[GigaCourse.com] Udemy - Offensive Security Engineering/1. Introduction/1. Introduction.mp4 |
20.5 MB |
[GigaCourse.com] Udemy - Offensive Security Engineering/1. Introduction/1. Introduction.srt |
9 KB |
[GigaCourse.com] Udemy - Offensive Security Engineering/1. Introduction/1.1 Intro Presentation.pdf |
34 KB |
[GigaCourse.com] Udemy - Offensive Security Engineering/1. Introduction/1.2 All Course Material.html |
124 B |
[GigaCourse.com] Udemy - Offensive Security Engineering/1. Introduction/2. AWS Primer.mp4 |
42.5 MB |
[GigaCourse.com] Udemy - Offensive Security Engineering/1. Introduction/2. AWS Primer.srt |
23 KB |
[GigaCourse.com] Udemy - Offensive Security Engineering/1. Introduction/2.1 Course References.html |
157 B |
[GigaCourse.com] Udemy - Offensive Security Engineering/10. Scenario 2 - The Dropbox/1. The Dropbox.mp4 |
32.8 MB |
[GigaCourse.com] Udemy - Offensive Security Engineering/10. Scenario 2 - The Dropbox/1. The Dropbox.srt |
18 KB |
[GigaCourse.com] Udemy - Offensive Security Engineering/10. Scenario 2 - The Dropbox/1.1 Course References.html |
157 B |
[GigaCourse.com] Udemy - Offensive Security Engineering/10. Scenario 2 - The Dropbox/2. The Dropbox Post-Exploitation.mp4 |
91.6 MB |
[GigaCourse.com] Udemy - Offensive Security Engineering/10. Scenario 2 - The Dropbox/2. The Dropbox Post-Exploitation.srt |
35 KB |
[GigaCourse.com] Udemy - Offensive Security Engineering/10. Scenario 2 - The Dropbox/2.1 Course References.html |
157 B |
[GigaCourse.com] Udemy - Offensive Security Engineering/10. Scenario 2 - The Dropbox/3. The Dropbox Assignment.html |
145 B |
[GigaCourse.com] Udemy - Offensive Security Engineering/11. Scenario 3 - Phishing Attacks and Redirectors/1. Custom C2 Tooling Development.mp4 |
78.3 MB |
[GigaCourse.com] Udemy - Offensive Security Engineering/11. Scenario 3 - Phishing Attacks and Redirectors/1. Custom C2 Tooling Development.srt |
35 KB |
[GigaCourse.com] Udemy - Offensive Security Engineering/11. Scenario 3 - Phishing Attacks and Redirectors/1.1 Simple C2 Source Code.html |
154 B |
[GigaCourse.com] Udemy - Offensive Security Engineering/11. Scenario 3 - Phishing Attacks and Redirectors/2. Phishing Attacks - Configuring Gophish.mp4 |
84.8 MB |
[GigaCourse.com] Udemy - Offensive Security Engineering/11. Scenario 3 - Phishing Attacks and Redirectors/2. Phishing Attacks - Configuring Gophish.srt |
35 KB |
[GigaCourse.com] Udemy - Offensive Security Engineering/11. Scenario 3 - Phishing Attacks and Redirectors/2.1 Gophish Terraform Config.html |
149 B |
[GigaCourse.com] Udemy - Offensive Security Engineering/11. Scenario 3 - Phishing Attacks and Redirectors/3. C2 Redirectors with AWS Lambda.mp4 |
97.8 MB |
[GigaCourse.com] Udemy - Offensive Security Engineering/11. Scenario 3 - Phishing Attacks and Redirectors/3. C2 Redirectors with AWS Lambda.srt |
38 KB |
[GigaCourse.com] Udemy - Offensive Security Engineering/11. Scenario 3 - Phishing Attacks and Redirectors/3.1 Serverless Lambda Redirector.html |
158 B |
[GigaCourse.com] Udemy - Offensive Security Engineering/11. Scenario 3 - Phishing Attacks and Redirectors/4. Make a Custom Implant and Implement C2 Redirectors.html |
145 B |
[GigaCourse.com] Udemy - Offensive Security Engineering/12. Bonus Scenario - Multiplayer C2/1. Multiplayer C2.mp4 |
14 MB |
[GigaCourse.com] Udemy - Offensive Security Engineering/12. Bonus Scenario - Multiplayer C2/1. Multiplayer C2.srt |
10 KB |
[GigaCourse.com] Udemy - Offensive Security Engineering/12. Bonus Scenario - Multiplayer C2/1.1 Course References.html |
157 B |
[GigaCourse.com] Udemy - Offensive Security Engineering/13. Conclusion/1. Conclusion.mp4 |
7.9 MB |
[GigaCourse.com] Udemy - Offensive Security Engineering/13. Conclusion/1. Conclusion.srt |
3 KB |
[GigaCourse.com] Udemy - Offensive Security Engineering/13. Conclusion/1.1 Conclusion Presentation.pdf |
103 KB |
[GigaCourse.com] Udemy - Offensive Security Engineering/13. Conclusion/1.2 Course References.html |
157 B |
[GigaCourse.com] Udemy - Offensive Security Engineering/13. Conclusion/2. Course Exam.html |
141 B |
[GigaCourse.com] Udemy - Offensive Security Engineering/2. Networks Refresher/1. Networks Refresher.mp4 |
18.4 MB |
[GigaCourse.com] Udemy - Offensive Security Engineering/2. Networks Refresher/1. Networks Refresher.srt |
12 KB |
[GigaCourse.com] Udemy - Offensive Security Engineering/2. Networks Refresher/1.1 Network Refresher Presentation.pdf |
277 KB |
[GigaCourse.com] Udemy - Offensive Security Engineering/2. Networks Refresher/2. Networks Refresher Quiz.html |
