Torrent Info
Title GetFreeCourses.Co-Udemy-Complete Ethical Hacking Bootcamp 2023 Zero to Mastery
Category
Size 9.89GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
001 Android Hacking Theory_en.srt 4.90KB
001 Android Hacking Theory.mp4 10.69MB
001 Anonymity Theory_en.srt 5.04KB
001 Anonymity Theory.mp4 13.26MB
001 Become An Alumni.html 944B
001 Built-in-Exceptions.url 73B
001 Course Outline_en.srt 10.20KB
001 Course Outline.mp4 96.01MB
001 Creating 2 Programs_en.srt 2.29KB
001 Creating 2 Programs.mp4 5.40MB
001 Enumerating Active Directory_en.srt 24.74KB
001 Enumerating Active Directory.mp4 189.49MB
001 Errors in Python_en.srt 7.73KB
001 Errors in Python.mp4 31.55MB
001 Finding First Vulnerability With Nmap Scripts_en.srt 22.70KB
001 Finding First Vulnerability With Nmap Scripts.mp4 156.08MB
001 Generating Basic Payload With Msfvenom_en.srt 15.62KB
001 Generating Basic Payload With Msfvenom.mp4 67.64MB
001 Learning Python_en.srt 2.73KB
001 Learning Python.mp4 6.57MB
001 Navigating Through Linux System_en.srt 14.56KB
001 Navigating Through Linux System.mp4 73.08MB
001 Note Not Everything Will Work Smooth!.html 1.73KB
001 Post Exploitation Theory_en.srt 6.11KB
001 Post Exploitation Theory.mp4 13.53MB
001 Special Bonus Lecture.html 1.21KB
001 The 2 Paths.html 868B
001 Theory Behind Scanning_en.srt 9.76KB
001 Theory Behind Scanning.mp4 88.38MB
001 Theory - Man In The Middle Attack_en.srt 10.38KB
001 Theory - Man In The Middle Attack.mp4 24.79MB
001 Website Penetration Testing Theory_en.srt 15.23KB
001 Website Penetration Testing Theory.mp4 35.36MB
001 What Are We Creating_en.srt 3.64KB
001 What Are We Creating.mp4 8.52MB
001 What Is A Programming Language_en.srt 7.83KB
001 What Is A Programming Language.mp4 18.83MB
001 What is A Virtual Machine_en.srt 8.44KB
001 What is A Virtual Machine.mp4 78.93MB
001 What is Exploitation_en.srt 9.65KB
001 What is Exploitation.mp4 21.86MB
001 What is Information Gathering_en.srt 5.94KB
001 What is Information Gathering.mp4 14.08MB
001 Wireless Cracking Theory_en.srt 7.57KB
001 Wireless Cracking Theory.mp4 18.03MB
001 Working With Files In Python_en.srt 11.44KB
001 Working With Files In Python.mp4 30.83MB
002 Advance Msfvenom Usage Part 1_en.srt 13.16KB
002 Advance Msfvenom Usage Part 1.mp4 87.07MB
002 Android VM Install_en.srt 8.51KB
002 Android VM Install.mp4 41.53MB
002 Bettercap ARP Spoofing_en.srt 15.72KB
002 Bettercap ARP Spoofing.mp4 126.10MB
002 bruteforce.py 1.06KB
002 Bruteforcer In Python_en.srt 36.21KB
002 Bruteforcer In Python.mp4 200.11MB
002 Built-in-Exceptions.url 73B
002 Connecting Server And Backdoor_en.srt 14.81KB
002 Connecting Server And Backdoor.mp4 37.61MB
002 Creating Files & Managing Directories_en.srt 16.58KB
002 Creating Files & Managing Directories.mp4 71.16MB
002 Endorsements On LinkedIN.html 1.37KB
