Movies

[FreeTutorials Us] Udemy - Learn Python & Ethical Hacking From Scratch

  • Download Faster
  • Download torrent
  • Direct Download
  • Rate this torrent +  |  -
[FreeTutorials Us] Udemy - Learn Python & Ethical Hacking From Scratch

Download Anonymously! Get Protected Today And Get your 70% discount


Torrent info

Name:[FreeTutorials Us] Udemy - Learn Python & Ethical Hacking From Scratch

Infohash: 2177481158744B0FC73B21940430A431FFADE165

Total Size: 12.13 GB

Seeds: 6

Leechers: 1

Stream: Watch Full Movie @ Movie4u

Last Updated: 2024-01-24 00:23:53 (Update Now)

Torrent added: 2018-08-17 16:41:44






Torrent Files List


10. Bypassing HTTPS (Size: 12.13 GB) (Files: 594)

 10. Bypassing HTTPS

  1.1 Moxie explaining how SSLstrip works.html

0.11 KB

  1. How to Bypass HTTPS.mp4

163.68 MB

  1. How to Bypass HTTPS.srt

12.89 KB

  1. How to Bypass HTTPS.vtt

11.41 KB

  2. Bypassing HTTPS & Sniffing Login Credentials.mp4

67.74 MB

  2. Bypassing HTTPS & Sniffing Login Credentials.srt

9.74 KB

  2. Bypassing HTTPS & Sniffing Login Credentials.vtt

8.60 KB

  3. Replacing Downloads on HTTPS Pages.mp4

115.95 MB

  3. Replacing Downloads on HTTPS Pages.srt

12.95 KB

  3. Replacing Downloads on HTTPS Pages.vtt

11.34 KB

  4. Injecting Code in HTTPS Pages.mp4

100.22 MB

  4. Injecting Code in HTTPS Pages.srt

9.82 KB

  4. Injecting Code in HTTPS Pages.vtt

8.60 KB

 11. Writing an ARP Spoof Detector

  1. Running Python Programs on Windows.mp4

106.81 MB

  1. Running Python Programs on Windows.srt

12.38 KB

  1. Running Python Programs on Windows.vtt

10.86 KB

  2. Capturing & Analysing ARP Responses.mp4

55.60 MB

  2. Capturing & Analysing ARP Responses.srt

7.98 KB

  2. Capturing & Analysing ARP Responses.vtt

7.07 KB

  3. Detecting ARP Spoofing Attacks.mp4

67.82 MB

  3. Detecting ARP Spoofing Attacks.srt

8.99 KB

  3. Detecting ARP Spoofing Attacks.vtt

7.91 KB

 12. Writing Malware

  10.1 OS Library Documentation.html

0.10 KB

  10. Interacting With The File System.mp4

76.91 MB

  10. Interacting With The File System.srt

12.15 KB

  10. Interacting With The File System.vtt

10.66 KB

  1.1 Evil Files.pdf.pdf

1.34 MB

  1. Introduction & Teaser.mp4

44.10 MB

  1. Introduction & Teaser.srt

2.35 KB

  1. Introduction & Teaser.vtt

2.08 KB

  2. Execute System Command Payload.mp4

91.27 MB

  2. Execute System Command Payload.srt

12.00 KB

  2. Execute System Command Payload.vtt

10.56 KB

  3.1 smtplib Documentation.html

0.10 KB

  3. Sending Reports By Email.mp4

89.92 MB

  3. Sending Reports By Email.srt

13.63 KB

  3. Sending Reports By Email.vtt

12.00 KB

  4. Filtering Command Output Using Regex.mp4

90.60 MB

  4. Filtering Command Output Using Regex.srt

12.71 KB

  4. Filtering Command Output Using Regex.vtt

11.18 KB

  5. Stealing WiFi Passwords Saved on a Computer.mp4

118.44 MB

  5. Stealing WiFi Passwords Saved on a Computer.srt

12.10 KB

  5. Stealing WiFi Passwords Saved on a Computer.vtt

10.68 KB

  6. Downloading Files From Program.mp4

89.62 MB

  6. Downloading Files From Program.srt

9.98 KB

  6. Downloading Files From Program.vtt

8.81 KB

  7.1 File Modes In Python.html

0.12 KB

  7. Writing Files on Disk.mp4

69.10 MB

  7. Writing Files on Disk.srt

14.17 KB

  7. Writing Files on Disk.vtt

12.37 KB

  8.1 LaZagne Git Repo.html

0.11 KB

  8. Password Recovery Basics.mp4

93.73 MB

  8. Password Recovery Basics.srt

10.78 KB

  8. Password Recovery Basics.vtt

9.50 KB

  9. Using all the Above to Steal Saved Passwords Remotely.mp4

62.79 MB

  9. Using all the Above to Steal Saved Passwords Remotely.srt

10.10 KB

  9. Using all the Above to Steal Saved Passwords Remotely.vtt

8.89 KB

 13. Writing Malware - Keylogger

  1. Introduction & Teaser.mp4

63.19 MB

  1. Introduction & Teaser.srt

4.56 KB

  1. Introduction & Teaser.vtt

4.00 KB

  2.1 Pynput Documentation.html

0.09 KB

  2. Writing a Basic Local Keylogger.mp4

78.31 MB

  2. Writing a Basic Local Keylogger.srt

13.10 KB

  2. Writing a Basic Local Keylogger.vtt

11.55 KB

  3. Global Variables.mp4

54.79 MB

  3. Global Variables.srt

10.25 KB

  3. Global Variables.vtt

8.98 KB

