elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
00316 Enterprise_Penetration_Testing_and_Continuous_Monitoring_-_Summary.mp4 92M
00315 10.2_Surveying_Continouos_Reporting_for_Enterprise_Continuous_Monitoring.mp4 29M
00314 10.1_Surveying_Final_Reports_for_Transactional_Penetration_Testing_Events.mp4 74M
00313 Learning_objectives.mp4 25M
00312 9.2_Exploring_How_to_Test_in_the_Cloud.mp4 182M
00311 9.1_Understanding_the_Challenge_of_Testing_Cloud_Services.mp4 211M
00310 Learning_objectives.mp4 26M
00309 8.8_Understanding_How_to_Cover_Your_Tracks.mp4 78M
00308 8.7_Understanding_Data_Exfiltration_Techniques.mp4 103M
00307 8.6_Searching_for_Sensitive_Data.mp4 142M
00306 8.5_Understanding_That_Domain_Admin_Is_Not_the_End_Goal.mp4 36M
00305 8.4_Surveying_Password_Cracking_amp_Reporting.mp4 48M
00304 8.3_Understanding_How_to_Compromise_User_Credentials.mp4 128M
00303 8.2_Learning_How_to_Achieve_Domain_Admin_Access.mp4 79M
00302 8.1_Understanding_Persistent_Access.mp4 16M
00301 Learning_objectives.mp4 55M
00300 7.3_Surveying_Privilege_Escalation_Essential_Tools.mp4 59M
00299 7.2_Understanding_Lateral_Movement.mp4 218M
00298 7.1_Learning_Privilege_Escalation_Methodologies.mp4 74M
00297 Learning_objectives.mp4 32M
00296 6.4_Learning_How_to_Host_Enterprise_Capture_the_Flag_Events.mp4 98M
00295 6.3_Exploring_the_Hidden_Cost_of_Open_Source_Software.mp4 223M
00294 6.2_Understanding_What_Hosts_to_Target_and_the_Scope_of_the_Testing.mp4 70M
00293 6.1_Understanding_How_to_Initially_Get_on_the_Network.mp4 27M
00292 Learning_objectives.mp4 21M
00291 5.3_Understanding_Enterprise_Application_Continuous_Testing.mp4 95M
00290 5.2_Exploring_Web_App_Testing_Essential_Tools.mp4 171M
00289 5.1_Exploring_How_to_Target_Hosts.mp4 40M
00288 Learning_objectives.mp4 29M
00287 4.8_Understanding_How_to_Perform_Continuous_Monitoring.mp4 39M
00286 4.7_Understanding_Binary_and_Source_Code_Scanners.mp4 46M
00285 4.6_Exploring_Vulnerability_Scanners.mp4 149M
00284 4.5_Using_Shodan_and_Its_API.mp4 106M
00283 4.4_Exploring_How_to_Automate_Scans.mp4 205M
00282 4.3_Understanding_Scanning_Tools.mp4 46M
00281 4.2_Understanding_the_Operational_Impact_of_Enterprise-wide_Scanning.mp4 80M
00280 4.1_Exploring_Network_and_Vulnerability_Scanning_Methodologies.mp4 69M
00279 Learning_objectives.mp4 40M
00278 3.3_Exploiting_Social_Engineering_Tools.mp4 192M
00277 3.2_Understanding_How_to_Target_Employees.mp4 157M
00276 3.1_Surveying_Social_Engineering_Methodologies.mp4 231M
00275 Learning_objectives.mp4 24M
00274 2.3_Understanding_Active_Recon.mp4 145M
00273 2.2_Understanding_Passive_Recon.mp4 334M
00272 2.1_Understanding_the_Red_Team_Environment.mp4 313M
00271 Learning_objectives.mp4 31M
00270 1.7_Understanding_Red_Team_Collaboration.mp4 151M
00269 1.6_Understanding_How_to_Create_and_Hire_the_Red_Team.mp4 137M
00268 1.5_Surveying_Operational_Processes_and_Policies_for_the_Red_Team.mp4 212M
00267 1.4_Exploring_How_to_Plan_and_Fund_a_Red_Team.mp4 186M
00266 1.3_Understanding_the_Difference_Between_Red_and_Blue_Teams.mp4 160M
00265 1.2_Understanding_Enterprise_Wide_Penetration_Testing.mp4 435M
