FILENAME SIZE 1. Introduction/1. Welcome!.mp4 39.1 MB 1. Introduction/1. Welcome!.vtt 7.9 KB 10. Web Server Hacking/1. Web server hacking with Metasploit - Gaining Access.mp4 149.4 MB 10. Web Server Hacking/1. Web server hacking with Metasploit - Gaining Access.vtt 19 KB 10. Web Server Hacking/2. Web server hacking with Metasploit - FTP backdoor command execution.mp4 104.3 MB 10. Web Server Hacking/2. Web server hacking with Metasploit - FTP backdoor command execution.vtt 12.4 KB 10. Web Server Hacking/3. Web server hacking with Metasploit - Metasploit payloads.mp4 96.8 MB 10. Web Server Hacking/3. Web server hacking with Metasploit - Metasploit payloads.vtt 12.1 KB 10. Web Server Hacking/4. Nikto - Web Vulnerability Scanner.mp4 112.8 MB 10. Web Server Hacking/4. Nikto - Web Vulnerability Scanner.vtt 13.9 KB 11. Exploitation/1. WordPress hacking with WPScan.mp4 162 MB 11. Exploitation/1. WordPress hacking with WPScan.vtt 17.9 KB 11. Exploitation/2. Password cracking with John The Ripper.mp4 181.9 MB 11. Exploitation/2. Password cracking with John The Ripper.vtt 17.3 KB 11. Exploitation/3. Bruteforce password cracking with Hydra - SSH.mp4 201 MB 11. Exploitation/3. Bruteforce password cracking with Hydra - SSH.vtt 18.3 KB 11. Exploitation/4. Bruteforce password cracking with Medusa.mp4 140.4 MB 11. Exploitation/4. Bruteforce password cracking with Medusa.vtt 10.6 KB 11. Exploitation/5. BeEF browser exploitation - Client side attacks.mp4 282.1 MB 11. Exploitation/5. BeEF browser exploitation - Client side attacks.vtt 26.7 KB 11. Exploitation/6. Armitage - Scanning and Exploitation.mp4 112 MB 11. Exploitation/6. Armitage - Scanning and Exploitation.vtt 112 MB 11. Exploitation/7. Veil Evasion - How to generate undetectable payloads.mp4 223 MB 11. Exploitation/7. Veil Evasion - How to generate undetectable payloads.vtt 22.1 KB 11. Exploitation/8. How to generate wordlists with Crunch.mp4 233.7 MB 11. Exploitation/8. How to generate wordlists with Crunch.vtt 15 KB 12. Wired and WIreless attacks/1. MITM - ARP spoofing with arpspoof.mp4 192.1 MB 12. Wired and WIreless attacks/1. MITM - ARP spoofing with arpspoof.vtt 12.7 KB 12. Wired and WIreless attacks/2. MITM - ARP Poisoning with Ettercap.mp4 143.9 MB 12. Wired and WIreless attacks/2. MITM - ARP Poisoning with Ettercap.vtt 11.1 KB 12. Wired and WIreless attacks/3. WPAWPA2 Hacking & Exploitation With Aircrack-ng & airgeddon Pixie Dust Attack.mp4 386.4 MB 12. Wired and WIreless attacks/3. WPAWPA2 Hacking & Exploitation With Aircrack-ng & airgeddon Pixie Dust Attack.vtt 53.5 KB 12. Wired and WIreless attacks/4. DDoS Attacks with Xerxes - The most powerful DDoS tool.mp4 83.5 MB 12. Wired and WIreless attacks/4. DDoS Attacks with Xerxes - The most powerful DDoS tool.vtt 12.4 KB 12. Wired and WIreless attacks/4.1 Xerxes Download Link.txt.txt 37 B 13. Post Exploitation & Privilege Escalation/1. The Complete Meterpreter guide - Privilege escalation and clearning tracks.mp4 165.6 MB 13. Post Exploitation & Privilege Escalation/1. The Complete Meterpreter guide - Privilege escalation and clearning tracks.vtt 26.8 KB 13. Post Exploitation & Privilege Escalation/2. Generating a PHP backdoor with Weevely - Post exploitation.mp4 91.6 MB 13. Post Exploitation & Privilege Escalation/2. Generating a PHP backdoor with Weevely - Post exploitation.vtt 12 KB 2. Setting Up Your Environment/1. How To Setup A Virtual Penetration Testing Environment.mp4 394.4 MB 2. Setting Up Your Environment/1. How To Setup A Virtual Penetration Testing Environment.vtt 40.2 KB 2. Setting Up Your Environment/1.1 Section 1 Links.txt.txt 163 B 2. Setting Up Your Environment/2. Downloading and installing Metasploitable2.mp4 64.2 MB 2. Setting Up Your Environment/2. Downloading and installing Metasploitable2.vtt 11.2 KB 2. Setting Up Your Environment/2.1 Section 1 Links.txt.txt 163 B 2. Setting Up Your Environment/3. Installing VMware.mp4 49.5 