[FreeCourseSite.com] Udemy - Learn Python & Ethical Hacking From Scratch

Photo unavailable
Category:
Date:
01/14/19 at 5:41am GMT+1
Submitter:
Seeders:
0
Leechers:
1
File size:
12.2 GB in 99 files

Torrent Status:
  This torrent has been verified.

Infohash:
96f57ea6a1684c74e6e30a8dfe8ccf08eef2bd2b


File list

  • [FreeCourseSite.com] Udemy - Learn Python & Ethical Hacking From Scratch
  • icon 1. Introduction/1. Introduction.mp4 141.5 MB
    icon 1. Introduction/1. Introduction.vtt 7 KB
    icon 1. Introduction/2. Teaser.mp4 102 MB
    icon 1. Introduction/2. Teaser.vtt 8 KB
    icon 1. Introduction/3. What is Programming, What is Hacking & Why Learn Them.mp4 139.7 MB
    icon 1. Introduction/3. What is Programming, What is Hacking & Why Learn Them.vtt 7.3 KB
    icon 1. Introduction/4. Lab Overview & Needed Software.mp4 81.9 MB
    icon 1. Introduction/4. Lab Overview & Needed Software.vtt 6.5 KB
    icon 1. Introduction/4.1 Virtual Box Download Page.html 102 B
    icon 1. Introduction/5. Installing Kali as a virtual Machine.mp4 104 MB
    icon 1. Introduction/5. Installing Kali as a virtual Machine.vtt 9.9 KB
    icon 1. Introduction/5.1 How to Fix Missing Nat Network Issue.html 104 B
    icon 1. Introduction/5.2 How to Fix Blank Screen After Starting Kali.html 158 B
    icon 1. Introduction/5.3 Kali Linux Download Page.html 150 B
    icon 1. Introduction/6. Basic Overview of Kali Linux.mp4 107.4 MB
    icon 1. Introduction/6. Basic Overview of Kali Linux.vtt 5.8 KB
    icon 1. Introduction/6.1 How to connect a usb device to Kali.html 104 B
    icon 1. Introduction/7. The Terminal & Linux Commands.mp4 223.5 MB
    icon 1. Introduction/7. The Terminal & Linux Commands.vtt 12.3 KB
    icon 1. Introduction/7.1 List of Linux Commands.html 122 B
    icon 1. Introduction/8. Python 2 VS Python 3 & Writing Our First Program.mp4 193.7 MB
    icon 1. Introduction/8. Python 2 VS Python 3 & Writing Our First Program.vtt 10.1 KB
    icon 1. Introduction/9. Installing & Using a Python IDE.mp4 115.5 MB
    icon 1. Introduction/9. Installing & Using a Python IDE.vtt 10 KB
    icon 1. Introduction/9.1 Pycharm Download Link.html 118 B
    icon 10. Bypassing HTTPS/1. How to Bypass HTTPS.mp4 163.7 MB
    icon 10. Bypassing HTTPS/1. How to Bypass HTTPS.vtt 11.4 KB
    icon 10. Bypassing HTTPS/1.1 Moxie explaining how SSLstrip works.html 112 B
    icon 10. Bypassing HTTPS/2. Bypassing HTTPS & Sniffing Login Credentials.mp4 67.7 MB
    icon 10. Bypassing HTTPS/2. Bypassing HTTPS & Sniffing Login Credentials.vtt 8.6 KB
    icon 10. Bypassing HTTPS/3. Replacing Downloads on HTTPS Pages.mp4 115.9 MB
    icon 10. Bypassing HTTPS/3. Replacing Downloads on HTTPS Pages.vtt 11.3 KB
    icon 10. Bypassing HTTPS/4. Injecting Code in HTTPS Pages.mp4 100.2 MB
    icon 10. Bypassing HTTPS/4. Injecting Code in HTTPS Pages.vtt 8.6 KB
    icon 11. Writing an ARP Spoof Detector/1. Running Python Programs on Windows.mp4 106.8 MB
    icon 11. Writing an ARP Spoof Detector/1. Running Python Programs on Windows.vtt 10.9 KB
    icon 11. Writing an ARP Spoof Detector/2. Capturing & Analysing ARP Responses.mp4 55.6 MB
    icon 11. Writing an ARP Spoof Detector/2. Capturing & Analysing ARP Responses.vtt 7.1 KB
    icon 11. Writing an ARP Spoof Detector/3. Detecting ARP Spoofing Attacks.mp4 67.8 MB
    icon 11. Writing an ARP Spoof Detector/3. Detecting ARP Spoofing Attacks.vtt 7.9 KB
    icon 12. Writing Malware/1. Introduction & Teaser.mp4 44.1 MB
    icon 12. Writing Malware/1. Introduction & Teaser.vtt 2.1 KB
    icon 12. Writing Malware/1.1 Evil Files.pdf.pdf 1.3 MB
    icon 12. Writing Malware/10. Interacting With The File System.mp4 76.9 MB
    icon 12. Writing Malware/10. Interacting With The File System.vtt 10.7 KB
    icon 12. Writing Malware/10.1 OS Library Documentation.html 102 B
    icon 12. Writing Malware/2. Execute System Command Payload.mp4 91.3 MB
    icon 12. Writing Malware/2. Execute System Command Payload.vtt 10.6 KB
    icon 12. Writing Malware/3. Sending Reports By Email.mp4 89.9 MB
    icon 12. Writing Malware/3. Sending Reports By Email.vtt 12 KB
    icon 12. Writing Malware/3.1 smtplib Documentation.html 107 B
