[ ] Linkedin - A Complete Guide to Kali Purple 收录时间:2024-01-12 08:03:18 文件大小:765MB 下载次数:1 最近下载:2024-01-12 08:03:18 磁力链接: magnet:?xt=urn:btih:c5a8cf0a23e14c85f146b0273f4846ab208225bb 立即下载 复制链接 文件列表 ~Get Your Files Here !/Ex_Files_Complete_Guide_Kali_Purple/Exercise Files/CH06/06_03/Cyberville.pcap 169MB ~Get Your Files Here !/08 - 7. Threat Intelligence/05 - Working with the OpenCTI threat intelligence system.mp4 26MB ~Get Your Files Here !/07 - 6. Threat Hunting/04 - Threat hunting with Malcolm.mp4 21MB ~Get Your Files Here !/05 - 4. Security Monitoring with ELK/01 - Installing the ELKStack SIEM.mp4 20MB ~Get Your Files Here !/05 - 4. Security Monitoring with ELK/07 - Detecting reconnaissance with ELKStack.mp4 18MB ~Get Your Files Here !/05 - 4. Security Monitoring with ELK/06 - Enhancing our logs.mp4 18MB ~Get Your Files Here !/08 - 7. Threat Intelligence/02 - Installing OpenTaxii.mp4 17MB ~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/06 - Detecting webshells with Wazuh.mp4 17MB ~Get Your Files Here !/03 - 2. ProxyIDS/08 - Using kali-autopilot to generate attack scripts.mp4 16MB ~Get Your Files Here !/08 - 7. Threat Intelligence/03 - Working with the cabby client library.mp4 16MB ~Get Your Files Here !/07 - 6. Threat Hunting/05 - Deep diving with Malcolm's Arkime.mp4 16MB ~Get Your Files Here !/02 - 1. Building a Cyber Range/06 - A quick tour of Kali Linux.mp4 16MB ~Get Your Files Here !/09 - 8. Incident Response/01 - Installing Velociraptor.mp4 15MB ~Get Your Files Here !/02 - 1. Building a Cyber Range/05 - Installing Kali Linux.mp4 15MB ~Get Your Files Here !/07 - 6. Threat Hunting/03 - A tour of Cyberville with Malcolm.mp4 14MB ~Get Your Files Here !/03 - 2. ProxyIDS/01 - Setting up NGINX as a proxy server.mp4 14MB ~Get Your Files Here !/08 - 7. Threat Intelligence/04 - Installing the OpenCTI threat intelligence system.mp4 14MB ~Get Your Files Here !/05 - 4. Security Monitoring with ELK/05 - Enrolling hosts into the Fleet server.mp4 14MB ~Get Your Files Here !/05 - 4. Security Monitoring with ELK/02 - Upgrading Kibana to HTTPS.mp4 13MB ~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/01 - Installing the Wazuh SIEM.mp4 12MB ~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/04 - Collecting NGINX logs in Wazuh.mp4 12MB ~Get Your Files Here !/02 - 1. Building a Cyber Range/10 - Creating a Kali Purple server template.mp4 12MB ~Get Your Files Here !/02 - 1. Building a Cyber Range/04 - A first look at Proxmox.mp4 12MB ~Get Your Files Here !/03 - 2. ProxyIDS/07 - Installing virtual machines in the lab.mp4 11MB ~Get Your Files Here !/05 - 4. Security Monitoring with ELK/08 - Detecting exploitation with ELKStack.mp4 11MB ~Get Your Files Here !/09 - 8. Incident Response/06 - Hunting with Velociraptor.mp4 11MB ~Get Your Files Here !/03 - 2. ProxyIDS/04 - Creating a Linux application server.mp4 11MB ~Get Your Files Here !/02 - 1. Building a Cyber Range/07 - Installing the Kali Purple workstation.mp4 11MB ~Get Your Files Here !/03 - 2. ProxyIDS/05 - Creating a Windows application server.mp4 10MB ~Get Your Files Here !