23 OCT 2025 - We are back! If you have been following us over the last few years, you will know that the last 2 months have been rough. We website was practically not loading. Sorry for the mess. We are back though and everything should run smoothly now. New servers. Updated domains. And new owners. We invite you all to start uploading torrents again!
TORRENT DETAILS
[FreeAllCourse.Com] Udemy - Network Hacking Continued - Intermediate To Advanced
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
Network Hacking Continued - Intermediate to Advanced
Learn advanced techniques to hack into WiFi & wired networks & write own python scripts to implement custom MITM attacks.
For More Paid Udemy Courses: FreeAllCourse.Com
What you'll learn?
# 80+ detailed videos on ADVANCED network hacking # 2 methods to hack WPA2 enterprise networks # 3 methods to hack captive portals (hotels & airport networks) # Steal WPA/WPA2 password using evil twin attack. # Crack WPA/WPA2 faster using GPU. # Write custom scripts to implement your attack ideas. # Bypass router-side security & run ARP spoofing attack without raising alarms. # Unlock WPS on some routers even if its locked # Disconnect multiple or all clients from their networks without knowing the key # Bypass MAC filtering (both black & white lists). # Discover & connect to hidden networks # Crack more secure WEP implementation when SKA is used. # Exploit WPS on more secure routers to get the WPA/WPA2 key. # Understand how WPA/WPA2 enterprise work. # Understand how a fake access points work # Manually create fake access points # Generate SSL certificates & use it to support HTTPS on apache2. # Create a fake captive portal that acts exactly like a normal captive portal. # Use huge wordlists to crack WPA/WPA2 without taking up disk space. # Save WPA / WPA2 cracking progress. # Bypass HTTPS & capture data manually. # Analyse data flows and build own attacks. # Run attacks against HTTPS websites. # Inject Javascript / HTML code in HTTPS pages. # Create trojans - combine any file (image/pdf) with an evil file. # Replace files downloaded on the network with trojans. # Write script to replace downloads with trojans on the fly.
Description
Created by Zaid Sabih, z Security Last updated 1/2020 Audio : English Caption : English [Auto-generated]
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
1. Introduction/1. Teaser - Converting Downloads To Trojans On The Fly & Hacking Windows 10.mp4
22 MB
1. Introduction/1. Teaser - Converting Downloads To Trojans On The Fly & Hacking Windows 10.srt
9 KB
1. Introduction/2. Course Overview.mp4
21 MB
1. Introduction/2. Course Overview.srt
7.3 KB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/1. Introduction to MITMproxy.mp4
7.8 MB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/1. Introduction to MITMproxy.srt
5.1 KB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/1.1 MITMproxy Download Page.html
108 B
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/1.2 Post Connection - Analysing Data Flows.pdf
190 KB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/10. [Bonus] - Hacking Windows 10 Using A Fake Update.mp4
11.6 MB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/10. [Bonus] - Hacking Windows 10 Using A Fake Update.srt
6.1 KB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/2. Using MITMproxy In Explicit Mode.mp4
11.4 MB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/2. Using MITMproxy In Explicit Mode.srt
8.4 KB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/3. Analysing (Filtering & Highlighting) Flows.mp4
11.8 MB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/3. Analysing (Filtering & Highlighting) Flows.srt
6.7 KB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/4. Intercepting Network Flows.mp4
9.9 MB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/4. Intercepting Network Flows.srt
6.2 KB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/5. Modifying Responses & Injecting Javascript Manually.mp4
23 MB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/5. Modifying Responses & Injecting Javascript Manually.srt
10.9 KB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/6. Intercepting & Modifying Responses In Transparent Mode.mp4
16.2 MB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/6. Intercepting & Modifying Responses In Transparent Mode.srt
9.9 KB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/7. Editing Responses & Injecting BeEF's Code On The Fly.mp4
23 MB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/7. Editing Responses & Injecting BeEF's Code On The Fly.srt
11.5 KB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/8. Editing Responses Automatically Based On Regex.mp4
20.4 MB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/8. Editing Responses Automatically Based On Regex.srt
10.8 KB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/9. [Bonus] - Stealing Login Info Using Fake Login Prompt.mp4
19.1 MB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/9. [Bonus] - Stealing Login Info Using Fake Login Prompt.srt
