elhacker.INFO Downloads

[ índice de contenido ]

Copyright issues contact webmaster@elhacker.info
Icon  Name                                                                                        Size  
[Volver] Parent Directory - [VID] 00302 8.1_Understanding_Persistent_Access.mp4 16M [VID] 00084 Learning_objectives.mp4 16M [VID] 00240 11.3_Understanding_Wireless_Intrusion_Monitoring_and_Prevention.mp4 17M [VID] 00258 15.1_Introducing_iOS_Security.mp4 17M [VID] 00032 5.4_Testing_Web_Applications_-_Methodology.mp4 18M [VID] 00232 9.1_Understanding_Bluetooth_Vulnerabilities.mp4 19M [VID] 00037 5.9_Surveying_Defenses_to_Mitigate_Web_Application_Hacking.mp4 19M [VID] 00213 Learning_objectives.mp4 21M [VID] 00292 Learning_objectives.mp4 21M [VID] 00257 Learning_objectives.mp4 23M [VID] 00201 Learning_objectives.mp4 23M [VID] 00200 2.5_Attacking_the_Preferred_Network_List_PNL.mp4 23M [VID] 00231 Learning_objectives.mp4 23M [VID] 00222 Learning_objectives.mp4 24M [VID] 00242 Learning_objectives.mp4 24M [VID] 00197 2.2_Learning_Packet_Injection_Attacks.mp4 24M [VID] 00275 Learning_objectives.mp4 24M [VID] 00241 11.4_Understanding_Wireless_Security_Policies.mp4 24M [VID] 00237 Learning_objectives.mp4 25M [VID] 00313 Learning_objectives.mp4 25M [VID] 00038 Learning_objectives.mp4 25M [VID] 00023 Learning_objectives.mp4 25M [VID] 00016 Learning_objectives.mp4 26M [VID] 00310 Learning_objectives.mp4 26M [VID] 00188 Learning_objectives.mp4 27M [VID] 00089 Learning_objectives.mp4 27M [VID] 00235 10.1_Understanding_NFC_Vulnerabilities.mp4 27M [VID] 00226 Learning_objectives.mp4 27M [VID] 00293 6.1_Understanding_How_to_Initially_Get_on_the_Network.mp4 27M [VID] 00260 15.3_Surveying_Tools_for_Dissasembling_iOS_Applications.mp4 28M [VID] 00102 14.4_Maintaining_Persistence.mp4 28M [VID] 00012 Learning_objectives.mp4 28M [VID] 00205 Learning_objectives.mp4 28M [VID] 00046 Learning_objectives.mp4 29M [VID] 00253 Learning_objectives.mp4 29M [VID] 00076 Learning_objectives.mp4 29M [VID] 00315 10.2_Surveying_Continouos_Reporting_for_Enterprise_Continuous_Monitoring.mp4 29M [VID] 00049 7.3_Attacking_a_Database_-_Automated_Scanners.mp4 29M [VID] 00288 Learning_objectives.mp4 29M [VID] 00070 Learning_objectives.mp4 30M [VID] 00098 Learning_objectives.mp4 31M [VID] 00199 2.4_Attacking_Publicly_Secure_Packet_Forwarding_PSPF.mp4 31M [VID] 00271 Learning_objectives.mp4 31M [VID] 00093 Learning_objectives.mp4 31M [VID] 00259 15.2_Exploring_Jailbraking_iOS.mp4 31M [VID] 00216 Learning_objectives.mp4 31M [VID] 00297 Learning_objectives.mp4 32M [VID] 00173 Learning_objectives.mp4 32M [VID] 00234 Learning_objectives.mp4 33M [VID] 00091 12.2_Exploring_Post_Exploitation_Techniques.mp4 34M [VID] 00028 Learning_objectives.mp4 34M [VID] 00248 Learning_objectives.mp4 35M [VID] 00306 8.5_Understanding_That_Domain_Admin_Is_Not_the_End_Goal.mp4 36M [VID] 00207 4.2_Introducing_Airmon-ng.mp4 37M [VID] 00079 10.3_Overcoming_Defenses_for_Buffer_Overflow_Vulnerabilities.mp4 