Udemy - Python 3 For Offensive PenTest: A Complete Practical Course

  • CategoryOther
  • TypeTutorials
  • LanguageEnglish
  • Total size2.4 GB
  • Uploaded ByFclab
  • Downloads319
  • Last checkedMay. 03rd '19
  • Date uploadedMay. 03rd '19
  • Seeders 25
  • Leechers14

Infohash : DEF779580F50E9EC8E67BFFA0B7BDD2752EE0E96

Udemy - Python 3 For Offensive PenTest: A Complete Practical Course

The knowledge which you will learn from this course is literally a weapon. My goal is to make you a better warrior in penetration testing.

For more Udemy Courses: https://freecourselab.com

Files:

[FreeCourseLab.com] Udemy - Python 3 For Offensive PenTest A Complete Practical Course 1. Quick Intro
  • 1. Course Intro.mp4 (14.5 MB)
  • 1. Course Intro.vtt (2.3 KB)
  • 2. Preparing Kali 2 linux & Windows 10.html (2.4 KB)
2. Python 3 Windows 10 Kali 2 Gaining Access - Your First Persistence Shell
  • 1. Download Scripts.html (0.2 KB)
  • 10. Coding a HTTP Reverse Shell.mp4 (113.2 MB)
  • 10. Coding a HTTP Reverse Shell.vtt (10.1 KB)
  • 11. Data Exfiltration.mp4 (96.9 MB)
  • 11. Data Exfiltration.vtt (6.9 KB)
  • 12. Exercise Switching user-agent value.html (0.4 KB)
  • 13. Persistence Outline.mp4 (32.6 MB)
  • 13. Persistence Outline.vtt (4.5 KB)
  • 14. Making our HTTP Reverse Shell Persistent.mp4 (122.9 MB)
  • 14. Making our HTTP Reverse Shell Persistent.vtt (8.8 KB)
  • 15. Tuning the connection attempts.mp4 (56.6 MB)
  • 15. Tuning the connection attempts.vtt (4.0 KB)
  • 16. Final Notes & Countermeasures.html (2.7 KB)
  • 2. TCP Reverse Shell Outline.mp4 (32.5 MB)
  • 2. TCP Reverse Shell Outline.vtt (4.8 KB)
  • 3. Server Side - Coding a TCP Reverse Shell.mp4 (91.9 MB)
  • 3. Server Side - Coding a TCP Reverse Shell.vtt (7.0 KB)
  • 4. Client Side - Coding a TCP Reverse Shell.mp4 (78.1 MB)
  • 4. Client Side - Coding a TCP Reverse Shell.vtt (7.1 KB)
  • 5. Exercise Overcome Empty String.html (0.4 KB)
  • 6. Coding a Low Level Data Exfiltration.mp4 (86.5 MB)
  • 6. Coding a Low Level Data Exfiltration.vtt (6.9 KB)
  • 7. Exporting To EXE.mp4 (36.8 MB)
  • 7. Exporting To EXE.vtt (2.8 KB)
  • 8. Exercise Downloading Tools From Hacker Machine.html (0.7 KB)
  • 9. HTTP Reverse Shell Outline.mp4 (18.9 MB)
  • 9. HTTP Reverse Shell Outline.vtt (18.9 MB)
3. Python 3 Windows 10 Kali 2 Advanced Scriptable Shell
  • 1. Download Scripts.html (0.2 KB)
  • 2. DDNS Aware Shell.mp4 (54.5 MB)
  • 3. Interacting with Twitter.mp4 (82.0 MB)
  • 3. Interacting with Twitter.vtt (82.0 MB)
  • 4. Exercise Twitter as DDNS Tweet your Kali IPport.html (0.6 KB)
  • 5. Target Directory Navigation.mp4 (77.6 MB)
  • 5. Target Directory Navigation.vtt (6.4 KB)
  • 6. Replicating Metasploit Screen Capturing.mp4 (50.8 MB)
  • 6. Replicating Metasploit Screen Capturing.vtt (4.9 KB)
  • 7. Replicating Metasploit Searching for Content.mp4 (68.2 MB)
  • 7. Replicating Metasploit Searching for Content.vtt (5.7 KB)
  • 8. Integrating Low Level Port Scanner.mp4 (51.1 MB)
  • 8. Integrating Low Level Port Scanner.vtt (5.4 KB)
4. Python 3 Windows 10 Kali 2 Catch Me If You Can!
  • 1. Download Scripts.html (0.2 KB)
  • 2. Bypassing Host Based Firewall Outline.mp4 (21.6 MB)
  • 2. Bypassing Host Based Firewall Outline.vtt (3.5 KB)
  • 3. Hijacking Internet Explorer - Shell Over Internet Explorer.mp4 (55.9 MB)
  • 3. Hijacking Internet Explorer - Shell Over Internet Explorer.vtt (5.0 KB)
  • 4. Bypassing Reputation Filtering in Next Generation Firewalls - Outline.mp4 (20.3 MB)