002 Error Handling_en.srt 10.65KB
002 Error Handling.mp4 39.13MB
002 Exploiting Active Directory_en.srt 17.35KB
002 Exploiting Active Directory.mp4 116.89MB
002 File Paths_en.srt 8.45KB
002 File Paths.mp4 50.48MB
002 HTTP Request & Response_en.srt 5.08KB
002 HTTP Request & Response.mp4 31.30MB
002 Join Our Online Classroom!_en.srt 5.99KB
002 Join Our Online Classroom!.mp4 77.77MB
002 Manual Vulnerability Analysis & Searchsploit_en.srt 10.64KB
002 Manual Vulnerability Analysis & Searchsploit.mp4 80.58MB
002 Meterpreter Basic Commands Part 1_en.srt 15.90KB
002 Meterpreter Basic Commands Part 1.mp4 103.59MB
002 Note Do We Need To Learn Programming To Be An Ethical Hacker.html 1.48KB
002 Obtaining IP Address, Physical Address Using Whois Tool_en.srt 12.77KB
002 Obtaining IP Address, Physical Address Using Whois Tool.mp4 56.35MB
002 Pathlib.url 70B
002 Putting Wireless Card In Monitor Mode_en.srt 5.09KB
002 Putting Wireless Card In Monitor Mode.mp4 15.45MB
002 python.org.url 47B
002 Python Data Types_en.srt 6.00KB
002 Python Data Types.mp4 9.88MB
002 Python Interpreter_en.srt 8.97KB
002 Python Interpreter.mp4 70.92MB
002 Setting Up Vulnerable Windows 10_en.srt 10.95KB
002 Setting Up Vulnerable Windows 10.mp4 35.38MB
002 TCP & UDP_en.srt 5.77KB
002 TCP & UDP.mp4 13.43MB
002 Tor Browser_en.srt 10.90KB
002 Tor Browser.mp4 52.26MB
002 What is a Vulnerability_en.srt 7.35KB
002 What is a Vulnerability.mp4 16.42MB
002 Why Linux_en.srt 4.29KB
002 Why Linux.mp4 40.22MB
003 Advance Msfvenom Usage Part 2_en.srt 10.01KB
003 Advance Msfvenom Usage Part 2.mp4 67.19MB
003 Coding a Portscanner in Python 3_en.srt 32.88KB
003 Coding a Portscanner in Python 3.mp4 74.53MB
003 Crashing Windows 10 Machine Remotely_en.srt 9.29KB
003 Crashing Windows 10 Machine Remotely.mp4 43.55MB
003 Deauthenticating Devices & Grabbing Password_en.srt 15.72KB
003 Deauthenticating Devices & Grabbing Password.mp4 111.67MB
003 directories.py 474B
003 Error Handling 2_en.srt 7.39KB
003 Error Handling 2.mp4 20.06MB
003 Escalating Privileges on the Domain_en.srt 16.68KB
003 Escalating Privileges on the Domain.mp4 125.49MB
003 Ettercap Password Sniffing_en.srt 12.22KB
003 Ettercap Password Sniffing.mp4 31.75MB
003 Exercise Meet Your Classmates and Instructor.html 3.68KB
003 File IO Errors_en.srt 2.82KB
003 File IO Errors.mp4 15.28MB
003 Gaining Access With Android Meterpreter_en.srt 14.34KB
003 Gaining Access With Android Meterpreter.mp4 40.64MB
003 Glot.io.url 40B
003 Hidden Directory Discovery_en.srt 15.68KB
003 Hidden Directory Discovery.mp4 74.76MB
003 How To Run Python Code_en.srt 6.82KB
003 How To Run Python Code.mp4 36.81MB
003 How To Succeed.html 280B
003 Information Gathering & Dirb Tool_en.srt 11.20KB
003 Information Gathering & Dirb Tool.mp4 65.80MB
003 Meterpreter Basic Commands Part 2_en.srt 14.57KB
003 Meterpreter Basic Commands Part 2.mp4 90.23MB