37M [VID] 00105 Learning_objectives.mp4 37M [VID] 00110 15.5_Distributing_Pen_Test_Reports.mp4 38M [VID] 00287 4.8_Understanding_How_to_Perform_Continuous_Monitoring.mp4 39M [VID] 00289 5.1_Exploring_How_to_Target_Hosts.mp4 40M [VID] 00279 Learning_objectives.mp4 40M [VID] 00195 Learning_objectives.mp4 41M [VID] 00176 Learning_objectives.mp4 41M [VID] 00160 7.1_Introducing_XSS.mp4 41M [VID] 00164 7.5_Understanding_Cross-Site_Request_Forgery_CSRF.mp4 42M [VID] 00041 6.3_Exploring_Password_Storage_Mechanisms.mp4 42M [VID] 00092 12.3_Covering_Your_Tracks.mp4 44M [VID] 00114 1.1_Understanding_Ethical_Hacking_and_Penetration_Testing.mp4 44M [VID] 00225 7.3_Learning_How_to_Hack_Default_Configurations.mp4 44M [VID] 00210 4.5_Introducing_Airdecap-ng.mp4 44M [VID] 00282 4.3_Understanding_Scanning_Tools.mp4 46M [VID] 00286 4.7_Understanding_Binary_and_Source_Code_Scanners.mp4 46M [VID] 00156 6.5_Understanding_XML_Injection.mp4 47M [VID] 00255 14.2_Exploring_Android_Emulators_and_SDK.mp4 47M [VID] 00245 12.3_Exploring_INSTEON.mp4 48M [VID] 00305 8.4_Surveying_Password_Cracking_amp_Reporting.mp4 48M [VID] 00212 4.7_Introducing_Airtun-ng.mp4 50M [VID] 00244 12.2_Exploring_ZigBee_and_IEEE_802.15.4.mp4 50M [VID] 00025 4.2_Exploring_Active_Reconnaissance_Methodologies_from_an_Ethical_Hacker.mp4 51M [VID] 00131 3.3_Surveying_DVWA.mp4 51M [VID] 00184 11.3_Surveying_Information_Disclosure_Vulnerabilities.mp4 52M [VID] 00148 Learning_objectives.mp4 52M [VID] 00080 10.4_Understanding_Fuzzing.mp4 52M [VID] 00104 14.6_Defending_Against_the_Advanced_Persistent_Threat.mp4 53M [VID] 00224 7.2_Using_Wireshark.mp4 53M [VID] 00236 10.2_Exploring_NFC_Attacks_and_Case_Studies.mp4 55M [VID] 00301 Learning_objectives.mp4 55M [VID] 00030 5.2_Understanding_Web_Architectures.mp4 56M [VID] 00111 Security_Penetration_Testing_-_Summary.mp4 56M [VID] 00130 3.2_Introducing_Vulnerable_Applications.mp4 57M [VID] 00198 2.3_Eavesdropping_and_Manipulating_Unencrypted_Wi-Fi_Communications.mp4 57M [VID] 00002 Learning_objectives.mp4 58M [VID] 00180 10.4_Mitigating_AJAX_HTML5_and_Client-side_Vulnerabilities.mp4 59M [VID] 00221 6.5_Exploring_WPA_Enterprise_Hacking.mp4 59M [VID] 00300 7.3_Surveying_Privilege_Escalation_Essential_Tools.mp4 59M [VID] 00247 12.5_Exploring_LoRA.mp4 59M [VID] 00223 7.1_Using_Kismet.mp4 60M [VID] 00051 Learning_objectives.mp4 61M [VID] 00045 6.7_Improving_Password_Security.mp4 63M [VID] 00181 Learning_objectives.mp4 63M [VID] 00132 3.4_Surveying_WebGoat.mp4 64M [VID] 00238 11.1_Understanding_the_Evolution_of_Wireless_Defenses.mp4 64M [VID] 00143 4.6_Understanding_How_Web_Application_Scanners_Work.mp4 64M [VID] 00069 8.18_Using_Network_Device_Hacking_Tools_to_Perform_a_MiTM_Attack.mp4 65M [VID] 00108 15.3_Understanding_the_Pen_Test_Report_Format.mp4 66M [VID] 00109 15.4_Exploring_Risk_Ratings.mp4 67M [VID] 00263 Learning_objectives.mp4 67M [VID] 00168 Learning_objectives.mp4 68M [VID] 00152 6.1_Understanding_Command_Injection.mp4 68M [VID] 00125 