FILENAME | SIZE | | 1. Introduction and Welcome/1. Introduction.mp4 | 15.9 MB |
| 1. Introduction and Welcome/1. Introduction.vtt | 8.8 KB |
| 10/1. Introduction to Perl.mp4 | 18.1 MB |
| 10/1. Introduction to Perl.vtt | 8.1 KB |
| 10/2. Basic Perl Programming.mp4 | 18.7 MB |
| 10/2. Basic Perl Programming.vtt | 10.1 KB |
| 10/3. Introduction to Perl Functions.mp4 | 30 MB |
| 10/3. Introduction to Perl Functions.vtt | 15.3 KB |
| 10/4. Working With Arrays.mp4 | 28.6 MB |
| 10/4. Working With Arrays.vtt | 14 KB |
| 10/5. More Fun With Arrays.mp4 | 32.6 MB |
| 10/5. More Fun With Arrays.vtt | 15.6 KB |
| 10/6. Conditions in Perl.mp4 | 26.7 MB |
| 10/6. Conditions in Perl.vtt | 14 KB |
| 10/7. Switch Statements and More Examples of If Statements.mp4 | 35.3 MB |
| 10/7. Switch Statements and More Examples of If Statements.vtt | 17.4 KB |
| 2/1. Downloading Kali Linux.mp4 | 5.9 MB |
| 2/1. Downloading Kali Linux.vtt | 1.4 KB |
| 2/2. Installing Kali Linux Part 1.mp4 | 9.2 MB |
| 2/2. Installing Kali Linux Part 1.vtt | 5.3 KB |
| 2/3. Installing Kali Linux Part 2.mp4 | 16.2 MB |
| 2/3. Installing Kali Linux Part 2.vtt | 9.8 KB |
| 2/4. Final Installation Steps Before Startup.mp4 | 5.6 MB |
| 2/4. Final Installation Steps Before Startup.vtt | 4.2 KB |
| 2/5. First Look at Kali Linux.mp4 | 30.4 MB |
| 2/5. First Look at Kali Linux.vtt | 6.7 KB |
| 2/6. Wireless Card Installation Part 1.mp4 | 24.8 MB |
| 2/6. Wireless Card Installation Part 1.vtt | 4.8 KB |
| 2/7. Linux Kernel Installation.mp4 | 6.7 MB |
| 2/7. Linux Kernel Installation.vtt | 1.8 KB |
| 2/8. How To Install VIrtualBox Guest Additions For Wireless Card Setup on Kali Linux.mp4 | 20.1 MB |
| 2/8. How To Install VIrtualBox Guest Additions For Wireless Card Setup on Kali Linux.vtt | 4.8 KB |
| 2/9. Wireless Card Installation Part 2.mp4 | 29.8 MB |
| 2/9. Wireless Card Installation Part 2.vtt | 5.1 KB |
| 3/1. NMAP Introduction and Demo.mp4 | 33.2 MB |
| 3/1. NMAP Introduction and Demo.vtt | 8.8 KB |
| 3/2. NMAP Anonymous Mode First.mp4 | 3.2 MB |
| 3/2. NMAP Anonymous Mode First.vtt | 1.5 KB |
| 3/3. TraceRoute Without ProxyChains.mp4 | 2.3 MB |
| 3/3. TraceRoute Without ProxyChains.vtt | 864 B |
| 3/4. Proxychains.mp4 | 32.2 MB |
| 3/4. Proxychains.vtt | 8.8 KB |
| 3/5. Nmap TCP Port Scanning.mp4 | 9.9 MB |
| 3/5. Nmap TCP Port Scanning.vtt | 2 KB |
| 3/6. Port Scanning on Test Machine.mp4 | 28.9 MB |
| 3/6. Port Scanning on Test Machine.vtt | 7.3 KB |
| 3/7. TCP Port Scanning - Further Results.mp4 | 2.3 MB |
| 3/7. TCP Port Scanning - Further Results.vtt | 812 B |
| 3/8. FIN and XMAS Scans.mp4 | 12.2 MB |
| 3/8. FIN and XMAS Scans.vtt | 4.7 KB |
| 3/9. Nmap OS Detection.mp4 | 21.9 MB |
| 3/9. Nmap OS Detection.vtt | 5.2 KB |
| 4/1. Whois Footprinting.mp4 | 25.2 MB |