003 Monthly Coding Challenges, Free Resources and Guides.html 1.58KB
003 Nessus Installation_en.srt 7.97KB
003 Nessus Installation.mp4 23.40MB
003 Network Commands & Sudo Privileges In Kali_en.srt 13.95KB
003 Network Commands & Sudo Privileges In Kali.mp4 77.32MB
003 Note Installing Vulnerable Machine.html 293B
003 portscanner.py 653B
003 Processing Instructional Commands_en.srt 9.28KB
003 Processing Instructional Commands.mp4 35.16MB
003 Proxychains With Nmap_en.srt 8.80KB
003 Proxychains With Nmap.mp4 55.07MB
003 Repl.it.url 40B
003 Reverse Shells, Bind Shells_en.srt 3.70KB
003 Reverse Shells, Bind Shells.mp4 8.23MB
003 What is Next_en.srt 3.40KB
003 What is Next.mp4 7.89MB
003 Whatweb Stealthy Scan_en.srt 11.29KB
003 Whatweb Stealthy Scan.mp4 94.80MB
004 Aggressive Website Technology Discovering on IP Range_en.srt 13.04KB
004 Aggressive Website Technology Discovering on IP Range.mp4 96.03MB
004 Aircrack Password Cracking_en.srt 9.58KB
004 Aircrack Password Cracking.mp4 29.70MB
004 Burpsuite Configuration_en.srt 10.83KB
004 Burpsuite Configuration.mp4 60.80MB
004 Discovering Vulnerabilities With Nessus_en.srt 21.57KB
004 Discovering Vulnerabilities With Nessus.mp4 56.08MB
004 Downloading Virtual Box & Kali Linux_en.srt 7.44KB
004 Downloading Virtual Box & Kali Linux.mp4 57.97MB
004 Elevating Privileges With Different Modules_en.srt 12.01KB
004 Elevating Privileges With Different Modules.mp4 101.21MB
004 Evil Droid_en.srt 11.11KB
004 Evil Droid.mp4 21.93MB
004 Exercises Error Handling_en.srt 7.14KB
004 Exercises Error Handling.mp4 16.58MB
004 Exploiting Windows 10 Machine Remotely_en.srt 20.30KB
004 Exploiting Windows 10 Machine Remotely.mp4 149.87MB
004 Floating-point-numbers.url 67B
004 Generating Powershell Payload Using Veil_en.srt 20.61KB
004 Generating Powershell Payload Using Veil.mp4 143.56MB
004 Installing VPN in Kali Linux_en.srt 6.87KB
004 Installing VPN in Kali Linux.mp4 35.99MB
004 Installing Vulnerable Virtual Machine_en.srt 8.24KB
004 Installing Vulnerable Virtual Machine.mp4 47.25MB
004 Learning Guideline.html 336B
004 Manually Poisoning Targets ARP Cache With Scapy_en.srt 17.10KB
004 Manually Poisoning Targets ARP Cache With Scapy.mp4 80.85MB
004 Metasploitable-Download.url 106B
004 Metasploit Framework Structure_en.srt 18.18KB
004 Metasploit Framework Structure.mp4 79.82MB
004 Note Linux File System & Additional Commands.html 1.11KB
004 Numbers_en.srt 13.35KB
004 Numbers.mp4 47.69MB
004 Our First Python Program_en.srt 10.16KB
004 Our First Python Program.mp4 41.91MB
004 Read, Write, Append_en.srt 9.65KB
004 Read, Write, Append.mp4 53.58MB
004 Sending and Receiving Data_en.srt 8.51KB
004 Sending and Receiving Data.mp4 20.56MB
004 What Is Ethical Hacking_en.srt 10.66KB
004 What Is Ethical Hacking.mp4 86.86MB
005 Course Resources + Guide.html 322B
