23 OCT 2025 - We are back! If you have been following us over the last few years, you will know that the last 2 months have been rough. We website was practically not loading. Sorry for the mess. We are back though and everything should run smoothly now. New servers. Updated domains. And new owners. We invite you all to start uploading torrents again!
10. Post Connection Attacks - Information Gathering/1. Discovering Connected Clients using netdiscover.mp4
76 MB
10. Post Connection Attacks - Information Gathering/1. Discovering Connected Clients using netdiscover.vtt
17.1 KB
10. Post Connection Attacks - Information Gathering/1.1 04-post-connection-attacks.pdf.pdf
1.6 MB
10. Post Connection Attacks - Information Gathering/2. Gathering More Information Using Zenmap.mp4
52 MB
10. Post Connection Attacks - Information Gathering/2. Gathering More Information Using Zenmap.vtt
16.1 KB
10. Post Connection Attacks - Information Gathering/3. Gathering Even More Information Using Zenmap.mp4
63.3 MB
10. Post Connection Attacks - Information Gathering/3. Gathering Even More Information Using Zenmap.vtt
18.1 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/1. ARP Poisoning Theory.mp4
139.5 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/1. ARP Poisoning Theory.vtt
139.5 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/10. Wireshark - Basic Overview & How To Use It With MITM Attacks.mp4
125.8 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/10. Wireshark - Basic Overview & How To Use It With MITM Attacks.vtt
22 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/11. Wireshark - Sniffing Data & Analysing HTTP Traffic.mp4
114.2 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/11. Wireshark - Sniffing Data & Analysing HTTP Traffic.vtt
18.5 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/12. Wireshark - Capturing Passwords & Cookies Entered By Any Device In The Network.mp4
17.1 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/12. Wireshark - Capturing Passwords & Cookies Entered By Any Device In The Network.vtt
11.7 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/13. Creating a Fake Access Point - Theory.mp4
139 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/13. Creating a Fake Access Point - Theory.vtt
21.1 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/14. Creating a Fake AP Using Mana-Toolkit.mp4
105.9 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/14. Creating a Fake AP Using Mana-Toolkit.vtt
22.8 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/2. ARP Poisoning Using arpspoof.mp4
62.2 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/2. ARP Poisoning Using arpspoof.vtt
13.6 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/3. ARP Poisoning Using MITMf & Capturing Passwords Entered By Users On The Network.mp4
55.4 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/3. ARP Poisoning Using MITMf & Capturing Passwords Entered By Users On The Network.vtt
10.8 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/4. Bypassing HTTPS SSL.mp4
86.4 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/4. Bypassing HTTPS SSL.vtt
12.9 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/5. DNS Spoofing - Redirecting Requests From One Website To Another.mp4
37.1 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/5. DNS Spoofing - Redirecting Requests From One Website To Another.vtt
11.6 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/6. Capturing Screen Of Target & Injecting a Keylogger.mp4
105.3 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/6. Capturing Screen Of Target & Injecting a Keylogger.vtt
19.5 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/7. Injecting JavascriptHTML Code.mp4
76.2 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/7. Injecting JavascriptHTML Code.vtt
18.5 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/8. Hooking Clients To Beef & Stealing Passwords.mp4
25.4 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/8. Hooking Clients To Beef & Stealing Passwords.vtt
21.5 KB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/9. MITM - Using MITMf Against Real Networks.mp4
89.5 MB
11. Post Connections Attacks - Man In The Middle Attacks (MITM)/9. MITM - Using MITMf Against Real Networks.vtt
19.6 KB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/1. Bonus - Installing Veil 3.1.mp4
41.6 MB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/1. Bonus - Installing Veil 3.1.vtt
13.9 KB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/1.1 Veil 3 Git Repo.html
100 B
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/2. Bonus - Veil Overview & Payloads Basics.mp4
10.4 MB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/2. Bonus - Veil Overview & Payloads Basics.vtt
17.9 KB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/3. Bonus - Generating An Undetectable Backdoor Using Veil 3.mp4
14.9 MB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/3. Bonus - Generating An Undetectable Backdoor Using Veil 3.vtt
20.8 KB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/3.1 Another way of generating an undetectable backdoor.html
137 B
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/4. Bonus - Listening For Incoming Connections.mp4
9 MB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/4. Bonus - Listening For Incoming Connections.vtt
15.7 KB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/5. Bonus - Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10.mp4
13.4 MB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/5. Bonus - Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10.vtt
15.6 KB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/6. Creating a Fake Update & Hacking Any Client in the Network.mp4
19.6 MB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/6. Creating a Fake Update & Hacking Any Client in the Network.vtt
19.8 KB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/6.1 evilgrade-installation-commands-updated.txt.txt
859 B
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/7. Meterpreter Basics - Interacting Wit Hacked Clients.mp4
15 MB
12. Post Connection Attacks - Gaining Full Control Over Devices On The Same Network/7. Meterpreter Basics - Interacting Wit Hacked Clients.vtt