00264 1.1_Introducing_Red_Teams_and_Enterprise_Hacking.mp4 315M
00263 Learning_objectives.mp4 67M
00262 Introduction.mp4 124M
00261 Wireless_Networks_IoT_and_Mobile_Devices_Hacking_-_Summary.mp4 80M
00260 15.3_Surveying_Tools_for_Dissasembling_iOS_Applications.mp4 28M
00259 15.2_Exploring_Jailbraking_iOS.mp4 31M
00258 15.1_Introducing_iOS_Security.mp4 17M
00257 Learning_objectives.mp4 23M
00256 14.3_Understanding_Android_Hacking_Tools_and_Methodologies.mp4 276M
00255 14.2_Exploring_Android_Emulators_and_SDK.mp4 47M
00254 14.1_Exploring_The_Android_Security_Model.mp4 223M
00253 Learning_objectives.mp4 29M
00252 13.4_Understanding_Mobile_Device_Security_Policies.mp4 93M
00251 13.3_Understanding_Mobile_Device_Management_MDM.mp4 120M
00250 13.2_Wrestling_with_the_BYOD_Dilemma.mp4 112M
00249 13.1_Understanding_OWASP_Mobile_Device_Vulnerabilities.mp4 160M
00248 Learning_objectives.mp4 35M
00247 12.5_Exploring_LoRA.mp4 59M
00246 12.4_Exploring_ZWave.mp4 212M
00245 12.3_Exploring_INSTEON.mp4 48M
00244 12.2_Exploring_ZigBee_and_IEEE_802.15.4.mp4 50M
00243 12.1_Understanding_IoT_Fundamentals.mp4 258M
00242 Learning_objectives.mp4 24M
00241 11.4_Understanding_Wireless_Security_Policies.mp4 24M
00240 11.3_Understanding_Wireless_Intrusion_Monitoring_and_Prevention.mp4 17M
00239 11.2_Surveying_Fast_and_Secure_Roaming.mp4 115M
00238 11.1_Understanding_the_Evolution_of_Wireless_Defenses.mp4 64M
00237 Learning_objectives.mp4 25M
00236 10.2_Exploring_NFC_Attacks_and_Case_Studies.mp4 55M
00235 10.1_Understanding_NFC_Vulnerabilities.mp4 27M
00234 Learning_objectives.mp4 33M
00233 9.2_Surveying_Tools_for_Bluetooth_Monitoring.mp4 137M
00232 9.1_Understanding_Bluetooth_Vulnerabilities.mp4 19M
00231 Learning_objectives.mp4 23M
00230 8.4_Exploring_the_WiFi_Pineapple.mp4 223M
00229 8.3_Using_Karmetasploit.mp4 97M
00228 8.2_Performing_Evil_Twin_Attacks.mp4 228M
00227 8.1_Defining_Evil_Twin_Attacks.mp4 73M
00226 Learning_objectives.mp4 27M
00225 7.3_Learning_How_to_Hack_Default_Configurations.mp4 44M
00224 7.2_Using_Wireshark.mp4 53M
00223 7.1_Using_Kismet.mp4 60M
00222 Learning_objectives.mp4 24M
00221 6.5_Exploring_WPA_Enterprise_Hacking.mp4 59M
00220 6.4_Using_Pyrit.mp4 91M
00219 6.3_Using_coWPAtty.mp4 165M
00218 6.2_Surveying_Attacks_Against_WPA2-PSK_Networks.mp4 102M
00217 6.1_Understanding_WPA_Fundamentals.mp4 129M
00216 Learning_objectives.mp4 31M
00215 5.2_Learning_How_to_Crack_WEP.mp4 136M
00214 5.1_Understanding_WEP_Fundamentals.mp4 92M
00213 Learning_objectives.mp4 21M
00212 4.7_Introducing_Airtun-ng.mp4 50M
00211 4.6_Introducing_Airserv-ng.mp4 82M
00210 4.5_Introducing_Airdecap-ng.mp4 44M
00209 4.4_Introducing_Aireplay-ng.mp4 89M
00208 4.3_Understanding_Airodump-ng.mp4 87M
00207 4.2_Introducing_Airmon-ng.mp4 37M
00206 4.1_Introducing_the_Aircrack-ng_Suite.mp4 171M
00205 Learning_objectives.mp4 28M
00204 3.3_Building_Your_Own_Lab.mp4 165M
00203 3.2_Surveying_Wi-Fi_Devices_Like_the_Pinneaple.mp4 348M
00202 3.1_Understanding_Wireless_Antennas.mp4 125M
00201 Learning_objectives.mp4 23M
00200 2.5_Attacking_the_Preferred_Network_List_PNL.mp4 23M
00199 2.4_Attacking_Publicly_Secure_Packet_Forwarding_PSPF.mp4 31M
