Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
[TGx]Downloaded from torrentgalaxy.to .txt |
585B |
0 |
12B |
001 About the course.en.srt |
5.15KB |
001 About the course.mp4 |
40.96MB |
001 Blocks of Information Gathering.en.srt |
10.24KB |
001 Blocks of Information Gathering.mp4 |
103.96MB |
001 How Secure are Web Application Applications_.en.srt |
14.41KB |
001 How Secure are Web Application Applications_.mp4 |
128.64MB |
001 Interacting with Target Machine -Part 1.en.srt |
7.12KB |
001 Interacting with Target Machine -Part 1.mp4 |
73.57MB |
001 Introduction to Metasploit Framework.en.srt |
27.76KB |
001 Introduction to Metasploit Framework.mp4 |
136.03MB |
001 Introduction to Shodan.en.srt |
4.79KB |
001 Introduction to Shodan.mp4 |
42.21MB |
001 JavaScript- Explained.en.srt |
15.07KB |
001 JavaScript- Explained.mp4 |
143.10MB |
001 Myth_1 Bad Hackers are Most-Skilled and Smart!.html |
1.20KB |
001 Prepare your Mind.en.srt |
8.29KB |
001 Prepare your Mind.mp4 |
95.52MB |
001 Risk and Anonymity.en.srt |
17.61KB |
001 Risk and Anonymity.mp4 |
220.96MB |
001 Setting up the Lab.en.srt |
7.57KB |
001 Setting up the Lab.mp4 |
52.44MB |
001 SQL Injection - Explained.en.srt |
16.14KB |
001 SQL Injection - Explained.mp4 |
140.88MB |
001 Windows 10 and Malwares.en.srt |
6.92KB |
001 Windows 10 and Malwares.mp4 |
57.34MB |
002 About Instructor.en.srt |
5.29KB |
002 About Instructor.mp4 |
45.32MB |
002 Bonus_ What is Virtualization_.en.srt |
22.25KB |
002 Bonus_ What is Virtualization_.mp4 |
176.09MB |
002 Career Options- Based on 2021 Market.en.srt |
11.16KB |
002 Career Options- Based on 2021 Market.mp4 |
79.42MB |
002 Creating MSF Workspaces.en.srt |
2.47KB |
002 Creating MSF Workspaces.mp4 |
10.88MB |
002 Frequently used Queries.en.srt |
8.64KB |
002 Frequently used Queries.mp4 |
76.72MB |
002 HTTP.en.srt |
13.94KB |
002 HTTP.mp4 |
98.74MB |
002 HTTP Header Analysis.en.srt |
2.98KB |
002 HTTP Header Analysis.mp4 |
31.29MB |
002 Interacting with Target Machine -Part 2.en.srt |
5.35KB |
002 Interacting with Target Machine -Part 2.mp4 |
61.98MB |
002 Myth_2 Hackers are illegal person.html |
1.23KB |
002 Security Challenges.en.srt |
16.62KB |
002 Security Challenges.mp4 |
135.23MB |
002 Setting up a MySQL Database from Scratch.en.srt |
21.88KB |
002 Setting up a MySQL Database from Scratch.mp4 |
176.33MB |
002 What are Threats in Windows 10.en.srt |
6.65KB |
002 What are Threats in Windows 10.mp4 |
57.39MB |
002 What is Dark Web_.en.srt |
9.01KB |
002 What is Dark Web_.mp4 |
100.98MB |
003 Backdoor.en.srt |
5.30KB |
003 Backdoor.mp4 |
48.03MB |
003 Bind Shell vs Reverse Shell.en.srt |
13.40KB |
003 Bind Shell vs Reverse Shell.mp4 |
97.74MB |
003 Clearing the Tracks.html |
