Torrent Info
Title [FreeCourseSite.com] Udemy - Learn Social Engineering From Scratch
Category
Size 2.87GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
[CourseClub.ME].url 122B
[FCS Forum].url 133B
[FreeCourseSite.com].url 127B
1.1 02 - Information Gathering.pdf.pdf 87.98KB
1.1 03 - Generating Evil Files For Windows.pdf.pdf 692.07KB
1.1 04 - Generating Evil Files For Mac OS X.pdf.pdf 141.49KB
1.1 05 - Generating Evil Files For Linux.pdf.pdf 246.70KB
1.1 06 - Delivery Methods.pdf.pdf 127.02KB
1.1 download-and-execute.txt.txt 210B
1.1 How to fix Maltego if its not starting.html 89B
1.1 Security.pdf.pdf 100.01KB
1.1 Veil 3.0 Git Repo.html 99B
1.1 Virtual Box Download Page.html 116B
1.1 What is Social Engineering _.pdf.pdf 98.73KB
1.1 ZLogger Git Repo.html 92B
1.2 01 - The Lab.pdf.pdf 460.96KB
1. Basic Overview Of Kali Linux.mp4 107.41MB
1. Basic Overview Of Kali Linux.srt 96.89MB
1. Basics Of Empire Agents.mp4 10.60MB
1. Basics Of Empire Agents.srt 8.57KB
1. Bonus Lecture - What's Next.html 5.21KB
1. Bypassing All Anti-Virus Programs By Modifying Hex Vales.mp4 22.30MB
1. Bypassing All Anti-Virus Programs By Modifying Hex Vales.srt 13.66KB
1. Detecting FakeSpoofed Emails.mp4 11.30MB
1. Detecting FakeSpoofed Emails.srt 9.05KB
1. Discovering Websites, Links & Social Networking Accounts.mp4 17.31MB
1. Discovering Websites, Links & Social Networking Accounts.srt 14.15KB
1. Download & Execute Payload.mp4 14.91MB
1. Download & Execute Payload.srt 8.93KB
1. Hacking Into Linux-Like Systems Using One Command.mp4 16.72MB
1. Hacking Into Linux-Like Systems Using One Command.srt 12.20KB
1. Installing Veil 3.1.mp4 41.69MB
1. Installing Veil 3.1.srt 8.60KB
1. Introduction.mp4 8.05MB
1. Introduction.mp4 6.21MB
1. Introduction.mp4 5.11MB
1. Introduction.mp4 4.61MB
1. Introduction.mp4 5.06MB
1. Introduction.srt 4.12KB
1. Introduction.srt 2.70KB
1. Introduction.srt 3.34KB
1. Introduction.srt 2.69KB
1. Introduction.srt 3.03KB
1. Lab Overview & Needed Software.mp4 106.52MB
1. Lab Overview & Needed Software.srt 10.03KB
1. Maltego Overview.mp4 100.90MB
1. Maltego Overview.srt 8.46KB
1. Meterpreter Basics.mp4 12.46MB
1. Meterpreter Basics.srt 7.93KB
1. Overview of the Setup.mp4 15.04MB
1. Overview of the Setup.srt 8.58KB
1. What Is A Keylogger .mp4 64.29MB
1. What Is A Keylogger .srt 8.64KB
1. What Is Social Engineering.mp4 7.45MB
1. What Is Social Engineering.srt 4.72KB
10. Basic BeEF Commands.mp4 7.77MB
10. Basic BeEF Commands.srt 6.22KB
10. Creating a Windows Powershell Stager & Hacking Windows 10.mp4 13.10MB
10. Creating a Windows Powershell Stager & Hacking Windows 10.srt 3.77KB
11.1 Nodistribute - Online Virus Scanner.html 86B
11.2 Alternative to Nodistribute.html 87B
11. Modifying Backdoor Source To Bypass All Anti-virus Programs.mp4 14.02MB
11. Modifying Backdoor Source To Bypass All Anti-virus Programs.srt 10.83KB
11. Stealing CredentialsPasswords Using A Fake Login Prompt.mp4 4.24MB
11. Stealing CredentialsPasswords Using A Fake Login Prompt.srt 3.29KB
12. Hacking Windows 10 Using A Fake Update.mp4 8.94MB
12. Hacking Windows 10 Using A Fake Update.srt 6.41KB
13. Hacking Mac OS X Using A Fake Update.mp4 8.33MB
13. Hacking Mac OS X Using A Fake Update.srt 6.07KB
14. Hacking Linux Using A Fake Update.mp4 8.87MB
14. Hacking Linux Using A Fake Update.srt 5.99KB
2.1 Kali Linux Ready Images Download Page.html 140B
2.2 How To Fix No Nat Network Issue.html 121B
2.3 How To Fix Blank Screen When Starting Kali.html 158B
2.4 Installing Kali Using ISO Image (use this to install Kali as a MAIN machine).html 104B