  4. Logging Special Keys.mp4

54.93 MB

  4. Logging Special Keys.srt

8.23 KB

  4. Logging Special Keys.vtt

7.19 KB

  5.1 Threading Documentation.html

0.11 KB

  5. Threading & Recursion.mp4

84.42 MB

  5. Threading & Recursion.srt

13.51 KB

  5. Threading & Recursion.vtt

11.89 KB

  6.1 More info About Objects in Python.html

0.12 KB

  6. OOP - Object Oriented Programming Basics.mp4

116.49 MB

  6. OOP - Object Oriented Programming Basics.srt

18.93 KB

  6. OOP - Object Oriented Programming Basics.vtt

16.62 KB

  7. Constructor Methods & Instance Variables.mp4

66.14 MB

  7. Constructor Methods & Instance Variables.srt

9.41 KB

  7. Constructor Methods & Instance Variables.vtt

8.29 KB

  8. Logging Key-strikes and Reporting Them By Email.mp4

83.79 MB

  8. Logging Key-strikes and Reporting Them By Email.srt

14.59 KB

  8. Logging Key-strikes and Reporting Them By Email.vtt

12.79 KB

 14. Writing Malware - Backdoors

  10. Serialisation - Theory.mp4

164.45 MB

  10. Serialisation - Theory.srt

13.68 KB

  10. Serialisation - Theory.vtt

12.05 KB

  11.1 json Documentation.html

0.10 KB

  11. Serialisation - Implementing Reliable Methods to Send & Receive Data Over TCP.mp4

81.88 MB

  11. Serialisation - Implementing Reliable Methods to Send & Receive Data Over TCP.srt

9.38 KB

  11. Serialisation - Implementing Reliable Methods to Send & Receive Data Over TCP.vtt

8.25 KB

  12. Serialisation - Reliably Sending & Receiving Data.mp4

58.97 MB

  12. Serialisation - Reliably Sending & Receiving Data.srt

7.22 KB

  12. Serialisation - Reliably Sending & Receiving Data.vtt

6.35 KB

  13. Sending Commands as List & Implementing Exit Command.mp4

73.15 MB

  13. Sending Commands as List & Implementing Exit Command.srt

10.01 KB

  13. Sending Commands as List & Implementing Exit Command.vtt

8.79 KB

  14. Interacting With the File System - Implementing cd Command.mp4

77.77 MB

  14. Interacting With the File System - Implementing cd Command.srt

10.66 KB

  14. Interacting With the File System - Implementing cd Command.vtt

9.44 KB

  15. Reading Files.mp4

73.85 MB

  15. Reading Files.srt

8.90 KB

  15. Reading Files.vtt

7.83 KB

  16. Writing Files.mp4

56.67 MB

  16. Writing Files.srt

8.08 KB

  16. Writing Files.vtt

7.07 KB

  17. Downloading Files From Hacked Computer.mp4

77.29 MB

  17. Downloading Files From Hacked Computer.srt

8.29 KB

  17. Downloading Files From Hacked Computer.vtt

7.31 KB

  18. Implementing Upload Functionality in Listener.mp4

97.87 MB

  18. Implementing Upload Functionality in Listener.srt

8.94 KB

  18. Implementing Upload Functionality in Listener.vtt

7.89 KB

  19. Implementing Upload Functionality in Backdoor.mp4

61.67 MB

  19. Implementing Upload Functionality in Backdoor.srt

7.12 KB

  19. Implementing Upload Functionality in Backdoor.vtt

6.27 KB

  1. Introduction & Teaser.mp4

76.63 MB

  1. Introduction & Teaser.srt

7.28 KB

  1. Introduction & Teaser.vtt

6.39 KB

  20. Handling Unknown Exceptions.mp4

97.84 MB

  20. Handling Unknown Exceptions.srt

11.55 KB

  20. Handling Unknown Exceptions.vtt

10.20 KB

  21. Using the Backdoor to Hack Windows, Linux & OS X.mp4

126.99 MB

  21. Using the Backdoor to Hack Windows, Linux & OS X.srt

14.78 KB

  21. Using the Backdoor to Hack Windows, Linux & OS X.vtt

13.00 KB

  2. Client - Server Communication & Connection Types.mp4

120.14 MB

  2. Client - Server Communication & Connection Types.srt

9.95 KB

  2. Client - Server Communication & Connection Types.vtt

8.81 KB

  3.1 Sockets Official Documentation.html

0.10 KB

  3.2 Tutorials Point Socket Documentation.html

0.12 KB

  3. Connecting Two Remote Computers Using Sockets.mp4

66.79 MB

  3. Connecting Two Remote Computers Using Sockets.srt

12.90 KB

  3. Connecting Two Remote Computers Using Sockets.vtt

11.31 KB

  4. Sending & Receiving Data Over TCP.mp4

32.14 MB

  4. Sending & Receiving Data Over TCP.srt

6.41 KB

  4. Sending & Receiving Data Over TCP.vtt

5.61 KB

  5. Executing System Commands Remotely.mp4

73.31 MB

  5. Executing System Commands Remotely.srt

12.23 KB

  5. Executing System Commands Remotely.vtt

10.81 KB

