文件内容:
file:002 Endorsements On LinkedIN.html
file:008 Exploit Development.html
file:003 What is Next_en.srt
file:003 What is Next.mp4
file:001 Become An Alumni.html
file:003 What is Next.srt
file:009 Python Monthly.html
file:005 Practice.html
file:004 Learning Guideline.html
file:006 Bug Bounty.html
file:007 Coding For Hackers.html
file:008 Information Disclosure - Telnet Exploit.mp4
file:017 Update 2 - Routersploit.srt
file:002 What is a Vulnerability_en.srt
file:012 Explaining Windows 7 Setup_en.srt
file:001 What is Exploitation.srt
file:006 Our First Exploit - vsftp 2.3.4 Exploitation.srt
file:007 Misconfigurations Happen - Bindshell Exploitation_en.srt
file:007 Misconfigurations Happen - Bindshell Exploitation.srt
file:014 DoublePulsar Attack - Windows Exploit_en.srt
file:017 Update 2 - Routersploit_en.srt
file:005 Msfconsole Basic Commands.srt
file:017 Update 2 - Routersploit.mp4
file:005 Msfconsole Basic Commands.mp4
file:010 Attacking SSH - Bruteforce Attack_en.srt
file:011 Exploitation Challenge - 5 Different Exploits.srt
file:004 Metasploit Framework Structure_en.srt
file:010 Attacking SSH - Bruteforce Attack.mp4
file:015 BlueKeep Vulnerability - Windows Exploit.srt
file:002 What is a Vulnerability.srt
file:008 Information Disclosure - Telnet Exploit.srt
file:008 Information Disclosure - Telnet Exploit_en.srt
file:006 Our First Exploit - vsftp 2.3.4 Exploitation_en.srt
file:003 Reverse Shells, Bind Shells.srt
file:018 Update 3 - Router Default Credentials_en.srt
file:005 Msfconsole Basic Commands_en.srt
file:015 BlueKeep Vulnerability - Windows Exploit.mp4
file:003 Reverse Shells, Bind Shells.mp4
file:014 DoublePulsar Attack - Windows Exploit.mp4
file:006 Our First Exploit - vsftp 2.3.4 Exploitation.mp4
file:004 Metasploit Framework Structure.mp4
file:005 Next Steps.html
file:001 Working With Files In Python.srt
file:006 Exercise Translator_en.srt
file:001 Working With Files In Python.mp4
file:003 File IO Errors_en.srt
file:001 Working With Files In Python_en.srt
file:006 Exercise Translator.mp4
file:002 Pathlib.url
file:004 Read, Write, Append_en.srt
file:003 File IO Errors.mp4
file:002 File Paths.srt
file:006 Exercise Translator.srt
file:004 Read, Write, Append.mp4
file:003 File IO Errors.srt
file:002 File Paths_en.srt
file:004 Read, Write, Append.srt
file:002 File Paths.mp4
file:external-links.txt
file:007 Installing Kali Linux Operating System.mp4
file:004 Downloading Virtual Box & Kali Linux.mp4
file:002 Why Linux.mp4
file:012 Note Getting Familiar With Kali Linux!.html
file:009 Networking Basics.html
file:004 Downloading Virtual Box & Kali Linux_en.srt
file:006 Creating Our First Virtual Machine.mp4
file:007 Installing Kali Linux Operating System_en.srt
file:013 5 Stages Of A Penetration Test.srt
file:006 Creating Our First Virtual Machine_en.srt
file:001 What is A Virtual Machine.srt
file:013 5 Stages Of A Penetration Test.mp4
file:007 Installing Kali Linux Operating System.srt
file:013 5 Stages Of A Penetration Test_en.srt
file:005 Note Kali Linux Updates All The Time!.html
file:001 What is A Virtual Machine.mp4
file:004 Downloading Virtual Box & Kali Linux.srt
file:011 Troubleshooting Network Connection in Kali Linux.srt
file:002 Why Linux_en.srt
file:008 Update 1 - New & Old Versions of Kali Linux_en.srt
file:010 Full Screen Mode & Network Settings.srt
file:010 Full Screen Mode & Network Settings.mp4
file:001 What is A Virtual Machine_en.srt
file:008 Update 1 - New & Old Versions of Kali Linux.srt
file:002 Why Linux.srt
file:008 Update 1 - New & Old Versions of Kali Linux.mp4
file:003 Monthly Coding Challenges, Free Resources and Guides.html
file:006 Creating Our First Virtual Machine.srt
file:009 Networking-101.pdf
file:011 Troubleshooting Network Connection in Kali Linux_en.srt
file:007 Exploitation Recap.mp4
file:006 Post Exploitation Modules.mp4
file:004 Elevating Privileges With Different Modules.srt
file:004 Elevating Privileges With Different Modules_en.srt
file:002 Meterpreter Basic Commands Part 1_en.srt
file:002 Meterpreter Basic Commands Part 1.srt
file:005 Creating Persistence On The Target System.srt
file:001 Post Exploitation Theory.mp4
file:003 Meterpreter Basic Commands Part 2_en.srt
file:002 Meterpreter Basic Commands Part 1.mp4
file:006 Post Exploitation Modules_en.srt
file:005 Creating Persistence On The Target System_en.srt
file:004 Elevating Privileges With Different Modules.mp4
file:001 Post Exploitation Theory.srt
file:005 Creating Persistence On The Target System.mp4
file:003 Meterpreter Basic Commands Part 2.srt
file:001 Post Exploitation Theory_en.srt
file:006 Post Exploitation Modules.srt
file:003 Meterpreter Basic Commands Part 2.mp4
file:007 Exploitation Recap_en.srt
file:007 Exploitation Recap.srt
folder:103551_2023年最新道德黑客+渗透测试训练营 从入门到精通 Complete Ethical Hacking Bootcamp 2023 Zero to Mastery_f
folder:20 - Where To Go From Here
folder:08 - Exploitation & Gaining Access
folder:24 - Learn Python 4 File IO
folder:02 - Setting Up Our Hacking Lab
folder:11 - Post Exploitation - Elevating Privileges, Extracting Data, Running Keyloggers
folder:13 - Website Application Penetration Testing
folder:14 - Python Coding Project #3 - Login Bruteforce, Directory Discovery
folder:16 - Extra Wireless Access Point Cracking
folder:15 - Man In The Middle - MITM
folder:19 - Extra Hacking Active Directory
folder:21 - Learn Python Basics
folder:01 - Introduction
folder:10 - Gaining Access (Viruses, Trojans, Payloads ...)
folder:09 - SMBGhost CVE 2020-0796 - Windows 10 Manual Exploitation
folder:06 - Python Coding Project #1 - Portscanner
folder:07 - Vulnerability Analysis
folder:23 - Learn Python 3 Error Handling
folder:18 - Extra Introduction To Anonymity
folder:04 - Reconnaissance & Information Gathering
folder:22 - Learn Python Intermediate
folder:03 - Linux Operating System
folder:05 - Scanning
folder:17 - Extra Gaining Access To An Android Device
folder:12 - Python Coding Project #2 - Backdoor
folder:25 - BONUS SECTION