/05 - 4. Security Monitoring with ELK/09 - Monitoring alerts with ELKStack.mp4 10MB ~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/07 - Activating vulnerability scanning.mp4 10MB ~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/05 - Monitoring an attack with Wazuh.mp4 10MB ~Get Your Files Here !/03 - 2. ProxyIDS/03 - Setting up a public web server.mp4 9MB ~Get Your Files Here !/05 - 4. Security Monitoring with ELK/03 - Configuring log integrations.mp4 9MB ~Get Your Files Here !/04 - 3. Vulnerabilty Scanning/03 - Running a vulnerabilitty scan with GVM.mp4 9MB ~Get Your Files Here !/04 - 3. Vulnerabilty Scanning/02 - Installing GVM.mp4 9MB ~Get Your Files Here !/09 - 8. Incident Response/02 - Connecting Linux hosts to Velociraptor.mp4 8MB ~Get Your Files Here !/03 - 2. ProxyIDS/06 - Installing the juice shop.mp4 8MB ~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/02 - Installing a Wazuh Linux agent.mp4 8MB ~Get Your Files Here !/02 - 1. Building a Cyber Range/01 - Introduction to Kali Purple.mp4 8MB ~Get Your Files Here !/03 - 2. ProxyIDS/09 - Running an attack on autopilot.mp4 8MB ~Get Your Files Here !/03 - 2. ProxyIDS/02 - Adding Suricata IDS to the proxy.mp4 7MB ~Get Your Files Here !/02 - 1. Building a Cyber Range/08 - A quick tour of Kali Purple.mp4 7MB ~Get Your Files Here !/05 - 4. Security Monitoring with ELK/04 - Installing the Fleet server.mp4 6MB ~Get Your Files Here !/02 - 1. Building a Cyber Range/03 - Virtualization using Proxmox.mp4 6MB ~Get Your Files Here !/04 - 3. Vulnerabilty Scanning/01 - Web scanning with ZAP.mp4 6MB ~Get Your Files Here !/09 - 8. Incident Response/05 - Accessing client files with VFS.mp4 5MB ~Get Your Files Here !/02 - 1. Building a Cyber Range/02 - Introduction to virtualization.mp4 5MB ~Get Your Files Here !/07 - 6. Threat Hunting/02 - Installing Malcolm.mp4 5MB ~Get Your Files Here !/02 - 1. Building a Cyber Range/09 - A first look at the Kali Purple servers.mp4 5MB ~Get Your Files Here !/08 - 7. Threat Intelligence/01 - Exchanging threat intelligence.mp4 4MB ~Get Your Files Here !/09 - 8. Incident Response/03 - Connecting Windows hosts to Velociraptor.mp4 4MB ~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/03 - Installing a Wazuh Windows agent.mp4 3MB ~Get Your Files Here !/07 - 6. Threat Hunting/01 - Understanding Malcolm for threat hunting.mp4 3MB ~Get Your Files Here !/10 - Conclusion/01 - Next steps.mp4 3MB ~Get Your Files Here !/09 - 8. Incident Response/04 - Running commands remotely from Velociraptor.mp4 2MB ~Get Your Files Here !/01 - Introduction/01 - Learning how to use Kali Purple.mp4 2MB ~Get Your Files Here !/01 - Introduction/03 - Disclaimer.mp4 2MB ~Get Your Files Here !/01 - Introduction/02 - What you should know.mp4 935KB ~Get Your Files Here !/03 - 2. ProxyIDS/08 - Using kali-autopilot to generate attack scripts.srt 13KB ~Get Your Files Here !/Ex_Files_Complete_Guide_Kali_Purple/Exercise Files/CH02/02_06/juice.json 12KB ~Get Your Files Here !/02 - 1. Building a Cyber Range/06 - A quick tour of Kali Linux.srt 11KB ~Get Your Files Here !