FILENAME | SIZE |  | 1. Chapter 1/1. Course Introduction.mp4 | 26 MB |
 | 1. Chapter 1/1. Course Introduction.srt | 3.5 KB |
 | 10. SQL Injection Vulnerabilities/1. What is SQL.mp4 | 10.5 MB |
 | 10. SQL Injection Vulnerabilities/1. What is SQL.srt | 7.6 KB |
 | 10. SQL Injection Vulnerabilities/2. Dangers of SQL Injections.mp4 | 6.7 MB |
 | 10. SQL Injection Vulnerabilities/2. Dangers of SQL Injections.srt | 4 KB |
 | 11. SQL Injection Vulnerabilities - SQLi In Login Pages/1. Discovering SQL Injections In POST.mp4 | 15.5 MB |
 | 11. SQL Injection Vulnerabilities - SQLi In Login Pages/1. Discovering SQL Injections In POST.srt | 10.6 KB |
 | 11. SQL Injection Vulnerabilities - SQLi In Login Pages/1.1 Fix table metasploit.accounts doesn't exist issue.html | 121 B |
 | 11. SQL Injection Vulnerabilities - SQLi In Login Pages/2. Bypassing Logins Using SQL Injection Vulnerability.mp4 | 8.1 MB |
 | 11. SQL Injection Vulnerabilities - SQLi In Login Pages/2. Bypassing Logins Using SQL Injection Vulnerability.srt | 6.7 KB |
 | 2/1. Lab Overview & Needed Software.mp4 | 106.5 MB |
 | 2/1. Lab Overview & Needed Software.srt | 9.6 KB |
 | 2/1.1 The Lab.pdf | 347 KB |
 | 2/1.2 Virtual Box Download Page.html | 116 B |
 | 2/2. Installing Kali 2020 As a Virtual Machine Using a Ready Image.mp4 | 142.3 MB |
 | 2/2. Installing Kali 2020 As a Virtual Machine Using a Ready Image.srt | 13.8 KB |
 | 2/2.1 How To Fix No Nat Network Issue.html | 89 B |
 | 2/2.2 Kali 2020 Download Page.html | 103 B |
 | 2/2.3 How To Fix Blank Screen When Starting Kali.html | 158 B |
 | 2/2.4 Installing Kali Using ISO (use this method to install it as a Main machine)..html | 104 B |
 | 2/3. Installing Metasploitable As a Virtual Machine.mp4 | 11.1 MB |
 | 2/3. Installing Metasploitable As a Virtual Machine.srt | 5.4 KB |
 | 2/3.1 Metasploitable Download Page.html | 120 B |
 | 2/4. Installing Windows As a Virtual Machine.mp4 | 9.4 MB |
 | 2/4. Installing Windows As a Virtual Machine.srt | 4.4 KB |
 | 2/4.1 Windows Image Download Page.html | 124 B |
 | 3. Preparation - Linux Basics/1. Basic Overview Of Kali Linux.mp4 | 107.4 MB |
 | 3. Preparation - Linux Basics/1. Basic Overview Of Kali Linux.srt | 6.5 KB |
 | 3. Preparation - Linux Basics/2. The Linux Terminal & Basic Linux Commands.mp4 | 223.5 MB |
 | 3. Preparation - Linux Basics/2. The Linux Terminal & Basic Linux Commands.srt | 13.9 KB |
 | 3. Preparation - Linux Basics/2.1 List Of Linux Commands.html | 121 B |
 | 3. Preparation - Linux Basics/3. Configuring Metasploitable & Lab Network Settings.mp4 | 15.3 MB |
 | 3. Preparation - Linux Basics/3. Configuring Metasploitable & Lab Network Settings.srt | 7.5 KB |
 | 3. Preparation - Linux Basics/3.1 How To Fix No Nat Network Issue.html | 89 B |
 | 4. Website Basics/1. What is a Website.mp4 | 11.7 MB |
 | 4. Website Basics/1. What is a Website.srt | 5.5 KB |
 | 4. Website Basics/1.1 Intro-what-is-a-website.pdf | 360.1 KB |
 | 4. Website Basics/2. How To Hack a Website .mp4 | 16.8 MB |