    icon 12. Writing Malware/4. Filtering Command Output Using Regex.mp4 90.6 MB
    icon 12. Writing Malware/4. Filtering Command Output Using Regex.vtt 11.2 KB
    icon 12. Writing Malware/5. Stealing WiFi Passwords Saved on a Computer.mp4 118.4 MB
    icon 12. Writing Malware/5. Stealing WiFi Passwords Saved on a Computer.vtt 10.7 KB
    icon 12. Writing Malware/6. Downloading Files From Program.mp4 89.6 MB
    icon 12. Writing Malware/6. Downloading Files From Program.vtt 8.8 KB
    icon 12. Writing Malware/7. Writing Files on Disk.mp4 69.1 MB
    icon 12. Writing Malware/7. Writing Files on Disk.vtt 12.4 KB
    icon 12. Writing Malware/7.1 File Modes In Python.html 118 B
    icon 12. Writing Malware/8. Password Recovery Basics.mp4 93.7 MB
    icon 12. Writing Malware/8. Password Recovery Basics.vtt 9.5 KB
    icon 12. Writing Malware/8.1 LaZagne Git Repo.html 108 B
    icon 12. Writing Malware/9. Using all the Above to Steal Saved Passwords Remotely.mp4 62.8 MB
    icon 12. Writing Malware/9. Using all the Above to Steal Saved Passwords Remotely.vtt 8.9 KB
    icon 13. Writing Malware - Keylogger/1. Introduction & Teaser.mp4 63.2 MB
    icon 13. Writing Malware - Keylogger/1. Introduction & Teaser.vtt 4 KB
    icon 13. Writing Malware - Keylogger/2. Writing a Basic Local Keylogger.mp4 78.3 MB
    icon 13. Writing Malware - Keylogger/2. Writing a Basic Local Keylogger.vtt 11.6 KB
    icon 13. Writing Malware - Keylogger/2.1 Pynput Documentation.html 93 B
    icon 13. Writing Malware - Keylogger/3. Global Variables.mp4 54.8 MB
    icon 13. Writing Malware - Keylogger/3. Global Variables.vtt 9 KB
    icon 13. Writing Malware - Keylogger/4. Logging Special Keys.mp4 54.9 MB
    icon 13. Writing Malware - Keylogger/4. Logging Special Keys.vtt 7.2 KB
    icon 13. Writing Malware - Keylogger/5. Threading & Recursion.mp4 84.4 MB
    icon 13. Writing Malware - Keylogger/5. Threading & Recursion.vtt 11.9 KB
    icon 13. Writing Malware - Keylogger/5.1 Threading Documentation.html 109 B
    icon 13. Writing Malware - Keylogger/6. OOP - Object Oriented Programming Basics.mp4 116.5 MB
    icon 13. Writing Malware - Keylogger/6. OOP - Object Oriented Programming Basics.vtt 16.6 KB
    icon 13. Writing Malware - Keylogger/6.1 More info About Objects in Python.html 125 B
    icon 13. Writing Malware - Keylogger/7. Constructor Methods & Instance Variables.mp4 66.1 MB
    icon 13. Writing Malware - Keylogger/7. Constructor Methods & Instance Variables.vtt 8.3 KB
    icon 13. Writing Malware - Keylogger/8. Logging Key-strikes and Reporting Them By Email.mp4 83.8 MB
    icon 13. Writing Malware - Keylogger/8. Logging Key-strikes and Reporting Them By Email.vtt 12.8 KB
    icon 14. Writing Malware - Backdoors/1. Introduction & Teaser.mp4 76.6 MB
    icon 14. Writing Malware - Backdoors/1. Introduction & Teaser.vtt 6.4 KB
    icon 14. Writing Malware - Backdoors/10. Serialisation - Theory.mp4 164.4 MB
    icon 14. Writing Malware - Backdoors/10. Serialisation - Theory.vtt 12.1 KB
    icon 14. Writing Malware - Backdoors/11. Serialisation - Implementing Reliable Methods to Send & Receive Data Over TCP.mp4 81.9 MB
    icon 14. Writing Malware - Backdoors/11. Serialisation - Implementing Reliable Methods to Send & Receive Data Over TCP.vtt 8.2 KB
    icon 14. Writing Malware - Backdoors/11.1 json Documentation.html 104 B
    icon 14. Writing Malware - Backdoors/12. Serialisation - Reliably Sending & Receiving Data.mp4 59 MB
    icon 14. Writing Malware - Backdoors/12. Serialisation - Reliably Sending & Receiving Data.vtt 6.3 KB
    icon 14. Writing Malware - Backdoors/13. Sending Commands as List & Implementing Exit Command.mp4 73.1 MB
    icon 14. Writing Malware - Backdoors/13. Sending Commands as List & Implementing Exit Command.vtt 8.8 KB
    icon 14. Writing Malware - Backdoors/14. Interacting With the File System - Implementing cd Command.mp4 77.8 MB
    icon 14. Writing Malware - Backdoors/14. Interacting With the File System - Implementing cd Command.vtt 9.4 KB
    icon 14. Writing Malware - Backdoors/15. Reading Files.mp4 73.9 MB
    icon 14. Writing Malware - Backdoors/15. Reading Files.vtt 7.8 KB

