Udemy - Python for Advanced Ethical Hacking - Unleashing the Dark Side

Photo unavailable
Category:
Date:
02/01/24 at 7:12pm GMT+1
Submitter:
Seeders:
13
Leechers:
2
File size:
339 MB in 75 files

Torrent Status:
  This torrent has been verified.

Infohash:
7e7aa5ac76e2a6e88b3d0f7e7b8c544cc8e73553


File list

  • Udemy - Python for Advanced Ethical Hacking - Unleashing the Dark Side
  • icon ~Get Your Files Here !/1. Introduction/1. Introduction.html 4 KB
    icon ~Get Your Files Here !/1. Introduction/2. Python for Ethical Hacking Installation and Setup.html 170 B
    icon ~Get Your Files Here !/1. Introduction/3. Variables & Data Types Learn Integers, Strings, Floats in Python.html 170 B
    icon ~Get Your Files Here !/1. Introduction/4. How to create the simple python file in kali linux.mp4 153.8 MB
    icon ~Get Your Files Here !/1. Introduction/5. How to convert the python file into a script.mp4 76.8 MB
    icon ~Get Your Files Here !/1. Introduction/6. How to run a simple script in the python.mp4 24.8 MB
    icon ~Get Your Files Here !/1. Introduction/7. How to run a linux command in the python scriopt.mp4 43.6 MB
    icon ~Get Your Files Here !/1. Introduction/8. Python Hacking book & course introduction Form Very Basics in the Notebook.mp4 39.9 MB
    icon ~Get Your Files Here !/2. Embark on a journey through advanced Ethical Hacking with Python,/1. Polymorphic Malware Generation Advanced Techniques for Ethical Hacking.html 9.9 KB
    icon ~Get Your Files Here !/2. Embark on a journey through advanced Ethical Hacking with Python,/10. Advanced Incident Response and Digital Forensics A Comprehensive Guide.html 10.5 KB
    icon ~Get Your Files Here !/2. Embark on a journey through advanced Ethical Hacking with Python,/2. Multi-Vector Cyber Attacks Crafting Comprehensive Scripts for Ethical Hacking.html 6.5 KB
    icon ~Get Your Files Here !/2. Embark on a journey through advanced Ethical Hacking with Python,/3. Zero-Day Vulnerability Detection with Machine Learning Advanced Ethical Hacking.html 14 KB
    icon ~Get Your Files Here !/2. Embark on a journey through advanced Ethical Hacking with Python,/4. Wireless Network Exploitation Ethical Hacking Techniques and Countermeasures.html 11 KB
    icon ~Get Your Files Here !/2. Embark on a journey through advanced Ethical Hacking with Python,/5. Web Application Penetration Testing Exploiting Vulnerabilities for Ethical Hack.html 9.2 KB
    icon ~Get Your Files Here !/2. Embark on a journey through advanced Ethical Hacking with Python,/6. Advanced Cryptography for Ethical Hacking Mastering Encryption Algorithms and P.html 8.9 KB
    icon ~Get Your Files Here !/2. Embark on a journey through advanced Ethical Hacking with Python,/7. Advanced IoT Device Exploitation Ethical Hacking for Secure IoT Environments.html 6.8 KB
    icon ~Get Your Files Here !/2. Embark on a journey through advanced Ethical Hacking with Python,/8. Mastering Social Engineering Tactics and Countermeasures Advanced Ethical Hacki.html 6.4 KB
    icon ~Get Your Files Here !/2. Embark on a journey through advanced Ethical Hacking with Python,/9. Comprehensive Cloud Security and Ethical Hacking Protecting Cloud Environments.html 6.8 KB
    icon ~Get Your Files Here !/3. Dive deep into the realm of cybersecurity with Python/1. Advanced Network Traffic Analysis Analyzing and Identifying Security Threats.html 9.1 KB