1.45KB |
003 Demo_ IP Camera Access with Shodan.en.srt |
19.13KB |
003 Demo_ IP Camera Access with Shodan.mp4 |
210.63MB |
003 Exploring VMware Workstation Pro.en.srt |
8.49KB |
003 Exploring VMware Workstation Pro.mp4 |
79.47MB |
003 Installing Tor browser in Kali Linux.en.srt |
7.89KB |
003 Installing Tor browser in Kali Linux.mp4 |
114.63MB |
003 Lab_ HTTP.en.srt |
12.72KB |
003 Lab_ HTTP.mp4 |
135.75MB |
003 Lab_ HTTP Header Analysis.en.srt |
13.05KB |
003 Lab_ HTTP Header Analysis.mp4 |
133.46MB |
003 Myth_3 All the attacks are launched from China and Russia!.html |
1.35KB |
003 Penetration Tester.en.srt |
16.63KB |
003 Penetration Tester.mp4 |
122.90MB |
003 Same-Origin Policy(SOP).en.srt |
8.82KB |
003 Same-Origin Policy(SOP).mp4 |
90.87MB |
003 What its like being hacked_.en.srt |
8.74KB |
003 What its like being hacked_.mp4 |
73.64MB |
003 Working of SQL Query.en.srt |
4.05KB |
003 Working of SQL Query.mp4 |
39.31MB |
004 All you need is just one Tool!.html |
1.07KB |
004 Bonus_ Types of VMware Virtulizations.en.srt |
7.97KB |
004 Bonus_ Types of VMware Virtulizations.mp4 |
65.64MB |
004 Creating a Payload using MSFVenom.en.srt |
17.03KB |
004 Creating a Payload using MSFVenom.mp4 |
195.58MB |
004 Fact 1_ You dont need degree to become an Ethical Hacker!.html |
1.55KB |
004 How Form-based Authentication works_.en.srt |
8.35KB |
004 How Form-based Authentication works_.mp4 |
70.14MB |
004 HTTPS.en.srt |
9.19KB |
004 HTTPS.mp4 |
89.81MB |
004 Introduction to Censys.en.srt |
3.24KB |
004 Introduction to Censys.mp4 |
29.35MB |
004 Stages in Ethical Hacking.en.srt |
13.57KB |
004 Stages in Ethical Hacking.mp4 |
106.73MB |
004 What is Cross-Site Scripting attack_.en.srt |
5.26KB |
004 What is Cross-Site Scripting attack_.mp4 |
47.92MB |
004 What is Proxychains_.en.srt |
4.89KB |
004 What is Proxychains_.mp4 |
70.42MB |
004 What is Vulnerability_.en.srt |
6.23KB |
004 What is Vulnerability_.mp4 |
62.60MB |
004 Why to learn Ethical Hacking.en.srt |
6.02KB |
004 Why to learn Ethical Hacking.mp4 |
62.54MB |
005 Application Security Testing Practices.en.srt |
15.09KB |
005 Application Security Testing Practices.mp4 |
122.04MB |
005 Attack Planning.en.srt |
11.74KB |
005 Attack Planning.mp4 |
109.92MB |
005 Bonus_ Exploring Virtualbox.en.srt |
5.67KB |
005 Bonus_ Exploring Virtualbox.mp4 |
46.99MB |
005 Creating an Encoded Payload using MSFVenom.en.srt |
9.37KB |
005 Creating an Encoded Payload using MSFVenom.mp4 |
114.83MB |
005 Demo IP Camera Access with Censys.en.srt |
8.55KB |
005 Demo IP Camera Access with Censys.mp4 |
96.45MB |
005 Fact 2_ You dont need spend huge on certifications!.html |
1.29KB |
005 Lab_ Proxychains.en.srt |
12.52KB |