141 B |
[GigaCourse.com] Udemy - Offensive Security Engineering/3. Basics of Command and Control (C2)/1. Basics of Command and Control (C2).mp4 |
50.1 MB |
[GigaCourse.com] Udemy - Offensive Security Engineering/3. Basics of Command and Control (C2)/1. Basics of Command and Control (C2).srt |
17 KB |
[GigaCourse.com] Udemy - Offensive Security Engineering/3. Basics of Command and Control (C2)/1.1 Basics of C2 Presentation.pdf |
83 KB |
[GigaCourse.com] Udemy - Offensive Security Engineering/3. Basics of Command and Control (C2)/2. C2 Quiz.html |
141 B |
[GigaCourse.com] Udemy - Offensive Security Engineering/4. Reverse VPN Tunneling/1. Reverse VPN Tunneling.mp4 |
76.9 MB |
[GigaCourse.com] Udemy - Offensive Security Engineering/4. Reverse VPN Tunneling/1. Reverse VPN Tunneling.srt |
31 KB |
[GigaCourse.com] Udemy - Offensive Security Engineering/4. Reverse VPN Tunneling/1.1 Reverse VPN Tunneling Presentation.pdf |
135 KB |
[GigaCourse.com] Udemy - Offensive Security Engineering/4. Reverse VPN Tunneling/1.2 Course References.html |
157 B |
[GigaCourse.com] Udemy - Offensive Security Engineering/4. Reverse VPN Tunneling/1.3 Base VPN Terraform Config.html |
145 B |
[GigaCourse.com] Udemy - Offensive Security Engineering/4. Reverse VPN Tunneling/2. Configure Reverse VPN Tunneling on a Device.html |
145 B |
[GigaCourse.com] Udemy - Offensive Security Engineering/5. Infrastructure Operations/1. Infrastructure Operations.mp4 |
140.1 MB |
[GigaCourse.com] Udemy - Offensive Security Engineering/5. Infrastructure Operations/1. Infrastructure Operations.srt |
36 KB |
[GigaCourse.com] Udemy - Offensive Security Engineering/5. Infrastructure Operations/1.1 Using a VM for Local Setup.html |
150 B |
[GigaCourse.com] Udemy - Offensive Security Engineering/5. Infrastructure Operations/1.2 Course References.html |
157 B |
[GigaCourse.com] Udemy - Offensive Security Engineering/5. Infrastructure Operations/1.3 Infrastructure Operations Presentation.pdf |
31 KB |
[GigaCourse.com] Udemy - Offensive Security Engineering/5. Infrastructure Operations/1.4 Saltstack Config and Instructions.html |
151 B |
[GigaCourse.com] Udemy - Offensive Security Engineering/5. Infrastructure Operations/2. DevOps Quiz.html |
141 B |
[GigaCourse.com] Udemy - Offensive Security Engineering/6. Red Teams/1. Red Teams.mp4 |
31.8 MB |
[GigaCourse.com] Udemy - Offensive Security Engineering/6. Red Teams/1. Red Teams.srt |
10 KB |
[GigaCourse.com] Udemy - Offensive Security Engineering/6. Red Teams/1.1 Red Teams Presentation.pdf |
265 KB |
[GigaCourse.com] Udemy - Offensive Security Engineering/6. Red Teams/2. Red Teaming Quiz.html |
141 B |
[GigaCourse.com] Udemy - Offensive Security Engineering/7. Red Team Operations/1. Red Team Operations.mp4 |
17.7 MB |
[GigaCourse.com] Udemy - Offensive Security Engineering/7. Red Team Operations/1. Red Team Operations.srt |
5 KB |
[GigaCourse.com] Udemy - Offensive Security Engineering/7. Red Team Operations/1.1 Infrastructure Operations Presentation.pdf |
31 KB |
[GigaCourse.com] Udemy - Offensive Security Engineering/8. Scenarios Introduction/1. Scenarios Introduction.mp4 |
6 MB |
[GigaCourse.com] Udemy - Offensive Security Engineering/8. Scenarios Introduction/1. Scenarios Introduction.srt |
2 KB |
[GigaCourse.com] Udemy - Offensive Security Engineering/8. Scenarios Introduction/1.1 Scenarios Presentation.pdf |
31 KB |
[GigaCourse.com] Udemy - Offensive Security Engineering/9. Scenario 1 - Classic Exploitation/1. Classic Exploitation.mp4 |
24.7 MB |
[GigaCourse.com] Udemy - Offensive Security Engineering/9. Scenario 1 - Classic Exploitation/1. Classic Exploitation.srt |
12 KB |
[GigaCourse.com] Udemy - Offensive Security Engineering/9. Scenario 1 - Classic Exploitation/1.1 Base C2 Terraform Config.html |
144 B |
[GigaCourse.com] Udemy - Offensive Security Engineering/9. Scenario 1 - Classic Exploitation/2. Classic Post-Exploitation.mp4 |
66 MB |
[GigaCourse.com] Udemy - Offensive Security Engineering/9. Scenario 1 - Classic Exploitation/2. Classic Post-Exploitation.srt |
24 KB |
[GigaCourse.com] Udemy - Offensive Security Engineering/9. Scenario 1 - Classic Exploitation/2.1 Base C2 Terraform Config.html |
144 B |
[GigaCourse.com] Udemy - Offensive Security Engineering/9. Scenario 1 - Classic Exploitation/3. Configuring a Basic C2.html |
145 B |
[GigaCourse.com] Udemy - Offensive Security Engineering/Readme.txt |
962 B |
[GigaCourse.com] Udemy - Offensive Security Engineering/[GigaCourse.com].url |
49 B |