005 Creating Persistence On The Target System_en.srt 11.24KB
005 Creating Persistence On The Target System.mp4 63.60MB
005 Endorsements On LinkedIN.html 1.37KB
005 Error Handling 3_en.srt 3.75KB
005 Error Handling 3.mp4 10.63MB
005 Executing Commands And Compiling The Program_en.srt 16.61KB
005 Executing Commands And Compiling The Program.mp4 97.87MB
005 Hashcat Password Cracking_en.srt 13.19KB
005 Hashcat Password Cracking.mp4 86.28MB
005 Is it Flappy Bird or Malware_en.srt 17.16KB
005 Is it Flappy Bird or Malware.mp4 89.99MB
005 Latest Version Of Python_en.srt 2.47KB
005 Latest Version Of Python.mp4 5.21MB
005 Math Functions_en.srt 5.84KB
005 Math Functions.mp4 25.92MB
005 Msfconsole Basic Commands_en.srt 22.74KB
005 Msfconsole Basic Commands.mp4 131.67MB
005 Netdiscover_en.srt 8.46KB
005 Netdiscover.mp4 42.02MB
005 Next Steps.html 834B
005 Note Kali Linux Updates All The Time!.html 1.38KB
005 Note Same Tools Different Results!.html 833B
005 Practice.html 625B
005 Scanning Windows 7 Machine With Nessus_en.srt 6.19KB
005 Scanning Windows 7 Machine With Nessus.mp4 14.51MB
005 ShellShock Exploitation_en.srt 21.64KB
005 ShellShock Exploitation.mp4 83.03MB
005 TheFatRat Payload Creation_en.srt 11.19KB
005 TheFatRat Payload Creation.mp4 77.25MB
005 WhoAmI Anonymity Tool_en.srt 10.84KB
005 WhoAmI Anonymity Tool.mp4 67.23MB
005 zerotomastery.io-Complete-Ethical-Hacking-Bootcamp-Zero-to-Mastery-Guide.pdf 119.19KB
006 Bug Bounty.html 670B
006 Changing Directory Inside Of Our Backdoor_en.srt 7.97KB
006 Changing Directory Inside Of Our Backdoor.mp4 40.93MB
006 Command Injection Exploitation_en.srt 16.10KB
006 Command Injection Exploitation.mp4 78.55MB
006 Creating Our First Virtual Machine_en.srt 12.32KB
006 Creating Our First Virtual Machine.mp4 25.28MB
006 DEVELOPER FUNDAMENTALS I_en.srt 5.50KB
006 DEVELOPER FUNDAMENTALS I.mp4 47.72MB
006 Exercise Translator_en.srt 14.49KB
006 Exercise Translator.mp4 81.62MB
006 Gathering Emails Using theHarvester & Hunter.io_en.srt 13.67KB
006 Gathering Emails Using theHarvester & Hunter.io.mp4 49.54MB
006 Hack Any Device On Any Network With Ngrok_en.srt 15.97KB
006 Hack Any Device On Any Network With Ngrok.mp4 31.20MB
006 Lets cool down for a bit!_en.srt 1.71KB
006 Lets cool down for a bit!.mp4 3.78MB
006 Note My Payloads Are Getting Detected By An Antivirus!.html 2.38KB
006 Our First Exploit - vsftp 2.3.4 Exploitation_en.srt 12.76KB
006 Our First Exploit - vsftp 2.3.4 Exploitation.mp4 37.55MB
006 Performing First Nmap Scan_en.srt 11.80KB
006 Performing First Nmap Scan.mp4 76.33MB
006 Post Exploitation Modules_en.srt 11.25KB
006 Post Exploitation Modules.mp4 81.92MB
006 Python 2 vs Python 3_en.srt 8.62KB
006 Python 2 vs Python 3.mp4 70.77MB
006 Python-2-vs-Python-3.url 91B
006 Python-2-vs-Python-3-another-one.url 124B
006 The-Story-of-Python.url 67B
