[FreeCourseSite.com] Udemy - Learn Python & Ethical Hacking From Scratch

  • Seeders:5
  • Leechers:39
  • Completed:64
  • File size:4.09 GB
  • Date:2020-07-25

Files

  • 1. Introduction1. Introduction.mp4(141.51 MB)
  • 1. Introduction1. Introduction.vtt(6.97 KB)
  • 1. Introduction2. Teaser.mp4(102.02 MB)
  • 1. Introduction2. Teaser.vtt(7.96 KB)
  • 1. Introduction3. What is Programming What is Hacking & Why Learn Them.mp4(139.67 MB)
  • 1. Introduction3. What is Programming What is Hacking & Why Learn Them.vtt(7.27 KB)
  • 1. Introduction4. Lab Overview & Needed Software.mp4(106.46 MB)
  • 1. Introduction4. Lab Overview & Needed Software.vtt(8.48 KB)
  • 1. Introduction4.1 Virtual Box Download Page.html(102 B)
  • 1. Introduction5. Installing Kali 2019 as a virtual Machine.mp4(156.10 MB)
  • 1. Introduction5. Installing Kali 2019 as a virtual Machine.vtt(11.51 KB)
  • 1. Introduction5.1 How to Fix Missing Nat Network Issue.html(104 B)
  • 1. Introduction5.2 How to Fix Blank Screen After Starting Kali.html(158 B)
  • 1. Introduction5.3 Kali Linux Download Page.html(150 B)
  • 1. Introduction6. Basic Overview of Kali Linux.mp4(107.45 MB)
  • 1. Introduction6. Basic Overview of Kali Linux.vtt(5.77 KB)
  • 1. Introduction6.1 How to connect a usb device to Kali.html(104 B)
  • 1. Introduction7. The Terminal & Linux Commands.mp4(223.49 MB)
  • 1. Introduction7. The Terminal & Linux Commands.vtt(12.27 KB)
  • 1. Introduction7.1 List of Linux Commands.html(122 B)
  • 1. Introduction8. Python 2 VS Python 3 & Writing Our First Program.mp4(193.68 MB)
  • 1. Introduction8. Python 2 VS Python 3 & Writing Our First Program.vtt(10.14 KB)
  • 1. Introduction9. Installing & Using a Python IDE.mp4(115.46 MB)
  • 1. Introduction9. Installing & Using a Python IDE.vtt(9.95 KB)
  • 1. Introduction9.1 Pycharm Download Link.html(118 B)
  • 10. Bypassing HTTPS1. How to Bypass HTTPS.mp4(163.69 MB)
  • 10. Bypassing HTTPS1. How to Bypass HTTPS.vtt(11.41 KB)
  • 10. Bypassing HTTPS1.1 Moxie explaining how SSLstrip works.html(112 B)
  • 10. Bypassing HTTPS2. Bypassing HTTPS & Sniffing Login Credentials.mp4(67.74 MB)
  • 10. Bypassing HTTPS2. Bypassing HTTPS & Sniffing Login Credentials.vtt(67.76 MB)
  • 10. Bypassing HTTPS3. Replacing Downloads on HTTPS Pages.mp4(115.95 MB)
  • 10. Bypassing HTTPS3. Replacing Downloads on HTTPS Pages.vtt(11.34 KB)
  • 10. Bypassing HTTPS4. Injecting Code in HTTPS Pages.mp4(100.23 MB)
  • 10. Bypassing HTTPS4. Injecting Code in HTTPS Pages.vtt(8.60 KB)
  • 11. Writing an ARP Spoof Detector1. Running Python Programs on Windows.mp4(106.80 MB)
  • 11. Writing an ARP Spoof Detector1. Running Python Programs on Windows.vtt(10.86 KB)
  • 11. Writing an ARP Spoof Detector2. Capturing & Analysing ARP Responses.mp4(55.60 MB)
  • 11. Writing an ARP Spoof Detector2. Capturing & Analysing ARP Responses.vtt(7.07 KB)
  • 11. Writing an ARP Spoof Detector3. Detecting ARP Spoofing Attacks.mp4(67.81 MB)
  • 11. Writing an ARP Spoof Detector3. Detecting ARP Spoofing Attacks.vtt(67.83 MB)
  • 12. Writing Malware1. Introduction & Teaser.mp4(44.09 MB)
  • 12. Writing Malware1. Introduction & Teaser.vtt(2.08 KB)
  • 12. Writing Malware1.1 Evil Files.pdf.pdf(1.34 MB)
  • 12. Writing Malware10. Interacting With The File System.mp4(76.91 MB)
  • 12. Writing Malware10. Interacting With The File System.vtt(10.66 KB)
  • 12. Writing Malware10.1 OS Library Documentation.html(102 B)
  • 12. Writing Malware2. Execute System Command Payload.mp4(91.28 MB)
  • 12. Writing Malware2. Execute System Command Payload.vtt(10.56 KB)
  • 12. Writing Malware3. Sending Reports By Email.mp4(89.93 MB)
  • 12. Writing Malware3. Sending Reports By Email.vtt(12.00 KB)
  • 12. Writing Malware3.1 smtplib Documentation.html(107 B)
  • 12. Writing Malware4. Filtering Command Output Using Regex.mp4(90.60 MB)
  • 12. Writing Malware4. Filtering Command Output Using Regex.vtt(11.18 KB)
