BITCQ

Ethical Hacking and Penetration Testing (Kali Linux)

Size: 4.5 GB
Magnet link

Name Size
Ethical Hacking and Penetration Testing (Kali Linux)/readme.txt 4 KB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 1 - Ethical Hacking and Penetration Testing (Kali Linux)/1-welcomemkv.mkv 8.3 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 1 - Ethical Hacking and Penetration Testing (Kali Linux)/2-system-requirementsmkv .mkv 12.3 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 1 - Ethical Hacking and Penetration Testing (Kali Linux)/3-system-requirementsmkv.mkv 12.3 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 2 - Introduction $ installing/10Udemy -(10) Online Courses from the World's Experts.mp4 3 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 2 - Introduction $ installing/11Udemy -(11) Online Courses from the World's Experts.mp4 5.1 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 2 - Introduction $ installing/12-advanced-scanningmkv.mkv 40 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 2 - Introduction $ installing/13-scripting-enginemkv.mkv 35.2 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 2 - Introduction $ installing/14-investigating-scan-types-with-wiresharkmkv.mkv 107 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 2 - Introduction $ installing/15-importing-results-to-dradismkv.mkv 23.9 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 2 - Introduction $ installing/16-aquiring-nessusmkv.mkv 37.7 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 2 - Introduction $ installing/17-setting-up-nessusmkv.mkv 52 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 2 - Introduction $ installing/18-configuring-nessusmkv.mkv 35.7 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 2 - Introduction $ installing/4Udemy -(4) Online Courses from the World's Experts.mp4 1.5 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 2 - Introduction $ installing/5Udemy -(5) Online Courses from the World's Experts.mp4 1.8 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 2 - Introduction $ installing/6Udemy -(6) Online Courses from the World's Experts_2.mp4 4 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 2 - Introduction $ installing/7Udemy -(7) Online Courses from the World's Experts.mp4 2.7 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 2 - Introduction $ installing/8Udemy -(8) Online Courses from the World's Experts.mp4 3.6 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 2 - Introduction $ installing/9Udemy -(9) Online Courses from the World's Experts.mp4 2 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 3 - Scan/19-scan-details-networkmkv.mkv 25.9 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 3 - Scan/20-scan-details-credentials-plugins-optionsmkv.mkv 35.5 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 3 - Scan/21-scan-details-web-applicationsmkv.mkv 56.8 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 3 - Scan/22-starting-scanmkv.mkv 18.8 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 3 - Scan/23-reviewing-resultsmkv.mkv 70.8 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 3 - Scan/24-false-positivesmkv.mkv 51.4 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 3 - Scan/25-acquiring-nexposemkv.mkv 43 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 3 - Scan/25-setting-up-jobsmkv.mkv 17.8 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 3 - Scan/27-setting-up-nexposemkv.mkv 17.9 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 3 - Scan/28-configuring-nexposemkv.mkv 39.6 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 3 - Scan/29-adding-hosts-to-nexposemkv.mkv 44.5 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 3 - Scan/30-reviewing-results-manual-checksmkv.mkv 60.4 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 3 - Scan/31-netcatmkv.mkv 65.8 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 3 - Scan/32-protocol-checkingmkv.mkv 80.1 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 3 - Scan/33-ssl-clientmkv.mkv 90.8 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 3 - Scan/34-sslscanmkv.mkv 94.5 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 3 - Scan/35-snmpwalkmkv.mkv 72.7 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/36-acquiring-metasploitmkv.mkv 45.7 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/37-setting-up-metasploitmkv.mkv 9.7 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/38-metasploit-web-interfacemkv.mkv 37.2 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/39-configuring-workspacesmkv.mkv 20.9 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/40-running-nmp-from-metasploitmkv.mkv 32.4 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/41-import-nessus-resultsmkv.mkv 29.3 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/42-scanning-with-metasploitmkv.mkv 75.1 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/43-looking-at-vulnerabilitiesmkv.mkv 57.6 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/44-searching-vulnerabilitesmkv.mkv 51.3 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/45-running-exploitsmkv.mkv 48.5 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/46-post-exploitation-data-gatheringmkv.mkv 67.3 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/47-pivoting-tunnelingmkv.mkv 42.2 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/48-writing-an-msf-pluginmkv.mkv 93.2 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/49-writing-fuzzersmkv.mkv 102.8 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/50-social-engineering-toolkitmkv.mkv 24.9 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/51-spear-phishingmkv.mkv 88.1 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/52-browser-plugins-with-chromemkv.mkv 95 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/53-browser-plugins-with-firefoxmkv.mkv 47.9 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/54-tamperdatamkv.mkv 52.2 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/55-performing-injectionsmkv.mkv 