zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
Udemy - Master ethical hacking with Python (2019)
magnet:?xt=urn:btih:2f5fc144772a265e8e0aef23213ca312b608a606&dn=Udemy - Master ethical hacking with Python (2019)
磁力链接详情
文件列表详情
2f5fc144772a265e8e0aef23213ca312b608a606
infohash:
89
文件数量
6.39 GB
文件大小
2021-3-2 16:04
创建日期
2024-11-15 21:59
最后访问
相关分词
Udemy
-
Master
ethical
hacking
with
Python
2019
01 Introduction and Setup/001 Welcome to Python for ethical hacking!.mp4 12.85 MB
01 Introduction and Setup/002 VirtualBox installation.mp4 158.26 MB
01 Introduction and Setup/003 Kali Linux installation.mp4 67.4 MB
01 Introduction and Setup/004 Adding Guest Additions.mp4 100.93 MB
01 Introduction and Setup/005 Python in Kali terminal.mp4 51.46 MB
02 Port and Vulnerability Scanning/006 Coding a simple port scanner.mp4 208.01 MB
02 Port and Vulnerability Scanning/007 Adding raw_input to our port scanner.mp4 43.9 MB
02 Port and Vulnerability Scanning/008 Scanning the first 1,000 ports.mp4 28.65 MB
02 Port and Vulnerability Scanning/009 Coding an advanced port scanner part 1.mp4 62.21 MB
02 Port and Vulnerability Scanning/010 Coding an advanced port scanner part 2.mp4 62.12 MB
02 Port and Vulnerability Scanning/011 Finishing and testing our scanner.mp4 57.63 MB
02 Port and Vulnerability Scanning/012 Configuring IP address and installing Metasploitable.mp4 56.99 MB
02 Port and Vulnerability Scanning/013 Returning banner from open port.mp4 76.6 MB
02 Port and Vulnerability Scanning/014 Coding a vulnerability scanner part 1.mp4 55.28 MB
02 Port and Vulnerability Scanning/015 Coding a vulnerability scanner part 2.mp4 40.83 MB
03 SSH and FTP Attacks/016 Automating SSH login part 1.mp4 45.97 MB
03 SSH and FTP Attacks/017 Automating SSH login part 2.mp4 54.18 MB
03 SSH and FTP Attacks/018 Testing our SSH login program.mp4 54.13 MB
03 SSH and FTP Attacks/019 Coding a SSH brute-forcer.mp4 149.64 MB
03 SSH and FTP Attacks/020 Executing commands on target after brute-forcing SSH.mp4 60.68 MB
03 SSH and FTP Attacks/021 Anonymous FTP login attack.mp4 45.06 MB
03 SSH and FTP Attacks/022 Username & password list attack on FTP.mp4 91.76 MB
04 Password Cracking/023 SHA256, SHA512, MD5.mp4 42.09 MB
04 Password Cracking/024 Cracking SHA1 hash with online dictionary.mp4 85.09 MB
04 Password Cracking/025 Getting password from MD5 hash.mp4 60 MB
04 Password Cracking/026 Cracking crypt passwords with salt.mp4 120.91 MB
05 Sniffers, Flooders and Spoofers/027 Changing MAC address manually.mp4 50.96 MB
05 Sniffers, Flooders and Spoofers/028 Coding MAC address changer.mp4 92.91 MB
05 Sniffers, Flooders and Spoofers/029 Theory behind ARP spoofing.mp4 33.34 MB
05 Sniffers, Flooders and Spoofers/030 Crafting malicious ARP packet.mp4 144.16 MB
05 Sniffers, Flooders and Spoofers/031 Coding ARP spoofer.mp4 62.69 MB
05 Sniffers, Flooders and Spoofers/032 Forwarding packets and restoring ARP tables.mp4 41.88 MB
05 Sniffers, Flooders and Spoofers/033 Spoofing our IP address and sending message with TCP payload.mp4 70.64 MB
05 Sniffers, Flooders and Spoofers/034 Running SynFlooder with changed source IP address.mp4 65.7 MB
05 Sniffers, Flooders and Spoofers/035 Getting source and destination MAC address from received packets.mp4 130.35 MB
05 Sniffers, Flooders and Spoofers/036 Sniffing FTP username and password part 1.mp4 37.05 MB
05 Sniffers, Flooders and Spoofers/037 Sniffing FTP username and password part 2.mp4 80.11 MB
05 Sniffers, Flooders and Spoofers/038 Getting passwords from HTTP websites.mp4 77.7 MB
06 Coding DNS Spoofer/039 Cloning any webpage.mp4 60.61 MB
06 Coding DNS Spoofer/040 Printing DNS queries.mp4 55.62 MB
06 Coding DNS Spoofer/041 Redirecting response to cloned page.mp4 207.2 MB
06 Coding DNS Spoofer/042 Setting IP table rules and running DNS spoofer.mp4 130.94 MB
