Udemy - Ethical Hacking - Learn The Art of Hacking Using Python3

Photo unavailable
Category:
Date:
04/24/22 at 3:36am GMT+1
Submitter:
Seeders:
0
Leechers:
1
File size:
3.4 GB in 88 files

Torrent Status:
  This torrent has been verified.

Infohash:
6ca2db45b6e5045382ea3d9bfe444435f304ea18


File list

  • Udemy - Ethical Hacking - Learn The Art of Hacking Using Python3
  • icon ~Get Your Files Here !/1. Introduction/1. Introduction.mp4 30.3 MB
    icon ~Get Your Files Here !/2. Introduction to the Backdoor/1. What is Backdoor.mp4 32.5 MB
    icon ~Get Your Files Here !/2. Introduction to the Backdoor/1. What is Backdoor.srt 5 KB
    icon ~Get Your Files Here !/3. Creating Backdoor from Scratch/1. Introduction to subprocess module.mp4 43.5 MB
    icon ~Get Your Files Here !/3. Creating Backdoor from Scratch/1. Introduction to subprocess module.srt 9 KB
    icon ~Get Your Files Here !/3. Creating Backdoor from Scratch/10. Change Directory using Backdoor.mp4 127.2 MB
    icon ~Get Your Files Here !/3. Creating Backdoor from Scratch/10. Change Directory using Backdoor.srt 24.7 KB
    icon ~Get Your Files Here !/3. Creating Backdoor from Scratch/11. Handle Change Directory (cd) exceptions.mp4 70.1 MB
    icon ~Get Your Files Here !/3. Creating Backdoor from Scratch/11. Handle Change Directory (cd) exceptions.srt 12.3 KB
    icon ~Get Your Files Here !/3. Creating Backdoor from Scratch/2. Saving result of command execution.mp4 41.6 MB
    icon ~Get Your Files Here !/3. Creating Backdoor from Scratch/2. Saving result of command execution.srt 7.6 KB
    icon ~Get Your Files Here !/3. Creating Backdoor from Scratch/3. Backdoor in Server-Client.mp4 12.4 MB
    icon ~Get Your Files Here !/3. Creating Backdoor from Scratch/3. Backdoor in Server-Client.srt 1.7 KB
    icon ~Get Your Files Here !/3. Creating Backdoor from Scratch/4. Server Side Programming.mp4 27 MB
    icon ~Get Your Files Here !/3. Creating Backdoor from Scratch/4. Server Side Programming.srt 6.1 KB
    icon ~Get Your Files Here !/3. Creating Backdoor from Scratch/5. Client Side Programming.mp4 48.5 MB
    icon ~Get Your Files Here !/3. Creating Backdoor from Scratch/5. Client Side Programming.srt 8.6 KB
    icon ~Get Your Files Here !/3. Creating Backdoor from Scratch/6. Send message from Server to Client.mp4 61.9 MB
    icon ~Get Your Files Here !/3. Creating Backdoor from Scratch/6. Send message from Server to Client.srt 8.9 KB
    icon ~Get Your Files Here !/3. Creating Backdoor from Scratch/7. Server-Client Communication.mp4 63.9 MB
    icon ~Get Your Files Here !/3. Creating Backdoor from Scratch/7. Server-Client Communication.srt 11 KB
    icon ~Get Your Files Here !/3. Creating Backdoor from Scratch/8. Executing shell commands through backdoor.mp4 86.8 MB
    icon ~Get Your Files Here !/3. Creating Backdoor from Scratch/8. Executing shell commands through backdoor.srt 16 KB
    icon ~Get Your Files Here !/3. Creating Backdoor from Scratch/9. Handle Exceptions.mp4 78 MB
    icon ~Get Your Files Here !/3. Creating Backdoor from Scratch/9. Handle Exceptions.srt 12.7 KB
    icon ~Get Your Files Here !/4. Adding Several Functionalities to Backdoor/1. Download Functionality.mp4 124.7 MB
    icon ~Get Your Files Here !/4. Adding Several Functionalities to Backdoor/1. Download Functionality.srt 21.9 KB
    icon ~Get Your Files Here !/4. Adding Several Functionalities to Backdoor/10. Binding Payload with other files.mp4 146 MB
    icon ~Get Your Files Here !/4. Adding Several Functionalities to Backdoor/10. Binding Payload with other files.srt 19.1 KB