2.6_Exploring_Web_Application_Frameworks.mp4 69M [VID] 00151 Learning_objectives.mp4 69M [VID] 00280 4.1_Exploring_Network_and_Vulnerability_Scanning_Methodologies.mp4 69M [VID] 00294 6.2_Understanding_What_Hosts_to_Target_and_the_Scope_of_the_Testing.mp4 70M [VID] 00165 7.6_Exploiting_CSRF_Vulnerabilities.mp4 72M [VID] 00227 8.1_Defining_Evil_Twin_Attacks.mp4 73M [VID] 00010 1.8_Understanding_Vulnerabilities_Threats_and_Exploits.mp4 73M [VID] 00314 10.1_Surveying_Final_Reports_for_Transactional_Penetration_Testing_Events.mp4 74M [VID] 00298 7.1_Learning_Privilege_Escalation_Methodologies.mp4 74M [VID] 00123 2.4_Introducing_DevOps.mp4 74M [VID] 00116 1.3_Understanding_the_Need_for_Web_Application_Penetration_Testing.mp4 75M [VID] 00309 8.8_Understanding_How_to_Cover_Your_Tracks.mp4 78M [VID] 00042 6.4_Understanding_Password_Storage_Vulnerability.mp4 79M [VID] 00158 6.7_Mitigating_Injection_Vulnerabilities.mp4 79M [VID] 00303 8.2_Learning_How_to_Achieve_Domain_Admin_Access.mp4 79M [VID] 00261 Wireless_Networks_IoT_and_Mobile_Devices_Hacking_-_Summary.mp4 80M [VID] 00281 4.2_Understanding_the_Operational_Impact_of_Enterprise-wide_Scanning.mp4 80M [VID] 00179 10.3_Understanding_AJAX_Implementations.mp4 80M [VID] 00067 8.16_Surveying_Essential_Tools_for_Hacking_Network_Devices_-_MiTM_Tools.mp4 81M [VID] 00157 6.6_Exploiting_XML_Injection_Vulnerabilities.mp4 81M [VID] 00211 4.6_Introducing_Airserv-ng.mp4 82M [VID] 00161 7.2_Exploiting_Reflected_XSS_Vulnerabilities.mp4 82M [VID] 00113 Learning_objectives.mp4 83M [VID] 00107 15.2_Planning_and_Organizing_Your_Report.mp4 84M [VID] 00159 Learning_objectives.mp4 84M [VID] 00034 5.6_Testing_Web_Applications_-_Mapping.mp4 86M [VID] 00208 4.3_Understanding_Airodump-ng.mp4 87M [VID] 00006 1.4_Exploring_Penetration_Testing_Methodologies.mp4 88M [VID] 00011 1.9_Understanding_the_Current_Threat_Landscape.mp4 88M [VID] 00119 Learning_objectives.mp4 89M [VID] 00209 4.4_Introducing_Aireplay-ng.mp4 89M [VID] 00128 Learning_objectives.mp4 91M [VID] 00220 6.4_Using_Pyrit.mp4 91M [VID] 00316 Enterprise_Penetration_Testing_and_Continuous_Monitoring_-_Summary.mp4 92M [VID] 00214 5.1_Understanding_WEP_Fundamentals.mp4 92M [VID] 00252 13.4_Understanding_Mobile_Device_Security_Policies.mp4 93M [VID] 00082 10.6_Exploring_Mutation-based_Generation-based_and_Evolutionary_Fuzzers.mp4 94M [VID] 00174 9.1_Understanding_the_APIs.mp4 94M [VID] 00106 15.1_Understanding_Pen_Test_Reports_and_How_They_Are_Used.mp4 94M [VID] 00057 8.6_Hacking_Switches_-_Demo.mp4 95M [VID] 00291 5.3_Understanding_Enterprise_Application_Continuous_Testing.mp4 95M [VID] 00127 2.8_Introducing_Kubernetes.mp4 96M [VID] 00229 8.3_Using_Karmetasploit.mp4 97M [VID] 00068 8.17_Surveying_Essential_Tools_for_Hacking_Network_Devices_-_Linux_Tools.mp4 97M [VID] 00153 6.2_Exploiting_Command_Injection_Vulnerabilities.mp4 97M [VID] 00194 1.6_Understanding_802.1x_and_Wireless_Authentication_Mechanisms.mp4 98M [VID] 00296 