Filename Size 1. Chapter 1/1. Teaser - Hacking An Android Phone & Accessing The Camera.mp4 11.9 MB 1. Chapter 1/1. Teaser - Hacking An Android Phone & Accessing The Camera.srt 8.5 KB 1. Chapter 1/2. Introduction to Social Engineering.mp4 7.5 MB 1. Chapter 1/2. Introduction to Social Engineering.srt 4.7 KB 1. Chapter 1/2.1 What is Social Engineering _.pdf 98.7 KB 1. Chapter 1/3. Course Overview.mp4 10.6 MB 1. Chapter 1/3. Course Overview.srt 6.3 KB 1. Chapter 1/3.1 00 - Intro & Perperation.pdf 364.2 KB 10. Windows Malware - Enhancing Malware/1. Bypassing All Anti-Virus Programs By Modifying Hex Vales.mp4 22.3 MB 10. Windows Malware - Enhancing Malware/1. Bypassing All Anti-Virus Programs By Modifying Hex Vales.srt 13.7 KB 10. Windows Malware - Enhancing Malware/2. Creating The Perfect Spying Tool.mp4 14.5 MB 10. Windows Malware - Enhancing Malware/2. Creating The Perfect Spying Tool.srt 9.5 KB 11. Windows Malware - Creating Trojans/1. Download & Execute Payload.mp4 14.9 MB 11. Windows Malware - Creating Trojans/1. Download & Execute Payload.srt 8.9 KB 11. Windows Malware - Creating Trojans/1.1 download-and-execute.txt 185 B 11. Windows Malware - Creating Trojans/2. Embedding Evil Files With Any File Type Like An Image Or PDF.mp4 21.1 MB 11. Windows Malware - Creating Trojans/2. Embedding Evil Files With Any File Type Like An Image Or PDF.srt 14.4 KB 11. Windows Malware - Creating Trojans/3. Running Evil Files Silently In The Background.mp4 22.6 MB 11. Windows Malware - Creating Trojans/3. Running Evil Files Silently In The Background.srt 11.4 KB 11. Windows Malware - Creating Trojans/3.1 Bat To EXE Download Link.html 130 B 11. Windows Malware - Creating Trojans/4. Changing Trojan's Icon.mp4 16.8 MB 11. Windows Malware - Creating Trojans/4. Changing Trojan's Icon.srt 10.8 KB 11. Windows Malware - Creating Trojans/4.1 PNG To ICO Converter..html 92 B 11. Windows Malware - Creating Trojans/4.2 Icons Website - iconarchive.com.html 88 B 11. Windows Malware - Creating Trojans/5. Spoofing File Extension from .exe to anything else (pdf, png ..etc).mp4 23.7 MB 11. Windows Malware - Creating Trojans/5. Spoofing File Extension from .exe to anything else (pdf, png ..etc).srt 15.6 KB 11. Windows Malware - Creating Trojans/6. Download & Execute Payload (Method 2).mp4 18.9 MB 11. Windows Malware - Creating Trojans/6. Download & Execute Payload (Method 2).srt 9 KB 11. Windows Malware - Creating Trojans/6.1 autoit-download-and-execute.txt 492 B 11. Windows Malware - Creating Trojans/7. Embedding Evil Files With Any File Type Like An Image Or PDF (Method 2).mp4 18.3 MB 11. Windows Malware - Creating Trojans/7. Embedding Evil Files With Any File Type Like An Image Or PDF (Method 2).srt 9.3 KB 11. Windows Malware - Creating Trojans/8. Embedding a Backdoor In a Legitimate Microsoft Office Document.mp4 18.8 MB 11. Windows Malware - Creating Trojans/8. Embedding a Backdoor In a Legitimate Microsoft Office Document.srt 10.6 KB 11. Windows Malware - Creating Trojans/9. Embedding Any Evil File In A Legitimate Microsoft Office Document.mp4 21 MB 11. Windows Malware - Creating Trojans/9. Embedding Any Evil File In A Legitimate Microsoft Office Document.srt 13.3 KB 11. Windows Malware - Creating Trojans/9.1 download-and-execute-macro.txt 463 B 12. Mac OS X Malware/1. Introduction.mp4 8.1 MB 12. Mac OS X Malware/1. Introduction.srt 4.1 KB 12. Mac OS X Malware/1.1 04 - Generating Evil Files For Mac OS X.pdf 141.5 KB 12. Mac OS X Malware/2. Hacking Mac OS X Using A Meterpreter Backdoor.mp4 34.6 MB 12. Mac OS X Malware/2. Hacking Mac OS X Using A Meterpreter Backdoor.srt 14.7 KB 12. Mac OS X Malware/3. Hacking Mac OS X Using An Empire Stager.mp4 14.3 MB 12. Mac OS X Malware/3. Hacking Mac OS X Using An Empire Stager.srt 9.2 KB 12. Mac OS X Malware/4. Converting Basic Backdoor To An Executable.mp4 8.4 MB 12. Mac OS X Malware/4. Converting Basic Backdoor To An Executable.srt 4.5 KB 12. Mac OS X Malware/5. Embedding A Normal