/097 Basics Of Empire Agents-es.srt 9KB
11 Mac OS X Evil Files/052 Hacking Mac OS X Using An Empire Stager-es.srt 9KB
12 Linux Evil Files/064 Recovering Saved Passwords From A Remote Machine-es.srt 9KB
09 Windows Evil Files - Enhancing Evil Files/040 Creating The Perfect Spying Tool-pt.srt 9KB
07 Windows Evil Files - Generating Undetectable Backdoors/030 Creating An Empire Listener-pt.srt 9KB
11 Mac OS X Evil Files/052 Hacking Mac OS X Using An Empire Stager-pt.srt 9KB
04 Information Gathering - Gathering Info About A CompanyWebsite/014 Discovering Information About Hosting Company Support Team Emails Admin Email-pt.srt 9KB
12 Linux Evil Files/064 Recovering Saved Passwords From A Remote Machine-pt.srt 9KB
09 Windows Evil Files - Enhancing Evil Files/040 Creating The Perfect Spying Tool-en.srt 9KB
17 Post Exploitation - Empire/097 Basics Of Empire Agents-pt.srt 9KB
17 Post Exploitation - Empire/098 File System Commands-pt.srt 9KB
10 Windows Evil Files - Converting Evil File To A Trojan/047 Embedding Evil Files With Any File Type Like An Image Or PDF (Method 2)-en.srt 9KB
14 Using The Above Attacks Outside The Local Network/082 Overview of the Setup-es.srt 9KB
07 Windows Evil Files - Generating Undetectable Backdoors/027 Installing The Fat Rat-es.srt 9KB
11 Mac OS X Evil Files/052 Hacking Mac OS X Using An Empire Stager-en.srt 9KB
07 Windows Evil Files - Generating Undetectable Backdoors/027 Installing The Fat Rat-pt.srt 9KB
08 Windows Evil Files - Spying/033 What Is A Keylogger-pt.srt 9KB
14 Using The Above Attacks Outside The Local Network/082 Overview of the Setup-pt.srt 9KB
07 Windows Evil Files - Generating Undetectable Backdoors/030 Creating An Empire Listener-en.srt 9KB
10 Windows Evil Files - Converting Evil File To A Trojan/046 Download Execute Payload (Method 2)-pt.srt 9KB
10 Windows Evil Files - Converting Evil File To A Trojan/046 Download Execute Payload (Method 2)-es.srt 8KB
07 Windows Evil Files - Generating Undetectable Backdoors/031 Creating a Windows Powershell Stager Hacking Windows 10-es.srt 8KB
12 Linux Evil Files/060 More Advanced Linux Backdoor-es.srt 8KB
04 Information Gathering - Gathering Info About A CompanyWebsite/014 Discovering Information About Hosting Company Support Team Emails Admin Email-en.srt 8KB
17 Post Exploitation - Empire/098 File System Commands-en.srt 8KB
07 Windows Evil Files - Generating Undetectable Backdoors/027 Installing The Fat Rat-en.srt 8KB
17 Post Exploitation - Empire/097 Basics Of Empire Agents-en.srt 8KB
08 Windows Evil Files - Spying/033 What Is A Keylogger-en.srt 8KB
07 Windows Evil Files - Generating Undetectable Backdoors/031 Creating a Windows Powershell Stager Hacking Windows 10-pt.srt 8KB
14 Using The Above Attacks Outside The Local Network/082 Overview of the Setup-en.srt 8KB
12 Linux Evil Files/060 More Advanced Linux Backdoor-pt.srt 8KB
04 Information Gathering - Gathering Info About A CompanyWebsite/012 Maltego Overview-es.srt 8KB
12 Linux Evil Files/064 Recovering Saved Passwords From A Remote Machine-en.srt 8KB
16 Post Exploitation - Meterpreter/091 Maintaining Access - Using a Reliable undetectable Method-es.srt 8KB
16 Post Exploitation - Meterpreter/091 Maintaining Access - Using a Reliable undetectable Method-pt.srt 8KB