| 4/1. Whois Footprinting.vtt | 4.3 KB |
| 4/2. Further Footprinting.mp4 | 58.1 MB |
| 4/2. Further Footprinting.vtt | 12.3 KB |
| 4/3. Fun with List-Urls.py.mp4 | 12.5 MB |
| 4/3. Fun with List-Urls.py.vtt | 1.8 KB |
| 4/4. More of The Harvester.mp4 | 5.6 MB |
| 4/4. More of The Harvester.vtt | 1.1 KB |
| 5/1. Introduction to Nessus and Nessus Installation.mp4 | 13.9 MB |
| 5/1. Introduction to Nessus and Nessus Installation.vtt | 4.1 KB |
| 6/1. Introduction to Web SQL Injection.mp4 | 22.5 MB |
| 6/1. Introduction to Web SQL Injection.vtt | 9.9 KB |
| 6/2. Impacts of Web SQL Injection.mp4 | 4.6 MB |
| 6/2. Impacts of Web SQL Injection.vtt | 2.6 KB |
| 7/1. Introduction to Malware and Trojans.mp4 | 7.7 MB |
| 7/1. Introduction to Malware and Trojans.vtt | 5.1 KB |
| 7/10. Viewing KeyScan Results.mp4 | 4.8 MB |
| 7/10. Viewing KeyScan Results.vtt | 2.6 KB |
| 7/2. Installing C C++ Compiler.mp4 | 14.2 MB |
| 7/2. Installing C C++ Compiler.vtt | 5.6 KB |
| 7/3. Downloading Additional Applications.mp4 | 14.4 MB |
| 7/3. Downloading Additional Applications.vtt | 5.5 KB |
| 7/4. Creating a Malware Program with Codeblocks.mp4 | 22.2 MB |
| 7/4. Creating a Malware Program with Codeblocks.vtt | 9.3 KB |
| 7/5. Running Apache Server and Uploading Malware to Server.mp4 | 29.8 MB |
| 7/5. Running Apache Server and Uploading Malware to Server.vtt | 9.7 KB |
| 7/6. Using Reverse Shell on Victim's PC.mp4 | 25 MB |
| 7/6. Using Reverse Shell on Victim's PC.vtt | 8.5 KB |
| 7/7. Viewing Access Logs and Introduction to the Metasploit Framerwork.mp4 | 22.1 MB |
| 7/7. Viewing Access Logs and Introduction to the Metasploit Framerwork.vtt | 8.4 KB |
| 7/8. What to Do When Victim is on a Different Network.mp4 | 7.7 MB |
| 7/8. What to Do When Victim is on a Different Network.vtt | 2.8 KB |
| 7/9. Using Metasploit to Create an Exploit.mp4 | 8.3 MB |
| 7/9. Using Metasploit to Create an Exploit.vtt | 3.6 KB |
| 8/1. Python Introduction and Installation on Windows.mp4 | 15.6 MB |
| 8/1. Python Introduction and Installation on Windows.vtt | 6.8 KB |
| 8/10. String Manipulation and File Handling.mp4 | 19.7 MB |
| 8/10. String Manipulation and File Handling.vtt | 9.1 KB |
| 8/11. Introduction to Functions.mp4 | 14.6 MB |
| 8/11. Introduction to Functions.vtt | 6.5 KB |
| 8/12. Building an Nmap Network Scanner - Part 1.mp4 | 17.1 MB |
| 8/12. Building an Nmap Network Scanner - Part 1.vtt | 7.4 KB |
| 8/13. Building an Nmap Network Scanner - Part 2.mp4 | 18.7 MB |
| 8/13. Building an Nmap Network Scanner - Part 2.vtt | 7.8 KB |
| 8/14. Creating a Brute Force Password Cracker in Python.mp4 | 28.2 MB |
| 8/14. Creating a Brute Force Password Cracker in Python.vtt | 12.8 KB |
| 8/15. Brute Force Cracking Results.mp4 | 9.4 MB |