2. Creating A Remote Keylogger.mp4 71.01MB
2. Creating A Remote Keylogger.srt 11.31KB
2. Creating The Perfect Spying Tool.mp4 14.53MB
2. Creating The Perfect Spying Tool.srt 9.52KB
2. Discovering Domain Info & Emails Associated With Target.mp4 12.70MB
2. Discovering Domain Info & Emails Associated With Target.srt 9.87KB
2. Discovering Twitter Friends & Associated Accounts.mp4 9.36MB
2. Discovering Twitter Friends & Associated Accounts.srt 6.80KB
2. Embedding Evil Files With Any File Type Like An Image Or PDF.mp4 21.11MB
2. Embedding Evil Files With Any File Type Like An Image Or PDF.srt 14.43KB
2. Ex1 - Generating a Backdoor That Works Outside The Network.mp4 13.24MB
2. Ex1 - Generating a Backdoor That Works Outside The Network.srt 7.39KB
2. File System Commands.mp4 10.00MB
2. File System Commands.mp4 12.39MB
2. File System Commands.srt 5.76KB
2. File System Commands.srt 9.29KB
2. Hacking Mac OS X Using A Meterpreter Backdoor.mp4 34.59MB
2. Hacking Mac OS X Using A Meterpreter Backdoor.srt 14.68KB
2. How to Protect Against BeEF & Other Browser Exploits.mp4 10.83MB
2. How to Protect Against BeEF & Other Browser Exploits.srt 5.53KB
2. Installing Kali 2019 As a Virtual Machine Using a Ready Image.mp4 156.07MB
2. Installing Kali 2019 As a Virtual Machine Using a Ready Image.srt 13.45KB
2. Mail Deliver - Setting up an SMTP Server.mp4 76.29MB
2. Mail Deliver - Setting up an SMTP Server.srt 76.29MB
2. More Advanced Linux Backdoor.mp4 10.24MB
2. More Advanced Linux Backdoor.srt 8.88KB
2. Teaser - Hacking An Android Phone & Accessing The Camera.mp4 11.86MB
2. Teaser - Hacking An Android Phone & Accessing The Camera.srt 8.48KB
2. The Linux Terminal & Basic Linux Commands.mp4 223.53MB
2. The Linux Terminal & Basic Linux Commands.srt 15.68KB
2. Upgrading Basic Shell Access To A MeterpreterEmpire Access.mp4 12.47MB
2. Upgrading Basic Shell Access To A MeterpreterEmpire Access.srt 12.72KB
2. Veil Overview & Payloads Basics.mp4 11.52MB
2. Veil Overview & Payloads Basics.srt 10.76KB
3.1 00 - Intro & Perperation.pdf.pdf 364.17KB
3.1 Bat To EXE Download Link.html 130B
3.1 Nodistribute - Online Virus Scanner.html 86B
3.1 Windows Image Download Page.html 124B
3.1 ZLogger Git Repo.html 92B
3.2 Alternative to Nodistribute.html 87B
3. Configuring The Router To Forward Connections To Kali.mp4 15.25MB
3. Configuring The Router To Forward Connections To Kali.srt 9.13KB
3. Course Overview.mp4 10.62MB
3. Course Overview.srt 6.27KB
3. Creating & Using Snapshots.mp4 89.38MB
3. Creating & Using Snapshots.srt 8.15KB
3. Detecting Trojans Manually.mp4 11.16MB
3. Detecting Trojans Manually.srt 6.69KB
3. Discovering Emails Of The Target's Friends.mp4 8.99MB
3. Discovering Emails Of The Target's Friends.srt 6.14KB
3. Discovering Information About Hosting Company, Support Team Emails & Admin Email.mp4 14.08MB
3. Discovering Information About Hosting Company, Support Team Emails & Admin Email.srt 8.79KB
3. Generating An Undetectable Backdoor Using Veil 3.mp4 16.84MB
3. Generating An Undetectable Backdoor Using Veil 3.srt 12.67KB
3. Hacking Mac OS X Using An Empire Stager.mp4 14.31MB
3. Hacking Mac OS X Using An Empire Stager.srt 9.21KB
3. Installing Windows As a Virtual Machine.mp4 7.01MB
3. Installing Windows As a Virtual Machine.srt 4.58KB
3. Mail Delivery - Spoofing Emails.mp4 121.28MB
3. Mail Delivery - Spoofing Emails.srt 16.45KB
3. Maintaining Access Basic Methods.mp4 10.10MB
3. Maintaining Access Basic Methods.srt 7.41KB
3. Running Evil Files Silently In The Background.mp4 22.62MB