  6. Implementing a Server.mp4

52.48 MB

  6. Implementing a Server.srt

10.55 KB

  6. Implementing a Server.vtt

9.31 KB

  7. Implementing Skeleton For Server - Client Communication.mp4

54.79 MB

  7. Implementing Skeleton For Server - Client Communication.srt

8.56 KB

  7. Implementing Skeleton For Server - Client Communication.vtt

7.53 KB

  8. Refactoring - Creating a Listener Class.mp4

71.87 MB

  8. Refactoring - Creating a Listener Class.srt

9.54 KB

  8. Refactoring - Creating a Listener Class.vtt

8.35 KB

  9. Refactoring - Creating a Backdoor Class.mp4

43.41 MB

  9. Refactoring - Creating a Backdoor Class.srt

6.82 KB

  9. Refactoring - Creating a Backdoor Class.vtt

6.04 KB

 15. Writing Malware - Packaging

  10. Bypassing Anti-Virus Programs - Theory.mp4

81.20 MB

  10. Bypassing Anti-Virus Programs - Theory.srt

6.58 KB

  10. Bypassing Anti-Virus Programs - Theory.vtt

5.82 KB

  11.1 Nodistribute.html

0.08 KB

  11.2 UPX Download Page.html

0.09 KB

  11. Bypassing Anti-Virus Programs - Practical.mp4

81.38 MB

  11. Bypassing Anti-Virus Programs - Practical.srt

10.53 KB

  11. Bypassing Anti-Virus Programs - Practical.vtt

9.30 KB

  12.1 Iconfinder - a website to download icons.html

0.09 KB

  12.2 Easyicon - a website to convert images to icons.html

0.10 KB

  12. Adding an Icon to Generated Executables.mp4

44.43 MB

  12. Adding an Icon to Generated Executables.srt

5.99 KB

  12. Adding an Icon to Generated Executables.vtt

5.26 KB

  13. Spoofing File Extension.mp4

146.11 MB

  13. Spoofing File Extension.srt

10.80 KB

  13. Spoofing File Extension.vtt

9.41 KB

  14. Converting Python Programs To OS X Executables.mp4

103.52 MB

  14. Converting Python Programs To OS X Executables.srt

10.73 KB

  14. Converting Python Programs To OS X Executables.vtt

9.43 KB

  15. Converting Python Programs to Linux Executables.mp4

61.72 MB

  15. Converting Python Programs to Linux Executables.srt

9.66 KB

  15. Converting Python Programs to Linux Executables.vtt

8.50 KB

  1. Introduction & Teaser.mp4

68.27 MB

  1. Introduction & Teaser.srt

4.10 KB

  1. Introduction & Teaser.vtt

3.62 KB

  2. Converting Python Programs To Windows Binary Executables.mp4

82.04 MB

  2. Converting Python Programs To Windows Binary Executables.srt

8.24 KB

  2. Converting Python Programs To Windows Binary Executables.vtt

7.28 KB

  3. Running Executables Silentely.mp4

66.55 MB

  3. Running Executables Silentely.srt

8.30 KB

  3. Running Executables Silentely.vtt

7.36 KB

  4.1 Python 2.7.14 Download Page.html

0.11 KB

  4. Installing Windows Pyinstaller on Linux.mp4

67.22 MB

  4. Installing Windows Pyinstaller on Linux.srt

9.07 KB

  4. Installing Windows Pyinstaller on Linux.vtt

8.03 KB

  5. Packaging Programs For Windows From Linux.mp4

58.22 MB

  5. Packaging Programs For Windows From Linux.srt

10.05 KB

  5. Packaging Programs For Windows From Linux.vtt

8.84 KB

  6. Persistence Idea.mp4

104.42 MB

  6. Persistence Idea.srt

9.75 KB

  6. Persistence Idea.vtt

8.59 KB

  7.1 Python OS Library Documentation.html

0.10 KB

  7.2 Python Shutil Library Documentation.html

0.10 KB

  7. Running Programs on Startup.mp4

119.02 MB

  7. Running Programs on Startup.srt

16.82 KB

  7. Running Programs on Startup.vtt

14.72 KB

  8. Creating a Basic Trojan Using Download & Execute Payload.mp4

94.54 MB

  8. Creating a Basic Trojan Using Download & Execute Payload.srt

13.14 KB

  8. Creating a Basic Trojan Using Download & Execute Payload.vtt

11.54 KB

  9.1 Pyinstaller Documentation.html

0.12 KB

  9. Creating a Trojan By Embedding Files In Program Code.mp4

61.52 MB

  9. Creating a Trojan By Embedding Files In Program Code.srt

9.96 KB

  9. Creating a Trojan By Embedding Files In Program Code.vtt

8.81 KB

 16. Website Web Application Hacking

  1.1 Website Hacking.pdf.pdf

346.30 KB

  1. Introduction & Teaser.mp4

136.44 MB

  1. Introduction & Teaser.srt

8.96 KB

  1. Introduction & Teaser.vtt

7.81 KB

  2. What is a Website.mp4

86.00 MB

  2. What is a Website.srt

5.43 KB

  2. What is a Website.vtt

4.80 KB

  3. How to Hack a Website.mp4

103.13 MB

  3. How to Hack a Website.srt