07 Network Analysis/043 Analyzing Ethernet header.mp4 78.92 MB
07 Network Analysis/044 Analyzing IP header part 1.mp4 72.44 MB
07 Network Analysis/045 Analyzing IP header part 2.mp4 218.9 MB
07 Network Analysis/046 Analyzing TCP header.mp4 122.77 MB
07 Network Analysis/047 Analyzing UDP header.mp4 99.73 MB
08 Multi-functioning Reverse Shell/048 Theory behind socket programming.mp4 27.58 MB
08 Multi-functioning Reverse Shell/049 Wine and Pyinstaller installation.mp4 40.51 MB
08 Multi-functioning Reverse Shell/050 Setting up listener.mp4 34.02 MB
08 Multi-functioning Reverse Shell/051 Establishing connection between target and server.mp4 32.19 MB
08 Multi-functioning Reverse Shell/052 Implementing send & receive functions.mp4 65.89 MB
08 Multi-functioning Reverse Shell/053 Executing commands on target system.mp4 69.08 MB
08 Multi-functioning Reverse Shell/054 Importing JSON library to parse data.mp4 53.28 MB
08 Multi-functioning Reverse Shell/055 Converting Python backdoor to .exe.mp4 54.05 MB
08 Multi-functioning Reverse Shell/056 Using OS library to change directory.mp4 58.19 MB
08 Multi-functioning Reverse Shell/057 Downloading & uploading files to target PC.mp4 115.81 MB
08 Multi-functioning Reverse Shell/058 Hiding our backdoor and creating persistence.mp4 78.31 MB
08 Multi-functioning Reverse Shell/059 Trying to connect to server every 20 seconds.mp4 38.02 MB
08 Multi-functioning Reverse Shell/060 Downloading files to target PC.mp4 67.87 MB
08 Multi-functioning Reverse Shell/061 Capturing screenshot on target PC.mp4 140.26 MB
08 Multi-functioning Reverse Shell/062 Administrator privilege check.mp4 44.94 MB
08 Multi-functioning Reverse Shell/063 Starting other programs with our shell.mp4 72.79 MB
08 Multi-functioning Reverse Shell/064 Running our shell as an image, audio, PDF.mp4 136.62 MB
09 Coding a Keylogger/065 Installing Pynput.mp4 69.16 MB
09 Coding a Keylogger/066 Printing space character.mp4 36.95 MB
09 Coding a Keylogger/067 Calling timer on our keylogger.mp4 50.3 MB
09 Coding a Keylogger/068 Adding keylogger to our backdoor.mp4 91.66 MB
10 Command and Control Center/069 What is a threaded server_.mp4 24.36 MB
10 Command and Control Center/070 Accepting connections with a thread.mp4 60.62 MB
10 Command and Control Center/071 Managing multiple sessions.mp4 45.66 MB
10 Command and Control Center/072 Testing threaded server with Windows 10 target.mp4 61.83 MB
10 Command and Control Center/073 Fixing Q command.mp4 86.1 MB
10 Command and Control Center/074 Coding exit function.mp4 83.88 MB
10 Command and Control Center/075 Attacking multiple targets and gathering botnet.mp4 105.6 MB
11 Website Penetration Testing/076 Stealing saved wireless passwords.mp4 106.72 MB
11 Website Penetration Testing/077 Saving passwords to a file.mp4 40.69 MB
11 Website Penetration Testing/078 Bruteforcing Gmail.mp4 41.08 MB
11 Website Penetration Testing/079 Bruteforcing any login page part 1.mp4 89.37 MB
11 Website Penetration Testing/080 Bruteforcing any login page part 2.mp4 65.59 MB
11 Website Penetration Testing/081 Finding hidden directories part 1.mp4 21.5 MB
11 Website Penetration Testing/082 Finding hidden directories part 2.mp4 45.26 MB
11 Website Penetration Testing/083 Discovering subdomains.mp4 59.61 MB
11 Website Penetration Testing/084 Changing HTTP headers.mp4 75.7 MB
11 Website Penetration Testing/085 Starting basic and digest authentication bruteforcer.mp4 46.45 MB
11 Website Penetration Testing/086 Controlling threads.mp4 45.95 MB
11 Website Penetration Testing/087 Coding run function.mp4 60.22 MB
11 Website Penetration Testing/088 Printing usage and testing our program.mp4 79.13 MB
11 Website Penetration Testing/089 Taking a look at ransomware.mp4 97.12 MB
其他位置