    icon ~Get Your Files Here !/4. Adding Several Functionalities to Backdoor/2. Handle Download Exceptions.mp4 52.1 MB
    icon ~Get Your Files Here !/4. Adding Several Functionalities to Backdoor/2. Handle Download Exceptions.srt 8.6 KB
    icon ~Get Your Files Here !/4. Adding Several Functionalities to Backdoor/3. Maintaining DRY principle at Client Side.mp4 62 MB
    icon ~Get Your Files Here !/4. Adding Several Functionalities to Backdoor/3. Maintaining DRY principle at Client Side.srt 8.7 KB
    icon ~Get Your Files Here !/4. Adding Several Functionalities to Backdoor/4. Maintaining DRY principle at Server Side.mp4 30.7 MB
    icon ~Get Your Files Here !/4. Adding Several Functionalities to Backdoor/4. Maintaining DRY principle at Server Side.srt 4.7 KB
    icon ~Get Your Files Here !/4. Adding Several Functionalities to Backdoor/5. Upload Functionality.mp4 73 MB
    icon ~Get Your Files Here !/4. Adding Several Functionalities to Backdoor/5. Upload Functionality.srt 12.2 KB
    icon ~Get Your Files Here !/4. Adding Several Functionalities to Backdoor/6. Debug and Test Upload Feature.mp4 104.8 MB
    icon ~Get Your Files Here !/4. Adding Several Functionalities to Backdoor/6. Debug and Test Upload Feature.srt 16.5 KB
    icon ~Get Your Files Here !/4. Adding Several Functionalities to Backdoor/7. Lock Windows Machine.mp4 72.4 MB
    icon ~Get Your Files Here !/4. Adding Several Functionalities to Backdoor/7. Lock Windows Machine.srt 10.2 KB
    icon ~Get Your Files Here !/4. Adding Several Functionalities to Backdoor/8. Making Payload Persistance.mp4 109.6 MB
    icon ~Get Your Files Here !/4. Adding Several Functionalities to Backdoor/8. Making Payload Persistance.srt 17.4 KB
    icon ~Get Your Files Here !/4. Adding Several Functionalities to Backdoor/9. Convert .py to .exe Making Executables.mp4 52 MB
    icon ~Get Your Files Here !/4. Adding Several Functionalities to Backdoor/9. Convert .py to .exe Making Executables.srt 7.2 KB
    icon ~Get Your Files Here !/5. Theory on Cryptography Must watch before creating Ransomware/1. Introduction to Security.mp4 30.2 MB
    icon ~Get Your Files Here !/5. Theory on Cryptography Must watch before creating Ransomware/1. Introduction to Security.srt 4 KB
    icon ~Get Your Files Here !/5. Theory on Cryptography Must watch before creating Ransomware/2. Security Goals.mp4 41.6 MB
    icon ~Get Your Files Here !/5. Theory on Cryptography Must watch before creating Ransomware/2. Security Goals.srt 4.8 KB
    icon ~Get Your Files Here !/5. Theory on Cryptography Must watch before creating Ransomware/3. What is Cryptography.mp4 52.6 MB
    icon ~Get Your Files Here !/5. Theory on Cryptography Must watch before creating Ransomware/3. What is Cryptography.srt 5.6 KB
    icon ~Get Your Files Here !/5. Theory on Cryptography Must watch before creating Ransomware/4. Categories of Cryptography.mp4 117.2 MB
    icon ~Get Your Files Here !/5. Theory on Cryptography Must watch before creating Ransomware/4. Categories of Cryptography.srt 13.2 KB
    icon ~Get Your Files Here !/5. Theory on Cryptography Must watch before creating Ransomware/5. Symmetric and Asymmetric Encryption.mp4 27.3 MB
    icon ~Get Your Files Here !/5. Theory on Cryptography Must watch before creating Ransomware/5. Symmetric and Asymmetric Encryption.srt 5.1 KB
    icon ~Get Your Files Here !/5. Theory on Cryptography Must watch before creating Ransomware/6. Asymmetric Cryptography - RSA algorithm.mp4 57.1 MB
    icon ~Get Your Files Here !/5. Theory on Cryptography Must watch before creating Ransomware/6. Asymmetric Cryptography - RSA algorithm.srt 12.1 KB