6.4_Learning_How_to_Host_Enterprise_Capture_the_Flag_Events.mp4 98M [VID] 00133 3.5_Surveying_Hackazon.mp4 100M [VID] 00047 7.1_Reviewing_Database_Fundamentals.mp4 102M [VID] 00218 6.2_Surveying_Attacks_Against_WPA2-PSK_Networks.mp4 102M [VID] 00172 8.4_Mitigating_Flaws_in_Cryptographic_Implementations.mp4 103M [VID] 00036 5.8_Understanding_the_Exploitation_of_Web_Applications.mp4 103M [VID] 00308 8.7_Understanding_Data_Exfiltration_Techniques.mp4 103M [VID] 00137 Learning_objectives.mp4 104M [VID] 00134 3.6_Exploring_the_Web_Security_Dojo.mp4 105M [VID] 00162 7.3_Exploiting_Stored_XSS_Vulnerabilities.mp4 106M [VID] 00284 4.5_Using_Shodan_and_Its_API.mp4 106M [VID] 00020 3.4_Exploring_Passive_Reconnaissance_Methodologies_-_Searching_for_Names.mp4 107M [VID] 00163 7.4_Exploiting_DOM-based_XSS_Vulnerabilities.mp4 108M [VID] 00124 2.5_Exploring_Cloud_Services.mp4 108M [VID] 00136 3.8_Understanding_Cyber_Ranges_and_Capture_the_Flag_Events.mp4 109M [VID] 00135 3.7_Understanding_Web_Application_Proxies.mp4 109M [VID] 00050 7.4_Surveying_Defenses_to_Mitigate_Database_Hacking.mp4 110M [VID] 00250 13.2_Wrestling_with_the_BYOD_Dilemma.mp4 112M [VID] 00192 1.4_Understanding_Bluetooth.mp4 112M [VID] 00239 11.2_Surveying_Fast_and_Secure_Roaming.mp4 115M [VID] 00187 Introduction.mp4 115M [VID] 00144 4.7_Introducing_Nikto.mp4 117M [VID] 00040 6.2_Understanding_Authentication_and_Authorization_Attacks.mp4 118M [VID] 00053 8.2_Reviewing_Networking_Technology_Fundamentals_-_OSI_and_DoD_Internet_Models.mp4 118M [VID] 00251 13.3_Understanding_Mobile_Device_Management_MDM.mp4 120M [VID] 00033 5.5_Testing_Web_Applications_-_Reconnaissance.mp4 121M [VID] 00117 1.4_Exploring_How_Web_Applications_Have_Evolved_Over_Time.mp4 123M [VID] 00088 11.4_Gathering_Network_Information_Using_PowerShell.mp4 123M [VID] 00058 8.7_Hacking_Switches_-_ARP_Vulnerabilities_and_ARP_Cache_Poisoning.mp4 124M [VID] 00262 Introduction.mp4 124M [VID] 00202 3.1_Understanding_Wireless_Antennas.mp4 125M [VID] 00063 8.12_Performing_Firewall_Reconnaissance_and_Tunneling.mp4 126M [VID] 00304 8.3_Understanding_How_to_Compromise_User_Credentials.mp4 128M [VID] 00217 6.1_Understanding_WPA_Fundamentals.mp4 129M [VID] 00054 8.3_Reviewing_Networking_Technology_Fundamentals_-_Forwarding_Device_Architecture.mp4 129M [VID] 00193 1.5_Understanding_NFC.mp4 130M [VID] 00138 4.1_Understanding_Passive_vs._Active_Reconnaissance.mp4 131M [VID] 00182 11.1_Understanding_the_Other_Common_Security_Flaws_in_Web_Applications.mp4 132M [VID] 00015 2.3_Managing_Kali_Services.mp4 132M [VID] 00115 1.2_Surveying_Web_Application_Penetration_Testing_Methodologies.mp4 133M [VID] 00024 4.1_Understanding_Active_Reconnaissance.mp4 134M [VID] 00055 8.4_Building_an_Internetwork_Topology_Using_VIRL.mp4 134M [VID] 00005 1.3_Understanding_the_Legal_Aspects_of_Penetration_Testing.mp4 134M [VID] 00141 4.4_Exploring_CMS_and_Framework_Identification.mp4 134M [VID] 00014 2.2_Examining_Kali_Modules_and_Architecture.mp4 135M [VID] 00215 5.2_Learning_How_to_Crack_WEP.mp4 