7.88 KB

  3. How to Hack a Website.vtt

7.00 KB

 17. Website Hacking - Writing a Crawler

  1.1 Python Requests.html

0.10 KB

  1. Sending GET Requests To Web Servers.mp4

94.40 MB

  1. Sending GET Requests To Web Servers.srt

11.46 KB

  1. Sending GET Requests To Web Servers.vtt

10.10 KB

  2.1 subdomains-wodlist.txt.txt

6.55 MB

  2. Discovering Subdomains.mp4

101.25 MB

  2. Discovering Subdomains.srt

12.61 KB

  2. Discovering Subdomains.vtt

11.07 KB

  3.1 files-and-dirs-wordlist.txt.txt

35.01 KB

  3. Discovering Hidden Paths in Websites.mp4

136.81 MB

  3. Discovering Hidden Paths in Websites.srt

12.79 KB

  3. Discovering Hidden Paths in Websites.vtt

11.23 KB

  4. Reading Response Content.mp4

91.43 MB

  4. Reading Response Content.srt

7.65 KB

  4. Reading Response Content.vtt

6.76 KB

  5. Extracting Useful Data From Response.mp4

112.72 MB

  5. Extracting Useful Data From Response.srt

8.33 KB

  5. Extracting Useful Data From Response.vtt

7.37 KB

  6. Filtering Rsults.mp4

112.07 MB

  6. Filtering Rsults.srt

8.49 KB

  6. Filtering Rsults.vtt

7.46 KB

  7. Extracting Unique Links & Storing Them In a List.mp4

96.37 MB

  7. Extracting Unique Links & Storing Them In a List.srt

7.74 KB

  7. Extracting Unique Links & Storing Them In a List.vtt

6.80 KB

  8. Recursively Discovering All Paths On a Target Website.mp4

106.26 MB

  8. Recursively Discovering All Paths On a Target Website.srt

11.86 KB

  8. Recursively Discovering All Paths On a Target Website.vtt

10.52 KB

 18. Writing a Program To Guess Login Information

  1. Sending Post Requests to Websites.mp4

106.29 MB

  1. Sending Post Requests to Websites.srt

14.02 KB

  1. Sending Post Requests to Websites.vtt

12.26 KB

  2. Guessing Login Information on Login Pages.mp4

91.58 MB

  2. Guessing Login Information on Login Pages.srt

10.72 KB

  2. Guessing Login Information on Login Pages.vtt

9.46 KB

 19. Writing a Vulnerability Scanner

  10. Implementing a Method To Run The Scanner.mp4

58.93 MB

  10. Implementing a Method To Run The Scanner.srt

7.02 KB

  10. Implementing a Method To Run The Scanner.vtt

6.19 KB

  11. Discovering XSS Vulnerabilities.mp4

147.83 MB

  11. Discovering XSS Vulnerabilities.srt

11.47 KB

  11. Discovering XSS Vulnerabilities.vtt

10.06 KB

  12. Exploiting XSS Vulnerabilities.mp4

96.07 MB

  12. Exploiting XSS Vulnerabilities.srt

6.12 KB

  12. Exploiting XSS Vulnerabilities.vtt

5.41 KB

  13. Implementing Code To Discover XSS in Forms.mp4

95.00 MB

  13. Implementing Code To Discover XSS in Forms.srt

8.64 KB

  13. Implementing Code To Discover XSS in Forms.vtt

7.66 KB

  14. Implementing Code To Discover XSS in Parameters.mp4

71.86 MB

  14. Implementing Code To Discover XSS in Parameters.srt

8.44 KB

  14. Implementing Code To Discover XSS in Parameters.vtt

7.43 KB

  15. Automatically Discovering Vulnerabilities Using the Vulnerability Scanner.mp4

89.80 MB

  15. Automatically Discovering Vulnerabilities Using the Vulnerability Scanner.srt

10.28 KB

  15. Automatically Discovering Vulnerabilities Using the Vulnerability Scanner.vtt

9.07 KB

  1. Introduction & Teaser.mp4

44.52 MB

  1. Introduction & Teaser.srt

3.28 KB

  1. Introduction & Teaser.vtt

2.90 KB

  2. HTTP Requests - POST VS GET.mp4

89.25 MB

  2. HTTP Requests - POST VS GET.srt

8.05 KB

  2. HTTP Requests - POST VS GET.vtt

7.14 KB

  3.1 Beautiful Soup Documentation.html

0.11 KB

  3. Parsing HTML Code.mp4

95.29 MB

  3. Parsing HTML Code.srt

8.80 KB

  3. Parsing HTML Code.vtt

7.78 KB

  4. Extracting HTML Attributes.mp4

137.62 MB

  4. Extracting HTML Attributes.srt

11.71 KB

  4. Extracting HTML Attributes.vtt

10.30 KB

  5. Posting Forms.mp4

136.19 MB

  5. Posting Forms.srt

10.68 KB

  5. Posting Forms.vtt

9.45 KB

  6. Building Basic Structure For Vulnerability Scanner.mp4

118.98 MB

  6. Building Basic Structure For Vulnerability Scanner.srt

13.83 KB

  6. Building Basic Structure For Vulnerability Scanner.vtt

12.09 KB

  7. Using Default Parameters.mp4

41.42 MB

  7. Using Default Parameters.srt

5.97 KB

  7. Using Default Parameters.vtt

5.27 KB

  8. Sending Requests in a Session.mp4

