23 OCT 2025 - We are back! If you have been following us over the last few years, you will know that the last 2 months have been rough. We website was practically not loading. Sorry for the mess. We are back though and everything should run smoothly now. New servers. Updated domains. And new owners. We invite you all to start uploading torrents again!
TORRENT DETAILS
Learn Social Engineering From Scratch
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
Note: The contents of this course are not covered in any of my other courses except for some basics. Although social engineering is covered in one of my other courses, that course only covers the basics where this course dives much deeper in this topic covering more techniques, more operating systems, advanced exploitation, advanced post exploitation, bypassing security and more!
Welcome to this comprehensive course on Social Engineering! In this course, you will start as a beginner with no previous knowledge in hacking, and by the end of it you’ll be at a high level in social engineering being able hack into all major operating systems (windows, OS X, Linux and Android) like black-hat hackers and secure yourself from hackers.
This course is focused on the practical side of social engineering without neglecting the theory, first you’ll learn how to install the needed software (on Windows, Linux and Mac OS X), then the course is divided into a number of sections to represent the steps you’d take to successfully hack a target using social engineering.
1. Information Gathering – First before doing anything you need to know your target, in this section you’ll learn how to gather information about your target whether it is a company, website or just a person. You will learn how to discover anything that is associated with your target such as websites, links, companies, users, emails, phone numbers, friends, social networks accounts …etc, you will also learn how to graph all of this information and use it to build a smart attack strategy.
2. Generating Malware – Now that you gathered enough information about your target and came up with an attack strategy, the next step is create custom malware that is attractive to the target. In this section you will learn how to generate evil files (files that execute tasks you want on the target computer), this includes backdoors, keyloggers, credential harvester and more, these files will work on all operating systems (Windows, OS X, Linux and Android), you’ll also learn how to enhance these files to make them bypass all anti-virus programs, and make them look and function just like any other file such as an image or a pdf, or even embed them in legitimate Microsoft Office documents.
3. Delivery Methods – Now that you have your custom-made trojan ready, in this section you will learn a number of social engineering techniques to deliver it to the target, you will learn how to create fake websites that look identical to websites the target trusts, send emails that appear like they’re coming from people the target trusts and use fake login pages and fake updates to hack into the target, you’ll also learn advanced social engineering techniques to lure the target into visiting an evil URL and hack into their system without even interacting with them.
4. Post Exploitation – In this section you will learn how to interact with the systems you compromised whether they use Windows, Linux, OS X or even Android. You’ll learn how to access the file system (read/write/upload/execute), maintain your access, escalate your privileges, spy on the target, use the target computer as a pivot to hack other computers and more! If your target uses Android then you’ll also learn how to read their messages, find their location, access their other accounts (such as Whatsapp, Facebook …etc) and more!
Finally at the end of the course you will learn how to protect yourself and your systems from these attacks.
All the attacks in this course are practical attacks that work against real computers, in each technique you will understand the theory behind it and how it works, then you’ll learn how to use that technique in a real life scenario, so by the end of the course you’ll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.
With this course you’ll get 24/7 support, so if you have any questions you can post them in the Q&A section and we’ll respond to you within 15 hours.
Notes:
This course is created for educational purposes only and all the attacks are launched in my own lab or against devices that I have permission to test.
This course is totally a product of Zaid Sabih & zSecurity, no other organization is associated with it or a certification exam. Although, you will receive a Course Completion Certification from Udemy, apart from that NO OTHER ORGANIZATION IS INVOLVED.
Who this course is for:
People who want to learn ethical hacking / social engineering
People who want to learn how hackers hack into secure systems that do not have any vulnerabilities
Anybody who wants to learn how to secure their systems from social engineering attacks
Requirements
Basic IT Skills
No Linux, programming or hacking knowledge required.
