FILENAME | SIZE |  | 1. Introduction/1. The Undeniable Power of Ethical Hacking.mp4 | 11.6 MB |
 | 1. Introduction/1. The Undeniable Power of Ethical Hacking.srt | 3.2 KB |
 | 10. Proven Social Engineering Techniques/1. Attack Vectors.mp4 | 14.7 MB |
 | 10. Proven Social Engineering Techniques/1. Attack Vectors.srt | 5.1 KB |
 | 10. Proven Social Engineering Techniques/2. Open-source Intelligence (OSINT).mp4 | 6.7 MB |
 | 10. Proven Social Engineering Techniques/2. Open-source Intelligence (OSINT).srt | 1.8 KB |
 | 10. Proven Social Engineering Techniques/3. Google Dorks Live Examples.mp4 | 60.1 MB |
 | 10. Proven Social Engineering Techniques/3. Google Dorks Live Examples.srt | 7.6 KB |
 | 10. Proven Social Engineering Techniques/3.1 Sample Google Dorks.txt | 299 B |
 | 10. Proven Social Engineering Techniques/3.2 Exploit Database.html | 88 B |
 | 10. Proven Social Engineering Techniques/4. Track and Spoof Emails Easily.mp4 | 37.6 MB |
 | 10. Proven Social Engineering Techniques/4. Track and Spoof Emails Easily.srt | 4.5 KB |
 | 10. Proven Social Engineering Techniques/5. Collect and Visualize Data with Maltego.mp4 | 68.5 MB |
 | 10. Proven Social Engineering Techniques/5. Collect and Visualize Data with Maltego.srt | 6.3 KB |
 | 10. Proven Social Engineering Techniques/6. Execute a Phishing Attack.mp4 | 72 MB |
 | 10. Proven Social Engineering Techniques/6. Execute a Phishing Attack.srt | 5.7 KB |
 | 10. Proven Social Engineering Techniques/7. Hack Facebook, Twitter, and Gmail Accounts.mp4 | 88.5 MB |
 | 10. Proven Social Engineering Techniques/7. Hack Facebook, Twitter, and Gmail Accounts.srt | 7.2 KB |
 | 11. Attack Mobile Phones/1. Mobile Attack Surface.mp4 | 14.4 MB |
 | 11. Attack Mobile Phones/1. Mobile Attack Surface.srt | 5.1 KB |
 | 11. Attack Mobile Phones/2. Decrypt SSL Session.mp4 | 91.2 MB |
 | 11. Attack Mobile Phones/2. Decrypt SSL Session.srt | 14.2 KB |
 | 11. Attack Mobile Phones/3. Reverse Engineer an Android Application.mp4 | 78.8 MB |
 | 11. Attack Mobile Phones/3. Reverse Engineer an Android Application.srt | 7.4 KB |
 | 11. Attack Mobile Phones/3.1 ProGuard.html | 109 B |
 | 11. Attack Mobile Phones/4. Hack an Android Phone and Download its Contacts.mp4 | 74.4 MB |
 | 11. Attack Mobile Phones/4. Hack an Android Phone and Download its Contacts.srt | 7.3 KB |
 | 12. Maintain Access/1. Post-Exploitation Terminologies.mp4 | 13.2 MB |
 | 12. Maintain Access/1. Post-Exploitation Terminologies.srt | 5 KB |
 | 12. Maintain Access/2. Backdoor Tools Explained.mp4 | 15 MB |
 | 12. Maintain Access/2. Backdoor Tools Explained.srt | 4.8 KB |
 | 12. Maintain Access/3. Netcat Simplified.mp4 | 97.7 MB |
 | 12. Maintain Access/3. Netcat Simplified.srt | 12.6 KB |
 | 12. Maintain Access/3.1 Netcat Download Source 2.html | 100 B |
 | 12. Maintain Access/3.2 Netcat Download Source 1.html | 94 B |
 | 12. Maintain Access/4. Install a Backdoor.mp4 | 95.1 MB |
 | 12. Maintain Access/4. Install a Backdoor.srt | 6.3 KB |
 | 12. Maintain Access/5. Deface a Website in Few Seconds.mp4 | 54.6 MB |
 | 12. Maintain Access/5. Deface a Website in Few Seconds.srt | 5.4 KB |
 | 12. Maintain Access/6. Create a Simple Ransomware.mp4 | 33.5 MB |
 | 12. Maintain Access/6. Create a Simple Ransomware.srt | 3.5 KB |
 | 12. Maintain Access/7. Understand Hidden Tear Ransomware.mp4 | 109.9 MB |
 | 12. Maintain Access/7. Understand Hidden Tear Ransomware.srt | 109.9 MB |
 | 12. Maintain Access/7.1 Hidden Tear Source Code.html | 99 B |
 | 12. Maintain Access/8. Bypass Firewalls by Tunneling Data and Commands over DNS.mp4 | 69.5 MB |
 | 12. Maintain Access/8. Bypass Firewalls by Tunneling Data and Commands over DNS.srt | 6.5 KB |