00198 2.3_Eavesdropping_and_Manipulating_Unencrypted_Wi-Fi_Communications.mp4 57M
00197 2.2_Learning_Packet_Injection_Attacks.mp4 24M
00196 2.1_Understanding_Wireless_Client_Attacks_and_Their_Motives.mp4 292M
00195 Learning_objectives.mp4 41M
00194 1.6_Understanding_802.1x_and_Wireless_Authentication_Mechanisms.mp4 98M
00193 1.5_Understanding_NFC.mp4 130M
00192 1.4_Understanding_Bluetooth.mp4 112M
00191 1.3_Understanding_the_802.11_Standard.mp4 144M
00190 1.2_Introducing_Wireless_Standards_and_Technologies.mp4 210M
00189 1.1_Introducing_Wireless_Hacking.mp4 254M
00188 Learning_objectives.mp4 27M
00187 Introduction.mp4 115M
00186 Hacking_Web_Applications_-_Summary.mp4 165M
00185 11.4_Fuzzing_Web_Applications.mp4 297M
00184 11.3_Surveying_Information_Disclosure_Vulnerabilities.mp4 52M
00183 11.2_Exploiting_Insecure_Direct_Object_References_and_Path_Traversal.mp4 309M
00182 11.1_Understanding_the_Other_Common_Security_Flaws_in_Web_Applications.mp4 132M
00181 Learning_objectives.mp4 63M
00180 10.4_Mitigating_AJAX_HTML5_and_Client-side_Vulnerabilities.mp4 59M
00179 10.3_Understanding_AJAX_Implementations.mp4 80M
00178 10.2_Understanding_HTML5_Implementations.mp4 212M
00177 10.1_Surveying_the_Client-side_Code_and_Storage.mp4 187M
00176 Learning_objectives.mp4 41M
00175 9.2_Exploring_the_Tools_Used_to_Test_the_APIs.mp4 139M
00174 9.1_Understanding_the_APIs.mp4 94M
00173 Learning_objectives.mp4 32M
00172 8.4_Mitigating_Flaws_in_Cryptographic_Implementations.mp4 103M
00171 8.3_Surveying_Examples_of_Crypto-based_Attacks_and_Vulnerabilities.mp4 136M
00170 8.2_Identifying_Common_Flaws_in_Data_Storage_and_Transmission.mp4 289M
00169 8.1_Introducing_Cryptography_Encryption_and_Hashing_Protocols.mp4 722M
00168 Learning_objectives.mp4 68M
00167 7.8_Mitigating_XSS_and_CSRF_Vulnerabilities.mp4 240M
00166 7.7_Evading_Web_Application_Security_Controls.mp4 185M
00165 7.6_Exploiting_CSRF_Vulnerabilities.mp4 72M
00164 7.5_Understanding_Cross-Site_Request_Forgery_CSRF.mp4 42M
00163 7.4_Exploiting_DOM-based_XSS_Vulnerabilities.mp4 108M
00162 7.3_Exploiting_Stored_XSS_Vulnerabilities.mp4 106M
00161 7.2_Exploiting_Reflected_XSS_Vulnerabilities.mp4 82M
00160 7.1_Introducing_XSS.mp4 41M
00159 Learning_objectives.mp4 84M
00158 6.7_Mitigating_Injection_Vulnerabilities.mp4 79M
00157 6.6_Exploiting_XML_Injection_Vulnerabilities.mp4 81M
00156 6.5_Understanding_XML_Injection.mp4 47M
00155 6.4_Exploiting_SQL_Injection_Vulnerabilities.mp4 808M
00154 6.3_Understanding_SQL_Injection.mp4 169M
00153 6.2_Exploiting_Command_Injection_Vulnerabilities.mp4 97M
00152 6.1_Understanding_Command_Injection.mp4 68M
00151 Learning_objectives.mp4 69M
00150 5.2_Exploring_Session_Management_Mechanisms_and_Related_Vulnerabilities.mp4 439M
00149 5.1_Understanding_Authentication_Schemes_in_Web_Applications.mp4 699M
00148 Learning_objectives.mp4 52M
00147 4.10_Introducing_OpenVAS.mp4 266M
00146 4.9_Introducing_OWASP_Zed_Application_Proxy_ZAP.mp4 170M
00145 4.8_Introducing_the_Burp_Suite.mp4 524M
00144 4.7_Introducing_Nikto.mp4 117M
00143 4.6_Understanding_How_Web_Application_Scanners_Work.mp4 64M