    icon ~Get Your Files Here !/3. Dive deep into the realm of cybersecurity with Python/10. Mastering Advanced Wireless Security Protocols Ethical Hacking with Python.html 7.7 KB
    icon ~Get Your Files Here !/3. Dive deep into the realm of cybersecurity with Python/11. Fuzz Testing for Software Security Advanced Techniques and Strategies.html 10.3 KB
    icon ~Get Your Files Here !/3. Dive deep into the realm of cybersecurity with Python/12. Advanced Binary Exploitation and Reverse Engineering for Ethical Hacking.html 7.9 KB
    icon ~Get Your Files Here !/3. Dive deep into the realm of cybersecurity with Python/13. Advanced Ethical Hacking Red Team Operations and Adversarial Tactics.html 7.9 KB
    icon ~Get Your Files Here !/3. Dive deep into the realm of cybersecurity with Python/14. Comprehensive Guide to Ethical Hacking using Python and AI for Cybersecurity.html 4.8 KB
    icon ~Get Your Files Here !/3. Dive deep into the realm of cybersecurity with Python/15. Advanced Incident Response and Threat Hunting Strengthening Cyber Defense.html 10.1 KB
    icon ~Get Your Files Here !/3. Dive deep into the realm of cybersecurity with Python/16. Advanced Ethical Hacking Python-Based Cryptography in Blockchain and Cryptocurr.html 9.2 KB
    icon ~Get Your Files Here !/3. Dive deep into the realm of cybersecurity with Python/17. Advanced Password Attacks and Defenses Ethical Hacking with Python.html 5 KB
    icon ~Get Your Files Here !/3. Dive deep into the realm of cybersecurity with Python/18. AI-Based Social Engineering Detection for Enhanced Security.html 11.7 KB
    icon ~Get Your Files Here !/3. Dive deep into the realm of cybersecurity with Python/19. Secure DevOps and Ethical Hacking Integration Enhancing Software Security.html 14.7 KB
    icon ~Get Your Files Here !/3. Dive deep into the realm of cybersecurity with Python/2. Automated Vulnerability Scanning with Python Efficient Security Assessment and.html 6.1 KB
    icon ~Get Your Files Here !/3. Dive deep into the realm of cybersecurity with Python/20. Comprehensive Guide to Ethical Hacking with Python Advanced Techniques and Clou.html 7.7 KB
    icon ~Get Your Files Here !/3. Dive deep into the realm of cybersecurity with Python/21. Hardware Implant Security Assessment Assessing and Securing Systems Against Mal.html 8.7 KB
    icon ~Get Your Files Here !/3. Dive deep into the realm of cybersecurity with Python/3. Advanced Container Security and Docker Exploitation Ethical Hacking for Educati.html 10 KB
    icon ~Get Your Files Here !/3. Dive deep into the realm of cybersecurity with Python/4. Advanced Hardware Hacking and IoT Security Ethical Hacking Techniques for IoT D.html 7.8 KB
    icon ~Get Your Files Here !/3. Dive deep into the realm of cybersecurity with Python/5. Comprehensive Cloud-Based API Security Testing Protecting Data with Python.html 9.6 KB
    icon ~Get Your Files Here !/3. Dive deep into the realm of cybersecurity with Python/6. Mobile Application Penetration Testing Comprehensive Security Analysis for Andr.html 5.7 KB
    icon ~Get Your Files Here !/3. Dive deep into the realm of cybersecurity with Python/7. Advanced Social Engineering Techniques Master the Art of Psychological Manipula.html 7 KB
    icon ~Get Your Files Here !/3. Dive deep into the realm of cybersecurity with Python/8. Blockchain Security & Smart Contracts Ethical Hacking for Decentralized Systems.html 8.5 KB
    icon ~Get Your Files Here !/3. Dive deep into the realm of cybersecurity with Python/9. Advanced Threat Hunting and Cyber Threat Intelligence for Ethical Hacking.html 13.2 KB