005 Lab_ Proxychains.mp4.part |
107.77MB |
005 Lab_ Setup and Resources.en.srt |
8.35KB |
005 Lab_ Setup and Resources.mp4 |
70.13MB |
005 Real-World Example of LetsMeetUp App.en.srt |
6.38KB |
005 Real-World Example of LetsMeetUp App.mp4 |
47.50MB |
005 Reflected XSS Attack.en.srt |
13.28KB |
005 Reflected XSS Attack.mp4 |
96.76MB |
005 Trailer_ Access a website without username_password.en.srt |
8.05KB |
005 Trailer_ Access a website without username_password.mp4 |
79.31MB |
006 Accessing Dark Web.en.srt |
10.27KB |
006 Accessing Dark Web.mp4 |
129.04MB |
006 Fact 3_ There is no perfect age to start your career in Ethical Hacking!.html |
1.25KB |
006 Finding Target email address.en.srt |
13.66KB |
006 Finding Target email address.mp4 |
152.65MB |
006 Introduction to Kali Linux.en.srt |
8.07KB |
006 Introduction to Kali Linux.mp4 |
68.67MB |
006 Introduction to Veil Evasion.en.srt |
4.53KB |
006 Introduction to Veil Evasion.mp4 |
46.60MB |
006 Lab_ Altoro Mutual.html |
955B |
006 Reflected XSS Attack_ A Closer look.en.srt |
6.58KB |
006 Reflected XSS Attack_ A Closer look.mp4 |
56.57MB |
006 Types of Vulnerabilities.en.srt |
10.81KB |
006 Types of Vulnerabilities.mp4 |
73.40MB |
006 What is an Ethical Hacking.en.srt |
5.82KB |
006 What is an Ethical Hacking.mp4 |
52.36MB |
007 CVEdetails.com and Exploit-DB.en.srt |
17.08KB |
007 CVEdetails.com and Exploit-DB.mp4 |
168.33MB |
007 Generating Payload with Veil Evasion.en.srt |
17.62KB |
007 Generating Payload with Veil Evasion.mp4 |
193.16MB |
007 Installing Kali Linux on Virtualbox.en.srt |
6.15KB |
007 Installing Kali Linux on Virtualbox.mp4 |
91.94MB |
007 Lab_ bWAPP.en.srt |
6.85KB |
007 Lab_ bWAPP.mp4 |
85.82MB |
007 Lab Setup_ Reflected XSS Attack.en.srt |
5.99KB |
007 Lab Setup_ Reflected XSS Attack.mp4 |
40.78MB |
007 Signal Hire and Hunter.io Tools.en.srt |
7.66KB |
007 Signal Hire and Hunter.io Tools.mp4 |
89.12MB |
008 Demo_ Launching SQL Injection Attack on Altoro Mutual.en.srt |
8.05KB |
008 Demo_ Launching SQL Injection Attack on Altoro Mutual.mp4 |
79.39MB |
008 Installing Kali Linux on VMware.en.srt |
7.59KB |
008 Installing Kali Linux on VMware.mp4 |
91.62MB |
008 Introduction to BeEF Tool.html |
1.59KB |
008 Vulnerability Scanning.en.srt |
4.33KB |
008 Vulnerability Scanning.mp4 |
27.74MB |
009 Installing BeEF Tool.en.srt |
15.94KB |
009 Installing BeEF Tool.mp4 |
170.77MB |
009 Introduction to Burp-Suite.en.srt |
11.53KB |
009 Introduction to Burp-Suite.mp4 |
98.73MB |
009 Introduction to Nessus Scanner.en.srt |
9.11KB |
009 Introduction to Nessus Scanner.mp4 |
55.08MB |
009 Kali Linux Basic Set-up.en.srt |
15.03KB |
009 Kali Linux Basic Set-up.mp4 |
160.73MB |
010 Getting started with Nessus Scanner.en.srt |