26.9 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/56-cookie-data-with-tamperdatamkv.mkv 112.8 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/57-sql-inject-memkv.mkv 58.9 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/58-xss-memkv.mkv 54.9 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/59-firebugmkv.mkv 84 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/60-hackbarmkv.mkv 61.1 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/61-wappalyzermkv.mkv 39.7 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/62-passive-reconmkv.mkv 85.8 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/63-groundspeedmkv.mkv 33.8 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/64-acquiring-webgoatmkv.mkv 72.9 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/65-practicing-web-application-attacksmkv.mkv 24.5 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/66-basics-of-webgoatmkv.mkv 39.5 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/67-working-through-lessonsmkv.mkv 62.5 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/68--acquiring-burpsuitemkv.mkv 29.1 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/69--installing-burpsuitemkv.mkv 22 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/70--running-burpsuite-configuring-your-browsermkv.mkv 22.4 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/71-spideringmkv.mkv 33.3 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/72-passive-scanningmkv.mkv 35.2 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/73-active-scanningmkv.mkv 48 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/74-investigating-resultsmkv.mkv 88.6 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/75-password-attacksmkv.mkv 55 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/76-fuzzing-attacksmkv.mkv 85.2 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/77-doing-sequencingmkv.mkv 50.2 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/78-using-the-intrudermkv.mkv 69.2 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/79-acquiring-w3afmkv.mkv 21.9 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/80-installing-w3afmkv.mkv 30.4 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/81-running-w3afmkv.mkv 19.2 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/82-configuring-w3afmkv.mkv 53.8 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/83-acquiring-configuring-zed-attack-proxy-zapmkv.mkv 61.6 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/84-quick-start-with-zapmkv.mkv 37.6 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/85-scanning-with-zapmkv.mkv 46.6 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/86-spidering-with-zapmkv.mkv 40.5 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/87-fuzzing-with-zapmkv.mkv 46 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/88-web-architecturemkv.mkv 45.6 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/89-basics-of-sql-injectionmkv.mkv 31.8 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/90-manual-testingmkv.mkv 56.2 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 4 - Metasploit/91-sqlmapmkv.mkv 126.6 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 5 - Exploits/92-command-injectionmkv.mkv 40 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 5 - Exploits/93-cross-site-scriptingmkv.mkv 34.9 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 5 - Exploits/94-spear-phishingmkv.mkv 62.8 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 5 - Exploits/95-cross-site-request-forgerymkv.mkv 19.5 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 5 - Exploits/96-roque-serversmkv.mkv 69.9 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 5 - Exploits/97-spoofed-certificatesmkv.mkv 121.8 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 5 - Exploits/98-course-wrap-upmkv.mkv 6.9 MB
Ethical Hacking and Penetration Testing (Kali Linux)/Section 5 - Exploits/99-next-stepsmkv.mkv 9.9 MB
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce
Name Size Peers
EC-Council. Ethical Hacking and Countermeasures. CEH v12. Modules 9-10. 2022 Application 318.3 MB 9
EC-Council. Ethical Hacking and Countermeasures CEH v12 Lab modules 2-5. 2022 Application 1.3 GB 8
[ FreeCourseWeb.com ] Udemy - Master Cybersecurity,Ethical Hacking and Penetrating Testing Video 1.5 GB 8
SANS SEC542 Web App Penetration Testing and Ethical Hacking Video 4.4 GB 7
EC-Council. Ethical Hacking and Countermeasures. CEH v12. Modules 19-20. 2022 Application 737.8 MB 6
Ethical Hacking and Cybersecurity Application 44.4 MB 5
Hartman S. Hands-On Ethical Hacking Tactics. Strategies, tools, and tech...2024 Application 439.1 MB 4
Ethical Hacking™ Learn to hack Websites and Applications Video 4.3 GB 2
[ DevCourseWeb.com ] Udemy - Free Tools for Penetration Testing and Ethical Hacking Video 3.7 GB 13
[Tutorialsplanet.NET] Udemy - Ultimate Ethical Hacking and Penetration Testing (UEH) Video 28.8 GB 0
Ethical Hacking Evading IDS, Firewalls, and Honeypots Video 386.3 MB 42
Ethical Hacking for Android Apps and Devices Video 2 GB 35
Learn Ethical Hacking Hacking Instagram and Facebook Video 202.3 MB 28
[ FreeCourseWeb.com ] Udemy - Learn Ethical Hacking - Hacking Instagram and Facebook.zip Application 201.5 MB 17
[ FreeCourseWeb.com ] Ethical Hacking - 3 in 1- Beginner's Guide + Tips and Tricks + Advanced and Effective measures of Ethical Hacking.zip Application 44.3 MB 12
Lynda - Ethical Hacking Trojans and Backdoors Video 190 MB 5
The Fundamentals Of Computer Security For Beginners A Simple And Comprehensive Guide To Start Working In Cybersecurity. Ethical Hacking To Learn And Protect Your Family And Business Ebook 1.7 MB 178
Ethical Hacking Learn Penetration Testing, Cybersecurity with Advanced Ethical Hacking Techniques and Methods 5.6 MB 145
The Basics of Hacking and Penetration Testing Ethical Hacking and Penetration Testing Made Easy Ebook 3.5 MB 117
Ethical Hacking With Python, JavaScript and Kali Linux Application 12.2 GB 117

Loading...