007 Coding For Hackers.html 901B
007 Different Nmap Scan Types_en.srt 14.20KB
007 Different Nmap Scan Types.mp4 92.77MB
007 Exercise How Does Python Work_en.srt 3.07KB
007 Exercise How Does Python Work.mp4 15.25MB
007 Exercise-Repl.url 69B
007 Exploitation Recap_en.srt 5.42KB
007 Exploitation Recap.mp4 12.15MB
007 Getting Meterpreter Shell With Command Execution_en.srt 12.16KB
007 Getting Meterpreter Shell With Command Execution.mp4 52.76MB
007 Hexeditor & Antiviruses_en.srt 9.60KB
007 Hexeditor & Antiviruses.mp4 32.99MB
007 How To Download Tools Online_en.srt 14.84KB
007 How To Download Tools Online.mp4 91.86MB
007 Installing Kali Linux Operating System_en.srt 17.57KB
007 Installing Kali Linux Operating System.mp4 51.16MB
007 Misconfigurations Happen - Bindshell Exploitation_en.srt 6.38KB
007 Misconfigurations Happen - Bindshell Exploitation.mp4 20.47MB
007 Operator Precedence_en.srt 3.67KB
007 Operator Precedence.mp4 5.78MB
007 Uploading & Downloading Files_en.srt 15.00KB
007 Uploading & Downloading Files.mp4 35.07MB
008 backdoor.py 1.58KB
008 Exercise Operator Precedence.html 704B
008 Exercise-Repl.url 69B
008 Exploit Development.html 1.07KB
008 Finding Usernames With Sherlock_en.srt 11.00KB
008 Finding Usernames With Sherlock.mp4 73.77MB
008 Information Disclosure - Telnet Exploit_en.srt 5.34KB
008 Information Disclosure - Telnet Exploit.mp4 17.98MB
008 Making Our Payload Open An Image_en.srt 11.66KB
008 Making Our Payload Open An Image.mp4 52.37MB
008 Reflected XSS & Cookie Stealing_en.srt 22.18KB
008 Reflected XSS & Cookie Stealing.mp4 105.12MB
008 server.py 1.27KB
008 Testing All The Commands_en.srt 12.59KB
008 Testing All The Commands.mp4 78.12MB
008 Update 1 - New & Old Versions of Kali Linux_en.srt 2.72KB
008 Update 1 - New & Old Versions of Kali Linux.mp4 7.47MB
008 ZTM Nmap Cheat Sheet.html 1.07KB
009 Base-Numbers.url 74B
009 Bonus - Email Scraper Tool In Python 3_en.srt 8.97KB
009 Bonus - Email Scraper Tool In Python 3.mp4 39.31MB
009 Discovering Target Operating System_en.srt 7.97KB
009 Discovering Target Operating System.mp4 35.93MB
009 email-scarper.py 1.42KB
009 Networking-101.pdf 404.04KB
009 Networking Basics.html 438B
009 Note You Can Continue Building Onto This Project!.html 1.23KB
009 Optional bin() and complex_en.srt 5.30KB
009 Optional bin() and complex.mp4 14.45MB
009 Python Monthly.html 917B
009 Software Vulnerability - Samba Exploitation_en.srt 12.28KB
009 Software Vulnerability - Samba Exploitation.mp4 91.93MB
009 Stored XSS_en.srt 11.57KB
009 Stored XSS.mp4 63.68MB
010 Attacking SSH - Bruteforce Attack_en.srt 16.33KB
010 Attacking SSH - Bruteforce Attack.mp4 109.79MB
010 Detecting Version Of Service Running On An Open Port_en.srt 10.06KB
010 Detecting Version Of Service Running On An Open Port.mp4 29.60MB
010 Full Screen Mode & Network Settings_en.srt 16.52KB
