Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
0. Join Our Discord for More Awesome Stuff!.txt |
156B |
01_01_introduction-to-command-and-control.en.srt |
16.93KB |
01_01_introduction-to-command-and-control.en.txt |
10.68KB |
01_01_introduction-to-command-and-control.mp4 |
20.34MB |
01_01_introduction-to-credential-access.en.srt |
16.22KB |
01_01_introduction-to-credential-access.en.txt |
10.24KB |
01_01_introduction-to-credential-access.mp4 |
19.31MB |
01_01_introduction-to-defensive-python.en.srt |
15.98KB |
01_01_introduction-to-defensive-python.en.txt |
10.21KB |
01_01_introduction-to-defensive-python.mp4 |
19.38MB |
01_01_introduction-to-initial-access.en.srt |
20.51KB |
01_01_introduction-to-initial-access.en.txt |
10.78KB |
01_01_introduction-to-initial-access.mp4 |
21.31MB |
01_01_introduction-to-reconnaissance.en.srt |
18.00KB |
01_01_introduction-to-reconnaissance.en.txt |
11.41KB |
01_01_introduction-to-reconnaissance.mp4 |
22.03MB |
01_01_welcome-to-advanced-python-for-cybersecurity.en.srt |
1.87KB |
01_01_welcome-to-advanced-python-for-cybersecurity.en.txt |
1009B |
01_01_welcome-to-advanced-python-for-cybersecurity.mp4 |
8.16MB |
01_02_brute-force-detection-with-windows-events.en.srt |
24.65KB |
01_02_brute-force-detection-with-windows-events.en.txt |
12.90KB |
01_02_brute-force-detection-with-windows-events.mp4 |
36.96MB |
01_02_dumping-chrome-credentials-with-python.en.srt |
17.24KB |
01_02_dumping-chrome-credentials-with-python.en.txt |
8.91KB |
01_02_dumping-chrome-credentials-with-python.mp4 |
33.15MB |
01_02_generating-password-variations-with-python.en.srt |
19.73KB |
01_02_generating-password-variations-with-python.en.txt |
10.30KB |
01_02_generating-password-variations-with-python.mp4 |
44.38MB |
01_02_introduction-to-python.en.srt |
11.14KB |
01_02_introduction-to-python.en.txt |
5.84KB |
01_02_introduction-to-python.mp4 |
10.63MB |
01_02_querying-shodan-with-python.en.srt |
20.29KB |
01_02_querying-shodan-with-python.en.txt |
10.55KB |
01_02_querying-shodan-with-python.mp4 |
41.92MB |
01_02_traffic-analysis-with-python.en.srt |
26.89KB |
01_02_traffic-analysis-with-python.en.txt |
14.01KB |
01_02_traffic-analysis-with-python.mp4 |
41.69MB |
01_03_calculating-entropy-with-python.en.srt |
13.96KB |
01_03_calculating-entropy-with-python.en.txt |
7.33KB |
01_03_calculating-entropy-with-python.mp4 |
18.78MB |
01_03_detecting-ftp-brute-force-with-scapy.en.srt |
20.13KB |
01_03_detecting-ftp-brute-force-with-scapy.en.txt |
10.57KB |
01_03_detecting-ftp-brute-force-with-scapy.mp4 |
33.50MB |
01_03_dns-queries-with-python.en.srt |
18.59KB |
01_03_dns-queries-with-python.en.txt |
11.65KB |
01_03_dns-queries-with-python.mp4 |
29.44MB |
01_03_generating-three-random-words-with-python.en.srt |
14.91KB |
01_03_generating-three-random-words-with-python.en.txt |
7.77KB |
01_03_generating-three-random-words-with-python.mp4 |
17.89MB |
01_03_introduction-to-mitre-att-ck-and-shield.en.srt |
16.54KB |
01_03_introduction-to-mitre-att-ck-and-shield.en.txt |
8.58KB |
01_03_introduction-to-mitre-att-ck-and-shield.mp4 |
20.62MB |
01_03_searching-the-registry-with-python.en.srt |
23.00KB |
01_03_searching-the-registry-with-python.en.txt |
14.25KB |
01_03_searching-the-registry-with-python.mp4 |
43.10MB |
01_04_automating-brute-force.en.srt |
14.56KB |
01_04_automating-brute-force.en.txt |
9.30KB |
01_04_automating-brute-force.mp4 |
24.73MB |
01_04_detecting-encodings-with-python.en.srt |
14.44KB |
01_04_detecting-encodings-with-python.en.txt |
9.11KB |
01_04_detecting-encodings-with-python.mp4 |
23.01MB |
01_04_detecting-ssh-brute-force-with-scapy.en.srt |
25.40KB |
01_04_detecting-ssh-brute-force-with-scapy.en.txt |
13.40KB |
01_04_detecting-ssh-brute-force-with-scapy.mp4 |
47.37MB |
01_04_network-scanning-with-scapy.en.srt |
25.12KB |
01_04_network-scanning-with-scapy.en.txt |
13.02KB |
01_04_network-scanning-with-scapy.mp4 |
36.97MB |
01_04_searching-the-system-with-python.en.srt |
23.70KB |
01_04_searching-the-system-with-python.en.txt |
12.39KB |
01_04_searching-the-system-with-python.mp4 |
33.30MB |
01_05_advanced-python-reconnaissance_exam.html |
11.34KB |
01_05_building-c2-packets-with-python.en.srt |
19.01KB |
01_05_building-c2-packets-with-python.en.txt |
9.82KB |
01_05_building-c2-packets-with-python.mp4 |
25.88MB |
01_05_cracking-the-linux-passwords-with-python.en.srt |
15.42KB |
01_05_cracking-the-linux-passwords-with-python.en.txt |
9.86KB |
01_05_cracking-the-linux-passwords-with-python.mp4 |
23.27MB |
01_05_feature-selection-for-traffic-analysis.en.srt |
23.20KB |
01_05_feature-selection-for-traffic-analysis.en.txt |
11.99KB |
01_05_feature-selection-for-traffic-analysis.mp4 |
43.14MB |
01_05_service-detection-with-python.en.srt |
31.75KB |
01_05_service-detection-with-python.en.txt |
16.37KB |
01_05_service-detection-with-python.mp4 |
43.52MB |
01_06_analyzing-passwords-with-python.en.srt |
22.37KB |
01_06_analyzing-passwords-with-python.en.txt |
11.68KB |
01_06_analyzing-passwords-with-python.mp4 |
32.86MB |
01_06_cve-lookups-with-python.en.srt |
7.89KB |
01_06_cve-lookups-with-python.en.txt |
4.98KB |
01_06_cve-lookups-with-python.mp4 |
12.63MB |
01_06_detecting-anomalous-network-traffic-with-scapy.en.srt |
14.57KB |
01_06_detecting-anomalous-network-traffic-with-scapy.en.txt |
7.60KB |
01_06_detecting-anomalous-network-traffic-with-scapy.mp4 |
27.48MB |
01_07_connection-hijacking-with-scapy.en.srt |
28.17KB |
01_07_connection-hijacking-with-scapy.en.txt |
17.79KB |
01_07_connection-hijacking-with-scapy.mp4 |
46.12MB |
01_07_establishing-command-and-control-and-finding-credentials_exam.html |
10.50KB |
01_08_defensive-python_exam.html |
5.08KB |