/08 - 7. Threat Intelligence/05 - Working with the OpenCTI threat intelligence system.srt 11KB ~Get Your Files Here !/05 - 4. Security Monitoring with ELK/01 - Installing the ELKStack SIEM.srt 9KB ~Get Your Files Here !/05 - 4. Security Monitoring with ELK/06 - Enhancing our logs.srt 8KB ~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/06 - Detecting webshells with Wazuh.srt 8KB ~Get Your Files Here !/05 - 4. Security Monitoring with ELK/07 - Detecting reconnaissance with ELKStack.srt 8KB ~Get Your Files Here !/02 - 1. Building a Cyber Range/01 - Introduction to Kali Purple.srt 8KB ~Get Your Files Here !/07 - 6. Threat Hunting/04 - Threat hunting with Malcolm.srt 8KB ~Get Your Files Here !/02 - 1. Building a Cyber Range/05 - Installing Kali Linux.srt 8KB ~Get Your Files Here !/02 - 1. Building a Cyber Range/04 - A first look at Proxmox.srt 8KB ~Get Your Files Here !/07 - 6. Threat Hunting/03 - A tour of Cyberville with Malcolm.srt 8KB ~Get Your Files Here !/08 - 7. Threat Intelligence/02 - Installing OpenTaxii.srt 8KB ~Get Your Files Here !/09 - 8. Incident Response/06 - Hunting with Velociraptor.srt 7KB ~Get Your Files Here !/05 - 4. Security Monitoring with ELK/05 - Enrolling hosts into the Fleet server.srt 7KB ~Get Your Files Here !/08 - 7. Threat Intelligence/03 - Working with the cabby client library.srt 7KB ~Get Your Files Here !/02 - 1. Building a Cyber Range/07 - Installing the Kali Purple workstation.srt 7KB ~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/04 - Collecting NGINX logs in Wazuh.srt 6KB ~Get Your Files Here !/03 - 2. ProxyIDS/01 - Setting up NGINX as a proxy server.srt 6KB ~Get Your Files Here !/03 - 2. ProxyIDS/04 - Creating a Linux application server.srt 6KB ~Get Your Files Here !/09 - 8. Incident Response/01 - Installing Velociraptor.srt 6KB ~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/01 - Installing the Wazuh SIEM.srt 6KB ~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/05 - Monitoring an attack with Wazuh.srt 6KB ~Get Your Files Here !/03 - 2. ProxyIDS/07 - Installing virtual machines in the lab.srt 6KB ~Get Your Files Here !/02 - 1. Building a Cyber Range/10 - Creating a Kali Purple server template.srt 6KB ~Get Your Files Here !/07 - 6. Threat Hunting/05 - Deep diving with Malcolm's Arkime.srt 6KB ~Get Your Files Here !/02 - 1. Building a Cyber Range/02 - Introduction to virtualization.srt 5KB ~Get Your Files Here !/05 - 4. Security Monitoring with ELK/08 - Detecting exploitation with ELKStack.srt 5KB ~Get Your Files Here !/05 - 4. Security Monitoring with ELK/02 - Upgrading Kibana to HTTPS.srt 5KB ~Get Your Files Here !/08 - 7. Threat Intelligence/04 - Installing the OpenCTI threat intelligence system.srt 5KB ~Get Your Files Here !/04 - 3. Vulnerabilty Scanning/03 - Running a vulnerabilitty scan with GVM.srt 5KB ~Get Your Files Here !/02 - 1. Building a Cyber Range/03 - Virtualization using Proxmox.srt 5KB ~Get Your Files Here !/03 - 2. ProxyIDS/05 - Creating a Windows application server.srt 5KB ~Get Your Files Here !/05 - 4. Security Monitoring with ELK/09 - Monitoring alerts with ELKStack.srt 5KB ~Get Your Files Here !