13.67KB |
010 Getting started with Nessus Scanner.mp4 |
114.56MB |
010 Intruder feature in Burp-Suite.en.srt |
4.33KB |
010 Intruder feature in Burp-Suite.mp4 |
44.72MB |
010 Lab_ DVWA(Damn Vulnerable Web Application).html |
1021B |
010 Linux Basics- Part 1.en.srt |
23.40KB |
010 Linux Basics- Part 1.mp4 |
196.18MB |
011 Demo_ Linkedin Account Hack using BeEF and DVWA.en.srt |
22.29KB |
011 Demo_ Linkedin Account Hack using BeEF and DVWA.mp4 |
259.37MB |
011 Downloading and Installing Metaspoitable.html |
972B |
011 Linux Basics -Part 2.en.srt |
10.54KB |
011 Linux Basics -Part 2.mp4 |
90.05MB |
011 Steps to launch SQL Injection using Burp-Suite.en.srt |
2.12KB |
011 Steps to launch SQL Injection using Burp-Suite.mp4 |
19.83MB |
012 Demo_ Launching SQL Injection attack on Altoro Mutual using Burp-Suite.en.srt |
12.62KB |
012 Demo_ Launching SQL Injection attack on Altoro Mutual using Burp-Suite.mp4 |
133.61MB |
012 Demo_ Linkedin Account Hack using BeEF and bWAPP.en.srt |
12.27KB |
012 Demo_ Linkedin Account Hack using BeEF and bWAPP.mp4 |
141.06MB |
012 Discovering Vulnerabilities on Target Server.en.srt |
19.56KB |
012 Discovering Vulnerabilities on Target Server.mp4 |
150.46MB |
012 Linux Basics - Part 3.en.srt |
6.17KB |
012 Linux Basics - Part 3.mp4 |
64.72MB |
013 Scanning Network for Vulnerabilities.en.srt |
16.28KB |
013 Scanning Network for Vulnerabilities.mp4 |
135.12MB |
013 Stored XSS Attack.en.srt |
10.63KB |
013 Stored XSS Attack.mp4 |
107.92MB |
013 User Permissions in Kali Linux.en.srt |
4.55KB |
013 User Permissions in Kali Linux.mp4 |
35.21MB |
014 Demo_ Stored XSS Attack - Part 1.en.srt |
4.19KB |
014 Demo_ Stored XSS Attack - Part 1.mp4 |
53.79MB |
014 Introduction to OpenVAS_GVM Scanner.en.srt |
7.45KB |
014 Introduction to OpenVAS_GVM Scanner.mp4 |
20.91MB |
015 Installing OpenVAS Scanner on Kali Linux.en.srt |
15.18KB |
015 Installing OpenVAS Scanner on Kali Linux.mp4 |
130.21MB |
016 Discovering Vulnerabilities on Victim Server with OpenVAS Scanner.en.srt |
14.31KB |
016 Discovering Vulnerabilities on Victim Server with OpenVAS Scanner.mp4 |
89.55MB |
017 Bonus_ Scan Config, Alerts and Schedules.en.srt |
12.51KB |
017 Bonus_ Scan Config, Alerts and Schedules.mp4 |
86.88MB |
018 Getting Started with Nmap.en.srt |
16.79KB |
018 Getting Started with Nmap.mp4 |
62.25MB |
019 Basic Scan with Nmap Part-1.en.srt |
7.40KB |
019 Basic Scan with Nmap Part-1.mp4 |
52.51MB |
020 Basic scan with Nmap Part -2.en.srt |
11.63KB |
020 Basic scan with Nmap Part -2.mp4 |
90.56MB |
021 Nmap Script Engine.en.srt |
23.71KB |
021 Nmap Script Engine.mp4 |
102.17MB |
022 Finding Exposed HTTP Methods with Nmap.en.srt |
6.72KB |
022 Finding Exposed HTTP Methods with Nmap.mp4 |