 | 4. Website Basics/2. How To Hack a Website .srt | 7.9 KB |
 | 5. Information Gathering/1. Gathering Information Using Whois Lookup.mp4 | 11.3 MB |
 | 5. Information Gathering/1. Gathering Information Using Whois Lookup.srt | 5.9 KB |
 | 5. Information Gathering/1.1 Domaintools Whois Lookup Palge.html | 90 B |
 | 5. Information Gathering/1.2 Information Gathering.pdf | 111.7 KB |
 | 5. Information Gathering/2. Discovering Technologies Used On The Website.mp4 | 16.8 MB |
 | 5. Information Gathering/2. Discovering Technologies Used On The Website.srt | 7.3 KB |
 | 5. Information Gathering/2.1 Netcraft.html | 105 B |
 | 5. Information Gathering/3. Gathering Comprehensive DNS Information.mp4 | 106.5 MB |
 | 5. Information Gathering/3. Gathering Comprehensive DNS Information.srt | 12.6 KB |
 | 5. Information Gathering/3.1 robtex.com.html | 84 B |
 | 5. Information Gathering/4. Discovering Websites On The Same Server.mp4 | 9.3 MB |
 | 5. Information Gathering/4. Discovering Websites On The Same Server.srt | 4.6 KB |
 | 5. Information Gathering/5. Discovering Subdomains.mp4 | 10 MB |
 | 5. Information Gathering/5. Discovering Subdomains.srt | 6.6 KB |
 | 5. Information Gathering/5.1 Knock Git Repo.html | 99 B |
 | 5. Information Gathering/6. Discovering Sensitive Files.mp4 | 15.4 MB |
 | 5. Information Gathering/6. Discovering Sensitive Files.srt | 9 KB |
 | 5. Information Gathering/7. Analysing Discovered Files.mp4 | 8.6 MB |
 | 5. Information Gathering/7. Analysing Discovered Files.srt | 5.4 KB |
 | 5. Information Gathering/8. Maltego - Discovering Servers, Domains & Files.mp4 | 16.8 MB |
 | 5. Information Gathering/8. Maltego - Discovering Servers, Domains & Files.srt | 10.2 KB |
 | 5. Information Gathering/9. Maltego - Discovering Websites, Hosting Provider & Emails.mp4 | 10.1 MB |
 | 5. Information Gathering/9. Maltego - Discovering Websites, Hosting Provider & Emails.srt | 6.1 KB |
 | 6. File Upload Vulnerabilities/1. How To Discover & Exploit Basic File Upload Vulnerabilities to Hack Websites.mp4 | 12.1 MB |
 | 6. File Upload Vulnerabilities/1. How To Discover & Exploit Basic File Upload Vulnerabilities to Hack Websites.srt | 8.9 KB |
 | 6. File Upload Vulnerabilities/1.1 File upload, Code execution, LFI, RFI, SQLi, XSS.pdf | 541.8 KB |
 | 6. File Upload Vulnerabilities/2. HTTP Requests - GET & POST.mp4 | 10.1 MB |
 | 6. File Upload Vulnerabilities/2. HTTP Requests - GET & POST.srt | 5.4 KB |
 | 6. File Upload Vulnerabilities/3. Intercepting HTTP Requests.mp4 | 16 MB |
 | 6. File Upload Vulnerabilities/3. Intercepting HTTP Requests.srt | 9.4 KB |
 | 6. File Upload Vulnerabilities/3.1 Configuring Burp to Handle HTTPS.html | 127 B |
 | 6. File Upload Vulnerabilities/4. Exploiting Advanced File Upload Vulnerabilities To Hack Websites.mp4 | 11 MB |
 | 6. File Upload Vulnerabilities/4. Exploiting Advanced File Upload Vulnerabilities To Hack Websites.srt | 5.8 KB |
 | 6. File Upload Vulnerabilities/5. Exploiting More Advanced File Upload Vulnerabilities.mp4 | 9.1 MB |