136M [VID] 00171 8.3_Surveying_Examples_of_Crypto-based_Attacks_and_Vulnerabilities.mp4 136M [VID] 00269 1.6_Understanding_How_to_Create_and_Hire_the_Red_Team.mp4 137M [VID] 00233 9.2_Surveying_Tools_for_Bluetooth_Monitoring.mp4 137M [VID] 00027 4.4_Surveying_Essential_Tools_for_Active_Reconnaissance_-_Network_and_Web.mp4 138M [VID] 00013 2.1_Installing_Kali.mp4 138M [VID] 00175 9.2_Exploring_the_Tools_Used_to_Test_the_APIs.mp4 139M [VID] 00307 8.6_Searching_for_Sensitive_Data.mp4 142M [VID] 00191 1.3_Understanding_the_802.11_Standard.mp4 144M [VID] 00035 5.7_Testing_Web_Applications_-_Vulnerability_Discovery.mp4 145M [VID] 00274 2.3_Understanding_Active_Recon.mp4 145M [VID] 00285 4.6_Exploring_Vulnerability_Scanners.mp4 149M [VID] 00270 1.7_Understanding_Red_Team_Collaboration.mp4 151M [VID] 00142 4.5_Surveying_Web_Crawlers_and_Directory_Brute_Force.mp4 152M [VID] 00081 10.5_Creating_a_Fuzzing_Strategy.mp4 152M [VID] 00019 3.3_Exploring_Passive_Reconnaissance_Methodologies_-_Searching_for_Files.mp4 153M [VID] 00277 3.2_Understanding_How_to_Target_Employees.mp4 157M [VID] 00073 9.3_Surveying_Wireless_Hacking_Tools_-_Software.mp4 159M [VID] 00266 1.3_Understanding_the_Difference_Between_Red_and_Blue_Teams.mp4 160M [VID] 00249 13.1_Understanding_OWASP_Mobile_Device_Vulnerabilities.mp4 160M [VID] 00139 4.2_Using_Search_Engines_and_Public_Information.mp4 162M [VID] 00039 6.1_Understanding_Authentication_and_Authorization_Mechanisms.mp4 162M [VID] 00099 14.1_Understanding_Persistence.mp4 164M [VID] 00219 6.3_Using_coWPAtty.mp4 165M [VID] 00186 Hacking_Web_Applications_-_Summary.mp4 165M [VID] 00204 3.3_Building_Your_Own_Lab.mp4 165M [VID] 00078 10.2_Exploiting_Buffer_Overflows.mp4 165M [VID] 00029 5.1_Understanding_Web_Applications.mp4 166M [VID] 00112 Introduction.mp4 166M [VID] 00118 1.5_Exploring_What_Programming_Languages_You_Should_Know.mp4 167M [VID] 00121 2.2_Exploring_the_HTTP_Request_and_Response.mp4 167M [VID] 00154 6.3_Understanding_SQL_Injection.mp4 169M [VID] 00146 4.9_Introducing_OWASP_Zed_Application_Proxy_ZAP.mp4 170M [VID] 00206 4.1_Introducing_the_Aircrack-ng_Suite.mp4 171M [VID] 00290 5.2_Exploring_Web_App_Testing_Essential_Tools.mp4 171M [VID] 00007 1.5_Exploring_Penetration_Testing_and_other_Cyber_Security_Certifications.mp4 172M [VID] 00031 5.3_Uncovering_Web_Vulnerabilities.mp4 177M [VID] 00095 13.2_Exploring_the_Social_Engineering_Toolkit_SET.mp4 178M [VID] 00021 3.5_Surveying_Essential_Tools_for_Passive_Reconnaissance_-_SpiderFoot.mp4 179M [VID] 00312 9.2_Exploring_How_to_Test_in_the_Cloud.mp4 182M [VID] 00126 2.7_Surveying_Docker_Containers.mp4 182M [VID] 00052 8.1_Understanding_the_Reasons_for_and_the_Steps_to_Hacking_a_Network.mp4 185M [VID] 00166 7.7_Evading_Web_Application_Security_Controls.mp4 185M [VID] 00267 1.4_Exploring_How_to_Plan_and_Fund_a_Red_Team.mp4 186M [VID] 00177 10.1_Surveying_the_Client-side_Code_and_Storage.mp4 187M [VID] 00075 9.5_Understanding_Hacking_Wireless_Clients.mp4 