589689.xyz

[ ] Linkedin - A Complete Guide to Kali Purple

  • 收录时间:2024-01-12 08:03:18
  • 文件大小:765MB
  • 下载次数:1
  • 最近下载:2024-01-12 08:03:18
  • 磁力链接:

文件列表

  1. ~Get Your Files Here !/Ex_Files_Complete_Guide_Kali_Purple/Exercise Files/CH06/06_03/Cyberville.pcap 169MB
  2. ~Get Your Files Here !/08 - 7. Threat Intelligence/05 - Working with the OpenCTI threat intelligence system.mp4 26MB
  3. ~Get Your Files Here !/07 - 6. Threat Hunting/04 - Threat hunting with Malcolm.mp4 21MB
  4. ~Get Your Files Here !/05 - 4. Security Monitoring with ELK/01 - Installing the ELKStack SIEM.mp4 20MB
  5. ~Get Your Files Here !/05 - 4. Security Monitoring with ELK/07 - Detecting reconnaissance with ELKStack.mp4 18MB
  6. ~Get Your Files Here !/05 - 4. Security Monitoring with ELK/06 - Enhancing our logs.mp4 18MB
  7. ~Get Your Files Here !/08 - 7. Threat Intelligence/02 - Installing OpenTaxii.mp4 17MB
  8. ~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/06 - Detecting webshells with Wazuh.mp4 17MB
  9. ~Get Your Files Here !/03 - 2. ProxyIDS/08 - Using kali-autopilot to generate attack scripts.mp4 16MB
  10. ~Get Your Files Here !/08 - 7. Threat Intelligence/03 - Working with the cabby client library.mp4 16MB
  11. ~Get Your Files Here !/07 - 6. Threat Hunting/05 - Deep diving with Malcolm's Arkime.mp4 16MB
  12. ~Get Your Files Here !/02 - 1. Building a Cyber Range/06 - A quick tour of Kali Linux.mp4 16MB
  13. ~Get Your Files Here !/09 - 8. Incident Response/01 - Installing Velociraptor.mp4 15MB
  14. ~Get Your Files Here !/02 - 1. Building a Cyber Range/05 - Installing Kali Linux.mp4 15MB
  15. ~Get Your Files Here !/07 - 6. Threat Hunting/03 - A tour of Cyberville with Malcolm.mp4 14MB
  16. ~Get Your Files Here !/03 - 2. ProxyIDS/01 - Setting up NGINX as a proxy server.mp4 14MB
  17. ~Get Your Files Here !/08 - 7. Threat Intelligence/04 - Installing the OpenCTI threat intelligence system.mp4 14MB
  18. ~Get Your Files Here !/05 - 4. Security Monitoring with ELK/05 - Enrolling hosts into the Fleet server.mp4 14MB
  19. ~Get Your Files Here !/05 - 4. Security Monitoring with ELK/02 - Upgrading Kibana to HTTPS.mp4 13MB
  20. ~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/01 - Installing the Wazuh SIEM.mp4 12MB
  21. ~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/04 - Collecting NGINX logs in Wazuh.mp4 12MB
  22. ~Get Your Files Here !/02 - 1. Building a Cyber Range/10 - Creating a Kali Purple server template.mp4 12MB
  23. ~Get Your Files Here !/02 - 1. Building a Cyber Range/04 - A first look at Proxmox.mp4 12MB
  24. ~Get Your Files Here !/03 - 2. ProxyIDS/07 - Installing virtual machines in the lab.mp4 11MB
  25. ~Get Your Files Here !/05 - 4. Security Monitoring with ELK/08 - Detecting exploitation with ELKStack.mp4 11MB
  26. ~Get Your Files Here !/09 - 8. Incident Response/06 - Hunting with Velociraptor.mp4 11MB
  27. ~Get Your Files Here !/03 - 2. ProxyIDS/04 - Creating a Linux application server.mp4 11MB
  28. ~Get Your Files Here !/02 - 1. Building a Cyber Range/07 - Installing the Kali Purple workstation.mp4 11MB
  29. ~Get Your Files Here !/03 - 2. ProxyIDS/05 - Creating a Windows application server.mp4 10MB
  30. ~Get Your Files Here !/05 - 4. Security Monitoring with ELK/09 - Monitoring alerts with ELKStack.mp4 10MB
