Filename Size 1. Chapter 1/1. What Is Social Engineering.mp4 7.5 MB 1. Chapter 1/1. What Is Social Engineering.srt 4.7 KB 1. Chapter 1/1.1 What is Social Engineering _.pdf.pdf 98.7 KB 1. Chapter 1/2. Teaser - Hacking An Android Phone & Accessing The Camera.mp4 11.9 MB 1. Chapter 1/2. Teaser - Hacking An Android Phone & Accessing The Camera.srt 8.5 KB 1. Chapter 1/3. Course Overview.mp4 10.6 MB 1. Chapter 1/3. Course Overview.srt 6.3 KB 1. Chapter 1/3.1 00 - Intro & Perperation.pdf.pdf 364.2 KB 10. Windows Evil Files - Enhancing Evil Files/1. Bypassing All Anti-Virus Programs By Modifying Hex Vales.mp4 22.3 MB 10. Windows Evil Files - Enhancing Evil Files/1. Bypassing All Anti-Virus Programs By Modifying Hex Vales.srt 13.7 KB 10. Windows Evil Files - Enhancing Evil Files/2. Creating The Perfect Spying Tool.mp4 14.5 MB 10. Windows Evil Files - Enhancing Evil Files/2. Creating The Perfect Spying Tool.srt 9.5 KB 11. Windows Evil Files - Converting Evil File To A Trojan/1. Download & Execute Payload.mp4 14.9 MB 11. Windows Evil Files - Converting Evil File To A Trojan/1. Download & Execute Payload.srt 8.9 KB 11. Windows Evil Files - Converting Evil File To A Trojan/1.1 download-and-execute.txt.txt 210 B 11. Windows Evil Files - Converting Evil File To A Trojan/2. Embedding Evil Files With Any File Type Like An Image Or PDF.mp4 21.1 MB 11. Windows Evil Files - Converting Evil File To A Trojan/2. Embedding Evil Files With Any File Type Like An Image Or PDF.srt 14.4 KB 11. Windows Evil Files - Converting Evil File To A Trojan/3. Running Evil Files Silently In The Background.mp4 22.6 MB 11. Windows Evil Files - Converting Evil File To A Trojan/3. Running Evil Files Silently In The Background.srt 11.4 KB 11. Windows Evil Files - Converting Evil File To A Trojan/3.1 Bat To EXE Download Link.html 130 B 11. Windows Evil Files - Converting Evil File To A Trojan/4. Changing Trojan's Icon.mp4 16.8 MB 11. Windows Evil Files - Converting Evil File To A Trojan/4. Changing Trojan's Icon.srt 10.8 KB 11. Windows Evil Files - Converting Evil File To A Trojan/4.1 Icons Website - iconarchive.com.html 88 B 11. Windows Evil Files - Converting Evil File To A Trojan/4.2 PNG To ICO Converter..html 92 B 11. Windows Evil Files - Converting Evil File To A Trojan/5. Spoofing File Extension from .exe to anything else (pdf, png ..etc).mp4 23.7 MB 11. Windows Evil Files - Converting Evil File To A Trojan/5. Spoofing File Extension from .exe to anything else (pdf, png ..etc).srt 15.6 KB 11. Windows Evil Files - Converting Evil File To A Trojan/6. Download & Execute Payload (Method 2).mp4 18.9 MB 11. Windows Evil Files - Converting Evil File To A Trojan/6. Download & Execute Payload (Method 2).srt 9 KB 11. Windows Evil Files - Converting Evil File To A Trojan/6.1 autoit-download-and-execute.txt.txt 513 B 11. Windows Evil Files - Converting Evil File To A Trojan/7. Embedding Evil Files With Any File Type Like An Image Or PDF (Method 2).mp4 18.3 MB 11. Windows Evil Files - Converting Evil File To A Trojan/7. Embedding Evil Files With Any File Type Like An Image Or PDF (Method 2).srt 9.3 KB 11. Windows Evil Files - Converting Evil File To A Trojan/8. Embedding backdoor In A Legitimate Microsoft Office Document.mp4 18.8 MB 11. Windows Evil Files - Converting Evil File To A Trojan/8. Embedding backdoor In A Legitimate Microsoft Office Document.srt 10.6 KB 11. Windows Evil Files - Converting Evil File To A Trojan/9. Embedding Any Evil File In A Legitimate Microsoft Office Document.mp4 20.9 MB 11. Windows Evil Files - Converting Evil File To A Trojan/9. Embedding Any Evil File In A Legitimate Microsoft Office Document.srt 13.3 KB 11. Windows Evil Files - Converting Evil File To A Trojan/9.1 download-and-execute-macro.txt.txt 483 B 12. Mac OS X Evil Files/1. Introduction.mp4 8.1 MB 12. Mac OS X Evil Files/1. Introduction.srt 4.1 KB 12. Mac OS X Evil Files/1.1 04 - Generating Evil Files For Mac OS X.pdf.pdf 141.5 KB 12. Mac OS X Evil Files/2. Hacking Mac OS X Using A Meterpreter Backdoor.mp4 34.6 MB 12. Mac OS X Evil Files/2. Hacking Mac OS X Using A Meterpreter Backdoor.srt 14.7 KB 12. Mac OS X Evil Files/3. Hacking Mac OS X Using An Empire Stager.mp4 14.3 MB 12. Mac OS X Evil Files/3. Hacking Mac OS X Using An Empire Stager.srt 9.2 KB 12. Mac