 | 13. Let’s Get Real/1. Publish Your Weapons Online.mp4 | 31.3 MB |
 | 13. Let’s Get Real/1. Publish Your Weapons Online.srt | 3.8 KB |
 | 13. Let’s Get Real/1.1 Setup DNSCAT.txt | 185 B |
 | 13. Let’s Get Real/2. Stay Anonymous Online.mp4 | 41.9 MB |
 | 13. Let’s Get Real/2. Stay Anonymous Online.srt | 28 MB |
 | 13. Let’s Get Real/2.1 NO IP.html | 82 B |
 | 13. Let’s Get Real/3. Setup a Stealthy Command and Control Center Online.mp4 | 51.2 MB |
 | 13. Let’s Get Real/3. Setup a Stealthy Command and Control Center Online.srt | 6.1 KB |
 | 14. How to Prepare and Present Your Report/1. Report Writing Techniques.mp4 | 87.5 MB |
 | 14. How to Prepare and Present Your Report/1. Report Writing Techniques.srt | 15.1 KB |
 | 14. How to Prepare and Present Your Report/2. How Can Pentest.ws Help You.mp4 | 71 MB |
 | 14. How to Prepare and Present Your Report/2. How Can Pentest.ws Help You.srt | 71 MB |
 | 14. How to Prepare and Present Your Report/2.1 Pentest.ws.html | 84 B |
 | 15. Secret Sauce BONUS/1. Create a WiFi Jammer.mp4 | 127.4 MB |
 | 15. Secret Sauce BONUS/1. Create a WiFi Jammer.srt | 11.9 KB |
 | 15. Secret Sauce BONUS/2. Create a $3 Rubber Ducky Key-logger.mp4 | 113.1 MB |
 | 15. Secret Sauce BONUS/2. Create a $3 Rubber Ducky Key-logger.srt | 11.3 KB |
 | 15. Secret Sauce BONUS/2.1 Extra Resource List 3.html | 84 B |
 | 15. Secret Sauce BONUS/2.2 Extra Resource List 2.html | 84 B |
 | 15. Secret Sauce BONUS/2.3 Extra Resource List 5.html | 84 B |
 | 15. Secret Sauce BONUS/2.4 Extra Resource List 1.html | 84 B |
 | 15. Secret Sauce BONUS/2.5 Extra Resource List 7.html | 84 B |
 | 15. Secret Sauce BONUS/2.6 Extra Resource List 4.html | 84 B |
 | 15. Secret Sauce BONUS/2.7 Extra Resource List 6.html | 84 B |
 | 15. Secret Sauce BONUS/2.8 Course File Resources.html | 97 B |
 | 15. Secret Sauce BONUS/2.9 Extra Resource List 8.html | 84 B |
 | 2. Setup Your Lab/1. Why KALI.mp4 | 7.6 MB |
 | 2. Setup Your Lab/1. Why KALI.srt | 2.2 KB |
 | 2. Setup Your Lab/2. Different Installation Methods.mp4 | 4.3 MB |
 | 2. Setup Your Lab/2. Different Installation Methods.srt | 903 B |
 | 2. Setup Your Lab/3. Install KALI.mp4 | 31.7 MB |
 | 2. Setup Your Lab/3. Install KALI.srt | 5.4 KB |
 | 2. Setup Your Lab/3.1 username_update.txt | 665 B |
 | 2. Setup Your Lab/4. Color Coding for Root User.mp4 | 8 MB |
 | 2. Setup Your Lab/4. Color Coding for Root User.srt | 1 KB |
 | 2. Setup Your Lab/4.1 Bashrc File.html | 97 B |
 | 2. Setup Your Lab/5. Install Windows (Victim's Machine).mp4 | 16.3 MB |
 | 2. Setup Your Lab/5. Install Windows (Victim's Machine).srt | 2.2 KB |
 | 2. Setup Your Lab/5.1 Windows 10 Trial.html | 124 B |
 | 2. Setup Your Lab/5.2 KALI VMWARE image.html | 150 B |
 | 2. Setup Your Lab/5.3 VMWARE Player.html | 159 B |
 | 3. Explore KALI/1. Master KALI Desktop Environment.mp4 | 33.5 MB |
 | 3. Explore KALI/1. Master KALI Desktop Environment.srt | 2.6 KB |
 | 3. Explore KALI/2. Color Coding.mp4 | 15.4 MB |
 | 3. Explore KALI/2. Color Coding.srt | 1.8 KB |
 | 4. Setup Your KALI Server/1. Get Started with Linux Commands.mp4 | 75.5 MB |
 | 4. Setup Your KALI Server/1. Get Started with Linux Commands.srt | 10.3 KB |
 | 4. Setup Your KALI Server/2. Explore Main Services and Programs.mp4 | 69.2 MB |
 | 4. Setup Your KALI Server/2. Explore Main Services and Programs.srt | 5.6 KB |
 | 5. Steps to Plan a Successful Penetration Test/1. Penetration Testing Cycle.mp4 | 15.9 MB |
 | 5. Steps to Plan a Successful Penetration Test/1. Penetration Testing Cycle.srt | 5.1 KB |
 | 5. Steps to Plan a Successful Penetration Test/2. Threat Modeling.mp4 | 42.7 MB |