589689.xyz

LinuxAcademy - Kali Linux Deep Dive

  • 收录时间:2021-07-16 05:43:08
  • 文件大小:10GB
  • 下载次数:1
  • 最近下载:2021-07-16 05:43:08
  • 磁力链接:

文件列表

  1. 22. Don't Be an Easy Target!.mp4 207MB
  2. 44. ARP Spoofing.mp4 197MB
  3. 76. Reverse Engineering Function Logic with a Decompiler — Part 1.mp4 181MB
  4. 70. Detecting Process Abnormalities in the Task Manager.mp4 180MB
  5. 21. What Is Social Engineering.mp4 178MB
  6. 61. Using Hashcat and Password Masks.mp4 174MB
  7. 71. Analyzing Processes with Cheat Engine.mp4 172MB
  8. 36. Tor Browser.mp4 168MB
  9. 55. Vulnerability Scans.mp4 165MB
  10. 51. Open Port Discovery.mp4 164MB
  11. 31. Setting Up a VPN Server Side — Part 2.mp4 162MB
  12. 74. Analyzing an Executable with a Decompiler .mp4 159MB
  13. 79. Finding Salts in Decompiled Code.mp4 156MB
  14. 96. Debugging an NSE Script — Part 1.mp4 153MB
  15. 33. Setting Up a VPN Client Side.mp4 151MB
  16. 78. Reverse Engineering Function Logic with a Decompiler — Part 3.mp4 150MB
  17. 72. Determining What an Unknown Program Is Doing — Part 1.mp4 150MB
  18. 16. Building a Custom Kali Linux Image.mp4 148MB
  19. 37. The Tor Service.mp4 147MB
  20. 58. Scanning Networks, Capturing a Handshake, and Deauthenticating Clients.mp4 144MB
  21. 28. Common Pitfalls.mp4 143MB
  22. 75. Decompiling Function Parameters and Variables.mp4 141MB
  23. 30. Setting Up a VPN Server Side — Part 1.mp4 140MB
  24. 26. Physical Access to Devices.mp4 139MB
  25. 60. Setting Up the Environment and Installing GPU Drivers.mp4 139MB
  26. 81. Writing a Decryption Program from Pseudocode — Part 2.mp4 136MB
  27. 7. What Is What.mp4 136MB
  28. 27. Real Anonymity vs. Perceived Anonymity.mp4 134MB
  29. 99. Module Script Outline.mp4 133MB
  30. 101. Deploying and Testing a Script.mp4 129MB
  31. 43. Let's Go Phishing!.mp4 126MB
  32. 20. Finalizing and Testing the Live USB.mp4 125MB
  33. 94. Writing an NSE Script Rules.mp4 124MB
  34. 35. What Is Tor.mp4 123MB
  35. 77. Reverse Engineering Function Logic with a Decompiler — Part 2.mp4 123MB
  36. 95. Writing an NSE Script Actions.mp4 123MB
  37. 32. Setting Up a VPN Server Side — Part 3.mp4 122MB
  38. 80. Writing a Decryption Program from Pseudocode — Part 1.mp4 119MB
  39. 63. What Is Buffer Overflow.mp4 119MB
  40. 87. Database Setup and ExploitDB.mp4 114MB
  41. 9. Linux Command Line Review.mp4 114MB
  42. 86. Other Useful Metasploit Commands.mp4 114MB
  43. 39. Setting Up a SOCKS5 Proxy.mp4 113MB
  44. 46. DHCP Starvation.mp4 110MB
  45. 56. What Are DoS and DDoS Attacks.mp4 110MB
  46. 65. What Is Reverse Engineering.mp4 110MB
  47. 48. WHOIS and GeoIP Lookup.mp4 106MB
  48. 8. Where Is What.mp4 106MB
  49. 42. Setting Up Email Tracking.mp4 106MB
  50. 85. Basic Commands.mp4 106MB
  51. 68. Compiling and Customizing the Source Code.mp4 106MB
  52. 92. Executing Code Remotely with Shellshock.mp4 104MB
  53. 84. What Is Metasploit.mp4 104MB
  54. 50. Host Discovery.mp4 103MB
  55. 49. Nmap.mp4 103MB
  56. 10. Services.mp4 100MB
  57. 98. Examining a Metasploit Module .mp4 98MB
  58. 24. Keyloggers.mp4 97MB
  59. 29. What Is a VPN.mp4 95MB
  60. 23. Circles of Trust.mp4 94MB
  61. 47. Google Dorks.mp4 91MB
  62. 89. The Post-Exploitation Phase.mp4 88MB
  63. 100. Loading a Module into Metasploit and Performing a Syntax Check.mp4 87MB
  64. 40. Connecting to a Proxy.mp4 86MB
  65. 64. Using Buffer Overflow to Bypass Authentication.mp4 85MB
  66. 59. Password Cracking Math, Common Sense, and Limits.mp4 85MB
  67. 19. Adding Encrypted Persistent Storage .mp4 85MB
  68. 14. Installing Kali Linux — Part 1.mp4 83MB
  69. 11. Firewalls.mp4 83MB
  70. 45. MAC Address Spoofing.mp4 83MB
  71. 57. Famous DDoS Attacks.mp4 83MB
  72. 91. Shellshock.mp4 81MB
  73. 90. Armitage.mp4 81MB
  74. 73. Determining What an Unknown Program Is Doing — Part 2.mp4 80MB
  75. 52. Network Mapping.mp4 75MB
  76. 66. Setting Up an IDE to Compile a Keylogger.mp4 69MB
  77. 41. Introduction to Phishing and Tracking.mp4 65MB
  78. 93. Writing an NSE Script Headers.mp4 65MB
  79. 67. Getting, Importing, and Compiling the Source Code.mp4 65MB
  80. 4. Course Prerequisites.mp4 63MB
  81. 83. Reverse Engineering Wrap-Up.mp4 62MB
  82. 25. ATMs and Banks.mp4 61MB
  83. 34. Connecting to a VPN.mp4 60MB
  84. 12. Users.mp4 59MB
  85. 38. What Is a Proxy.mp4 56MB
  86. 102. What's Next .mp4 55MB
  87. 53. Service and Service Version Detection.mp4 54MB
  88. 88. Exploit Usage.mp4 54MB
  89. 6. Disclaimer It Is Not Like in the Movies! (1).mp4 54MB
  90. 6. Disclaimer It Is Not Like in the Movies!.mp4 54MB
  91. 97. Debugging an NSE Script — Part 2.mp4 53MB
  92. 1. An Important Note About A Cloud Guru and Linux Academy Courses.mp4 52MB
  93. 54. Identifying the Operating System.mp4 48MB
  94. 5. Community and Support.mp4 47MB
  95. 62. Hashcat Wrap-Up.mp4 45MB
  96. 17. Creating a Live USB.mp4 44MB
  97. 82. Writing a Decryption Program from Pseudocode — Part 3.mp4 43MB
  98. 3. About the Course.mp4 37MB
  99. 13. Introduction.mp4 37MB
  100. 69. Testing Out the Keylogger.mp4 36MB
  101. 18. Booting from a Live USB.mp4 34MB
  102. 2. About the Author.mp4 20MB
  103. 15. Installing Kali Linux — Part 2.mp4 16MB
  104. Resources/274_Kali-Linux_Deep-Dive_Study-Guide_1567788781.pdf 2MB
  105. Resources/274_Kali-Linux-Deep-Dive_Reverse-Engineering_1552067412.pdf 853KB
  106. Resources/linkstochartskali_1552431038 1019B