188M [VID] 00077 10.1_Understanding_Buffer_Overflows.mp4 188M [VID] 00278 3.3_Exploiting_Social_Engineering_Tools.mp4 192M [VID] 00083 10.7_Surveying_Tools_to_Find_and_Exploit_Buffer_Overflows.mp4 193M [VID] 00096 13.3_Exploring_Maltego.mp4 196M [VID] 00044 6.6_Cracking_Passwords_with_hashcat.mp4 197M [VID] 00065 8.14_Surveying_Essential_Tools_for_Hacking_Network_Devices_-_Switch_and_Router.mp4 200M [VID] 00090 12.1_Understanding_Security_Evasion_Techniques.mp4 201M [VID] 00283 4.4_Exploring_How_to_Automate_Scans.mp4 205M [VID] 00066 8.15_Surveying_Essential_Tools_for_Hacking_Network_Devices_-_ARP_Spoofing_Tools.mp4 206M [VID] 00094 13.1_Understanding_Social_Engineering.mp4 210M [VID] 00190 1.2_Introducing_Wireless_Standards_and_Technologies.mp4 210M [VID] 00311 9.1_Understanding_the_Challenge_of_Testing_Cloud_Services.mp4 211M [VID] 00268 1.5_Surveying_Operational_Processes_and_Policies_for_the_Red_Team.mp4 212M [VID] 00178 10.2_Understanding_HTML5_Implementations.mp4 212M [VID] 00246 12.4_Exploring_ZWave.mp4 212M [VID] 00103 14.5_Understanding_Pivoting_and_Lateral_Movement.mp4 215M [VID] 00003 1.1_Introducing_Ethical_Hacking_and_Pen_Testing.mp4 216M [VID] 00299 7.2_Understanding_Lateral_Movement.mp4 218M [VID] 00120 2.1_Understanding_the_Web_Application_Protocols.mp4 219M [VID] 00295 6.3_Exploring_the_Hidden_Cost_of_Open_Source_Software.mp4 223M [VID] 00254 14.1_Exploring_The_Android_Security_Model.mp4 223M [VID] 00230 8.4_Exploring_the_WiFi_Pineapple.mp4 223M [VID] 00228 8.2_Performing_Evil_Twin_Attacks.mp4 228M [VID] 00072 9.2_Surveying_Wireless_Hacking_Tools_-_Wireless_Adapters.mp4 230M [VID] 00122 2.3_Surveying_Session_Management_and_Cookies.mp4 231M [VID] 00276 3.1_Surveying_Social_Engineering_Methodologies.mp4 231M [VID] 00071 9.1_Reviewing_Wireless_Technology_Fundamentals.mp4 236M [VID] 00167 7.8_Mitigating_XSS_and_CSRF_Vulnerabilities.mp4 240M [VID] 00048 7.2_Attacking_a_Database_-_Discovery_Validation_and_Exploitation.mp4 243M [VID] 00085 11.1_Understanding_Powershell.mp4 245M [VID] 00001 Introduction.mp4 246M [VID] 00087 11.3_Pwning_Windows_Using_PowerShell_-_Empire_Modules_and_Advanced_Exploits.mp4 247M [VID] 00097 13.4_Surveying_Social_Engineering_Case_Studies.mp4 250M [VID] 00189 1.1_Introducing_Wireless_Hacking.mp4 254M [VID] 00243 12.1_Understanding_IoT_Fundamentals.mp4 258M [VID] 00009 1.7_Building_Your_Own_Lab_-_VIRL_and_Operating_System_Software.mp4 264M [VID] 00026 4.3_Surveying_Essential_Tools_for_Active_Reconnaissance_-_Port_Scanning.mp4 264M [VID] 00147 4.10_Introducing_OpenVAS.mp4 266M [VID] 00018 3.2_Exploring_Passive_Reconnaissance_Methodologies_-_Discovering_Host.mp4 268M [VID] 00060 8.9_Examining_ICMP_First_Hop_Redundancy_and_Routing_Protocol_Attacks.mp4 270M [VID] 00017 3.1_Understanding_Passive_Reconnaissance.mp4 270M [VID] 00256 14.3_Understanding_Android_Hacking_Tools_and_Methodologies.mp4 276M [VID] 00064 8.13_Surveying_Essential_Tools_for_Hacking_Network_Devices_-_Packet_Capture.mp4 