Computer with a minimum of 4GB ram/memory
Operating System: Windows / OS X / Linux
Last Updated 1/2023
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
.pad/0
1 B
.pad/1
18 B
.pad/2
5 B
.pad/3
4 B
TutsNode.net.txt
59 B
[TutsNode.net] - Learn Social Engineering From Scratch/1 - Preparation Creating a Penetration Testing Lab/4 - 01-The-Lab.pdf
461 KB
[TutsNode.net] - Learn Social Engineering From Scratch/1 - Preparation Creating a Penetration Testing Lab/5 - Initial Preparation.mp4
154.4 MB
[TutsNode.net] - Learn Social Engineering From Scratch/1 - Preparation Creating a Penetration Testing Lab/5 - Kali 2022 Download Page.txt
43 B
[TutsNode.net] - Learn Social Engineering From Scratch/1 - Preparation Creating a Penetration Testing Lab/6 - 7zip Download page.txt
22 B
[TutsNode.net] - Learn Social Engineering From Scratch/1 - Preparation Creating a Penetration Testing Lab/6 - VMware Player Download Page.txt
85 B
[TutsNode.net] - Learn Social Engineering From Scratch/1 - Preparation Creating a Penetration Testing Lab/7 - VMware for M1 Apple Computers.txt
82 B
[TutsNode.net] - Learn Social Engineering From Scratch/1 - Preparation Creating a Penetration Testing Lab/7 - VMware Player Download Page.txt
43 B
[TutsNode.net] - Learn Social Engineering From Scratch/1 - Preparation Creating a Penetration Testing Lab/8 - Installing Kali Linux as a VM on Linux French.srt
16.3 KB
[TutsNode.net] - Learn Social Engineering From Scratch/1 - Preparation Creating a Penetration Testing Lab/8 - Installing Kali Linux as a VM on Linux Italian.srt
14.9 KB
[TutsNode.net] - Learn Social Engineering From Scratch/1 - Preparation Creating a Penetration Testing Lab/8 - Installing Kali Linux as a VM on Linux Portuguese.srt
14.9 KB
[TutsNode.net] - Learn Social Engineering From Scratch/1 - Preparation Creating a Penetration Testing Lab/8 - Installing Kali Linux as a VM on Linux Spanish.srt
15.3 KB
[TutsNode.net] - Learn Social Engineering From Scratch/1 - Preparation Creating a Penetration Testing Lab/8 - VMware Player Download Page.txt
85 B
[TutsNode.net] - Learn Social Engineering From Scratch/10 - Windows Malware Creating Trojans/42 - Embedding Evil Files With Any File Type Like An Image Or PDF French.srt
15.8 KB
[TutsNode.net] - Learn Social Engineering From Scratch/10 - Windows Malware Creating Trojans/45 - Spoofing File Extension from exe to anything else pdf png etc English.srt
15 KB
[TutsNode.net] - Learn Social Engineering From Scratch/10 - Windows Malware Creating Trojans/45 - Spoofing File Extension from exe to anything else pdf png etc French.srt
16.2 KB
[TutsNode.net] - Learn Social Engineering From Scratch/10 - Windows Malware Creating Trojans/45 - Spoofing File Extension from exe to anything else pdf png etc Italian.srt
15.1 KB
[TutsNode.net] - Learn Social Engineering From Scratch/10 - Windows Malware Creating Trojans/45 - Spoofing File Extension from exe to anything else pdf png etc Portuguese.srt
15.1 KB
[TutsNode.net] - Learn Social Engineering From Scratch/10 - Windows Malware Creating Trojans/45 - Spoofing File Extension from exe to anything else pdf png etc Spanish.srt
15.3 KB
[TutsNode.net] - Learn Social Engineering From Scratch/11 - Mac OS X Malware/50 - 04-Generating-Evil-Files-For-Mac-OS-X.pdf
141.5 KB
[TutsNode.net] - Learn Social Engineering From Scratch/11 - Mac OS X Malware/50 - Introduction Portuguese.srt