00142 4.5_Surveying_Web_Crawlers_and_Directory_Brute_Force.mp4 152M
00141 4.4_Exploring_CMS_and_Framework_Identification.mp4 134M
00140 4.3_Exploring_Shodan_Maltego_Recon-NG_SpiderFoot_and_TheHarvester.mp4 488M
00139 4.2_Using_Search_Engines_and_Public_Information.mp4 162M
00138 4.1_Understanding_Passive_vs._Active_Reconnaissance.mp4 131M
00137 Learning_objectives.mp4 104M
00136 3.8_Understanding_Cyber_Ranges_and_Capture_the_Flag_Events.mp4 109M
00135 3.7_Understanding_Web_Application_Proxies.mp4 109M
00134 3.6_Exploring_the_Web_Security_Dojo.mp4 105M
00133 3.5_Surveying_Hackazon.mp4 100M
00132 3.4_Surveying_WebGoat.mp4 64M
00131 3.3_Surveying_DVWA.mp4 51M
00130 3.2_Introducing_Vulnerable_Applications.mp4 57M
00129 3.1_Exploring_Kali_Linux.mp4 559M
00128 Learning_objectives.mp4 91M
00127 2.8_Introducing_Kubernetes.mp4 96M
00126 2.7_Surveying_Docker_Containers.mp4 182M
00125 2.6_Exploring_Web_Application_Frameworks.mp4 69M
00124 2.5_Exploring_Cloud_Services.mp4 108M
00123 2.4_Introducing_DevOps.mp4 74M
00122 2.3_Surveying_Session_Management_and_Cookies.mp4 231M
00121 2.2_Exploring_the_HTTP_Request_and_Response.mp4 167M
00120 2.1_Understanding_the_Web_Application_Protocols.mp4 219M
00119 Learning_objectives.mp4 89M
00118 1.5_Exploring_What_Programming_Languages_You_Should_Know.mp4 167M
00117 1.4_Exploring_How_Web_Applications_Have_Evolved_Over_Time.mp4 123M
00116 1.3_Understanding_the_Need_for_Web_Application_Penetration_Testing.mp4 75M
00115 1.2_Surveying_Web_Application_Penetration_Testing_Methodologies.mp4 133M
00114 1.1_Understanding_Ethical_Hacking_and_Penetration_Testing.mp4 44M
00113 Learning_objectives.mp4 83M
00112 Introduction.mp4 166M
00111 Security_Penetration_Testing_-_Summary.mp4 56M
00110 15.5_Distributing_Pen_Test_Reports.mp4 38M
00109 15.4_Exploring_Risk_Ratings.mp4 67M
00108 15.3_Understanding_the_Pen_Test_Report_Format.mp4 66M
00107 15.2_Planning_and_Organizing_Your_Report.mp4 84M
00106 15.1_Understanding_Pen_Test_Reports_and_How_They_Are_Used.mp4 94M
00105 Learning_objectives.mp4 37M
00104 14.6_Defending_Against_the_Advanced_Persistent_Threat.mp4 53M
00103 14.5_Understanding_Pivoting_and_Lateral_Movement.mp4 215M
00102 14.4_Maintaining_Persistence.mp4 28M
00101 14.3_Gaining_Network_Access_with_SMB_Relay_Attacks_NetBIOS_Name_Service.mp4 386M
00100 14.2_Gaining_Network_Access.mp4 294M
00099 14.1_Understanding_Persistence.mp4 164M
00098 Learning_objectives.mp4 31M
00097 13.4_Surveying_Social_Engineering_Case_Studies.mp4 250M
00096 13.3_Exploring_Maltego.mp4 196M
00095 13.2_Exploring_the_Social_Engineering_Toolkit_SET.mp4 178M
00094 13.1_Understanding_Social_Engineering.mp4 210M
00093 Learning_objectives.mp4 31M
00092 12.3_Covering_Your_Tracks.mp4 44M
00091 12.2_Exploring_Post_Exploitation_Techniques.mp4 34M
00090 12.1_Understanding_Security_Evasion_Techniques.mp4 201M
00089 Learning_objectives.mp4 27M
00088 11.4_Gathering_Network_Information_Using_PowerShell.mp4 123M
00087 11.3_Pwning_Windows_Using_PowerShell_-_Empire_Modules_and_Advanced_Exploits.mp4 247M
00086 11.2_Pwning_Windows_Using_PowerShell_-_Empire_Components_Setup_and_Basic_Exploits.mp4 404M