Similar Torrents

Category
Name
Size
Date
 [FreeCourseSite.com] Udemy - 100 Days of Code The Complete Python Pro Bootcamp for 2023 19.7 GB06/12/234413
 [FreeCourseSite.com] Udemy - Complete Ethical Hacking Bootcamp 2023 Zero to Mastery 10.2 GB07/09/233812
 [FreeCourseSite.com] Udemy - 100 Days of Code The Complete Python Pro Bootcamp for 2023 29.6 GB01/03/233717
 [FreeCourseSite.com] Udemy - 23 Ways To Make Money Online In 2023 - Earn Money Online! 1.6 GB04/05/23311
 [FreeCourseSite.com] Udemy - 20 Great Python Projects To Help You Master It In 2023 1.5 GB06/28/23305
 [FreeCourseSite.com] Udemy - An Entire MBA in 1 Course Award Winning Business School Prof 6 GB07/13/232914
 [FreeCourseSite.com] Udemy - The Python Mega Course Learn Python in 60 Days with 20 Apps 13 GB06/09/23281
 [FreeCourseSite.com] Udemy - The Complete 2023 Web Development Bootcamp 38 GB02/19/232324
 [FreeCourseSite.com] Udemy - ChatGPT Complete Guide Learn Midjourney, ChatGPT 4 & More 9.1 GB04/24/23224
 [FreeCourseSite.com] Udemy - DevOps Beginners to Advanced Decoding DevOps with Projects 16.7 GB01/25/23214
 [FreeCourseSite.com] Udemy - The Ultimate Dark Web, Anonymity, Privacy & Security Course 6.1 GB05/08/23217
 [FreeCourseSite.com] Udemy - Microsoft Excel - Excel from Beginner to Advanced 7.9 GB01/21/23202
 [FreeCourseSite.com] Udemy - Python for Data Science and Machine Learning Bootcamp 4.2 GB02/01/23194
 [FreeCourseSite.com] Udemy - ChatGPT and Midjourney 12 Ways of Earning Money. ChatGPT AI 812 MB04/28/23181
 [FreeCourseSite.com] Udemy - Reverse Engineering & Malware Analysis in 21 Hours REMAC+ 9.1 GB10/02/23181