23 OCT 2025 - We are back! If you have been following us over the last few years, you will know that the last 2 months have been rough. We website was practically not loading. Sorry for the mess. We are back though and everything should run smoothly now. New servers. Updated domains. And new owners. We invite you all to start uploading torrents again!
Udemy - Learn Network Hacking From Scratch (WiFi & Wired)
Learn how to hack both WiFi and wired networks like black hat hackers, and learn how to secure them from these attacks.
For more Udemy Courses: https://freecourselab.com
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
1. Chapter 1/1. Introduction & Course Outline.mp4
37.3 MB
1. Chapter 1/1. Introduction & Course Outline.vtt
4.9 KB
10. Post Connection Attacks - Information Gathering/1. Discovering Connected Clients using netdiscover.mp4
76 MB
10. Post Connection Attacks - Information Gathering/1. Discovering Connected Clients using netdiscover.vtt
8.9 KB
10. Post Connection Attacks - Information Gathering/1.1 04-post-connection-attacks.pdf.pdf
1.6 MB
10. Post Connection Attacks - Information Gathering/2. Gathering More Information Using Zenmap.mp4
52 MB
10. Post Connection Attacks - Information Gathering/2. Gathering More Information Using Zenmap.vtt
7.9 KB
10. Post Connection Attacks - Information Gathering/3. Gathering Even More Information Using Zenmap.mp4
63.3 MB
10. Post Connection Attacks - Information Gathering/3. Gathering Even More Information Using Zenmap.vtt
9.2 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/1. ARP Poisoning Theory.mp4
139.5 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/1. ARP Poisoning Theory.vtt
9.1 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/10. Wireshark - Basic Overview & How To Use It With MITM Attacks.mp4
125.8 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/10. Wireshark - Basic Overview & How To Use It With MITM Attacks.vtt
11.5 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/11. Wireshark - Sniffing Data & Analysing HTTP Traffic.mp4
114.2 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/11. Wireshark - Sniffing Data & Analysing HTTP Traffic.vtt
9.5 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/12. Wireshark - Capturing Passwords & Cookies Entered By Any Device In The Network.mp4
17.1 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/12. Wireshark - Capturing Passwords & Cookies Entered By Any Device In The Network.vtt
6.2 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/13. Creating a Fake Access Point - Theory.mp4
139 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/13. Creating a Fake Access Point - Theory.vtt
10 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/14. Creating a Fake AP Using Mana-Toolkit.mp4
105.9 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/14. Creating a Fake AP Using Mana-Toolkit.vtt
11.4 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/2. ARP Poisoning Using arpspoof.mp4
62.2 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/2. ARP Poisoning Using arpspoof.vtt
6.8 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/3. ARP Poisoning Using MITMf & Capturing Passwords Entered By Users On The Network.mp4
64 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/3. ARP Poisoning Using MITMf & Capturing Passwords Entered By Users On The Network.vtt
5.7 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/4. Bypassing HTTPS SSL.mp4
65.8 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/4. Bypassing HTTPS SSL.vtt
5.2 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/5. DNS Spoofing - Redirecting Requests From One Website To Another.mp4
37.1 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/5. DNS Spoofing - Redirecting Requests From One Website To Another.vtt
5.5 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/6. Capturing Screen Of Target & Injecting a Keylogger.mp4
61.3 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/6. Capturing Screen Of Target & Injecting a Keylogger.vtt
6.1 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/7. Injecting JavascriptHTML Code.mp4
78.2 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/7. Injecting JavascriptHTML Code.vtt
8.5 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/8. Hooking Clients To Beef & Stealing Passwords.mp4
25.4 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/8. Hooking Clients To Beef & Stealing Passwords.vtt
11.2 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/9. MITM - Using MITMf Against Real Networks.mp4
89.5 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/9. MITM - Using MITMf Against Real Networks.vtt
10 KB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/1. Bonus - Installing Veil 3.1.mp4
41.6 MB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/1. Bonus - Installing Veil 3.1.vtt
6.9 KB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/1.1 Veil 3 Git Repo.html
100 B
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/2. Bonus - Veil Overview & Payloads Basics.mp4
10.4 MB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/2. Bonus - Veil Overview & Payloads Basics.vtt
8.8 KB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/3. Bonus - Generating An Undetectable Backdoor Using Veil 3.mp4
14.9 MB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/3. Bonus - Generating An Undetectable Backdoor Using Veil 3.vtt
10.9 KB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/3.1 Another way of generating an undetectable backdoor.html
137 B
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/4. Bonus - Listening For Incoming Connections.mp4
9 MB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/4. Bonus - Listening For Incoming Connections.vtt
7.9 KB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/5. Bonus - Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10.mp4
13.4 MB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/5. Bonus - Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10.vtt
8 KB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/6. Creating a Fake Update & Hacking Any Client in the Network.mp4
19.6 MB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/6. Creating a Fake Update & Hacking Any Client in the Network.vtt
10.2 KB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/6.1 evilgrade-installation-commands-updated.txt.txt
859 B
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/7. Meterpreter Basics - Interacting Wit Hacked Clients.mp4
15 MB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/7. Meterpreter Basics - Interacting Wit Hacked Clients.vtt