File With Backdoor.mp4 26.7 MB 12. Mac OS X Malware/5. Embedding A Normal File With Backdoor.srt 12.9 KB 12. Mac OS X Malware/6. Generating a Basic Trojan For Max OS X.mp4 20.2 MB 12. Mac OS X Malware/6. Generating a Basic Trojan For Max OS X.srt 9.6 KB 12. Mac OS X Malware/7. Changing Trojan's Icon.mp4 20.2 MB 12. Mac OS X Malware/7. Changing Trojan's Icon.srt 8.6 KB 12. Mac OS X Malware/8. Configuring The Trojan To Run Silently.mp4 17.1 MB 12. Mac OS X Malware/8. Configuring The Trojan To Run Silently.srt 7.8 KB 12. Mac OS X Malware/9. Embedding Backdoor In A Legitimate Microsoft Office Document.mp4 13.9 MB 12. Mac OS X Malware/9. Embedding Backdoor In A Legitimate Microsoft Office Document.srt 7.7 KB 13. Linux Malware/1. Hacking Into Linux-Like Systems Using One Command.mp4 16.7 MB 13. Linux Malware/1. Hacking Into Linux-Like Systems Using One Command.srt 12.2 KB 13. Linux Malware/1.1 05 - Generating Evil Files For Linux.pdf 246.7 KB 13. Linux Malware/2. More Advanced Linux Backdoor.mp4 10.2 MB 13. Linux Malware/2. More Advanced Linux Backdoor.srt 8.9 KB 13. Linux Malware/3. Using A Remote Keylogger To Capture Key Strikes Including Passwords.mp4 100.1 MB 13. Linux Malware/3. Using A Remote Keylogger To Capture Key Strikes Including Passwords.srt 12 KB 13. Linux Malware/3.1 ZLogger Git Repo.html 92 B 13. Linux Malware/4. Recovering Saved Passwords From A Local Machine.mp4 15.6 MB 13. Linux Malware/4. Recovering Saved Passwords From A Local Machine.srt 9.3 KB 13. Linux Malware/4.1 LaZagne Git Repo.html 99 B 13. Linux Malware/5. Execute & Report Payload.mp4 11.7 MB 13. Linux Malware/5. Execute & Report Payload.srt 9.6 KB 13. Linux Malware/5.1 ZReporter Git Repo.html 94 B 13. Linux Malware/6. Recovering Saved Passwords From A Remote Machine.mp4 12.8 MB 13. Linux Malware/6. Recovering Saved Passwords From A Remote Machine.srt 8.6 KB 13. Linux Malware/7. Embedding Evil Code In A Legitimate Linux Package - Part 1.mp4 19.2 MB 13. Linux Malware/7. Embedding Evil Code In A Legitimate Linux Package - Part 1.srt 18.9 KB 13. Linux Malware/7.1 Ubuntu Packages Download Page.html 88 B 13. Linux Malware/8. Embedding Evil Code In A Legitimate Linux Package - Part 2.mp4 9.8 MB 13. Linux Malware/8. Embedding Evil Code In A Legitimate Linux Package - Part 2.srt 6.7 KB 13. Linux Malware/9. Backdooring a Legitimate Android App.mp4 108.8 MB 13. Linux Malware/9. Backdooring a Legitimate Android App.srt 15.1 KB 14. Delivery Methods/1. Introduction.mp4 6.2 MB 14. Delivery Methods/1. Introduction.srt 2.7 KB 14. Delivery Methods/1.1 06 - Delivery Methods.pdf 127 KB 14. Delivery Methods/10. Luring Targets Into Accessing Evil URL Without Direct Interaction.mp4 20.9 MB 14. Delivery Methods/10. Luring Targets Into Accessing Evil URL Without Direct Interaction.srt 14 KB 14. Delivery Methods/11. Basic BeEF Commands.mp4 7.8 MB 14. Delivery Methods/11. Basic BeEF Commands.srt 6.2 KB 14. Delivery Methods/12. Stealing CredentialsPasswords Using A Fake Login Prompt.mp4 4.2 MB 14. Delivery Methods/12. Stealing CredentialsPasswords Using A Fake Login Prompt.srt 3.3 KB 14. Delivery Methods/13. Hacking Windows 10 Using A Fake Update.mp4 8.9 MB 14. Delivery Methods/13. Hacking Windows 10 Using A Fake Update.srt 6.4 KB 14. Delivery Methods/14. Hacking Mac OS X Using A Fake Update.mp4 8.3 MB 14. Delivery Methods/14. Hacking Mac OS X Using A Fake Update.srt 6.1 KB 14. Delivery Methods/15. Hacking Linux Using A Fake Update.mp4 8.9 MB 14. Delivery Methods/15. Hacking Linux Using A Fake Update.srt 6 KB 14. Delivery Methods/2. Mail Deliver - Setting up an SMTP Server.mp4 71.1 MB 14. Delivery Methods/2. Mail Deliver - Setting up an SMTP Server.srt 8.5 KB 14. Delivery Methods/3. Mail Delivery - Spoofing Emails.mp4 92.6 MB 14. Delivery Methods/3. Mail Delivery - Spoofing Emails.srt 14.8 KB 14. Delivery Methods/4. Mail Delivery - Spoofing Emails (method 2).mp4 53.7 MB 14. Delivery Methods/4. Mail Delivery - Spoofing Emails (method 2).srt 11.2 KB