https://img100.pixhost.to/images/404/537368816_que-es-udemy-analisis-opiniones.jpg
6.07 GB | 19min 17s | mp4 | 1280X720  | 16:9
Genre:eLearning |Language:English


Files Included :
1 -Course Promotion.mp4 (28.61 MB)
2 -Course Introduction.mp4 (35.07 MB)
1 -1  writing a basic keylogger.mp4 (24.16 MB)
2 -2  global variables in keylogger.mp4 (34.01 MB)
3 -3  logging special keys.mp4 (46.95 MB)
4 -4  threading and recursion.mp4 (40.04 MB)
5 -5  OOP, object oriented programming.mp4 (83.95 MB)
6 -6  constructor methods and instance variables.mp4 (61.89 MB)
7 -7  logging key-strikes and reporting by emails.mp4 (124.76 MB)
1 -1  client - server communication and connection types.mp4 (16.97 MB)
10 -10  changing directory in file systems.mp4 (118.4 MB)
11 -11  downloading files from victim computers.mp4 (69.94 MB)
12 -12  download скачать any kind of file from hacked computer.mp4 (28.54 MB)
2 -2  Connecting two remote computer using socket.mp4 (50.53 MB)
3 -3  sending and receiving data over tcp.mp4 (39.42 MB)
4 -4  execute system commond remotly.mp4 (86.63 MB)
5 -5  implementing a server.mp4 (64.44 MB)
6 -6  implementing skeleton for server - client communication.mp4 (52.84 MB)
7 -7  Refactoring - Creating Listener Class.mp4 (54.81 MB)
8 -8  Refactoring - Creating Backdoor class.mp4 (32.07 MB)
9 -9  sending commands as list and implementing exit command.mp4 (50.65 MB)
1 -1  Converting Python Programs To Windows Binary Executables.mp4 (56.5 MB)
2 -2  Running Executables Silentely.mp4 (69.44 MB)
3 -3  Persistencey.mp4 (43.2 MB)
4 -4  running programs on startup.mp4 (175.77 MB)
5 -5  Creating a Basic Trojan Using download скачать   Execute Payload.mp4 (117.34 MB)
6 -6  Creating a Trojan By Embedding Files In Program Code.mp4 (75.22 MB)
7 -7  Adding an Icon to Generated Executables mp4.mp4 (67.42 MB)
1 -1  installing metasploitable.mp4 (41.01 MB)
10 -10  Recursively discovering all paths on a target website.mp4 (31.88 MB)
2 -2  accessing metasploitable from kali.mp4 (41.18 MB)
3 -3  sending get requests to web server.mp4 (65.27 MB)
4 -4  Discovering Subdomains.mp4 (35.99 MB)
5 -5  descovering google sub domain.mp4 (68.59 MB)
6 -6  descovering hidden path.mp4 (89.95 MB)
7 -7  extracting link from webpage using re.mp4 (91.35 MB)
8 -8  filtering results.mp4 (135.79 MB)
9 -9  getting only the unique link.mp4 (35.12 MB)
1 -1  sending post requests to website.mp4 (72.85 MB)
2 -2  guess login password.mp4 (82.13 MB)
1 -1  get and post method.mp4 (35.26 MB)
10 -10  descovering XSS vulnerabilities.mp4 (49.13 MB)
11 -11  implementing code to discover xss in forms.mp4 (80.18 MB)
12 -12  implementing code to discover xss in links.mp4 (62.26 MB)
13 -15  Automatically Discovering Vulnerabilities Using the Vulnerability Scanner.mp4 (63.56 MB)
2 -2  parsing html code.mp4 (61.45 MB)
3 -3  extracting html attributes.mp4 (73.08 MB)
4 -4  posting forms.mp4 (119.67 MB)
5 -5  building basic structure for vulnerability scanner.mp4 (94.65 MB)
6 -6  using default parameters.mp4 (16.37 MB)
7 -7  sendig request to a session.mp4 (97.49 MB)
8 -8  extracting submitting forms automatically.mp4 (173.49 MB)
9 -9  Implementing a method to run scanner.mp4 (53.22 MB)
1 -1 Lab Overview & Needed Software.mp4 (58.6 MB)
2 -2 Installing Windows and kali linux on Virtual Box.mp4 (48.55 MB)
3 -3 Installing VsCode in kali linux.mp4 (66.49 MB)
4 -4 Some Basic Command of Kali linux.mp4 (34.32 MB)
1 -1 Your First program in python.mp4 (26.35 MB)
10 -10 while loops in python.mp4 (38.41 MB)