9.7 KB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/1. Introduction to MITM Scripts.mp4
13.7 MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/1. Introduction to MITM Scripts.srt
7.6 KB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/1.1 Post Connection - Writing Custom Scripts.pdf
211.3 KB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/1.2 MITMproxy Scripting Wiki Page.html
120 B
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/10. Executing Bash Commands & Calling Trojan Factory From Our Script.mp4
18.7 MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/10. Executing Bash Commands & Calling Trojan Factory From Our Script.srt
10.5 KB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/11. Using Variables & More Complex Conditions.mp4
17 MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/11. Using Variables & More Complex Conditions.srt
10.9 KB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/12. Converting Downloads To Trojans On The Fly.mp4
23.2 MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/12. Converting Downloads To Trojans On The Fly.srt
13.1 KB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/12.1 basic-v3.py
553 B
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/13. Configuring The Trojan Factory's MITMproxy Script.mp4
16.4 MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/13. Configuring The Trojan Factory's MITMproxy Script.srt
9.4 KB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/14. Using The Trojan Factory MITMproxy Script.mp4
18.8 MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/14. Using The Trojan Factory MITMproxy Script.srt
10.3 KB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/2. Capturing & Printing RequestsResponses.mp4
18.2 MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/2. Capturing & Printing RequestsResponses.srt
10.7 KB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/2.1 basic.py
131 B
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/3. Filtering Flows & Extracting Useful Data.mp4
27.4 MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/3. Filtering Flows & Extracting Useful Data.srt
12.1 KB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/4. Using Conditions To Execute Code On Useful Flows.mp4
26.8 MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/4. Using Conditions To Execute Code On Useful Flows.srt
11.9 KB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/5. Generating Custom HTTP Responses.mp4
19.3 MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/5. Generating Custom HTTP Responses.srt
10.6 KB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/6. Testing Script Locally.mp4
18.3 MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/6. Testing Script Locally.srt
10.3 KB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/6.1 basic-v2.py
285 B
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/7. Generating Trojans - Installing The Trojan Factory.mp4
15.9 MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/7. Generating Trojans - Installing The Trojan Factory.srt
8.3 KB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/7.1 Trojan Factory Git Repo.html
98 B
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/8. Generating Trojans - Converting Any File (egimage) To a Trojan.mp4
24.3 MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/8. Generating Trojans - Converting Any File (egimage) To a Trojan.srt
12.9 KB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/9. Testing Script On Remote Computer To Replace Downloads With a Generic Trojan.mp4
14.9 MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/9. Testing Script On Remote Computer To Replace Downloads With a Generic Trojan.srt
9.1 KB
12. Post-Connection Attacks - Doing All Of The Above On HTTPS Websites/1. Bypassing HTTPS With MITMproxy.mp4
16.3 MB
12. Post-Connection Attacks - Doing All Of The Above On HTTPS Websites/1. Bypassing HTTPS With MITMproxy.srt
8.2 KB
12. Post-Connection Attacks - Doing All Of The Above On HTTPS Websites/1.1 MITMProxy Complex Scripts.html
128 B
12. Post-Connection Attacks - Doing All Of The Above On HTTPS Websites/1.2 sslstrip.py
2.4 KB
12. Post-Connection Attacks - Doing All Of The Above On HTTPS Websites/2. Replacing HTTPS Downloads.mp4
12.7 MB
12. Post-Connection Attacks - Doing All Of The Above On HTTPS Websites/2. Replacing HTTPS Downloads.srt
6.4 KB
12. Post-Connection Attacks - Doing All Of The Above On HTTPS Websites/3. Injecting Data (Javascript, HTML elements ...etc) In HTTPS Websites.mp4
13.9 MB
12. Post-Connection Attacks - Doing All Of The Above On HTTPS Websites/3. Injecting Data (Javascript, HTML elements ...etc) In HTTPS Websites.srt
8 KB
12. Post-Connection Attacks - Doing All Of The Above On HTTPS Websites/4. Securing Systems From The Above Post Connection Attacks.mp4
20.5 MB
12. Post-Connection Attacks - Doing All Of The Above On HTTPS Websites/4. Securing Systems From The Above Post Connection Attacks.srt