010 Full Screen Mode & Network Settings.mp4 86.46MB
010 HTML Injection_en.srt 9.20KB
010 HTML Injection.mp4 27.54MB
010 Note More About Information Gathering.html 1.41KB
010 Python-Keywords.url 80B
010 Variables_en.srt 17.46KB
010 Variables.mp4 56.88MB
011 Exploitation Challenge - 5 Different Exploits_en.srt 24.23KB
011 Exploitation Challenge - 5 Different Exploits.mp4 168.18MB
011 Expressions vs Statements_en.srt 1.95KB
011 Expressions vs Statements.mp4 3.16MB
011 Filtering Port Range & Output Of Scan Results_en.srt 16.42KB
011 Filtering Port Range & Output Of Scan Results.mp4 56.96MB
011 SQL Injection_en.srt 27.53KB
011 SQL Injection.mp4 142.06MB
011 Troubleshooting Network Connection in Kali Linux_en.srt 8.20KB
011 Troubleshooting Network Connection in Kali Linux.mp4 50.15MB
012 Augmented Assignment Operator_en.srt 3.45KB
012 Augmented Assignment Operator.mp4 5.65MB
012 CSRF Vulnerability_en.srt 16.87KB
012 CSRF Vulnerability.mp4 97.79MB
012 Exercise-Repl.url 79B
012 Explaining Windows 7 Setup_en.srt 11.95KB
012 Explaining Windows 7 Setup.mp4 47.97MB
012 Note Getting Familiar With Kali Linux!.html 1.01KB
012 What is a FirewallIDS_en.srt 3.11KB
012 What is a FirewallIDS.mp4 30.77MB
013 5 Stages Of A Penetration Test_en.srt 10.15KB
013 5 Stages Of A Penetration Test.mp4 23.38MB
013 Eternal Blue Attack - Windows 7 Exploitation_en.srt 16.46KB
013 Eternal Blue Attack - Windows 7 Exploitation.mp4 108.15MB
013 Hydra Bruteforce Attack Example 1_en.srt 14.79KB
013 Hydra Bruteforce Attack Example 1.mp4 56.92MB
013 Strings_en.srt 6.83KB
013 Strings.mp4 11.19MB
013 Using Decoys and Packet Fragmentation_en.srt 16.35KB
013 Using Decoys and Packet Fragmentation.mp4 90.12MB
014 DoublePulsar Attack - Windows Exploit_en.srt 19.55KB
014 DoublePulsar Attack - Windows Exploit.mp4 76.94MB
014 Hydra Bruteforce Attack Example 2_en.srt 9.96KB
014 Hydra Bruteforce Attack Example 2.mp4 61.54MB
014 Security Evasion Nmap Options_en.srt 7.33KB
014 Security Evasion Nmap Options.mp4 32.78MB
014 String Concatenation_en.srt 1.65KB
014 String Concatenation.mp4 2.49MB
015 BlueKeep Vulnerability - Windows Exploit_en.srt 12.89KB
015 BlueKeep Vulnerability - Windows Exploit.mp4 89.32MB
015 Burpsuite Intruder_en.srt 10.99KB
015 Burpsuite Intruder.mp4 36.59MB
015 Note Time To Switch Things Up!.html 1.17KB
015 Type Conversion_en.srt 3.71KB
015 Type Conversion.mp4 14.57MB
016 Escape Sequences_en.srt 5.78KB
016 Escape Sequences.mp4 8.68MB
016 Note We Can Also Target Routers!.html 605B
017 Exercise-Repl.url 75B
017 Formatted Strings_en.srt 10.40KB
017 Formatted Strings.mp4 21.81MB
017 Update 2 - Routersploit_en.srt 8.46KB
017 Update 2 - Routersploit.mp4 63.33MB
018 Exercise-Repl.url 64B
018 String Indexes_en.srt 11.23KB
018 String Indexes.mp4 17.42MB
018 Update 3 - Router Default Credentials_en.srt 9.36KB