285M [VID] 00170 8.2_Identifying_Common_Flaws_in_Data_Storage_and_Transmission.mp4 289M [VID] 00196 2.1_Understanding_Wireless_Client_Attacks_and_Their_Motives.mp4 292M [VID] 00100 14.2_Gaining_Network_Access.mp4 294M [VID] 00185 11.4_Fuzzing_Web_Applications.mp4 297M [VID] 00183 11.2_Exploiting_Insecure_Direct_Object_References_and_Path_Traversal.mp4 309M [VID] 00074 9.4_Hacking_WEP_WPA_and_Other_Protocols.mp4 311M [VID] 00272 2.1_Understanding_the_Red_Team_Environment.mp4 313M [VID] 00264 1.1_Introducing_Red_Teams_and_Enterprise_Hacking.mp4 315M [VID] 00062 8.11_Understanding_Firewall_Fundamentals_and_Levels_of_Inspection.mp4 315M [VID] 00273 2.2_Understanding_Passive_Recon.mp4 334M [VID] 00203 3.2_Surveying_Wi-Fi_Devices_Like_the_Pinneaple.mp4 348M [VID] 00004 1.2_Getting_Started_with_Ethical_Hacking_and_Pen_Testing.mp4 353M [VID] 00059 8.8_Reviewing_Router_Fundamentals.mp4 358M [VID] 00101 14.3_Gaining_Network_Access_with_SMB_Relay_Attacks_NetBIOS_Name_Service.mp4 386M [VID] 00043 6.5_Cracking_Passwords_with_John_the_Ripper.mp4 402M [VID] 00086 11.2_Pwning_Windows_Using_PowerShell_-_Empire_Components_Setup_and_Basic_Exploits.mp4 404M [VID] 00008 1.6_Building_Your_Own_Lab_-_Overview.mp4 434M [VID] 00265 1.2_Understanding_Enterprise_Wide_Penetration_Testing.mp4 435M [VID] 00150 5.2_Exploring_Session_Management_Mechanisms_and_Related_Vulnerabilities.mp4 439M [VID] 00056 8.5_Hacking_Switches_-_Reviewing_Ethernet_Fundamentals.mp4 445M [VID] 00061 8.10_Hacking_the_Management_Plane.mp4 448M [VID] 00022 3.6_Surveying_Essential_Tools_for_Passive_Reconnaissance_-_Recon-ng.mp4 466M [VID] 00140 4.3_Exploring_Shodan_Maltego_Recon-NG_SpiderFoot_and_TheHarvester.mp4 488M [VID] 00145 4.8_Introducing_the_Burp_Suite.mp4 524M [VID] 00129 3.1_Exploring_Kali_Linux.mp4 559M [VID] 00149 5.1_Understanding_Authentication_Schemes_in_Web_Applications.mp4 699M [VID] 00169 8.1_Introducing_Cryptography_Encryption_and_Hashing_Protocols.mp4 722M [VID] 00155 6.4_Exploiting_SQL_Injection_Vulnerabilities.mp4 808M

Recent Courses

CEHv13
HackTricks - AWS Red Team Expert (ARTE)
Certified Exploit Development Professional [CEDP]
Advance Exploitation Course By Umar Sabil
CompTIA Security+ (SY0-701 & SY0-601) Full Training Guide
ITProTV - LPIC-2 Linux Engineer (202-450)_
OffSec - PEN-210 - Foundational Wireless Network Attacks
OffSec EXP-301
FOR508 Videos 2023
Introduction Windows Malware Development
Red-Teaming-Exploit-Development-with-Assembly-and-C-MSAC
SEC450 Videos 2020
AWS Cloud Red Team Specialist [CARTS]
SEC670 MP3 2025.4
Zero Point Security - Red Team Ops 2025.2
Certified Red Team Analyst [CCRTA] 2022
EC Council - DroneWorkshop
HTB - AI Red Teamer 2025.3 Path
SEC670 Red Teaming Tools - Developing Windows Implants, Shellcode, Command and Control
Maltrak - Threat Hunting In Microsoft Sentinel and Defender
Hybrid Multi-Cloud Red Team Specialist [CHMRTS]
Stealth Cyber Operator [CSCO]
Process Injection Analyst [CPIA]
Red Team Specialist [CRTS V1]