/09 - 8. Incident Response/02 - Connecting Linux hosts to Velociraptor.srt 5KB ~Get Your Files Here !/02 - 1. Building a Cyber Range/08 - A quick tour of Kali Purple.srt 5KB ~Get Your Files Here !/03 - 2. ProxyIDS/09 - Running an attack on autopilot.srt 5KB ~Get Your Files Here !/05 - 4. Security Monitoring with ELK/03 - Configuring log integrations.srt 5KB ~Get Your Files Here !/04 - 3. Vulnerabilty Scanning/02 - Installing GVM.srt 4KB ~Get Your Files Here !/02 - 1. Building a Cyber Range/09 - A first look at the Kali Purple servers.srt 4KB ~Get Your Files Here !/Ex_Files_Complete_Guide_Kali_Purple/Exercise Files/CH02/02_09/pass.txt 4KB ~Get Your Files Here !/07 - 6. Threat Hunting/02 - Installing Malcolm.srt 4KB ~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/07 - Activating vulnerability scanning.srt 4KB ~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/02 - Installing a Wazuh Linux agent.srt 4KB ~Get Your Files Here !/03 - 2. ProxyIDS/06 - Installing the juice shop.srt 3KB ~Get Your Files Here !/09 - 8. Incident Response/05 - Accessing client files with VFS.srt 3KB ~Get Your Files Here !/03 - 2. ProxyIDS/03 - Setting up a public web server.srt 3KB ~Get Your Files Here !/05 - 4. Security Monitoring with ELK/04 - Installing the Fleet server.srt 3KB ~Get Your Files Here !/Ex_Files_Complete_Guide_Kali_Purple/Exercise Files/CH07/07_02/threat.yml 3KB ~Get Your Files Here !/04 - 3. Vulnerabilty Scanning/01 - Web scanning with ZAP.srt 3KB ~Get Your Files Here !/08 - 7. Threat Intelligence/01 - Exchanging threat intelligence.srt 3KB ~Get Your Files Here !/03 - 2. ProxyIDS/02 - Adding Suricata IDS to the proxy.srt 3KB ~Get Your Files Here !/09 - 8. Incident Response/03 - Connecting Windows hosts to Velociraptor.srt 2KB ~Get Your Files Here !/Ex_Files_Complete_Guide_Kali_Purple/Exercise Files/CH02/02_09/exgym.py 2KB ~Get Your Files Here !/07 - 6. Threat Hunting/01 - Understanding Malcolm for threat hunting.srt 2KB ~Get Your Files Here !/10 - Conclusion/01 - Next steps.srt 2KB ~Get Your Files Here !/01 - Introduction/03 - Disclaimer.srt 2KB ~Get Your Files Here !/Ex_Files_Complete_Guide_Kali_Purple/Exercise Files/CH02/02_09/learning.json 2KB ~Get Your Files Here !/09 - 8. Incident Response/04 - Running commands remotely from Velociraptor.srt 1KB ~Get Your Files Here !/06 - 5. Security Monitoring with Wazuh/03 - Installing a Wazuh Windows agent.srt 1KB ~Get Your Files Here !/Ex_Files_Complete_Guide_Kali_Purple/Exercise Files/CH07/07_03/submit.py 1KB ~Get Your Files Here !/01 - Introduction/01 - Learning how to use Kali Purple.srt 1KB ~Get Your Files Here !/01 - Introduction/02 - What you should know.srt 993B ~Get Your Files Here !/Ex_Files_Complete_Guide_Kali_Purple/Exercise Files/CH07/07_04/vars.sh 948B ~Get Your Files Here !/Ex_Files_Complete_Guide_Kali_Purple/Exercise Files/CH07/07_02/taxii.yml 682B ~Get Your Files Here !/Bonus Resources.txt 386B ~Get Your Files Here !/Ex_Files_Complete_Guide_Kali_Purple/Exercise Files/CH05/05_02/wagent.sh.sh 341B Get Bonus Downloads Here.url 181B