00085 11.1_Understanding_Powershell.mp4 245M
00084 Learning_objectives.mp4 16M
00083 10.7_Surveying_Tools_to_Find_and_Exploit_Buffer_Overflows.mp4 193M
00082 10.6_Exploring_Mutation-based_Generation-based_and_Evolutionary_Fuzzers.mp4 94M
00081 10.5_Creating_a_Fuzzing_Strategy.mp4 152M
00080 10.4_Understanding_Fuzzing.mp4 52M
00079 10.3_Overcoming_Defenses_for_Buffer_Overflow_Vulnerabilities.mp4 37M
00078 10.2_Exploiting_Buffer_Overflows.mp4 165M
00077 10.1_Understanding_Buffer_Overflows.mp4 188M
00076 Learning_objectives.mp4 29M
00075 9.5_Understanding_Hacking_Wireless_Clients.mp4 188M
00074 9.4_Hacking_WEP_WPA_and_Other_Protocols.mp4 311M
00073 9.3_Surveying_Wireless_Hacking_Tools_-_Software.mp4 159M
00072 9.2_Surveying_Wireless_Hacking_Tools_-_Wireless_Adapters.mp4 230M
00071 9.1_Reviewing_Wireless_Technology_Fundamentals.mp4 236M
00070 Learning_objectives.mp4 30M
00069 8.18_Using_Network_Device_Hacking_Tools_to_Perform_a_MiTM_Attack.mp4 65M
00068 8.17_Surveying_Essential_Tools_for_Hacking_Network_Devices_-_Linux_Tools.mp4 97M
00067 8.16_Surveying_Essential_Tools_for_Hacking_Network_Devices_-_MiTM_Tools.mp4 81M
00066 8.15_Surveying_Essential_Tools_for_Hacking_Network_Devices_-_ARP_Spoofing_Tools.mp4 206M
00065 8.14_Surveying_Essential_Tools_for_Hacking_Network_Devices_-_Switch_and_Router.mp4 200M
00064 8.13_Surveying_Essential_Tools_for_Hacking_Network_Devices_-_Packet_Capture.mp4 285M
00063 8.12_Performing_Firewall_Reconnaissance_and_Tunneling.mp4 126M
00062 8.11_Understanding_Firewall_Fundamentals_and_Levels_of_Inspection.mp4 315M
00061 8.10_Hacking_the_Management_Plane.mp4 448M
00060 8.9_Examining_ICMP_First_Hop_Redundancy_and_Routing_Protocol_Attacks.mp4 270M
00059 8.8_Reviewing_Router_Fundamentals.mp4 358M
00058 8.7_Hacking_Switches_-_ARP_Vulnerabilities_and_ARP_Cache_Poisoning.mp4 124M
00057 8.6_Hacking_Switches_-_Demo.mp4 95M
00056 8.5_Hacking_Switches_-_Reviewing_Ethernet_Fundamentals.mp4 445M
00055 8.4_Building_an_Internetwork_Topology_Using_VIRL.mp4 134M
00054 8.3_Reviewing_Networking_Technology_Fundamentals_-_Forwarding_Device_Architecture.mp4 129M
00053 8.2_Reviewing_Networking_Technology_Fundamentals_-_OSI_and_DoD_Internet_Models.mp4 118M
00052 8.1_Understanding_the_Reasons_for_and_the_Steps_to_Hacking_a_Network.mp4 185M
00051 Learning_objectives.mp4 61M
00050 7.4_Surveying_Defenses_to_Mitigate_Database_Hacking.mp4 110M
00049 7.3_Attacking_a_Database_-_Automated_Scanners.mp4 29M
00048 7.2_Attacking_a_Database_-_Discovery_Validation_and_Exploitation.mp4 243M
00047 7.1_Reviewing_Database_Fundamentals.mp4 102M
00046 Learning_objectives.mp4 29M
00045 6.7_Improving_Password_Security.mp4 63M
00044 6.6_Cracking_Passwords_with_hashcat.mp4 197M
00043 6.5_Cracking_Passwords_with_John_the_Ripper.mp4 402M
00042 6.4_Understanding_Password_Storage_Vulnerability.mp4 79M
00041 6.3_Exploring_Password_Storage_Mechanisms.mp4 42M
00040 6.2_Understanding_Authentication_and_Authorization_Attacks.mp4 118M
00039 6.1_Understanding_Authentication_and_Authorization_Mechanisms.mp4 162M
00038 Learning_objectives.mp4 25M
