Filename | Size |
| 1. Introduction & welcome/1. Introduction to the course.mp4 | 66 MB |
| 1. Introduction & welcome/1. Introduction to the course.srt | 6 KB |
| 10. MITM Attacks (Man In The Middle Attacks)/1. ARP Protocol basics.mp4 | 111.4 MB |
| 10. MITM Attacks (Man In The Middle Attacks)/1. ARP Protocol basics.srt | 13.2 KB |
| 10. MITM Attacks (Man In The Middle Attacks)/10. Cloning Any Webpage.mp4 | 91.8 MB |
| 10. MITM Attacks (Man In The Middle Attacks)/10. Cloning Any Webpage.srt | 11.5 KB |
| 10. MITM Attacks (Man In The Middle Attacks)/11. Man In The Middle Attack - Ettercap Basics.mp4 | 41.6 MB |
| 10. MITM Attacks (Man In The Middle Attacks)/11. Man In The Middle Attack - Ettercap Basics.srt | 9.5 KB |
| 10. MITM Attacks (Man In The Middle Attacks)/2. MITM Attacks Explained.mp4 | 27.6 MB |
| 10. MITM Attacks (Man In The Middle Attacks)/2. MITM Attacks Explained.srt | 9 KB |
| 10. MITM Attacks (Man In The Middle Attacks)/3. Installing MITMf.mp4 | 99.7 MB |
| 10. MITM Attacks (Man In The Middle Attacks)/3. Installing MITMf.srt | 9 KB |
| 10. MITM Attacks (Man In The Middle Attacks)/4. Manual Arp Spofing.mp4 | 130.6 MB |
| 10. MITM Attacks (Man In The Middle Attacks)/4. Manual Arp Spofing.srt | 17.7 KB |
| 10. MITM Attacks (Man In The Middle Attacks)/5. Problems While Installing MITMf.mp4 | 79.7 MB |
| 10. MITM Attacks (Man In The Middle Attacks)/5. Problems While Installing MITMf.srt | 8.9 KB |
| 10. MITM Attacks (Man In The Middle Attacks)/6. HTTP Traffic Sniffing.mp4 | 117.1 MB |
| 10. MITM Attacks (Man In The Middle Attacks)/6. HTTP Traffic Sniffing.srt | 11.5 KB |
| 10. MITM Attacks (Man In The Middle Attacks)/7. DNS Spoofing and HTTPS Password Sniffing.mp4 | 327 MB |
| 10. MITM Attacks (Man In The Middle Attacks)/7. DNS Spoofing and HTTPS Password Sniffing.srt | 29.7 KB |
| 10. MITM Attacks (Man In The Middle Attacks)/8. Hooking Browsers With BEEF.mp4 | 183.1 MB |
| 10. MITM Attacks (Man In The Middle Attacks)/8. Hooking Browsers With BEEF.srt | 20.2 KB |
| 10. MITM Attacks (Man In The Middle Attacks)/9. Taking a screenshot of the target's browser.mp4 | 149.6 MB |
| 10. MITM Attacks (Man In The Middle Attacks)/9. Taking a screenshot of the target's browser.srt | 14.3 KB |
| 11. Python Basics/1. Variables.mp4 | 75 MB |
| 11. Python Basics/1. Variables.srt | 17.4 KB |
| 11. Python Basics/10. Files in Python.mp4 | 49.8 MB |
| 11. Python Basics/10. Files in Python.srt | 15.7 KB |
| 11. Python Basics/11. Try and Except rule.mp4 | 28.5 MB |
| 11. Python Basics/11. Try and Except rule.srt | 6 KB |
| 11. Python Basics/2. Raw Input.mp4 | 38 MB |
| 11. Python Basics/2. Raw Input.srt | 14 KB |
| 11. Python Basics/3. If Else Statement.mp4 | 37.7 MB |
| 11. Python Basics/3. If Else Statement.srt | 12.3 KB |
| 11. Python Basics/4. For Loop.mp4 | 23.6 MB |
| 11. Python Basics/4. For Loop.srt | 8.2 KB |
| 11. Python Basics/5. While Loop.mp4 | 30.4 MB |
| 11. Python Basics/5. While Loop.srt | 10.1 KB |
| 11. Python Basics/6. Python Lists.mp4 | 29 MB |
| 11. Python Basics/6. Python Lists.srt | 10.6 KB |
| 11. Python Basics/7. Functions.mp4 | 62.6 MB |
| 11. Python Basics/7. Functions.srt | 18.7 KB |
| 11. Python Basics/8. Classes.mp4 | 41 MB |
| 11. Python Basics/8. Classes.srt | 13.4 KB |
| 11. Python Basics/9. Importing Libraries.mp4 | 33.9 MB |
| 11. Python Basics/9. Importing Libraries.srt | 8.9 KB |
| 12. Developing An Advanced Backdoor/1. The Theory Behind Reverse Shell.mp4 | 27.8 MB |
| 12. Developing An Advanced Backdoor/1. The Theory Behind Reverse Shell.srt | 8.7 KB |
| 12. Developing An Advanced Backdoor/10. Trying to Connect Every 20 seconds.mp4 | 97.9 MB |
| 12. Developing An Advanced Backdoor/10. Trying to Connect Every 20 seconds.srt | 15.9 KB |
| 12. Developing An Advanced Backdoor/11. Creating Persistence Part 1.mp4 | 57.3 MB |
| 12. Developing An Advanced Backdoor/11. Creating Persistence Part 1.srt | 8.2 KB |
| 12. Developing An Advanced Backdoor/12. Creating Persistence Part 2.mp4 | 127 MB |