11 -11 for loops in python.mp4 (32.9 MB)
12 -12 function in python.mp4 (54.97 MB)
13 -13 learning builds-in function from chatgpt in vscode.mp4 (42.93 MB)
14 -14 Installing some package and use it.mp4 (50.1 MB)
2 -2 Python Variables.mp4 (35.03 MB)
3 -3 DataType in Python.mp4 (29.82 MB)
4 -4 Casting in python.mp4 (24.28 MB)
5 -5 List in python.mp4 (26.68 MB)
6 -6 tuple in python.mp4 (21.63 MB)
7 -7 sets in python.mp4 (23.07 MB)
8 -7 dictionary in python.mp4 (23.07 MB)
9 -9 if condition in python.mp4 (26.01 MB)
1 -1 what is Mac address and how to change it.mp4 (58.09 MB)
10 -10 Decision Making in MAC Changer.mp4 (70.52 MB)
2 -2 Runing System command using subproccess modules.mp4 (37.46 MB)
3 -3 Implementing a very basic MAC changer.mp4 (28.83 MB)
4 -4 Implementing variables in MAC changer.mp4 (35.37 MB)
5 -5 Implementing the input function with MAC changer.mp4 (43.52 MB)
6 -6 handling Hijacking problem.mp4 (45.78 MB)
7 -7 Handling Command Line argument.mp4 (41.47 MB)
8 -8 Initialising variables base on command line arguments.mp4 (38.72 MB)
9 -9 uisng functions for Mac Changer.mp4 (42.83 MB)
1 -1 What is an algorithm and read the output.mp4 (38.08 MB)
2 -2 REgular Expression.mp4 (41.92 MB)
3 -3 Extracting Substring using Regex.mp4 (74.54 MB)
4 -4 Rfactoring the Housekeeping.mp4 (39.59 MB)
5 -5 Implementing the algorithm to check if the mac did changed.mp4 (38.28 MB)
1 -1 whati is ARP and what is it used for.mp4 (40.62 MB)
2 -2  design and algorithm to descover client connected to the same network.mp4 (16.08 MB)
3 -3  using scapy to create an arp request.mp4 (35.7 MB)
4 -4  combining frames to broadcast packets.mp4 (48.3 MB)
5 -5  sending and receiving packets.mp4 (29.75 MB)
6 -6  iterating over lists analysing packet.mp4 (62 MB)
7 -7  using excape characters to engance program output.mp4 (34.13 MB)
8 -8  iterating over nested data structures.mp4 (60.49 MB)
1 -1  what is arp spoofing program and how does it work.mp4 (33.47 MB)
2 -2  using arpspoof program.mp4 (38.51 MB)
3 -3  creating and sending ARP response.mp4 (37.22 MB)
4 -4  Extracting mac address from response.mp4 (55.1 MB)
5 -5  using loops in arp spoofing.mp4 (63.91 MB)
6 -6  improving the program by using counter.mp4 (33.76 MB)
7 -7  Dynamic Printing.mp4 (23.31 MB)
8 -8  Handling Exceptions.mp4 (24.81 MB)
9 -9  restoring arp table when an exception occures.mp4 (118.31 MB)
1 -1  sniffing packets using scapy.mp4 (67.89 MB)
2 -2  extracting data from a specific layer.mp4 (51.29 MB)
3 -3  Analysing Sniffed Packets   Extracting Fields From Layers.mp4 (68.9 MB)
4 -4  Analysing Fields   Extracting Passwords.mp4 (70.57 MB)
5 -5  Extracting URL.mp4 (68.52 MB)
6 -6  Extracting data from windows.mp4 (100.44 MB)
1 -1  Running Python Programs on Windows.mp4 (51.77 MB)
2 -2  capturing and analyzing arp responses.mp4 (44.47 MB)
3 -3  detecting arp spoofing attacks.mp4 (80.44 MB)]
Screenshot
https://images2.imgbox.com/94/af/rEpC15Mf_o.jpg



NitroFlare

Код:
https://nitroflare.com/view/D7BF3C4EE52861F/
https://nitroflare.com/view/78719B504234B75/
https://nitroflare.com/view/01[цензура]63BF2552CC/
https://nitroflare.com/view/10E2493041B4C8F/
https://nitroflare.com/view/BFC1DE4F42BE072/
https://nitroflare.com/view/D8F0F9C2388CD84/

DDownload

Код:
https://ddownload.com/n6kxvjwdjuc8
https://ddownload.com/5b5rn4gkvz91
https://ddownload.com/sfp0lx85qenc
https://ddownload.com/0495f019qf3v
https://ddownload.com/qqhu9yzayhck
https://ddownload.com/zodwotty1zb4