OS X Evil Files/4. Converting Basic Backdoor To An Executable.mp4 8.4 MB 12. Mac OS X Evil Files/4. Converting Basic Backdoor To An Executable.srt 4.5 KB 12. Mac OS X Evil Files/5. Embedding A Normal File With Backdoor.mp4 26.7 MB 12. Mac OS X Evil Files/5. Embedding A Normal File With Backdoor.srt 12.9 KB 12. Mac OS X Evil Files/6. Download & Execute Payload.mp4 20.2 MB 12. Mac OS X Evil Files/6. Download & Execute Payload.srt 9.6 KB 12. Mac OS X Evil Files/7. Changing Trojan's Icon.mp4 20.2 MB 12. Mac OS X Evil Files/7. Changing Trojan's Icon.srt 8.6 KB 12. Mac OS X Evil Files/8. Configuring The Trojan To Run Silently.mp4 17.1 MB 12. Mac OS X Evil Files/8. Configuring The Trojan To Run Silently.srt 7.8 KB 12. Mac OS X Evil Files/9. Embedding Backdoor In A Legitimate Microsoft Office Document.mp4 13.9 MB 12. Mac OS X Evil Files/9. Embedding Backdoor In A Legitimate Microsoft Office Document.srt 7.7 KB 13. Linux Evil Files/1. Hacking Into Linux-Like Systems Using One Command.mp4 16.7 MB 13. Linux Evil Files/1. Hacking Into Linux-Like Systems Using One Command.srt 12.2 KB 13. Linux Evil Files/1.1 05 - Generating Evil Files For Linux.pdf.pdf 246.7 KB 13. Linux Evil Files/2. More Advanced Linux Backdoor.mp4 10.2 MB 13. Linux Evil Files/2. More Advanced Linux Backdoor.srt 8.9 KB 13. Linux Evil Files/3. Using A Remote Keylogger To Capture Key Strikes Including Passwords.mp4 100.1 MB 13. Linux Evil Files/3. Using A Remote Keylogger To Capture Key Strikes Including Passwords.srt 12 KB 13. Linux Evil Files/3.1 ZLogger Git Repo.html 92 B 13. Linux Evil Files/4. Recovering Saved Passwords From A Local Machine.mp4 15.6 MB 13. Linux Evil Files/4. Recovering Saved Passwords From A Local Machine.srt 9.3 KB 13. Linux Evil Files/4.1 LaZagne Git Repo.html 99 B 13. Linux Evil Files/5. Execute & Report Payload.mp4 11.7 MB 13. Linux Evil Files/5. Execute & Report Payload.srt 9.6 KB 13. Linux Evil Files/5.1 ZReporter Git Repo.html 94 B 13. Linux Evil Files/6. Recovering Saved Passwords From A Remote Machine.mp4 12.8 MB 13. Linux Evil Files/6. Recovering Saved Passwords From A Remote Machine.srt 8.6 KB 13. Linux Evil Files/7. Embedding Evil Code In A Legitimate Linux Package - Part 1.mp4 19.2 MB 13. Linux Evil Files/7. Embedding Evil Code In A Legitimate Linux Package - Part 1.srt 18.9 KB 13. Linux Evil Files/7.1 Ubuntu Packages Download Page.html 88 B 13. Linux Evil Files/8. Embedding Evil Code In A Legitimate Linux Package - Part 2.mp4 9.8 MB 13. Linux Evil Files/8. Embedding Evil Code In A Legitimate Linux Package - Part 2.srt 6.7 KB 13. Linux Evil Files/9. Backdooring a Legitimate Android App.mp4 108.8 MB 13. Linux Evil Files/9. Backdooring a Legitimate Android App.srt 15.1 KB 14. Delivery Methods/1. Introduction.mp4 6.2 MB 14. Delivery Methods/1. Introduction.srt 2.7 KB 14. Delivery Methods/1.1 06 - Delivery Methods.pdf.pdf 127 KB 14. Delivery Methods/10. Basic BeEF Commands.mp4 7.8 MB 14. Delivery Methods/10. Basic BeEF Commands.srt 6.2 KB 14. Delivery Methods/11. Stealing CredentialsPasswords Using A Fake Login Prompt.mp4 4.2 MB 14. Delivery Methods/11. Stealing CredentialsPasswords Using A Fake Login Prompt.srt 3.3 KB 14. Delivery Methods/12. Hacking Windows 10 Using A Fake Update.mp4 8.9 MB 14. Delivery Methods/12. Hacking Windows 10 Using A Fake Update.srt 6.4 KB 14. Delivery Methods/13. Hacking Mac OS X Using A Fake Update.mp4 8.3 MB 14. Delivery Methods/13. Hacking Mac OS X Using A Fake Update.srt 6.1 KB 14. Delivery Methods/14. Hacking Linux Using A Fake Update.mp4 8.9 MB 14. Delivery Methods/14. Hacking Linux Using A Fake Update.srt 6 KB 14. Delivery Methods/2. Mail Deliver - Setting up an SMTP Server.mp4 76.3 MB 14. Delivery Methods/2. Mail Deliver - Setting up an SMTP Server.srt 76.3 MB 14. Delivery Methods/3. Mail Delivery - Spoofing Emails.mp4 121.3 MB 14. Delivery Methods/3. Mail Delivery - Spoofing Emails.srt 16.4 KB 14. Delivery Methods/4. Hacking OS X & Linux Using Pure Social Engineering Without Sending Any Files.mp4 19.5 MB 14. Delivery Methods/4. Hacking OS X & Linux Using Pure Social Engineering Without Sending Any Files.srt 14.3 KB 14. Delivery Methods/5. Creating A Replica Of Any Website Login Page.mp4 49.9 MB 14. Delivery Methods/5. Creating A Replica Of Any Website Login Page.srt 7.9 KB