MB 2. Setting Up Your Environment/3. Installing VMware.vtt 4.6 KB 2. Setting Up Your Environment/4. How To Install Kali Linux On VMware.mp4 99.3 MB 2. Setting Up Your Environment/4. How To Install Kali Linux On VMware.vtt 24.5 KB 3. Anonymity/1. How To Setup Proxychains On Kali Linux.mp4 40.2 MB 3. Anonymity/1. How To Setup Proxychains On Kali Linux.vtt 11.3 KB 3. Anonymity/2. How to setup Anonsurf on Kali Linux.mp4 138 MB 3. Anonymity/2. How to setup Anonsurf on Kali Linux.vtt 10.1 KB 3. Anonymity/3. How to use a VPN with Proxychains - Maximum anonymity.mp4 141.5 MB 3. Anonymity/3. How to use a VPN with Proxychains - Maximum anonymity.vtt 10.5 KB 3. Anonymity/4. The Complete DNS guide - How to change your DNS.mp4 196 MB 3. Anonymity/4. The Complete DNS guide - How to change your DNS.vtt 16.2 KB 4. Getting started with Linux/1. Adding Users & Changing Passwords.mp4 47 MB 4. Getting started with Linux/1. Adding Users & Changing Passwords.vtt 10.5 KB 4. Getting started with Linux/2. System Services.mp4 33.4 MB 4. Getting started with Linux/2. System Services.vtt 9.6 KB 4. Getting started with Linux/3. The Aptitude Package Manager - Installing & Updating packages.mp4 38.5 MB 4. Getting started with Linux/3. The Aptitude Package Manager - Installing & Updating packages.vtt 9.8 KB 4. Getting started with Linux/4. Linux File System.mp4 67.5 MB 4. Getting started with Linux/4. Linux File System.vtt 27.5 KB 4. Getting started with Linux/5. Installing Terminator - Productivity tool for Linux.mp4 37.8 MB 4. Getting started with Linux/5. Installing Terminator - Productivity tool for Linux.vtt 5.7 KB 5. Networking Fundamentals/1. Understanding the OSI Model.mp4 12.6 MB 5. Networking Fundamentals/1. Understanding the OSI Model.vtt 3.6 KB 5. Networking Fundamentals/2. The Network Layer.mp4 46.4 MB 5. Networking Fundamentals/2. The Network Layer.vtt 6.5 KB 5. Networking Fundamentals/3. The Transport Layer.mp4 46.3 MB 5. Networking Fundamentals/3. The Transport Layer.vtt 8.2 KB 5. Networking Fundamentals/4. The TCP 3 Way Handshake.mp4 46.3 MB 5. Networking Fundamentals/4. The TCP 3 Way Handshake.vtt 6.6 KB 6. Passive Information Gathering/1. Information Gathering - Whois Lookup & DNS Reconnaisance.mp4 91.3 MB 6. Passive Information Gathering/1. Information Gathering - Whois Lookup & DNS Reconnaisance.vtt 86.1 MB 6. Passive Information Gathering/1.1 Links.txt.txt 67 B 6. Passive Information Gathering/2. Gathering Emails - theharvester.mp4 124.1 MB 6. Passive Information Gathering/2. Gathering Emails - theharvester.vtt 9.3 KB 6. Passive Information Gathering/3. Whois Lookup.mp4 71.5 MB 6. Passive Information Gathering/3. Whois Lookup.vtt 5.9 KB 6. Passive Information Gathering/4. Netcraft - Passive Information Gathering.mp4 63.2 MB 6. Passive Information Gathering/4. Netcraft - Passive Information Gathering.vtt 9.4 KB 7. Active Information Gathering/1. DNS Enumeration.mp4 14.3 MB 7. Active Information Gathering/1. DNS Enumeration.vtt 6.7 KB 7. Active Information Gathering/10. Scanning a list of targets.mp4 18.3 MB 7. Active Information Gathering/10. Scanning a list of targets.vtt 6.9 KB 7. Active Information Gathering/11. Excluding targets from a scan.mp4 18.4 MB 7. Active Information Gathering/11. Excluding targets from a scan.vtt 6.7 KB 7. Active Information Gathering/12. Excluding targets with a list.mp4 14.7 MB 7. Active Information Gathering/12. Excluding targets with a list.vtt 6.3 KB 7. Active Information Gathering/13. Aggressive scanning & OS Detection.mp4 53.2 MB 7. Active Information Gathering/13. Aggressive scanning & OS Detection.vtt 9.2 KB 7. Active Information Gathering/14. Nmap Syn Scan.mp4 12.4 MB 7. Active Information Gathering/14. Nmap Syn Scan.vtt 3.5 MB 7. Active Information Gathering/15. Nmap UDP Scan.mp4 9.6 MB 7. Active Information Gathering/15. Nmap UDP Scan.vtt 3.9 KB 7. Active Information Gathering/16. Output Scan Results.mp4 29.4 MB