  31. ~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/07 - Activating vulnerability scanning.mp4 10MB
  32. ~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/05 - Monitoring an attack with Wazuh.mp4 10MB
  33. ~Get Your Files Here !/03 - 2. ProxyIDS/03 - Setting up a public web server.mp4 9MB
  34. ~Get Your Files Here !/05 - 4. Security Monitoring with ELK/03 - Configuring log integrations.mp4 9MB
  35. ~Get Your Files Here !/04 - 3. Vulnerabilty Scanning/03 - Running a vulnerabilitty scan with GVM.mp4 9MB
  36. ~Get Your Files Here !/04 - 3. Vulnerabilty Scanning/02 - Installing GVM.mp4 9MB
  37. ~Get Your Files Here !/09 - 8. Incident Response/02 - Connecting Linux hosts to Velociraptor.mp4 8MB
  38. ~Get Your Files Here !/03 - 2. ProxyIDS/06 - Installing the juice shop.mp4 8MB
  39. ~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/02 - Installing a Wazuh Linux agent.mp4 8MB
  40. ~Get Your Files Here !/02 - 1. Building a Cyber Range/01 - Introduction to Kali Purple.mp4 8MB
  41. ~Get Your Files Here !/03 - 2. ProxyIDS/09 - Running an attack on autopilot.mp4 8MB
  42. ~Get Your Files Here !/03 - 2. ProxyIDS/02 - Adding Suricata IDS to the proxy.mp4 7MB
  43. ~Get Your Files Here !/02 - 1. Building a Cyber Range/08 - A quick tour of Kali Purple.mp4 7MB
  44. ~Get Your Files Here !/05 - 4. Security Monitoring with ELK/04 - Installing the Fleet server.mp4 6MB
  45. ~Get Your Files Here !/02 - 1. Building a Cyber Range/03 - Virtualization using Proxmox.mp4 6MB
  46. ~Get Your Files Here !/04 - 3. Vulnerabilty Scanning/01 - Web scanning with ZAP.mp4 6MB
  47. ~Get Your Files Here !/09 - 8. Incident Response/05 - Accessing client files with VFS.mp4 5MB
  48. ~Get Your Files Here !/02 - 1. Building a Cyber Range/02 - Introduction to virtualization.mp4 5MB
  49. ~Get Your Files Here !/07 - 6. Threat Hunting/02 - Installing Malcolm.mp4 5MB
  50. ~Get Your Files Here !/02 - 1. Building a Cyber Range/09 - A first look at the Kali Purple servers.mp4 5MB
  51. ~Get Your Files Here !/08 - 7. Threat Intelligence/01 - Exchanging threat intelligence.mp4 4MB
  52. ~Get Your Files Here !/09 - 8. Incident Response/03 - Connecting Windows hosts to Velociraptor.mp4 4MB
  53. ~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/03 - Installing a Wazuh Windows agent.mp4 3MB
  54. ~Get Your Files Here !/07 - 6. Threat Hunting/01 - Understanding Malcolm for threat hunting.mp4 3MB
  55. ~Get Your Files Here !/10 - Conclusion/01 - Next steps.mp4 3MB
  56. ~Get Your Files Here !/09 - 8. Incident Response/04 - Running commands remotely from Velociraptor.mp4 2MB
  57. ~Get Your Files Here !/01 - Introduction/01 - Learning how to use Kali Purple.mp4 2MB
  58. ~Get Your Files Here !/01 - Introduction/03 - Disclaimer.mp4 2MB
  59. ~Get Your Files Here !/01 - Introduction/02 - What you should know.mp4 935KB
  60. ~Get Your Files Here !/03 - 2. ProxyIDS/08 - Using kali-autopilot to generate attack scripts.srt 13KB
  61. ~Get Your Files Here !/Ex_Files_Complete_Guide_Kali_Purple/Exercise Files/CH02/02_06/juice.json 12KB
  62. ~Get Your Files Here !/02 - 1. Building a Cyber Range/06 - A quick tour of Kali Linux.srt 11KB
  63. ~Get Your Files Here !/08 - 7. Threat Intelligence/05 - Working with the OpenCTI threat intelligence system.srt 11KB