018 Update 3 - Router Default Credentials.mp4 39.83MB
019 Exercise Imposter Syndrome_en.srt 4.54KB
019 Exercise Imposter Syndrome.mp4 26.57MB
019 Immutability_en.srt 3.84KB
019 Immutability.mp4 8.19MB
020 Built-In-Functions.url 72B
020 Built-In Functions + Methods_en.srt 11.95KB
020 Built-In Functions + Methods.mp4 44.08MB
020 String-Methods.url 78B
021 Booleans_en.srt 4.48KB
021 Booleans.mp4 7.45MB
022 Exercise Type Conversion_en.srt 9.99KB
022 Exercise Type Conversion.mp4 21.76MB
023 DEVELOPER FUNDAMENTALS II_en.srt 5.56KB
023 DEVELOPER FUNDAMENTALS II.mp4 18.70MB
023 Python-Comments-Best-Practices.url 69B
024 Exercise Password Checker_en.srt 8.97KB
024 Exercise Password Checker.mp4 21.24MB
025 Lists_en.srt 6.46KB
025 Lists.mp4 8.90MB
026 Exercise-Repl.url 55B
026 List Slicing_en.srt 9.63KB
026 List Slicing.mp4 17.54MB
027 Exercise-Repl.url 56B
027 Matrix_en.srt 5.07KB
027 Matrix.mp4 8.72MB
028 List Methods_en.srt 13.16KB
028 List Methods.mp4 40.18MB
028 List-Methods.url 76B
029 Exercise-Repl.url 65B
029 List Methods 2_en.srt 5.63KB
029 List Methods 2.mp4 17.62MB
029 Python-Keywords.url 80B
030 List Methods 3_en.srt 6.22KB
030 List Methods 3.mp4 18.29MB
031 Common List Patterns_en.srt 7.19KB
031 Common List Patterns.mp4 16.82MB
031 Exercise-Repl.url 57B
032 List Unpacking_en.srt 3.52KB
032 List Unpacking.mp4 6.20MB
033 None_en.srt 2.32KB
033 None.mp4 3.08MB
034 Dictionaries_en.srt 8.71KB
034 Dictionaries.mp4 12.48MB
035 DEVELOPER FUNDAMENTALS III_en.srt 3.77KB
035 DEVELOPER FUNDAMENTALS III.mp4 8.66MB
036 Dictionary Keys_en.srt 4.90KB
036 Dictionary Keys.mp4 7.88MB
037 Dictionary Methods_en.srt 6.30KB
037 Dictionary Methods.mp4 10.07MB
037 Dictionary-Methods.url 82B
038 Dictionary Methods 2_en.srt 8.64KB
038 Dictionary Methods 2.mp4 28.18MB
038 Exercise-Repl.url 60B
039 Tuples_en.srt 6.43KB
039 Tuples.mp4 9.99MB
040 Tuple-Methods.url 77B
040 Tuples 2_en.srt 3.94KB
040 Tuples 2.mp4 8.43MB
041 Sets_en.srt 9.52KB
041 Sets.mp4 32.65MB
042 Exercise-Repl.url 54B
042 Sets 2_en.srt 11.14KB
042 Sets 2.mp4 52.49MB
042 Sets-Methods.url 75B
043 Breaking The Flow_en.srt 3.04KB
043 Breaking The Flow.mp4 7.40MB
044 Conditional Logic_en.srt 18.30KB
044 Conditional Logic.mp4 56.52MB
045 Indentation In Python_en.srt 5.70KB
045 Indentation In Python.mp4 11.31MB
046 Truthy vs Falsey_en.srt 6.70KB
046 Truthy vs Falsey.mp4 42.80MB
046 Truthy-vs-Falsey-Stackoverflow.url 133B
047 Ternary Operator_en.srt 5.46KB
047 Ternary Operator.mp4 8.31MB
048 Short Circuiting_en.srt 5.03KB
048 Short Circuiting.mp4 8.15MB
049 Logical Operators_en.srt 10.02KB
049 Logical Operators.mp4 14.59MB
050 Exercise Logical Operators_en.srt 9.66KB
050 Exercise Logical Operators.mp4 23.57MB
051 is vs ==_en.srt 9.79KB
051 is vs ==.mp4 33.56MB
052 For Loops_en.srt 8.64KB
052 For Loops.mp4 34.28MB
053 Iterables_en.srt 8.08KB
053 Iterables.mp4 20.25MB