00037 5.9_Surveying_Defenses_to_Mitigate_Web_Application_Hacking.mp4 19M
00036 5.8_Understanding_the_Exploitation_of_Web_Applications.mp4 103M
00035 5.7_Testing_Web_Applications_-_Vulnerability_Discovery.mp4 145M
00034 5.6_Testing_Web_Applications_-_Mapping.mp4 86M
00033 5.5_Testing_Web_Applications_-_Reconnaissance.mp4 121M
00032 5.4_Testing_Web_Applications_-_Methodology.mp4 18M
00031 5.3_Uncovering_Web_Vulnerabilities.mp4 177M
00030 5.2_Understanding_Web_Architectures.mp4 56M
00029 5.1_Understanding_Web_Applications.mp4 166M
00028 Learning_objectives.mp4 34M
00027 4.4_Surveying_Essential_Tools_for_Active_Reconnaissance_-_Network_and_Web.mp4 138M
00026 4.3_Surveying_Essential_Tools_for_Active_Reconnaissance_-_Port_Scanning.mp4 264M
00025 4.2_Exploring_Active_Reconnaissance_Methodologies_from_an_Ethical_Hacker.mp4 51M
00024 4.1_Understanding_Active_Reconnaissance.mp4 134M
00023 Learning_objectives.mp4 25M
00022 3.6_Surveying_Essential_Tools_for_Passive_Reconnaissance_-_Recon-ng.mp4 466M
00021 3.5_Surveying_Essential_Tools_for_Passive_Reconnaissance_-_SpiderFoot.mp4 179M
00020 3.4_Exploring_Passive_Reconnaissance_Methodologies_-_Searching_for_Names.mp4 107M
00019 3.3_Exploring_Passive_Reconnaissance_Methodologies_-_Searching_for_Files.mp4 153M
00018 3.2_Exploring_Passive_Reconnaissance_Methodologies_-_Discovering_Host.mp4 268M
00017 3.1_Understanding_Passive_Reconnaissance.mp4 270M
00016 Learning_objectives.mp4 26M
00015 2.3_Managing_Kali_Services.mp4 132M
00014 2.2_Examining_Kali_Modules_and_Architecture.mp4 135M
00013 2.1_Installing_Kali.mp4 138M
00012 Learning_objectives.mp4 28M
00011 1.9_Understanding_the_Current_Threat_Landscape.mp4 88M
00010 1.8_Understanding_Vulnerabilities_Threats_and_Exploits.mp4 73M
00009 1.7_Building_Your_Own_Lab_-_VIRL_and_Operating_System_Software.mp4 264M
00008 1.6_Building_Your_Own_Lab_-_Overview.mp4 434M
00007 1.5_Exploring_Penetration_Testing_and_other_Cyber_Security_Certifications.mp4 172M
00006 1.4_Exploring_Penetration_Testing_Methodologies.mp4 88M
00005 1.3_Understanding_the_Legal_Aspects_of_Penetration_Testing.mp4 134M
00004 1.2_Getting_Started_with_Ethical_Hacking_and_Pen_Testing.mp4 353M
00003 1.1_Introducing_Ethical_Hacking_and_Pen_Testing.mp4 216M
00002 Learning_objectives.mp4 58M
00001 Introduction.mp4 246M
Recent Courses
CEHv13
HackTricks - AWS Red Team Expert (ARTE)
Certified Exploit Development Professional [CEDP]
Advance Exploitation Course By Umar Sabil
CompTIA Security+ (SY0-701 & SY0-601) Full Training Guide
ITProTV - LPIC-2 Linux Engineer (202-450)_
OffSec - PEN-210 - Foundational Wireless Network Attacks
OffSec EXP-301
FOR508 Videos 2023
Introduction Windows Malware Development
Red-Teaming-Exploit-Development-with-Assembly-and-C-MSAC
SEC450 Videos 2020
AWS Cloud Red Team Specialist [CARTS]
SEC670 MP3 2025.4
Zero Point Security - Red Team Ops 2025.2
Certified Red Team Analyst [CCRTA] 2022
EC Council - DroneWorkshop
HTB - AI Red Teamer 2025.3 Path
SEC670 Red Teaming Tools - Developing Windows Implants, Shellcode, Command and Control
Maltrak - Threat Hunting In Microsoft Sentinel and Defender
Hybrid Multi-Cloud Red Team Specialist [CHMRTS]