  64. ~Get Your Files Here !/05 - 4. Security Monitoring with ELK/01 - Installing the ELKStack SIEM.srt 9KB
  65. ~Get Your Files Here !/05 - 4. Security Monitoring with ELK/06 - Enhancing our logs.srt 8KB
  66. ~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/06 - Detecting webshells with Wazuh.srt 8KB
  67. ~Get Your Files Here !/05 - 4. Security Monitoring with ELK/07 - Detecting reconnaissance with ELKStack.srt 8KB
  68. ~Get Your Files Here !/02 - 1. Building a Cyber Range/01 - Introduction to Kali Purple.srt 8KB
  69. ~Get Your Files Here !/07 - 6. Threat Hunting/04 - Threat hunting with Malcolm.srt 8KB
  70. ~Get Your Files Here !/02 - 1. Building a Cyber Range/05 - Installing Kali Linux.srt 8KB
  71. ~Get Your Files Here !/02 - 1. Building a Cyber Range/04 - A first look at Proxmox.srt 8KB
  72. ~Get Your Files Here !/07 - 6. Threat Hunting/03 - A tour of Cyberville with Malcolm.srt 8KB
  73. ~Get Your Files Here !/08 - 7. Threat Intelligence/02 - Installing OpenTaxii.srt 8KB
  74. ~Get Your Files Here !/09 - 8. Incident Response/06 - Hunting with Velociraptor.srt 7KB
  75. ~Get Your Files Here !/05 - 4. Security Monitoring with ELK/05 - Enrolling hosts into the Fleet server.srt 7KB
  76. ~Get Your Files Here !/08 - 7. Threat Intelligence/03 - Working with the cabby client library.srt 7KB
  77. ~Get Your Files Here !/02 - 1. Building a Cyber Range/07 - Installing the Kali Purple workstation.srt 7KB
  78. ~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/04 - Collecting NGINX logs in Wazuh.srt 6KB
  79. ~Get Your Files Here !/03 - 2. ProxyIDS/01 - Setting up NGINX as a proxy server.srt 6KB
  80. ~Get Your Files Here !/03 - 2. ProxyIDS/04 - Creating a Linux application server.srt 6KB
  81. ~Get Your Files Here !/09 - 8. Incident Response/01 - Installing Velociraptor.srt 6KB
  82. ~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/01 - Installing the Wazuh SIEM.srt 6KB
  83. ~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/05 - Monitoring an attack with Wazuh.srt 6KB
  84. ~Get Your Files Here !/03 - 2. ProxyIDS/07 - Installing virtual machines in the lab.srt 6KB
  85. ~Get Your Files Here !/02 - 1. Building a Cyber Range/10 - Creating a Kali Purple server template.srt 6KB
  86. ~Get Your Files Here !/07 - 6. Threat Hunting/05 - Deep diving with Malcolm's Arkime.srt 6KB
  87. ~Get Your Files Here !/02 - 1. Building a Cyber Range/02 - Introduction to virtualization.srt 5KB
  88. ~Get Your Files Here !/05 - 4. Security Monitoring with ELK/08 - Detecting exploitation with ELKStack.srt 5KB
  89. ~Get Your Files Here !/05 - 4. Security Monitoring with ELK/02 - Upgrading Kibana to HTTPS.srt 5KB
  90. ~Get Your Files Here !/08 - 7. Threat Intelligence/04 - Installing the OpenCTI threat intelligence system.srt 5KB
  91. ~Get Your Files Here !/04 - 3. Vulnerabilty Scanning/03 - Running a vulnerabilitty scan with GVM.srt 5KB
  92. ~Get Your Files Here !/02 - 1. Building a Cyber Range/03 - Virtualization using Proxmox.srt 5KB
  93. ~Get Your Files Here !/03 - 2. ProxyIDS/05 - Creating a Windows application server.srt 5KB
  94. ~Get Your Files Here !/05 - 4. Security Monitoring with ELK/09 - Monitoring alerts with ELKStack.srt 5KB