3. Running Evil Files Silently In The Background.srt 11.39KB
3. Upload & Execute Shell Commands.mp4 8.13MB
3. Upload & Execute Shell Commands.srt 5.76KB
3. Using A Remote Keylogger To Capture Key Strikes Including Passwords.mp4 100.14MB
3. Using A Remote Keylogger To Capture Key Strikes Including Passwords.mp4 85.27MB
3. Using A Remote Keylogger To Capture Key Strikes Including Passwords.srt 11.97KB
3. Using A Remote Keylogger To Capture Key Strikes Including Passwords.srt 9.45KB
4.1 Hybrid Analysis.html 93B
4.1 Icons Website - iconarchive.com.html 88B
4.1 LaZagne Git Repo.html 99B
4.1 LaZagne Git Repo.html 99B
4.1 Ubuntu Download Link.html 100B
4.2 PNG To ICO Converter..html 92B
4. Analysing The Gathered Info & Building An Attack Strategy.mp4 16.84MB
4. Analysing The Gathered Info & Building An Attack Strategy.srt 12.18KB
4. Changing Trojan's Icon.mp4 16.84MB
4. Changing Trojan's Icon.srt 10.83KB
4. Converting Basic Backdoor To An Executable.mp4 8.44MB
4. Converting Basic Backdoor To An Executable.srt 4.52KB
4. Detecting Trojans Using a Sandbox.mp4 7.64MB
4. Detecting Trojans Using a Sandbox.srt 4.36KB
4. Discovering Files, Links, Websites & Other Companies Related To Target.mp4 10.47MB
4. Discovering Files, Links, Websites & Other Companies Related To Target.srt 6.25KB
4. Ex2 - Using BeEF Outside The Network.mp4 11.89MB
4. Ex2 - Using BeEF Outside The Network.srt 7.44KB
4. Hacking OS X & Linux Using Pure Social Engineering Without Sending Any Files.mp4 19.47MB
4. Hacking OS X & Linux Using Pure Social Engineering Without Sending Any Files.srt 14.28KB
4. Injecting Backdoor Process In System Processes.mp4 18.65MB
4. Injecting Backdoor Process In System Processes.srt 13.29KB
4. Installing Ubuntu As a Virtual Machine.mp4 13.52MB
4. Installing Ubuntu As a Virtual Machine.srt 10.47KB
4. Listening For Incoming Connections.mp4 9.68MB
4. Listening For Incoming Connections.srt 9.33KB
4. Maintaining Access - Using a Reliable & undetectable Method.mp4 14.41MB
4. Maintaining Access - Using a Reliable & undetectable Method.srt 8.24KB
4. Password Recovery Basics.mp4 16.82MB
4. Password Recovery Basics.srt 10.11KB
4. Recovering Saved Passwords From A Local Machine.mp4 15.61MB
4. Recovering Saved Passwords From A Local Machine.srt 9.26KB
5.1 Web Scrapbook Download Page.html 121B
5.1 ZReporter Git Repo.html 94B
5. Creating A Replica Of Any Website Login Page.mp4 49.86MB
5. Creating A Replica Of Any Website Login Page.srt 7.91KB
5. Embedding A Normal File With Backdoor.mp4 26.70MB
5. Embedding A Normal File With Backdoor.srt 12.89KB
5. Execute & Report Payload.mp4 11.67MB
5. Execute & Report Payload.srt 9.64KB
5. Hacking A Windows 10 Machine Using The Generated Backdoor.mp4 13.11MB
5. Hacking A Windows 10 Machine Using The Generated Backdoor.srt 9.27KB
5. Recovering Saved Passwords From Local Machine.mp4 6.80MB
5. Recovering Saved Passwords From Local Machine.srt 4.04KB
5. Spoofing File Extension from .exe to anything else (pdf, png ..etc).mp4 23.69MB
5. Spoofing File Extension from .exe to anything else (pdf, png ..etc).srt 15.57KB
5. Spying - Capturing Key Strikes & Taking Screen Shots.mp4 4.32MB
5. Spying - Capturing Key Strikes & Taking Screen Shots.srt 3.40KB
5. Stealing root Password & Escalating Privileges On OS X.mp4 14.69MB
5. Stealing root Password & Escalating Privileges On OS X.srt 9.41KB
5. Using The Gathered Info To Build An Attack Strategy.mp4 9.09MB
5. Using The Gathered Info To Build An Attack Strategy.srt 6.24KB
6.1 autoit-download-and-execute.txt.txt 513B
6.1 run-laZagne.txt.txt 862B