83.23 MB

  8. Sending Requests in a Session.srt

10.30 KB

  8. Sending Requests in a Session.vtt

9.12 KB

  9. Extracting & Submitting Forms Automatically.mp4

124.80 MB

  9. Extracting & Submitting Forms Automatically.srt

11.24 KB

  9. Extracting & Submitting Forms Automatically.vtt

9.90 KB

 1. Introduction

  1. Introduction.mp4

141.51 MB

  1. Introduction.srt

7.87 KB

  1. Introduction.vtt

6.97 KB

  2. Teaser.mp4

102.01 MB

  2. Teaser.srt

9.02 KB

  2. Teaser.vtt

7.96 KB

  3. What is Programming, What is Hacking & Why Learn Them.mp4

139.67 MB

  3. What is Programming, What is Hacking & Why Learn Them.srt

8.23 KB

  3. What is Programming, What is Hacking & Why Learn Them.vtt

7.27 KB

  4.1 Virtual Box Download Page.html

0.10 KB

  4. Lab Overview & Needed Software.mp4

57.00 MB

  4. Lab Overview & Needed Software.srt

4.88 KB

  4. Lab Overview & Needed Software.vtt

4.30 KB

  5.1 How to Fix Missing Nat Network Issue.html

0.10 KB

  5.2 Kali Linux Download Page.html

0.15 KB

  5.3 How to Fix Blank Screen After Starting Kali.html

0.15 KB

  5. Installing Kali as a virtual Machine.mp4

104.05 MB

  5. Installing Kali as a virtual Machine.srt

11.25 KB

  5. Installing Kali as a virtual Machine.vtt

9.93 KB

  6. Basic Overview of Kali Linux.mp4

107.45 MB

  6. Basic Overview of Kali Linux.srt

6.52 KB

  6. Basic Overview of Kali Linux.vtt

5.77 KB

  7.1 List of Linux Commands.html

0.12 KB

  7. The Terminal & Linux Commands.mp4

223.50 MB

  7. The Terminal & Linux Commands.srt

13.91 KB

  7. The Terminal & Linux Commands.vtt

12.27 KB

  8. Python 2 VS Python 3 & Writing Our First Program.mp4

193.69 MB

  8. Python 2 VS Python 3 & Writing Our First Program.srt

11.48 KB

  8. Python 2 VS Python 3 & Writing Our First Program.vtt

10.14 KB

  9.1 Pycharm Download Link.html

0.12 KB

  9. Installing & Using a Python IDE.mp4

115.47 MB

  9. Installing & Using a Python IDE.srt

11.33 KB

  9. Installing & Using a Python IDE.vtt

9.95 KB

 20. Bonus Section

  1. Bonus Lecture - What's Next.html

3.75 KB

 2. Writing a MAC Address Changer - Python Basics

  10.1 More info on Python Functions.html

0.12 KB

  10. Functions.mp4

22.49 MB

  10. Functions.srt

12.10 KB

  10. Functions.vtt

10.64 KB

  1.1 mac_changer.pdf.pdf

980.54 KB

  11. Returning Values From Functions.mp4

10.72 MB

  11. Returning Values From Functions.srt

8.53 KB

  11. Returning Values From Functions.vtt

7.48 KB

  12.1 More info on Decision Making.html

0.12 KB

  12. Decision Making - Theory.mp4

16.70 MB

  12. Decision Making - Theory.srt

9.01 KB

  12. Decision Making - Theory.vtt

7.90 KB

  13. Using Conditional Statements in MAC Changer.mp4

19.98 MB

  13. Using Conditional Statements in MAC Changer.srt

10.94 KB

  13. Using Conditional Statements in MAC Changer.vtt

9.63 KB

  1. What is MAC Address & How To Change it.mp4

105.33 MB

  1. What is MAC Address & How To Change it.srt

9.31 KB

  1. What is MAC Address & How To Change it.vtt

8.16 KB

  2.1 Subprocess Module Documentation.html

0.11 KB

  2. Using Python Modules & Executing System Commands.mp4

21.62 MB

  2. Using Python Modules & Executing System Commands.srt

12.33 KB

  2. Using Python Modules & Executing System Commands.vtt

10.81 KB

  3. Implementing a Very Basic MAC Changer.mp4

9.35 MB

  3. Implementing a Very Basic MAC Changer.srt

6.68 KB

  3. Implementing a Very Basic MAC Changer.vtt

5.87 KB

  4.1 More info About Variables in Python.html

0.12 KB

  4.2 More info About Strings in Python.html

0.11 KB

  4. Variables & Strings.mp4

19.48 MB

  4. Variables & Strings.srt

12.35 KB

  4. Variables & Strings.vtt

10.88 KB

  5. Using Variables in MAC Changer.mp4

9.12 MB

  5. Using Variables in MAC Changer.srt

5.71 KB

  5. Using Variables in MAC Changer.vtt

5.01 KB

  6.1 More info about Python Built-in Functions.html

0.12 KB

  6. Getting Input From The User.mp4

12.25 MB

  6. Getting Input From The User.srt

7.70 KB

  6. Getting Input From The User.vtt

6.73 KB

  7. Handling User Input.mp4

15.18 MB

  7. Handling User Input.srt

11.73 KB

  7. Handling User Input.vtt

10.35 KB