Practical Hardware Hacking
Red Team Infra Dev [CRT-ID]
Purple Team Analyst [CPTA V1]
Assembly 101
EC-Council Certified Cloud Security Engineer (CCSE)
Udemy - Web Security & Bug Bounty Learn Penetration Testing 2025
INE - Advanced Web Application Penetration Testing (New)_
Windows Red Team Lab (CRTE) 2025.2
Mandiant - Malware Analysis 2025
13Cubed - Investigating Linux Devices
Zero Point Security - DevOps for Pentesters 2025.3
Offensive Development w Greg Hatcher & John Stigerwalt
Pluralsight - Windows Server 2022 Administration
BittenTech - TechHacker Ethical Hacking and Cyber Security
Kaspersky - Hunting APTs like a Ninja with YARA
A-Windows_Process_Injection_For_Red-Blue_Team
QURE Academy - Advanced Attacks Against Active Directory
EC-Council - Certified Network Defender v3 2024.11
EC-Council - Cyber Security Technician
PEN-200 - Penetration Testing with Kali Linux Videos
EDRPv3 EC-Council Disaster Recovery Professional
OffSec - PEN-200 2024.11
Practical Analysis with Security Onion
SANS ON DEMAND COURSE
Top 5 Tools & Techniques for Penetration Testing
CVE's for Bug Bounties & Penetration Testing
Creating Batch Scripts For Android
Oreilly - Mastering Cybersecurity with Python - From Basics to Advanced Defense
Recon For Bug Bounties & Penetration Testing
Bug Bounty Hunting and Penetration Testing v2
Bug Bounty Hunting and Penetration Testing v1
Bootcamp de Backend Avanzado_ Microservicios
Sketchup desde Cero para Arquitectos
Creación y consulta de bases de datos con ChatGPT y SQL
Storytelling Audiovisual para redes sociales
Introducción a Frameworks de Frontend con Vue 3"
Trafficker Expert
2. Digital Marketing Course ( English )
Creación de videojuegos
Master en Creación de Videojuegos
Photoshop 2020 para fotógrafos. Conoce el Retoque nivel PRO!
Soporte Técnico a Computadoras en Entornos Corporativos
13 CURSO DE REPARACION DE IMPRESORAS
18. Copywriting como escribir para vender mas
Master en Reparación de iPhone
Crea Aplicaciones Java Web
Curso de creación de bots [CodigoFacilito]
Maestría en CSS3 Flexbox, Grid, SASS, Bootstrap 5
Robótica con Matlab Cinemática directa y Simulación
COMMUNITY AND CONTENT MANAGER
Aprende Android con Ejemplos
Adobe Premiere desde Cero
ELECTRICIDAD
Invertir en Criptomonedas - Blockchain - Trading - DeFi - UDEMY
Angular - De cero a experto
Electrónica desde cero
Creación de videojuegos
Universidad del dropshipping
Cursos PhotoShop
reparacion de ps2
Curso de Linux s4vitar
rofesional en Reparacion de Laptops
Curso Marketing PRO Masterclass - John Dani
Curso de Reparación de Discos Duros y Recuperación de Datos
CURSO WORD, POWERPOINT
EXCEL DE PRINCIPIANTE A EXPERTO
CURSO SOLIDWORKS
Seguridad Informática desde Cero
Master Unreal Engine 4 Para Arquitectura en Español
Aprende.realidad.aumentada.con.ARKit
COMO VENDER POR FB e IG ADS - FELIPE VERGARA
AUTOCAD 2019 DE PRINCIPIANTE A AVANZADO
Curso Word
Curso Adobe Illustrator Sé un experto en ilustración digital
Universidad Python 2021 - POO, Django, Flask y Postgresql