23 OCT 2025 - We are back! If you have been following us over the last few years, you will know that the last 2 months have been rough. We website was practically not loading. Sorry for the mess. We are back though and everything should run smoothly now. New servers. Updated domains. And new owners. We invite you all to start uploading torrents again!
TORRENT DETAILS
[FreeCourseLab.com] Udemy - Network Hacking Continued - Intermediate To Advanced
1. Introduction/1. Teaser - Converting Downloads To Trojans On The Fly & Hacking Windows 10.mp4
22 MB
1. Introduction/1. Teaser - Converting Downloads To Trojans On The Fly & Hacking Windows 10.vtt
7.9 KB
1. Introduction/2. Course Overview.mp4
21 MB
1. Introduction/2. Course Overview.vtt
6.5 KB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/1. MITMproxy - What is It & How To Install It.mp4
7.8 MB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/1. MITMproxy - What is It & How To Install It.vtt
4.5 KB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/1.1 MITMproxy Download Page.html
108 B
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/1.2 Post Connection - Analysing Data Flows.pdf.pdf
190 KB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/10. [Bonus] - Hacking Windows 10 Using A Fake Update.mp4
11.6 MB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/10. [Bonus] - Hacking Windows 10 Using A Fake Update.vtt
5.4 KB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/2. Using MITMproxy In Explicit Mode.mp4
11.4 MB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/2. Using MITMproxy In Explicit Mode.vtt
7.4 KB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/3. Analysing (Filtering & Highlighting) Flows.mp4
11.8 MB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/3. Analysing (Filtering & Highlighting) Flows.vtt
5.9 KB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/4. Intercepting Network Flows.mp4
9.9 MB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/4. Intercepting Network Flows.vtt
5.5 KB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/5. Modifying Responses & Injecting Javascript Manually.mp4
23 MB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/5. Modifying Responses & Injecting Javascript Manually.vtt
9.6 KB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/6. Intercepting & Modifying Responses In Transparent Mode.mp4
16.2 MB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/6. Intercepting & Modifying Responses In Transparent Mode.vtt
8.7 KB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/7. Editing Responses & Injecting BeEF's Code On The Fly.mp4
23 MB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/7. Editing Responses & Injecting BeEF's Code On The Fly.vtt
10 KB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/8. Editing Responses Automatically Based On Regex.mp4
20.4 MB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/8. Editing Responses Automatically Based On Regex.vtt
9.6 KB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/9. [Bonus] - Stealing Login Info Using Fake Login Prompt.mp4
19.1 MB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/9. [Bonus] - Stealing Login Info Using Fake Login Prompt.vtt
8.5 KB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/1. What Do Mean By MITM Scripts.mp4
13.7 MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/1. What Do Mean By MITM Scripts.vtt
6.7 KB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/1.1 Post Connection - Writing Custom Scripts.pdf.pdf
211.3 KB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/1.2 MITMproxy Scripting Wiki Page.html
120 B
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/10. Executing Bash Commands & Calling Trojan Factory From Our Script.mp4
18.7 MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/10. Executing Bash Commands & Calling Trojan Factory From Our Script.vtt
9.2 KB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/11. Using Variables & More Complex Conditions.mp4
17 MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/11. Using Variables & More Complex Conditions.vtt
9.5 KB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/12. Converting Downloads To Trojans On The Fly.mp4
23.2 MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/12. Converting Downloads To Trojans On The Fly.vtt
11.4 KB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/12.1 basic-v3.py.py
553 B
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/13. Configuring The Trojan Factory's MITMproxy Script.mp4
16.5 MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/13. Configuring The Trojan Factory's MITMproxy Script.vtt
8.3 KB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/14. Using The Trojan Factory MITMproxy Script.mp4
18.8 MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/14. Using The Trojan Factory MITMproxy Script.vtt
9 KB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/2. Capturing & Printing RequestsResponses.mp4
18.2 MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/2. Capturing & Printing RequestsResponses.vtt
9.4 KB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/2.1 basic.py.py
131 B
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/3. Filtering Flows & Extracting Useful Data.mp4
27.4 MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/3. Filtering Flows & Extracting Useful Data.vtt
10.6 KB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/4. Using Conditions To Execute Code On Useful Flows.mp4
26.8 MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/4. Using Conditions To Execute Code On Useful Flows.vtt
10.3 KB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/5. Generating Custom HTTP Responses.mp4
19.3 MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/5. Generating Custom HTTP Responses.vtt
9.3 KB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/6. Testing Script Locally.mp4
18.3 MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/6. Testing Script Locally.vtt
8.9 KB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/6.1 basic-v2.py.py
285 B
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/7. Generating Trojans - Installing The Trojan Factory.mp4
15.9 MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/7. Generating Trojans - Installing The Trojan Factory.vtt
7.3 KB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/7.1 Trojan Factory Git Repo.html
98 B
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/8. Generating Trojans - Converting Any File (egimage) To a Trojan.mp4
24.3 MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/8. Generating Trojans - Converting Any File (egimage) To a Trojan.vtt
11.2 KB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/9. Testing Script On Remote Computer To Replace Downloads With a Generic Trojan.mp4
14.9 MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/9. Testing Script On Remote Computer To Replace Downloads With a Generic Trojan.vtt
8 KB
12. Post-Connection Attacks - Doing All Of The Above On HTTPS Websites/1. Bypassing HTTPS With MITMproxy.mp4
16.3 MB
12. Post-Connection Attacks - Doing All Of The Above On HTTPS Websites/1. Bypassing HTTPS With MITMproxy.vtt
7.2 KB
12. Post-Connection Attacks - Doing All Of The Above On HTTPS Websites/1.1 MITMProxy Complex Scripts.html
128 B
12. Post-Connection Attacks - Doing All Of The Above On HTTPS Websites/1.2 sslstrip.py.py
2.4 KB
12. Post-Connection Attacks - Doing All Of The Above On HTTPS Websites/2. Replacing Downloads From HTTPS.mp4
12.7 MB
12. Post-Connection Attacks - Doing All Of The Above On HTTPS Websites/2. Replacing Downloads From HTTPS.vtt
5.6 KB
12. Post-Connection Attacks - Doing All Of The Above On HTTPS Websites/3. Injecting Data (Javascript, HTML elements ...etc) In HTTPS Websites.mp4
13.9 MB
12. Post-Connection Attacks - Doing All Of The Above On HTTPS Websites/3. Injecting Data (Javascript, HTML elements ...etc) In HTTPS Websites.vtt
7.1 KB
12. Post-Connection Attacks - Doing All Of The Above On HTTPS Websites/4. Securing Systems From The Above Post Connection Attacks.mp4
20.5 MB
12. Post-Connection Attacks - Doing All Of The Above On HTTPS Websites/4. Securing Systems From The Above Post Connection Attacks.vtt