  95. ~Get Your Files Here !/09 - 8. Incident Response/02 - Connecting Linux hosts to Velociraptor.srt 5KB
  96. ~Get Your Files Here !/02 - 1. Building a Cyber Range/08 - A quick tour of Kali Purple.srt 5KB
  97. ~Get Your Files Here !/03 - 2. ProxyIDS/09 - Running an attack on autopilot.srt 5KB
  98. ~Get Your Files Here !/05 - 4. Security Monitoring with ELK/03 - Configuring log integrations.srt 5KB
  99. ~Get Your Files Here !/04 - 3. Vulnerabilty Scanning/02 - Installing GVM.srt 4KB
  100. ~Get Your Files Here !/02 - 1. Building a Cyber Range/09 - A first look at the Kali Purple servers.srt 4KB
  101. ~Get Your Files Here !/Ex_Files_Complete_Guide_Kali_Purple/Exercise Files/CH02/02_09/pass.txt 4KB
  102. ~Get Your Files Here !/07 - 6. Threat Hunting/02 - Installing Malcolm.srt 4KB
  103. ~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/07 - Activating vulnerability scanning.srt 4KB
  104. ~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/02 - Installing a Wazuh Linux agent.srt 4KB
  105. ~Get Your Files Here !/03 - 2. ProxyIDS/06 - Installing the juice shop.srt 3KB
  106. ~Get Your Files Here !/09 - 8. Incident Response/05 - Accessing client files with VFS.srt 3KB
  107. ~Get Your Files Here !/03 - 2. ProxyIDS/03 - Setting up a public web server.srt 3KB
  108. ~Get Your Files Here !/05 - 4. Security Monitoring with ELK/04 - Installing the Fleet server.srt 3KB
  109. ~Get Your Files Here !/Ex_Files_Complete_Guide_Kali_Purple/Exercise Files/CH07/07_02/threat.yml 3KB
  110. ~Get Your Files Here !/04 - 3. Vulnerabilty Scanning/01 - Web scanning with ZAP.srt 3KB
  111. ~Get Your Files Here !/08 - 7. Threat Intelligence/01 - Exchanging threat intelligence.srt 3KB
  112. ~Get Your Files Here !/03 - 2. ProxyIDS/02 - Adding Suricata IDS to the proxy.srt 3KB
  113. ~Get Your Files Here !/09 - 8. Incident Response/03 - Connecting Windows hosts to Velociraptor.srt 2KB
  114. ~Get Your Files Here !/Ex_Files_Complete_Guide_Kali_Purple/Exercise Files/CH02/02_09/exgym.py 2KB
  115. ~Get Your Files Here !/07 - 6. Threat Hunting/01 - Understanding Malcolm for threat hunting.srt 2KB
  116. ~Get Your Files Here !/10 - Conclusion/01 - Next steps.srt 2KB
  117. ~Get Your Files Here !/01 - Introduction/03 - Disclaimer.srt 2KB
  118. ~Get Your Files Here !/Ex_Files_Complete_Guide_Kali_Purple/Exercise Files/CH02/02_09/learning.json 2KB
  119. ~Get Your Files Here !/09 - 8. Incident Response/04 - Running commands remotely from Velociraptor.srt 1KB
  120. ~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/03 - Installing a Wazuh Windows agent.srt 1KB
  121. ~Get Your Files Here !/Ex_Files_Complete_Guide_Kali_Purple/Exercise Files/CH07/07_03/submit.py 1KB
  122. ~Get Your Files Here !/01 - Introduction/01 - Learning how to use Kali Purple.srt 1KB
  123. ~Get Your Files Here !/01 - Introduction/02 - What you should know.srt 993B
  124. ~Get Your Files Here !/Ex_Files_Complete_Guide_Kali_Purple/Exercise Files/CH07/07_04/vars.sh 948B
  125. ~Get Your Files Here !/Ex_Files_Complete_Guide_Kali_Purple/Exercise Files/CH07/07_02/taxii.yml 682B
  126. ~Get Your Files Here !/Bonus Resources.txt 386B
  127. ~Get Your Files Here !/Ex_Files_Complete_Guide_Kali_Purple/Exercise Files/CH05/05_02/wagent.sh.sh 341B
  128. Get Bonus Downloads Here.url 181B