    icon ~Get Your Files Here !/4. Cutting-Edge Challenges in Ethical Hacking Mastery with the Python Scripting/1. Advanced Cross-Platform Ransomware Analysis & Mitigation with Python.html 8.1 KB
    icon ~Get Your Files Here !/4. Cutting-Edge Challenges in Ethical Hacking Mastery with the Python Scripting/10. Satellite Communication Security Assessment Ethical Hacking with Python.html 10.7 KB
    icon ~Get Your Files Here !/4. Cutting-Edge Challenges in Ethical Hacking Mastery with the Python Scripting/11. Exploring Security Implications in Neuromorphic Computing with Python.html 9.3 KB
    icon ~Get Your Files Here !/4. Cutting-Edge Challenges in Ethical Hacking Mastery with the Python Scripting/12. Cloud-Native Threat Modeling and Simulation with Python.html 9.2 KB
    icon ~Get Your Files Here !/4. Cutting-Edge Challenges in Ethical Hacking Mastery with the Python Scripting/13. Quantum Key Distribution Protocols Implementation Secure Communication using Py.html 8.5 KB
    icon ~Get Your Files Here !/4. Cutting-Edge Challenges in Ethical Hacking Mastery with the Python Scripting/14. Python Secure Coding Advanced Ethical Hacking Techniques.html 9.1 KB
    icon ~Get Your Files Here !/4. Cutting-Edge Challenges in Ethical Hacking Mastery with the Python Scripting/15. Advanced Biometric Cryptography and Multi-Modal Authentication with Python for E.html 5.6 KB
    icon ~Get Your Files Here !/4. Cutting-Edge Challenges in Ethical Hacking Mastery with the Python Scripting/16. Python-Based Exploits for Industrial Control Systems Ethical Hacking and Securi.html 8.8 KB
    icon ~Get Your Files Here !/4. Cutting-Edge Challenges in Ethical Hacking Mastery with the Python Scripting/17. Decentralized Identity Management with Python and Blockchain Secure and Privacy.html 12.7 KB
    icon ~Get Your Files Here !/4. Cutting-Edge Challenges in Ethical Hacking Mastery with the Python Scripting/18. CompTIA+ & Ethical Hacking File Monitor, Code Inject, Offensive Forensics.html 3.8 KB
    icon ~Get Your Files Here !/4. Cutting-Edge Challenges in Ethical Hacking Mastery with the Python Scripting/19. Next-Gen Intrusion Detection Systems Advanced Python Scripts for Ethical Hackin.html 10.2 KB
    icon ~Get Your Files Here !/4. Cutting-Edge Challenges in Ethical Hacking Mastery with the Python Scripting/2. Advanced Threat Emulation with Python and MITRE ATT&CK.html 3.8 KB
    icon ~Get Your Files Here !/4. Cutting-Edge Challenges in Ethical Hacking Mastery with the Python Scripting/20. Cyber Security Essentials Python & Hacking Practice Test.html 170 B
    icon ~Get Your Files Here !/4. Cutting-Edge Challenges in Ethical Hacking Mastery with the Python Scripting/21. Human Augmentation Security Assessing and Securing Cyber-Physical Systems.html 5.1 KB
    icon ~Get Your Files Here !/4. Cutting-Edge Challenges in Ethical Hacking Mastery with the Python Scripting/22. Dynamic Analysis of Mobile Malware with Python Advanced Ethical Hacking Techniq.html 9.5 KB
    icon ~Get Your Files Here !/4. Cutting-Edge Challenges in Ethical Hacking Mastery with the Python Scripting/3. Darknet Market Monitoring and Analysis with Python Ethical Hacking & Educationa.html 8.7 KB
    icon ~Get Your Files Here !/4. Cutting-Edge Challenges in Ethical Hacking Mastery with the Python Scripting/4. Cryptocurrency Exchange Security Assessment with Ethical Hacking Techniques in P.html 8.6 KB