44.09MB |
023 HTTP Enumeration with Nmap tool.en.srt |
10.12KB |
023 HTTP Enumeration with Nmap tool.mp4 |
136.12MB |
024 Sensitive Data Leakage.en.srt |
8.41KB |
024 Sensitive Data Leakage.mp4 |
86.33MB |
025 Lab_ DirBuster.en.srt |
15.37KB |
025 Lab_ DirBuster.mp4 |
176.32MB |
026 Recon-ng Introduction.en.srt |
6.45KB |
026 Recon-ng Introduction.mp4 |
62.88MB |
027 Lab_ Finding Verified Email accounts with Recon-ng.en.srt |
9.47KB |
027 Lab_ Finding Verified Email accounts with Recon-ng.mp4 |
121.79MB |
028 Discovering Sub-domains.en.srt |
7.23KB |
028 Discovering Sub-domains.mp4 |
97.36MB |
029 Discovering Sub-domains with Recon-ng.en.srt |
14.31KB |
029 Discovering Sub-domains with Recon-ng.mp4 |
187.63MB |
030 Introduction to Wireshark tool.en.srt |
7.22KB |
030 Introduction to Wireshark tool.mp4 |
96.09MB |
031 Wireshark Interfaces.en.srt |
7.44KB |
031 Wireshark Interfaces.mp4 |
79.59MB |
1 |
264B |
10 |
237.17KB |
100 |
809.23KB |
101 |
729.72KB |
102 |
670.30KB |
103 |
264.83KB |
104 |
91.97KB |
105 |
172.51KB |
11 |
684.03KB |
12 |
274.08KB |
13 |
357.84KB |
14 |
552.62KB |
15 |
918.31KB |
16 |
966.90KB |
17 |
121.11KB |
18 |
900.23KB |
19 |
993.09KB |
2 |
190B |
20 |
255.28KB |
21 |
789.47KB |
22 |
906.10KB |
23 |
394.81KB |
24 |
556.11KB |
25 |
805.33KB |
26 |
979.19KB |
27 |
371.54KB |
28 |
103.15KB |
29 |
978.52KB |
3 |
760.72KB |
30 |
211.66KB |
31 |
174.68KB |
32 |
381.67KB |
33 |
447.41KB |
34 |
78.89KB |
35 |
83.58KB |
36 |
240.00KB |
37 |
279.36KB |
38 |
37.12KB |
39 |
850.45KB |
4 |
430.95KB |
40 |
23.53KB |
41 |
261.70KB |
42 |
279.77KB |
43 |
270.77KB |
44 |
656.57KB |
45 |
248.95KB |
46 |
558.29KB |
47 |
927.23KB |
48 |
490.60KB |
49 |
61.09KB |
5 |
857.32KB |
50 |
390.17KB |
51 |
136.27KB |
52 |
450.13KB |
53 |
977.47KB |
54 |
189.80KB |
55 |
459.43KB |
56 |
903.94KB |
57 |
123.06KB |
58 |
686.92KB |
59 |
181.86KB |
6 |
379.03KB |
60 |
421.59KB |
61 |
539.34KB |
62 |
598.34KB |
63 |
621.63KB |
64 |
705.94KB |
65 |
289.99KB |
66 |
363.70KB |
67 |
443.46KB |
68 |
617.77KB |
69 |
597.31KB |
7 |
685.59KB |
70 |
877.75KB |
71 |
894.96KB |
72 |
336.32KB |
73 |
371.20KB |
74 |
285.44KB |
75 |
126.13KB |
76 |
406.83KB |
77 |
474.25KB |
78 |
771.97KB |
79 |
19.21KB |
8 |
692.25KB |
80 |
623.97KB |
81 |
679.92KB |
82 |
443.60KB |
83 |
947.11KB |
84 |
214.05KB |
85 |
499.67KB |
86 |
570.26KB |
87 |
652.37KB |
88 |
996.13KB |
89 |
82.90KB |
9 |
931.93KB |
90 |
513.27KB |
91 |
8.33KB |
92 |
412.01KB |
93 |
691.49KB |
94 |
290.46KB |
95 |
933.69KB |
96 |
812.89KB |
97 |
43.34KB |
98 |
226.94KB |
99 |
706.41KB |
external-assets-links.txt |
109B |
external-assets-links.txt |
66B |
external-assets-links.txt |
54B |
TutsNode.com.txt |
63B |