054 Exercise Tricky Counter_en.srt 4.11KB
054 Exercise Tricky Counter.mp4 6.76MB
054 Solution-Repl.url 55B
055 range()_en.srt 6.84KB
055 range().mp4 20.79MB
056 enumerate()_en.srt 5.14KB
056 enumerate().mp4 9.40MB
057 While Loops_en.srt 8.51KB
057 While Loops.mp4 13.94MB
058 While Loops 2_en.srt 7.46KB
058 While Loops 2.mp4 11.47MB
059 break, continue, pass_en.srt 5.81KB
059 break, continue, pass.mp4 9.25MB
060 Exercise-Repl.url 62B
060 Our First GUI_en.srt 11.60KB
060 Our First GUI.mp4 46.08MB
060 Solution-Repl.url 62B
061 DEVELOPER FUNDAMENTALS IV_en.srt 8.49KB
061 DEVELOPER FUNDAMENTALS IV.mp4 24.69MB
062 Exercise Find Duplicates_en.srt 5.02KB
062 Exercise Find Duplicates.mp4 8.50MB
062 Solution-Repl.url 65B
063 Functions_en.srt 10.11KB
063 Functions.mp4 21.29MB
064 Parameters and Arguments_en.srt 5.51KB
064 Parameters and Arguments.mp4 9.31MB
065 Default Parameters and Keyword Arguments_en.srt 6.70KB
065 Default Parameters and Keyword Arguments.mp4 38.11MB
066 return_en.srt 16.59KB
066 return.mp4 63.00MB
067 Methods vs Functions_en.srt 6.13KB
067 Methods vs Functions.mp4 26.35MB
068 Docstrings_en.srt 4.88KB
068 Docstrings.mp4 10.25MB
069 Clean Code_en.srt 6.03KB
069 Clean Code.mp4 17.58MB
070 args and kwargs_en.srt 9.17KB
070 args and kwargs.mp4 24.35MB
071 Exercise Functions_en.srt 5.47KB
071 Exercise Functions.mp4 8.86MB
071 Solution-Repl.url 71B
072 Scope_en.srt 4.68KB
072 Scope.mp4 8.09MB
073 Scope Rules_en.srt 8.99KB
073 Scope Rules.mp4 18.89MB
074 global Keyword_en.srt 7.67KB
074 global Keyword.mp4 18.61MB
075 nonlocal Keyword_en.srt 4.22KB
075 nonlocal Keyword.mp4 9.34MB
075 Solution-Repl.url 58B
076 Why Do We Need Scope_en.srt 4.89KB
076 Why Do We Need Scope.mp4 8.65MB
077 Modules in Python_en.srt 15.16KB
077 Modules in Python.mp4 70.71MB
078 Quick Note Upcoming Videos.html 479B
079 Optional PyCharm_en.srt 11.62KB
079 Optional PyCharm.mp4 25.33MB
080 Packages in Python_en.srt 14.06KB
080 Packages in Python.mp4 72.40MB
081 Different Ways To Import_en.srt 8.67KB
081 Different Ways To Import.mp4 23.94MB
Download Paid Udemy Courses For Free.url 116B
Download Paid Udemy Courses For Free.url 116B
Download Paid Udemy Courses For Free.url 116B
Download Paid Udemy Courses For Free.url 116B
Download Paid Udemy Courses For Free.url 116B
external-links.txt 115B
external-links.txt 420B
external-links.txt 2.02KB
external-links.txt 156B
external-links.txt 63B
GetFreeCourses.Co.url 116B
GetFreeCourses.Co.url 116B
GetFreeCourses.Co.url 116B
GetFreeCourses.Co.url 116B
GetFreeCourses.Co.url 116B
GetFreeCourses.Co.url 116B
How you can help GetFreeCourses.Co.txt 182B
How you can help GetFreeCourses.Co.txt 182B
Distribution statistics by country
Russia (RU) 2
United Kingdom (GB) 1
Serbia (RS) 1
Senegal (SN) 1
Total 5
IP List List of IP addresses which were distributed this torrent