  • 12. Writing Malware5. Stealing WiFi Passwords Saved on a Computer.mp4(118.43 MB)
  • 12. Writing Malware5. Stealing WiFi Passwords Saved on a Computer.vtt(10.68 KB)
  • 12. Writing Malware6. Downloading Files From Program.mp4(89.63 MB)
  • 12. Writing Malware6. Downloading Files From Program.vtt(8.81 KB)
  • 12. Writing Malware7. Writing Files on Disk.mp4(69.11 MB)
  • 12. Writing Malware7. Writing Files on Disk.vtt(12.37 KB)
  • 12. Writing Malware7.1 File Modes In Python.html(118 B)
  • 12. Writing Malware8. Password Recovery Basics.mp4(93.72 MB)
  • 12. Writing Malware8. Password Recovery Basics.vtt(9.50 KB)
  • 12. Writing Malware8.1 LaZagne Git Repo.html(108 B)
  • 12. Writing Malware9. Using all the Above to Steal Saved Passwords Remotely.mp4(62.79 MB)
  • 12. Writing Malware9. Using all the Above to Steal Saved Passwords Remotely.vtt(8.89 KB)
  • 13. Writing Malware - Keylogger1. Introduction & Teaser.mp4(63.20 MB)
  • 13. Writing Malware - Keylogger1. Introduction & Teaser.vtt(4.00 KB)
  • 13. Writing Malware - Keylogger2. Writing a Basic Local Keylogger.mp4(78.31 MB)
  • 13. Writing Malware - Keylogger2. Writing a Basic Local Keylogger.vtt(11.55 KB)
  • 13. Writing Malware - Keylogger2.1 Pynput Documentation.html(93 B)
  • 13. Writing Malware - Keylogger3. Global Variables.mp4(54.80 MB)
  • 13. Writing Malware - Keylogger3. Global Variables.vtt(8.98 KB)
  • 13. Writing Malware - Keylogger4. Logging Special Keys.mp4(54.94 MB)
  • 13. Writing Malware - Keylogger4. Logging Special Keys.vtt(7.19 KB)
  • 13. Writing Malware - Keylogger5. Threading & Recursion.mp4(84.43 MB)
  • 13. Writing Malware - Keylogger5. Threading & Recursion.vtt(11.89 KB)
  • 13. Writing Malware - Keylogger5.1 Threading Documentation.html(109 B)
  • 13. Writing Malware - Keylogger6. OOP - Object Oriented Programming Basics.mp4(116.48 MB)
  • 13. Writing Malware - Keylogger6. OOP - Object Oriented Programming Basics.vtt(16.62 KB)
  • 13. Writing Malware - Keylogger6.1 More info About Objects in Python.html(125 B)
  • 13. Writing Malware - Keylogger7. Constructor Methods & Instance Variables.mp4(66.14 MB)
  • 13. Writing Malware - Keylogger7. Constructor Methods & Instance Variables.vtt(8.29 KB)
  • 13. Writing Malware - Keylogger8. Logging Key-strikes and Reporting Them By Email.mp4(83.80 MB)
  • 13. Writing Malware - Keylogger8. Logging Key-strikes and Reporting Them By Email.vtt(12.79 KB)
  • 14. Writing Malware - Backdoors1. Introduction & Teaser.mp4(76.64 MB)
  • 14. Writing Malware - Backdoors1. Introduction & Teaser.vtt(6.39 KB)
  • 14. Writing Malware - Backdoors10. Serialisation - Theory.mp4(164.45 MB)
  • 14. Writing Malware - Backdoors10. Serialisation - Theory.vtt(12.05 KB)
  • 14. Writing Malware - Backdoors11. Serialisation - Implementing Reliable Methods to Send & Receive Data Over TCP.mp4(81.89 MB)
  • 14. Writing Malware - Backdoors11. Serialisation - Implementing Reliable Methods to Send & Receive Data Over TCP.vtt(8.25 KB)
  • 14. Writing Malware - Backdoors11.1 json Documentation.html(104 B)
  • 14. Writing Malware - Backdoors12. Serialisation - Reliably Sending & Receiving Data.mp4(58.97 MB)
  • 14. Writing Malware - Backdoors12. Serialisation - Reliably Sending & Receiving Data.vtt(6.35 KB)
  • 14. Writing Malware - Backdoors13. Sending Commands as List & Implementing Exit Command.mp4(73.15 MB)
  • 14. Writing Malware - Backdoors13. Sending Commands as List & Implementing Exit Command.vtt(8.79 KB)
  • 14. Writing Malware - Backdoors14. Interacting With the File System - Implementing cd Command.mp4(77.78 MB)
  • 14. Writing Malware - Backdoors14. Interacting With the File System - Implementing cd Command.vtt(9.44 KB)
  • 14. Writing Malware - Backdoors15. Reading Files.mp4(73.86 MB)
  • 14. Writing Malware - Backdoors15. Reading Files.vtt(7.83 KB)
  • 14. Writing Malware - Backdoors16. Writing Files.mp4(56.68 MB)

Favorites