Stealth Cyber Operator [CSCO]
Process Injection Analyst [CPIA]
Red Team Specialist [CRTS V1]
Practical Hardware Hacking
Red Team Infra Dev [CRT-ID]
Purple Team Analyst [CPTA V1]
Assembly 101
EC-Council Certified Cloud Security Engineer (CCSE)
Udemy - Web Security & Bug Bounty Learn Penetration Testing 2025
INE - Advanced Web Application Penetration Testing (New)_
Windows Red Team Lab (CRTE) 2025.2
Mandiant - Malware Analysis 2025
13Cubed - Investigating Linux Devices
Zero Point Security - DevOps for Pentesters 2025.3
Offensive Development w Greg Hatcher & John Stigerwalt
Pluralsight - Windows Server 2022 Administration
BittenTech - TechHacker Ethical Hacking and Cyber Security
Kaspersky - Hunting APTs like a Ninja with YARA
A-Windows_Process_Injection_For_Red-Blue_Team
QURE Academy - Advanced Attacks Against Active Directory
EC-Council - Certified Network Defender v3 2024.11
EC-Council - Cyber Security Technician
PEN-200 - Penetration Testing with Kali Linux Videos
EDRPv3 EC-Council Disaster Recovery Professional
OffSec - PEN-200 2024.11
Practical Analysis with Security Onion
SANS ON DEMAND COURSE
Top 5 Tools & Techniques for Penetration Testing
CVE's for Bug Bounties & Penetration Testing
Creating Batch Scripts For Android
Oreilly - Mastering Cybersecurity with Python - From Basics to Advanced Defense
Recon For Bug Bounties & Penetration Testing
Bug Bounty Hunting and Penetration Testing v2
Bug Bounty Hunting and Penetration Testing v1
Bootcamp de Backend Avanzado_ Microservicios
Sketchup desde Cero para Arquitectos
Creación y consulta de bases de datos con ChatGPT y SQL
Storytelling Audiovisual para redes sociales
Introducción a Frameworks de Frontend con Vue 3"
Trafficker Expert
2. Digital Marketing Course ( English )
Creación de videojuegos
Master en Creación de Videojuegos
Photoshop 2020 para fotógrafos. Conoce el Retoque nivel PRO!
Soporte Técnico a Computadoras en Entornos Corporativos
13 CURSO DE REPARACION DE IMPRESORAS
18. Copywriting como escribir para vender mas
Master en Reparación de iPhone
Crea Aplicaciones Java Web
Curso de creación de bots [CodigoFacilito]
Maestría en CSS3 Flexbox, Grid, SASS, Bootstrap 5
Robótica con Matlab Cinemática directa y Simulación
COMMUNITY AND CONTENT MANAGER
Aprende Android con Ejemplos
Adobe Premiere desde Cero
ELECTRICIDAD
Invertir en Criptomonedas - Blockchain - Trading - DeFi - UDEMY
Angular - De cero a experto
Electrónica desde cero
Creación de videojuegos
Universidad del dropshipping
Cursos PhotoShop
reparacion de ps2
Curso de Linux s4vitar
rofesional en Reparacion de Laptops
Curso Marketing PRO Masterclass - John Dani
Curso de Reparación de Discos Duros y Recuperación de Datos
CURSO WORD, POWERPOINT
EXCEL DE PRINCIPIANTE A EXPERTO
CURSO SOLIDWORKS
Seguridad Informática desde Cero
Master Unreal Engine 4 Para Arquitectura en Español
Aprende.realidad.aumentada.con.ARKit
COMO VENDER POR FB e IG ADS - FELIPE VERGARA
AUTOCAD 2019 DE PRINCIPIANTE A AVANZADO
Curso Word
Curso Adobe Illustrator Sé un experto en ilustración digital
Universidad Python 2021 - POO, Django, Flask y Postgresql