  8.1 Optparse Documentation Page.html

0.11 KB

  8. Handling Command-line Arguments.mp4

18.03 MB

  8. Handling Command-line Arguments.srt

11.46 KB

  8. Handling Command-line Arguments.vtt

10.08 KB

  9. Initialising Variables Based on Command-line Arguments.mp4

12.19 MB

  9. Initialising Variables Based on Command-line Arguments.srt

9.06 KB

  9. Initialising Variables Based on Command-line Arguments.vtt

7.89 KB

 3. MAC Changer - Algorithm Design

  1. What is an Algorithm.mp4

7.04 MB

  1. What is an Algorithm.srt

4.54 KB

  1. What is an Algorithm.vtt

3.98 KB

  2.1 Check_call() Manuall Page.html

0.11 KB

  2. Reading Output Returned By System Commands.mp4

14.51 MB

  2. Reading Output Returned By System Commands.srt

8.39 KB

  2. Reading Output Returned By System Commands.vtt

7.38 KB

  3.1 More info on Regular Expressions.html

0.12 KB

  3.2 Pythex.org.html

0.08 KB

  3. Regular Expressions (Regex).mp4

18.04 MB

  3. Regular Expressions (Regex).srt

10.50 KB

  3. Regular Expressions (Regex).vtt

9.25 KB

  4.1 Re Module Manual Page.html

0.10 KB

  4. Extracting a Substring Using Regex.mp4

15.81 MB

  4. Extracting a Substring Using Regex.srt

8.15 KB

  4. Extracting a Substring Using Regex.vtt

7.16 KB

  5. Refactoring & Housekeeping.mp4

17.64 MB

  5. Refactoring & Housekeeping.srt

15.15 KB

  5. Refactoring & Housekeeping.vtt

13.26 KB

  6. Implementing The Algorithm to Check The Mac Did Change.mp4

12.73 MB

  6. Implementing The Algorithm to Check The Mac Did Change.srt

8.23 KB

  6. Implementing The Algorithm to Check The Mac Did Change.vtt

7.23 KB

 4. Programming a Network Scanner

  10.1 Python Escape Characters.html

0.10 KB

  10. Using Escape Characters To Enhance Program Output.mp4

11.05 MB

  10. Using Escape Characters To Enhance Program Output.srt

8.13 KB

  10. Using Escape Characters To Enhance Program Output.vtt

7.13 KB

  11.1 More info about Python dictionaries.html

0.12 KB

  11. Dictionaries.mp4

15.29 MB

  11. Dictionaries.srt

12.82 KB

  11. Dictionaries.vtt

11.28 KB

  1.1 network_scanner.pdf.pdf

719.09 KB

  12.1 More info about python dictionaries.html

0.12 KB

  1.2 Best Wireless Adapters To Use With Kali.html

0.10 KB

  12. Improving the Program Using a List of Dictionaries.mp4

14.79 MB

  12. Improving the Program Using a List of Dictionaries.srt

11.42 KB

  12. Improving the Program Using a List of Dictionaries.vtt

10.01 KB

  13. Iterating Over Nested Data Structures.mp4

12.56 MB

  13. Iterating Over Nested Data Structures.srt

9.31 KB

  13. Iterating Over Nested Data Structures.vtt

8.18 KB

  1.3 Website That Sells Supported Wireless Adapters.html

0.09 KB

  14. Get IP Range Using Command Line Arguments.html

0.15 KB

  15.1 argparse Documentation.html

0.11 KB

  15. Python 3 Compatibility.mp4

12.69 MB

  15. Python 3 Compatibility.srt

9.32 KB

  15. Python 3 Compatibility.vtt

8.19 KB

  1. Introduction & Teaser.mp4

109.63 MB

  1. Introduction & Teaser.srt

12.38 KB

  1. Introduction & Teaser.vtt

10.91 KB

  2.1 Windows Virtual Image Download Link.html

0.12 KB

  2. Installing Windows as a Virtual Machine.mp4

60.59 MB

  2. Installing Windows as a Virtual Machine.srt

4.78 KB

  2. Installing Windows as a Virtual Machine.vtt

4.17 KB

  3.1 Scapy Documentation.html

0.10 KB

  3.2 More info about Scapy ARP Ping.html

0.12 KB

  3. What is ARP & What its Used For.mp4

16.58 MB

  3. What is ARP & What its Used For.srt

11.91 KB

  3. What is ARP & What its Used For.vtt

10.47 KB

  4. Designing an Algorithm To Discover Clients Connected To The Same Network.mp4

11.89 MB

  4. Designing an Algorithm To Discover Clients Connected To The Same Network.srt

4.99 KB

  4. Designing an Algorithm To Discover Clients Connected To The Same Network.vtt

4.43 KB

  5. Using Scapy To Create an ARP Request.mp4

11.60 MB

  5. Using Scapy To Create an ARP Request.srt

8.39 KB

  5. Using Scapy To Create an ARP Request.vtt

7.35 KB

  6. Combining Frames To Broadcast Packets.mp4

21.18 MB

  6. Combining Frames To Broadcast Packets.srt

11.21 KB

  6. Combining Frames To Broadcast Packets.vtt

9.90 KB

  7.1 More info about the sr() function.html

0.13 KB