  • 4. Bypassing Reputation Filtering in Next Generation Firewalls - Outline.vtt (3.2 KB)
  • 5. Interacting with Source Forge.mp4 (72.5 MB)
  • 5. Interacting with Source Forge.vtt (5.9 KB)
  • 6. Interacting with Google Forms.mp4 (48.6 MB)
  • 6. Interacting with Google Forms.vtt (4.7 KB)
  • 7. Exercise Putting All Together - Bypassing Botnet Filtering.html (0.2 KB)
5. Python 3 How Malware Abuse Cryptography Python Answers
  • 1. Download Scripts.html (0.2 KB)
  • 2. Bypassing IPS with Hand-Made XOR Encryption.mp4 (62.5 MB)
  • 2. Bypassing IPS with Hand-Made XOR Encryption.vtt (8.1 KB)
  • 3. Quick Introduction To Encryption Algorithms.mp4 (55.3 MB)
  • 3. Quick Introduction To Encryption Algorithms.vtt (16.0 MB)
  • 4. Protecting Your Tunnel with AES.mp4 (99.4 MB)
  • 4. Protecting Your Tunnel with AES.vtt (9.4 KB)
  • 5. Protecting Your Tunnel with RSA.mp4 (155.3 MB)
  • 5. Protecting Your Tunnel with RSA.vtt (13.4 KB)
  • 6. Developing One Time, Hybrid - Encryption Key.mp4 (56.5 MB)
  • 6. Developing One Time, Hybrid - Encryption Key.vtt (5.0 KB)
6. Python 3 Windows 10 Kali 2 Passwords Hacking
  • 1. Download Scripts.html (0.2 KB)
  • 10. Python in Firefox PoC.mp4 (50.6 MB)
  • 10. Python in Firefox PoC.vtt (8.1 KB)
  • 11. Exercise Python in Firefox EXE.mp4 (35.1 MB)
  • 11. Exercise Python in Firefox EXE.vtt (5.0 KB)
  • 12. Passwords Phishing - DNS Poisoning.mp4 (48.5 MB)
  • 12. Passwords Phishing - DNS Poisoning.vtt (8.5 KB)
  • 13. In Action Facebook Password Phishing.mp4 (52.3 MB)
  • 13. In Action Facebook Password Phishing.vtt (9.3 KB)
  • 14. Don't Skip Me! - Countermeasures.mp4 (17.5 MB)
  • 14. Don't Skip Me! - Countermeasures.vtt (6.1 KB)
  • 2. Keylogger.mp4 (23.5 MB)
  • 2. Keylogger.vtt (2.8 KB)
  • 3. Quick note.html (0.5 KB)
  • 4. Hijacking KeePass Password Manager.mp4 (26.4 MB)
  • 4. Hijacking KeePass Password Manager.vtt (4.9 KB)
  • 5. Bonus Dumping Saved Passwords Out of Google Chrome.mp4 (60.9 MB)
  • 5. Bonus Dumping Saved Passwords Out of Google Chrome.vtt (12.6 KB)
  • 6. Bonus Exercise Dumping Saved Passwords Out of Google Chrome.mp4 (12.3 MB)
  • 6. Bonus Exercise Dumping Saved Passwords Out of Google Chrome.vtt (2.6 KB)
  • 7. Quick note.html (0.4 KB)
  • 8. Man in the Browser Outline.mp4 (23.6 MB)
  • 8. Man in the Browser Outline.vtt (5.0 KB)
  • 9. FireFox API Hooking with ImmunityDebugger.mp4 (74.5 MB)
  • 9. FireFox API Hooking with ImmunityDebugger.vtt (7.6 KB)
7. Windows 7 & 10 Privilege Escalation - Weak Service Permission
  • 1. Download - Exercises + Scripts.html (1.1 KB)
  • 2. Privilege Escalation Part 1 - Weak Service File Permission Outline.mp4 (9.2 MB)
  • 2. Privilege Escalation Part 1 - Weak Service File Permission Outline.vtt (2.8 KB)
  • 3. Privilege Escalation Part 2 - Preparing Vulnerable Software.mp4 (33.2 MB)
  • 3. Privilege Escalation Part 2 -

Code:

  • http://0d.kebhana.mx:443/announce
  • udp://tw.opentracker.ga:36920/announce
  • udp://temp1.opentracker.gq:6969/announce
  • udp://temp2.opentracker.gq:6969/announce
  • udp://tracker.torrent.eu.org:451/announce
  • http://torrent.nwps.ws:80/announce
  • udp://explodie.org:6969/announce
  • https://opentracker.xyz:443/announce
  • https://t.quic.ws:443/announce
  • https://tracker.fastdownload.xyz:443/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://ipv4.tracker.harry.lu:80/announce
  • udp://tracker.coppersurfer.tk:6969/announce
  • udp://tracker.justseed.it:1337/announce
  • udp://open.demonii.si:1337/announce