    icon ~Get Your Files Here !/6. Introduction to Ransomware/1. What is a Ransomware.mp4 25.3 MB
    icon ~Get Your Files Here !/6. Introduction to Ransomware/1. What is a Ransomware.srt 3.7 KB
    icon ~Get Your Files Here !/6. Introduction to Ransomware/2. How do Criminal install Ransomware.mp4 7.9 MB
    icon ~Get Your Files Here !/6. Introduction to Ransomware/2. How do Criminal install Ransomware.srt 1.3 KB
    icon ~Get Your Files Here !/6. Introduction to Ransomware/3. Types of Ransomware.mp4 79.8 MB
    icon ~Get Your Files Here !/6. Introduction to Ransomware/3. Types of Ransomware.srt 12.3 KB
    icon ~Get Your Files Here !/7. Creating Ransomware From Scratch/1. Generate Private and Public Keys on Kali Machine.mp4 33 MB
    icon ~Get Your Files Here !/7. Creating Ransomware From Scratch/1. Generate Private and Public Keys on Kali Machine.srt 7.6 KB
    icon ~Get Your Files Here !/7. Creating Ransomware From Scratch/10. Display Ransom Note on Victim's Computer.mp4 250.2 MB
    icon ~Get Your Files Here !/7. Creating Ransomware From Scratch/10. Display Ransom Note on Victim's Computer.srt 31.3 KB
    icon ~Get Your Files Here !/7. Creating Ransomware From Scratch/11. Decrypting Files on Victim Computer.mp4 92.4 MB
    icon ~Get Your Files Here !/7. Creating Ransomware From Scratch/11. Decrypting Files on Victim Computer.srt 17.6 KB
    icon ~Get Your Files Here !/7. Creating Ransomware From Scratch/12. Finally Testing our Ransomware.mp4 265.3 MB
    icon ~Get Your Files Here !/7. Creating Ransomware From Scratch/12. Finally Testing our Ransomware.srt 30.6 KB
    icon ~Get Your Files Here !/7. Creating Ransomware From Scratch/2. Create Fernet Key for Ransomware.mp4 81.7 MB
    icon ~Get Your Files Here !/7. Creating Ransomware From Scratch/2. Create Fernet Key for Ransomware.srt 19.4 KB
    icon ~Get Your Files Here !/7. Creating Ransomware From Scratch/3. Testing Ransomware to generate Fernet Key on Windows Machine.mp4 112.3 MB
    icon ~Get Your Files Here !/7. Creating Ransomware From Scratch/3. Testing Ransomware to generate Fernet Key on Windows Machine.srt 19.3 KB
    icon ~Get Your Files Here !/7. Creating Ransomware From Scratch/4. Encrypt Fernet Key.mp4 135.4 MB
    icon ~Get Your Files Here !/7. Creating Ransomware From Scratch/4. Encrypt Fernet Key.srt 23 KB
    icon ~Get Your Files Here !/7. Creating Ransomware From Scratch/5. Encrypt and Decrypt Files.mp4 43.7 MB
    icon ~Get Your Files Here !/7. Creating Ransomware From Scratch/5. Encrypt and Decrypt Files.srt 8.8 KB
    icon ~Get Your Files Here !/7. Creating Ransomware From Scratch/6. Crypt System by Traversing through Directories and Files.mp4 151.8 MB
    icon ~Get Your Files Here !/7. Creating Ransomware From Scratch/6. Crypt System by Traversing through Directories and Files.srt 20 KB
    icon ~Get Your Files Here !/7. Creating Ransomware From Scratch/7. Decrypt Fernet Key on Kali Linux.mp4 145.5 MB
    icon ~Get Your Files Here !/7. Creating Ransomware From Scratch/7. Decrypt Fernet Key on Kali Linux.srt 25 KB
    icon ~Get Your Files Here !/7. Creating Ransomware From Scratch/8. Change Victim's Desktop Background.mp4 141.8 MB
    icon ~Get Your Files Here !/7. Creating Ransomware From Scratch/8. Change Victim's Desktop Background.srt 17.7 KB
    icon ~Get Your Files Here !/7. Creating Ransomware From Scratch/9. Ransom Note.mp4 55.4 MB
    icon ~Get Your Files Here !/7. Creating Ransomware From Scratch/9. Ransom Note.srt 7.8 KB
    icon ~Get Your Files Here !/Bonus Resources.txt 386 B

Similar Torrents