  7. Sending & Receiving Packets.mp4

10.74 MB

  7. Sending & Receiving Packets.srt

9.06 KB

  7. Sending & Receiving Packets.vtt

7.95 KB

  8.1 More info about python lists.html

0.11 KB

  8. Lists.mp4

19.09 MB

  8. Lists.srt

10.74 KB

  8. Lists.vtt

9.47 KB

  9. Iterating Over Lists & Analysing Packet.mp4

18.36 MB

  9. Iterating Over Lists & Analysing Packet.srt

12.74 KB

  9. Iterating Over Lists & Analysing Packet.vtt

11.12 KB

 5. Writing an ARP Spoofer

  10. Implementing a Restore Function.mp4

20.50 MB

  10. Implementing a Restore Function.srt

14.64 KB

  10. Implementing a Restore Function.vtt

12.91 KB

  1.1 arp_spoof.pdf.pdf

709.19 KB

  11. Restoring ARP Tables When an Exception Occures.mp4

9.29 MB

  11. Restoring ARP Tables When an Exception Occures.srt

6.28 KB

  11. Restoring ARP Tables When an Exception Occures.vtt

5.57 KB

  1. What is ARP Spoofing.mp4

112.25 MB

  1. What is ARP Spoofing.srt

6.96 KB

  1. What is ARP Spoofing.vtt

6.14 KB

  2. Redirecting the Flow of Packets in a Network Using arpspoof.mp4

56.99 MB

  2. Redirecting the Flow of Packets in a Network Using arpspoof.srt

6.10 KB

  2. Redirecting the Flow of Packets in a Network Using arpspoof.vtt

5.35 KB

  3. Creating an ARP Response.mp4

10.57 MB

  3. Creating an ARP Response.srt

8.79 KB

  3. Creating an ARP Response.vtt

7.77 KB

  4. Sending ARP Responses.mp4

9.02 MB

  4. Sending ARP Responses.srt

7.00 KB

  4. Sending ARP Responses.vtt

6.19 KB

  5. Extracting MAC Address From Responses.mp4

10.92 MB

  5. Extracting MAC Address From Responses.srt

8.31 KB

  5. Extracting MAC Address From Responses.vtt

7.34 KB

  6.1 More info about Python Loops.html

0.11 KB

  6. Loops.mp4

16.76 MB

  6. Loops.srt

11.10 KB

  6. Loops.vtt

9.76 KB

  7. More on Loops & Counters.mp4

11.61 MB

  7. More on Loops & Counters.srt

10.74 KB

  7. More on Loops & Counters.vtt

9.37 KB

  8. Dynamic Printing.mp4

10.10 MB

  8. Dynamic Printing.srt

8.73 KB

  8. Dynamic Printing.vtt

7.70 KB

  9.1 More info About Exceptions.html

0.12 KB

  9. Handling Exceptions.mp4

7.81 MB

  9. Handling Exceptions.srt

6.83 KB

  9. Handling Exceptions.vtt

6.04 KB

 6. Writing a Packet Sniffer

  1.1 Sniffer.pdf.pdf

556.34 KB

  1. Introduction & Teaser.mp4

85.79 MB

  1. Introduction & Teaser.srt

6.11 KB

  1. Introduction & Teaser.vtt

5.39 KB

  2.1 More info About the Sniff Function.html

0.11 KB

  2. Sniffing Packets Using Scapy.mp4

11.84 MB

  2. Sniffing Packets Using Scapy.srt

9.98 KB

  2. Sniffing Packets Using Scapy.vtt

8.81 KB

  3.1 Scapy-http Git Repo.html

0.10 KB

  3.2 Berkeley Packet Filter (BPF) syntax.html

0.09 KB

  3. Extracting data From a Specific Layer.mp4

16.37 MB

  3. Extracting data From a Specific Layer.srt

8.21 KB

  3. Extracting data From a Specific Layer.vtt

7.24 KB

  4. Analysing Sniffed Packets & Extracting Fields From Layers.mp4

28.99 MB

  4. Analysing Sniffed Packets & Extracting Fields From Layers.srt

13.79 KB

  4. Analysing Sniffed Packets & Extracting Fields From Layers.vtt

12.08 KB

  5. Analysing Fields & Extracting Passwords.mp4

21.17 MB

  5. Analysing Fields & Extracting Passwords.srt

13.79 KB

  5. Analysing Fields & Extracting Passwords.vtt

12.08 KB

  6. Extracting URLs.mp4

20.38 MB

  6. Extracting URLs.srt

9.15 KB

  6. Extracting URLs.vtt

8.04 KB

  7. Capturing Passwords From Any Computer Connected to the Same Network.mp4

15.15 MB

  7. Capturing Passwords From Any Computer Connected to the Same Network.srt

9.49 KB

  7. Capturing Passwords From Any Computer Connected to the Same Network.vtt

8.37 KB

 7. Writing a DNS Spoofer

  1.1 interceptor.pdf.pdf

1.81 MB

  1. Intercepting Packets - Creating a Proxy.mp4

155.19 MB

  1. Intercepting Packets - Creating a Proxy.srt

16.12 KB

  1. Intercepting Packets - Creating a Proxy.vtt

14.07 KB

  2. Converting Packets to Scapy Packets.mp4

83.94 MB

  2. Converting Packets to Scapy Packets.srt

10.63 KB

  2. Converting Packets to Scapy Packets.vtt

9.40 KB

  3. What is DNS Spoofing.mp4

123.57 MB

  3. What is DNS Spoofing.srt

8.53 KB

  3. What is DNS Spoofing.vtt

7.57 KB

  4. Filtering DNS Responses.mp4