 | 6. File Upload Vulnerabilities/5. Exploiting More Advanced File Upload Vulnerabilities.srt | 5.4 KB |
 | 6. File Upload Vulnerabilities/6. [Security] Fixing File Upload Vulnerabilities.mp4 | 13.3 MB |
 | 6. File Upload Vulnerabilities/6. [Security] Fixing File Upload Vulnerabilities.srt | 8.2 KB |
 | 6. File Upload Vulnerabilities/6.1 Link To Secure File Upload Code.html | 155 B |
 | 7. Code Execution Vulnerabilities/1. How To Discover & Exploit Basic Code Execution Vulnerabilities To Hack Websites.mp4 | 12.4 MB |
 | 7. Code Execution Vulnerabilities/1. How To Discover & Exploit Basic Code Execution Vulnerabilities To Hack Websites.srt | 9.1 KB |
 | 7. Code Execution Vulnerabilities/1.1 code-execution-reverse-shell-commands.txt | 938 B |
 | 7. Code Execution Vulnerabilities/2. Exploiting Advanced Code Execution Vulnerabilities.mp4 | 13.1 MB |
 | 7. Code Execution Vulnerabilities/2. Exploiting Advanced Code Execution Vulnerabilities.srt | 7.7 KB |
 | 7. Code Execution Vulnerabilities/3. [Security] - Fixing Code Execution Vulnerabilities.mp4 | 10.4 MB |
 | 7. Code Execution Vulnerabilities/3. [Security] - Fixing Code Execution Vulnerabilities.srt | 7.4 KB |
 | 8. Local File Inclusion Vulnerabilities (LFI)/1. What are they And How To Discover & Exploit Them.mp4 | 9.2 MB |
 | 8. Local File Inclusion Vulnerabilities (LFI)/1. What are they And How To Discover & Exploit Them.srt | 6.6 KB |
 | 8. Local File Inclusion Vulnerabilities (LFI)/2. Gaining Shell Access From LFI Vulnerabilities - Method 1.mp4 | 15.5 MB |
 | 8. Local File Inclusion Vulnerabilities (LFI)/2. Gaining Shell Access From LFI Vulnerabilities - Method 1.srt | 9.1 KB |
 | 8. Local File Inclusion Vulnerabilities (LFI)/3. Gaining Shell Access From LFI Vulnerabilities - Method 2.mp4 | 22.4 MB |
 | 8. Local File Inclusion Vulnerabilities (LFI)/3. Gaining Shell Access From LFI Vulnerabilities - Method 2.srt | 10.2 MB |
 | 9. Remote File Inclusion Vulnerabilities (RFI)/1. Remote File Inclusion Vulnerabilities - Configuring PHP Settings.mp4 | 7.3 MB |
 | 9. Remote File Inclusion Vulnerabilities (RFI)/1. Remote File Inclusion Vulnerabilities - Configuring PHP Settings.srt | 4.3 KB |
 | 9. Remote File Inclusion Vulnerabilities (RFI)/2. Remote File Inclusion Vulnerabilities - Discovery & Exploitation.mp4 | 8.5 MB |
 | 9. Remote File Inclusion Vulnerabilities (RFI)/2. Remote File Inclusion Vulnerabilities - Discovery & Exploitation.srt | 7.4 KB |
 | 9. Remote File Inclusion Vulnerabilities (RFI)/3. Exploiting Advanced Remote File Inclusion Vulnerabilities To Hack Websites.mp4 | 5.8 MB |
 | 9. Remote File Inclusion Vulnerabilities (RFI)/3. Exploiting Advanced Remote File Inclusion Vulnerabilities To Hack Websites.srt | 3.5 KB |
 | 9. Remote File Inclusion Vulnerabilities (RFI)/4. [Security] Fixing File Inclusion Vulnerabilities.mp4 | 10.4 MB |
 | 9. Remote File Inclusion Vulnerabilities (RFI)/4. [Security] Fixing File Inclusion Vulnerabilities.srt | 7.3 KB |