Filename | Size |
| 1. Chapter 1/1. Introduction.mp4 | 6 MB |
| 1. Chapter 1/2. DISCLAIMER.mp4 | 570.3 KB |
| 10. How to Be Safe From Above Attacks/1. How to Detect Phishing Page.mp4 | 4.7 MB |
| 10. How to Be Safe From Above Attacks/2. How to Detect Spoof Emails.mp4 | 6.6 MB |
| 2. Termux Basic Operations/1. Things You will Learn.mp4 | 1.1 MB |
| 2. Termux Basic Operations/2. Termux Introduction and Installation.mp4 | 10.9 MB |
| 2. Termux Basic Operations/3. Termux Storage Setup.mp4 | 13.4 MB |
| 2. Termux Basic Operations/4. Sending SMS Via Termux.mp4 | 6.4 MB |
| 2. Termux Basic Operations/5. Ubuntu ROOT Terminal Installation.mp4 | 6.2 MB |
| 2. Termux Basic Operations/6. How to use Ubuntu ROOT terminal.mp4 | 9.6 MB |
| 2. Termux Basic Operations/7. Installing Advanced Hacking Tools.mp4 | 6.3 MB |
| 2. Termux Basic Operations/8. Steganography-How to Hide Data Behind Any Image.mp4 | 6.8 MB |
| 2. Termux Basic Operations/9. Steganography-How The Data is Extracted at Destination Side.mp4 | 7.8 MB |
| 3. Information Gathering/1. Things You will Learn.mp4 | 1023.4 KB |
| 3. Information Gathering/2. Information Gathering -Whois Lookup and DNS Lookup.mp4 | 11.1 MB |
| 3. Information Gathering/3. Information Gathering - Port Scanning and Links Grabbing.mp4 | 6.3 MB |
| 3. Information Gathering/4. Information Gathering -IP Location Finding and Traceroute.mp4 | 5.3 MB |
| 3. Information Gathering/5. Tress IP & Find The Exact Location of Victim Using Termux.mp4 | 8.5 MB |
| 3. Information Gathering/6. Extracting Emails and User Information.mp4 | 13.8 MB |
| 4. Network Scanning/1. Things You will Learn.mp4 | 1.3 MB |
| 4. Network Scanning/2. Installing Nmap on Android.mp4 | 4.4 MB |
| 4. Network Scanning/3. Finding Live or UP Hosts in Network.mp4 | 2.8 MB |
| 4. Network Scanning/4. Listing Open Ports On a Target Host.mp4 | 3.8 MB |
| 4. Network Scanning/5. Generating a Scan Report.mp4 | 5.7 MB |
| 5. Denial of Service (DoS) attacks Demonstrated and explained/1. Things You will Learn.mp4 | 823.3 KB |
| 5. Denial of Service (DoS) attacks Demonstrated and explained/2. Performing DOS Attack with Termux.mp4 | 16 MB |
| 5. Denial of Service (DoS) attacks Demonstrated and explained/3. Performing DOS Attack without Termux.mp4 | 5 MB |
| 6. How Hackers Really Crack Your Passwords/1. Things You will Learn.mp4 | 2.2 MB |
| 6. How Hackers Really Crack Your Passwords/2. Cracking Password with Brute Force Attack.mp4 | 10.6 MB |
| 6. How Hackers Really Crack Your Passwords/3. Cracking Password with Dictionary Attack.mp4 | 4.8 MB |
| 7. Exploitation/1. Things You will Learn.mp4 | 788 KB |
| 7. Exploitation/10. Generate Payloads and Control Remote Machines.mp4 | 12.7 MB |
| 7. Exploitation/11. Continuing -Generate Payloads and Control Remote Machines.mp4 | 17.8 MB |
| 7. Exploitation/12. Get Every Single Saved Password From Victim Machine.mp4 | 8.2 MB |
| 7. Exploitation/2. Introduction and Installing Metasploit Framework on Termux.mp4 | 14.9 MB |
| 7. Exploitation/3. Extract Email Address of Domain using Metasploit.mp4 | 11 MB |
| 7. Exploitation/4. Hack Windows Machine By Creating a Backdoor-Msfvenom Payload With Netcat.mp4 | 14.9 MB |
| 7. Exploitation/5. Hacking windows Machine with Metasploit.mp4 | 10.2 MB |
| 7. Exploitation/6. Hack Linux Systems by Generating a more Advanced Backdoor.mp4 | 8.1 MB |
| 7. Exploitation/7. Hacking an Android Device with MSFvenom.mp4 | 8.9 MB |
| 7. Exploitation/8. Capturing keystrokes with Metasploit.mp4 | 5 MB |
| 7. Exploitation/9. Meterpreter Basic Commands.mp4 | 11.1 MB |
| 8. Social Engineering Attacks/1. Things You will Learn.mp4 | 444.3 KB |
| 8. Social Engineering Attacks/2. Email Spoofing-Send E-Mail Using Fake or Other Person's E-Mail.mp4 | 4.7 MB |
| 8. Social Engineering Attacks/3. E-Mail Bomber Sending Unlimited Fake Mails to Victim.mp4 | 6.3 MB |
| 8. Social Engineering Attacks/4. Performing a Phishing Attack to steal Victim credentials.mp4 | 9.5 MB |
| 8. Social Engineering Attacks/5. Creating a KEYLOGGER On Android.mp4 | 8.5 MB |
| 9. Using The Above Attacks Outside The Local Network/1. Things You will Learn.mp4 | 643.8 KB |
| 9. Using The Above Attacks Outside The Local Network/2. Hack Any Windows Machine Outside LAN.mp4 | 16.3 MB |
| 9. Using The Above Attacks Outside The Local Network/3. Remotely Hack Any Android Device with Metasploit- Hack Over WAN.mp4 | 10.5 MB |
| 9. Using The Above Attacks Outside The Local Network/4. Ngrok Installation,Configuration and Port Forwarding.mp4 | 11.4 MB |
| 9. Using The Above Attacks Outside The Local Network/5. Phishing Attack outside LAN Using Ngrok.mp4 | 13.3 MB |
| 9. Using The Above Attacks Outside The Local Network/6. Phishing Attack Over Wan without Termux.mp4 | 11.9 MB |
| 9. Using The Above Attacks Outside The Local Network/7. Creating Your Own Phishing App(Application).mp4 | 10.5 MB |