6.1 The Fat Rat Git Repo.html 99B
6. Download & Execute Payload.mp4 20.19MB
6. Download & Execute Payload.srt 9.57KB
6. Download & Execute Payload (Method 2).mp4 18.94MB
6. Download & Execute Payload (Method 2).srt 8.96KB
6. Installing The Fat Rat.mp4 13.62MB
6. Installing The Fat Rat.srt 8.55KB
6. Maintaining Access On OS X.mp4 12.19MB
6. Maintaining Access On OS X.srt 7.27KB
6. Pivoting - Theory (What is Pivoting).mp4 16.08MB
6. Pivoting - Theory (What is Pivoting).srt 8.00KB
6. Recovering Saved Passwords From A Remote Machine.mp4 12.84MB
6. Recovering Saved Passwords From A Remote Machine.mp4 24.62MB
6. Recovering Saved Passwords From A Remote Machine.srt 8.60KB
6. Recovering Saved Passwords From A Remote Machine.srt 15.35KB
6. Stealing Login Info Using Fake A Login Page.mp4 17.63MB
6. Stealing Login Info Using Fake A Login Page.srt 12.40KB
7.1 Nodistribute - Online Virus Scanner.html 86B
7.1 Ubuntu Packages Download Page.html 88B
7.2 Alternative to Nodistribute.html 87B
7. BeEF Overview & Basic Hook Method.mp4 13.84MB
7. BeEF Overview & Basic Hook Method.srt 9.76KB
7. Changing Trojan's Icon.mp4 20.23MB
7. Changing Trojan's Icon.srt 8.61KB
7. Embedding Evil Code In A Legitimate Linux Package - Part 1.mp4 19.25MB
7. Embedding Evil Code In A Legitimate Linux Package - Part 1.srt 18.88KB
7. Embedding Evil Files With Any File Type Like An Image Or PDF (Method 2).mp4 18.34MB
7. Embedding Evil Files With Any File Type Like An Image Or PDF (Method 2).srt 9.26KB
7. Generating An Undetectable Backdoor Using TheFatRat.mp4 23.11MB
7. Generating An Undetectable Backdoor Using TheFatRat.srt 14.51KB
7. Pivoting - Exploiting Devices on The Same Network As The Target Computer.mp4 15.36MB
7. Pivoting - Exploiting Devices on The Same Network As The Target Computer.srt 10.83KB
8.1 Empire Git Repo.html 100B
8. Configuring The Trojan To Run Silently.mp4 17.06MB
8. Configuring The Trojan To Run Silently.srt 7.83KB
8. Controlling Android Phone & Accessing Mic, Camera, Messages, File System & More.mp4 16.40MB
8. Controlling Android Phone & Accessing Mic, Camera, Messages, File System & More.srt 12.50KB
8. Embedding backdoor In A Legitimate Microsoft Office Document.mp4 18.82MB
8. Embedding backdoor In A Legitimate Microsoft Office Document.srt 10.59KB
8. Embedding Evil Code In A Legitimate Linux Package - Part 2.mp4 9.84MB
8. Embedding Evil Code In A Legitimate Linux Package - Part 2.srt 6.67KB
8. Injecting BeEF's Hook In Any Webpage.mp4 11.29MB
8. Injecting BeEF's Hook In Any Webpage.srt 6.26KB
8. Installing Empire.mp4 12.63MB
8. Installing Empire.srt 5.70KB
9.1 download-and-execute-macro.txt.txt 483B
9. Backdooring a Legitimate Android App.mp4 108.82MB
9. Backdooring a Legitimate Android App.srt 15.08KB
9. Creating An Empire Listener.mp4 10.75MB
9. Creating An Empire Listener.srt 8.84KB
9. Embedding Any Evil File In A Legitimate Microsoft Office Document.mp4 20.95MB
9. Embedding Any Evil File In A Legitimate Microsoft Office Document.srt 13.28KB
9. Embedding Backdoor In A Legitimate Microsoft Office Document.mp4 13.88MB
9. Embedding Backdoor In A Legitimate Microsoft Office Document.srt 7.68KB
9. Luring Target Into Accessing Evil URL Without Direct Interaction.mp4 20.92MB
9. Luring Target Into Accessing Evil URL Without Direct Interaction.srt 14.04KB
9. Maintaining Access On OS X.mp4 22.97MB
9. Maintaining Access On OS X.srt 13.38KB
Distribution statistics by country
Italy (IT) 1
Russia (RU) 1
Saudi Arabia (SA) 1
Total 3
IP List List of IP addresses which were distributed this torrent