589689.xyz

Codename Samurai Skills Course

  • 收录时间:2018-03-11 23:30:51
  • 文件大小:3GB
  • 下载次数:25
  • 最近下载:2018-12-08 10:31:16
  • 磁力链接:

文件列表

  1. Module 7 - Web Exploitation Techniques/Module 7 - Web Exploitation Techniques.mp4 747MB
  2. Module 2 - Real World Information Intelligence Techniques/Module 2 - Real World Information Intelligence Techniques.mp4 386MB
  3. Module 8 - Windows exploit development/Module 8 - Windows exploit development.mp4 367MB
  4. Module 5 - Windows and Unix Attacking Techniques/Module 5 - Windows and Unix Attacking Techniques.mp4 328MB
  5. Module 3 - Scanning and vulnerability Assessment/Module 3 - Scanning and vulnerability Assessment.mp4 307MB
  6. Module 6 - Windows and Unix Post Exploitation Techniques/Module 6 - Windows and Unix Post Exploitation Techniques.mp4 286MB
  7. Module 4 - Network Attacking Techniques/Module 4 - Network Attacking Techniques.mp4 119MB
  8. Module 1 - Solid Introduction to penetration testing/Module 1 - Solid Introduction to penetration testing.mp4 83MB
  9. books/Module 5- Windows & Unix Attacking Techniques.pdf 2MB
  10. books/Module 2- Real World Information Intelligence Techniques .pdf 2MB
  11. books/Module 3- Scanning and Assessment.pdf 2MB
  12. books/Module 6- Windows &Unix Post-Exploitation Techniques.pdf 1MB
  13. books/Module 7- Web Exploitation Techniques .pdf 641KB
  14. books/Module 4- Network Attacking Techniques.pdf 570KB
  15. Module 1 - Solid Introduction to penetration testing/Module 1 - Solid Introduction to penetration testing_controller.swf 440KB
  16. Module 2 - Real World Information Intelligence Techniques/Module 2 - Real World Information Intelligence Techniques_controller.swf 440KB
  17. Module 3 - Scanning and vulnerability Assessment/Module 3 - Scanning and vulnerability Assessment_controller.swf 440KB
  18. Module 4 - Network Attacking Techniques/Module 4 - Network Attacking Techniques_controller.swf 440KB
  19. Module 5 - Windows and Unix Attacking Techniques/Module 5 - Windows and Unix Attacking Techniques_controller.swf 440KB
  20. Module 6 - Windows and Unix Post Exploitation Techniques/Module 6 - Windows and Unix Post Exploitation Techniques_controller.swf 440KB
  21. Module 7 - Web Exploitation Techniques/Module 7 - Web Exploitation Techniques_controller.swf 440KB
  22. Module 8 - Windows exploit development/Module 8 - Windows exploit development_controller.swf 440KB
  23. books/Module 1- Solid Introduction to Penetration Testing .pdf 425KB
  24. books/Module 8- Windows_exploit_development.pdf 337KB
  25. books/Thumbs.db 34KB
  26. Module 1 - Solid Introduction to penetration testing/Thumbs.db 12KB
  27. Module 4 - Network Attacking Techniques/Thumbs.db 12KB
  28. Module 5 - Windows and Unix Attacking Techniques/Module 5 - Windows and Unix Attacking Techniques_config.xml 11KB
  29. Module 1 - Solid Introduction to penetration testing/swfobject.js 10KB
  30. Module 2 - Real World Information Intelligence Techniques/swfobject.js 10KB
  31. Module 3 - Scanning and vulnerability Assessment/swfobject.js 10KB
  32. Module 4 - Network Attacking Techniques/swfobject.js 10KB
  33. Module 5 - Windows and Unix Attacking Techniques/swfobject.js 10KB
  34. Module 6 - Windows and Unix Post Exploitation Techniques/swfobject.js 10KB
  35. Module 7 - Web Exploitation Techniques/swfobject.js 10KB
  36. Module 8 - Windows exploit development/swfobject.js 10KB
  37. Module 6 - Windows and Unix Post Exploitation Techniques/Module 6 - Windows and Unix Post Exploitation Techniques_config.xml 8KB
  38. Module 3 - Scanning and vulnerability Assessment/Module 3 - Scanning and vulnerability Assessment_config.xml 7KB
  39. Module 2 - Real World Information Intelligence Techniques/Module 2 - Real World Information Intelligence Techniques_config.xml 7KB
  40. Module 1 - Solid Introduction to penetration testing/Module 1 - Solid Introduction to penetration testing_config.xml 5KB
  41. Module 4 - Network Attacking Techniques/Module 4 - Network Attacking Techniques_config.xml 5KB
  42. Module 7 - Web Exploitation Techniques/Module 7 - Web Exploitation Techniques_config.xml 5KB
  43. Module 8 - Windows exploit development/Module 8 - Windows exploit development_config.xml 5KB
  44. Module 2 - Real World Information Intelligence Techniques/Module 2 - Real World Information Intelligence Techniques.html 3KB
  45. Module 6 - Windows and Unix Post Exploitation Techniques/Module 6 - Windows and Unix Post Exploitation Techniques.html 3KB
  46. Module 1 - Solid Introduction to penetration testing/Module 1 - Solid Introduction to penetration testing.html 3KB
  47. Module 5 - Windows and Unix Attacking Techniques/Module 5 - Windows and Unix Attacking Techniques.html 3KB
  48. Module 3 - Scanning and vulnerability Assessment/Module 3 - Scanning and vulnerability Assessment.html 3KB
  49. Module 8 - Windows exploit development/Module 8 - Windows exploit development.html 3KB
  50. Module 4 - Network Attacking Techniques/Module 4 - Network Attacking Techniques.html 3KB
  51. Module 7 - Web Exploitation Techniques/Module 7 - Web Exploitation Techniques.html 3KB
  52. Module 1 - Solid Introduction to penetration testing/expressInstall.swf 773B
  53. Module 2 - Real World Information Intelligence Techniques/expressInstall.swf 773B
  54. Module 3 - Scanning and vulnerability Assessment/expressInstall.swf 773B
  55. Module 4 - Network Attacking Techniques/expressInstall.swf 773B
  56. Module 5 - Windows and Unix Attacking Techniques/expressInstall.swf 773B
  57. Module 6 - Windows and Unix Post Exploitation Techniques/expressInstall.swf 773B
  58. Module 7 - Web Exploitation Techniques/expressInstall.swf 773B
  59. Module 8 - Windows exploit development/expressInstall.swf 773B