    icon ~Get Your Files Here !/4. Cutting-Edge Challenges in Ethical Hacking Mastery with the Python Scripting/5. AI-Driven Social Engineering Simulation with Python for Ethical Hacking.html 7.3 KB
    icon ~Get Your Files Here !/4. Cutting-Edge Challenges in Ethical Hacking Mastery with the Python Scripting/6. Automated Threat Hunting with Machine Learning Proactive Network Security.html 8.8 KB
    icon ~Get Your Files Here !/4. Cutting-Edge Challenges in Ethical Hacking Mastery with the Python Scripting/7. Advanced Wireless Protocol Exploitation Python-driven Exploits for Ethical Hack.html 5.2 KB
    icon ~Get Your Files Here !/4. Cutting-Edge Challenges in Ethical Hacking Mastery with the Python Scripting/8. Quantum-Secure Blockchain Implementation Ethical Hacking and Educational Python.html 9 KB
    icon ~Get Your Files Here !/4. Cutting-Edge Challenges in Ethical Hacking Mastery with the Python Scripting/9. Python Integration with Threat Intelligence Sharing Platforms for Proactive Cybe.html 10.4 KB
    icon ~Get Your Files Here !/5. Python Scripting Unleashed Elevating Kali Linux Mastery/1. Mastering Social Engineering Toolkit (SET) for Human Exploitation Advanced Ethi.html 7.3 KB
    icon ~Get Your Files Here !/5. Python Scripting Unleashed Elevating Kali Linux Mastery/10. Wireless Network Reconnaissance with Aircrack-ng using Python.html 10.6 KB
    icon ~Get Your Files Here !/5. Python Scripting Unleashed Elevating Kali Linux Mastery/11. Python Ethical Hacking Mastery Challenge.html 170 B
    icon ~Get Your Files Here !/5. Python Scripting Unleashed Elevating Kali Linux Mastery/12. Python Ethical Hacking Capstone Project Securing the Cyber Landscape.html 174 B
    icon ~Get Your Files Here !/5. Python Scripting Unleashed Elevating Kali Linux Mastery/13. Python script with additional advanced features for collecting volatile data.html 10.2 KB
    icon ~Get Your Files Here !/5. Python Scripting Unleashed Elevating Kali Linux Mastery/2. Python-Fueled Linux Privilege Escalation Techniques Advanced Ethical Hacking.html 9.8 KB
    icon ~Get Your Files Here !/5. Python Scripting Unleashed Elevating Kali Linux Mastery/3. Advanced Exploitation with Python-Infused Cobalt Strike Elevate Your Ethical Ha.html 4.9 KB
    icon ~Get Your Files Here !/5. Python Scripting Unleashed Elevating Kali Linux Mastery/4. Hacking Secret Cryptography Python Programming for Cryptographic Exploration.html 170 B
    icon ~Get Your Files Here !/5. Python Scripting Unleashed Elevating Kali Linux Mastery/5. Python-Powered Vulnerability Scanning with OpenVAS - Strengthen Your Security.html 15 KB
    icon ~Get Your Files Here !/5. Python Scripting Unleashed Elevating Kali Linux Mastery/6. Python-Enhanced Password Cracking with John the Ripper Advanced Techniques for.html 8 KB
    icon ~Get Your Files Here !/5. Python Scripting Unleashed Elevating Kali Linux Mastery/7. Python-Driven Network Traffic Analysis Enhancing Wireshark with Ethical Hacking.html 12.2 KB
    icon ~Get Your Files Here !/5. Python Scripting Unleashed Elevating Kali Linux Mastery/8. Advanced Forensic Analysis with Python, Autopsy, and Sleuth Kit Digital Evidenc.html 3.9 KB
    icon ~Get Your Files Here !/5. Python Scripting Unleashed Elevating Kali Linux Mastery/9. Advanced Post-Exploitation Python Scripts with Metasploit Framework.html 15 KB
    icon ~Get Your Files Here !/Bonus Resources.txt 386 B

Similar Torrents