70.56 MB

  4. Filtering DNS Responses.srt

7.92 KB

  4. Filtering DNS Responses.vtt

7.00 KB

  5. Analysing & Creating a Custom DNS Response.mp4

79.85 MB

  5. Analysing & Creating a Custom DNS Response.srt

9.78 KB

  5. Analysing & Creating a Custom DNS Response.vtt

8.61 KB

  6. Modifying Packets On The Fly.mp4

86.85 MB

  6. Modifying Packets On The Fly.srt

9.45 KB

  6. Modifying Packets On The Fly.vtt

8.33 KB

  7. Redirecting DNS Responses.mp4

60.97 MB

  7. Redirecting DNS Responses.srt

6.71 KB

  7. Redirecting DNS Responses.vtt

5.95 KB

 8. Writing a File Interceptor

  1. Introduction & Teaser.mp4

72.99 MB

  1. Introduction & Teaser.srt

5.47 KB

  1. Introduction & Teaser.vtt

4.83 KB

  2. Filtering Traffic Based on the Port Used.mp4

93.18 MB

  2. Filtering Traffic Based on the Port Used.srt

10.75 KB

  2. Filtering Traffic Based on the Port Used.vtt

9.50 KB

  3. Analysing HTTP Requests.mp4

55.62 MB

  3. Analysing HTTP Requests.srt

6.78 KB

  3. Analysing HTTP Requests.vtt

5.96 KB

  4. Intercepting HTTP Requests.mp4

104.22 MB

  4. Intercepting HTTP Requests.srt

11.82 KB

  4. Intercepting HTTP Requests.vtt

10.44 KB

  5.1 List of HTTP Responses.html

0.11 KB

  5. Modifying HTTP Responses on The Fly.mp4

102.69 MB

  5. Modifying HTTP Responses on The Fly.srt

12.58 KB

  5. Modifying HTTP Responses on The Fly.vtt

11.09 KB

  6. Intercepting & Replacing Downloads on The Network.mp4

100.47 MB

  6. Intercepting & Replacing Downloads on The Network.srt

11.34 KB

  6. Intercepting & Replacing Downloads on The Network.vtt

9.93 KB

 9. Writing a Code Injector

  10. BeEF Overview & Basic Hook Method.mp4

107.35 MB

  10. BeEF Overview & Basic Hook Method.srt

8.15 KB

  10. BeEF Overview & Basic Hook Method.vtt

7.16 KB

  11. Hooking Computers Using code_injector.mp4

48.49 MB

  11. Hooking Computers Using code_injector.srt

7.03 KB

  11. Hooking Computers Using code_injector.vtt

6.21 KB

  12. Basic BeEF Commands.mp4

52.95 MB

  12. Basic BeEF Commands.srt

6.01 KB

  12. Basic BeEF Commands.vtt

5.25 KB

  13. Delivering Malware Using BeEF.mp4

69.99 MB

  13. Delivering Malware Using BeEF.srt

7.51 KB

  13. Delivering Malware Using BeEF.vtt

6.58 KB

  1. Introduction & Teaser.mp4

30.14 MB

  1. Introduction & Teaser.srt

1.65 KB

  1. Introduction & Teaser.vtt

1.46 KB

  2. Analysing HTTP Responses.mp4

77.92 MB

  2. Analysing HTTP Responses.srt

8.25 KB

  2. Analysing HTTP Responses.vtt

7.28 KB

  3. Replacing a Substring Using Regex.mp4

64.71 MB

  3. Replacing a Substring Using Regex.srt

8.22 KB

  3. Replacing a Substring Using Regex.vtt

7.32 KB

  4. Decoding HTTP Responses.mp4

104.26 MB

  4. Decoding HTTP Responses.srt

11.77 KB

  4. Decoding HTTP Responses.vtt

10.42 KB

  5. Modifying HTTP Responses & Injecting Javascript Code in HTML Pages.mp4

113.10 MB

  5. Modifying HTTP Responses & Injecting Javascript Code in HTML Pages.srt

10.20 KB

  5. Modifying HTTP Responses & Injecting Javascript Code in HTML Pages.vtt

9.02 KB

  6. Refactoring & Housekeeping.mp4

79.07 MB

  6. Refactoring & Housekeeping.srt

10.78 KB

  6. Refactoring & Housekeeping.vtt

9.51 KB

  7. Debugging Issues.mp4

75.34 MB

  7. Debugging Issues.srt

7.57 KB

  7. Debugging Issues.vtt

6.68 KB

  8. Using Groups & None-capturing Regex.mp4

93.05 MB

  8. Using Groups & None-capturing Regex.srt

10.87 KB

  8. Using Groups & None-capturing Regex.vtt

9.56 KB

  9. Recalculating Content Length.mp4

124.42 MB

  9. Recalculating Content Length.srt

13.13 KB

  9. Recalculating Content Length.vtt

11.65 KB

 [FreeCoursesOnline.Me].url

0.12 KB

 [FreeTutorials.Us].url

0.12 KB

 [FTU Forum].url

0.25 KB
 

tracker

leech seeds
 

Torrent description

Feel free to post any comments about this torrent, including links to Subtitle, samples, screenshots, or any other relevant information, Watch [FreeTutorials Us] Udemy - Learn Python & Ethical Hacking From Scratch Online Free Full Movies Like 123Movies, Putlockers, Fmovies, Netflix or Download Direct via Magnet Link in Torrent Details.

related torrents

Torrent name

health leech seeds Size
 


comments (0)

Main Menu