| 12. Developing An Advanced Backdoor/12. Creating Persistence Part 2.srt | 21.1 KB |
| 12. Developing An Advanced Backdoor/13. Changing Directory.mp4 | 84.2 MB |
| 12. Developing An Advanced Backdoor/13. Changing Directory.srt | 14.7 KB |
| 12. Developing An Advanced Backdoor/14. Uploading & Downloading Files.mp4 | 216.4 MB |
| 12. Developing An Advanced Backdoor/14. Uploading & Downloading Files.srt | 27.5 KB |
| 12. Developing An Advanced Backdoor/15. Downloading Files From Internet.mp4 | 160.5 MB |
| 12. Developing An Advanced Backdoor/15. Downloading Files From Internet.srt | 28 KB |
| 12. Developing An Advanced Backdoor/16. Starting Programs From Our Backdoor.mp4 | 47.9 MB |
| 12. Developing An Advanced Backdoor/16. Starting Programs From Our Backdoor.srt | 8.7 KB |
| 12. Developing An Advanced Backdoor/17. Capturing Screenshot On Target PC.mp4 | 150.9 MB |
| 12. Developing An Advanced Backdoor/17. Capturing Screenshot On Target PC.srt | 21.6 KB |
| 12. Developing An Advanced Backdoor/18. Embedding Backdoor In Image Part 1.mp4 | 95.6 MB |
| 12. Developing An Advanced Backdoor/18. Embedding Backdoor In Image Part 1.srt | 16 KB |
| 12. Developing An Advanced Backdoor/19. Embedding Backdoor In Image Part 2.mp4 | 90.8 MB |
| 12. Developing An Advanced Backdoor/19. Embedding Backdoor In Image Part 2.srt | 10.9 KB |
| 12. Developing An Advanced Backdoor/2. Simple Server Code.mp4 | 59.3 MB |
| 12. Developing An Advanced Backdoor/2. Simple Server Code.srt | 15.8 KB |
| 12. Developing An Advanced Backdoor/20. Checking For Administrator Privileges.mp4 | 67.7 MB |
| 12. Developing An Advanced Backdoor/20. Checking For Administrator Privileges.srt | 14.9 KB |
| 12. Developing An Advanced Backdoor/21. Adding Help Option.mp4 | 61 MB |
| 12. Developing An Advanced Backdoor/21. Adding Help Option.srt | 9.5 KB |
| 12. Developing An Advanced Backdoor/3. Connection With Reverse Shell.mp4 | 45.7 MB |
| 12. Developing An Advanced Backdoor/3. Connection With Reverse Shell.srt | 9 KB |
| 12. Developing An Advanced Backdoor/4. Sending and Receiving Messages.mp4 | 67.8 MB |
| 12. Developing An Advanced Backdoor/4. Sending and Receiving Messages.srt | 14 KB |
| 12. Developing An Advanced Backdoor/5. Sending Messages Using The While Loop.mp4 | 55.1 MB |
| 12. Developing An Advanced Backdoor/5. Sending Messages Using The While Loop.srt | 10.8 KB |
| 12. Developing An Advanced Backdoor/6. Executing Commands On The Target System.mp4 | 65.4 MB |
| 12. Developing An Advanced Backdoor/6. Executing Commands On The Target System.srt | 11.4 KB |
| 12. Developing An Advanced Backdoor/7. Fixing Backdoor Bugs & Adding Functions.mp4 | 147.1 MB |
| 12. Developing An Advanced Backdoor/7. Fixing Backdoor Bugs & Adding Functions.srt | 25.9 KB |
| 12. Developing An Advanced Backdoor/8. Installing Pyinstaller.mp4 | 18.6 MB |
| 12. Developing An Advanced Backdoor/8. Installing Pyinstaller.srt | 3.3 MB |
| 12. Developing An Advanced Backdoor/9. First Performance Test of Our Backdoor.mp4 | 131.4 MB |
| 12. Developing An Advanced Backdoor/9. First Performance Test of Our Backdoor.srt | 24.9 KB |
| 13. Developing A Keylogger/1. Importing Pynput.mp4 | 45.9 MB |
| 13. Developing A Keylogger/1. Importing Pynput.srt | 13.4 KB |
| 13. Developing A Keylogger/2. Simple Keylogger.mp4 | 50.6 MB |
| 13. Developing A Keylogger/2. Simple Keylogger.srt | 11.9 KB |
| 13. Developing A Keylogger/3. Adding Report Function.mp4 | 55.9 MB |
| 13. Developing A Keylogger/3. Adding Report Function.srt | 13.2 KB |
| 13. Developing A Keylogger/4. Writing Keystrokes To a File.mp4 | 75.2 MB |
| 13. Developing A Keylogger/4. Writing Keystrokes To a File.srt | 16.3 KB |
| 13. Developing A Keylogger/5. Adding Keylogger To Our Reverse Shell Part 1.mp4 | 161.7 MB |
| 13. Developing A Keylogger/5. Adding Keylogger To Our Reverse Shell Part 1.srt | 25.6 KB |
| 13. Developing A Keylogger/6. Adding Keylogger To Our Reverse Shell Part 2.mp4 | 45.9 MB |