4.3 KB
[TutsNode.net] - Learn Social Engineering From Scratch/11 - Mac OS X Malware/51 - Hacking Mac OS X Using A Meterpreter Backdoor French.srt
16.6 KB
[TutsNode.net] - Learn Social Engineering From Scratch/11 - Mac OS X Malware/51 - Hacking Mac OS X Using A Meterpreter Backdoor Italian.srt
14.9 KB
[TutsNode.net] - Learn Social Engineering From Scratch/11 - Mac OS X Malware/51 - Hacking Mac OS X Using A Meterpreter Backdoor Portuguese.srt
15.2 KB
[TutsNode.net] - Learn Social Engineering From Scratch/11 - Mac OS X Malware/51 - Hacking Mac OS X Using A Meterpreter Backdoor Spanish.srt
15.3 KB
[TutsNode.net] - Learn Social Engineering From Scratch/11 - Mac OS X Malware/51 - Hacking Mac OS X Using A Meterpreter Backdoor.mp4
208.7 MB
[TutsNode.net] - Learn Social Engineering From Scratch/12 - Linux Malware/60 - 05-Generating-Evil-Files-For-Linux.pdf
246.7 KB
[TutsNode.net] - Learn Social Engineering From Scratch/12 - Linux Malware/66 - Embedding Evil Code In A Legitimate Linux Package Part 1 English.srt
18.7 KB
[TutsNode.net] - Learn Social Engineering From Scratch/12 - Linux Malware/66 - Embedding Evil Code In A Legitimate Linux Package Part 1 French.srt
20.8 KB
[TutsNode.net] - Learn Social Engineering From Scratch/12 - Linux Malware/66 - Embedding Evil Code In A Legitimate Linux Package Part 1 Italian.srt
18.9 KB
[TutsNode.net] - Learn Social Engineering From Scratch/12 - Linux Malware/66 - Embedding Evil Code In A Legitimate Linux Package Part 1 Portuguese.srt
19.1 KB
[TutsNode.net] - Learn Social Engineering From Scratch/12 - Linux Malware/66 - Embedding Evil Code In A Legitimate Linux Package Part 1 Spanish.srt
19 KB
[TutsNode.net] - Learn Social Engineering From Scratch/12 - Linux Malware/68 - Backdooring a Legitimate Android App English.srt
14.9 KB
[TutsNode.net] - Learn Social Engineering From Scratch/12 - Linux Malware/68 - Backdooring a Legitimate Android App French.srt
17.1 KB
[TutsNode.net] - Learn Social Engineering From Scratch/12 - Linux Malware/68 - Backdooring a Legitimate Android App Italian.srt
15.5 KB
[TutsNode.net] - Learn Social Engineering From Scratch/12 - Linux Malware/68 - Backdooring a Legitimate Android App Portuguese.srt
15.5 KB
[TutsNode.net] - Learn Social Engineering From Scratch/12 - Linux Malware/68 - Backdooring a Legitimate Android App Spanish.srt
15.8 KB
[TutsNode.net] - Learn Social Engineering From Scratch/13 - Delivery Methods/69 - 06-Delivery-Methods.pdf
127 KB
[TutsNode.net] - Learn Social Engineering From Scratch/13 - Delivery Methods/70 - Mail Deliver Setting up an SMTP Server Portuguese.srt
9 KB
[TutsNode.net] - Learn Social Engineering From Scratch/13 - Delivery Methods/71 - Mail Delivery Spoofing Emails English.srt
15.7 KB
[TutsNode.net] - Learn Social Engineering From Scratch/13 - Delivery Methods/71 - Mail Delivery Spoofing Emails French.srt
17.2 KB
[TutsNode.net] - Learn Social Engineering From Scratch/13 - Delivery Methods/71 - Mail Delivery Spoofing Emails Italian.srt
16.1 KB
[TutsNode.net] - Learn Social Engineering From Scratch/13 - Delivery Methods/71 - Mail Delivery Spoofing Emails Portuguese.srt
15.7 KB
[TutsNode.net] - Learn Social Engineering From Scratch/13 - Delivery Methods/71 - Mail Delivery Spoofing Emails Spanish.srt
16.7 KB
[TutsNode.net] - Learn Social Engineering From Scratch/13 - Delivery Methods/72 - Mail Delivery Spoofing Emails method 2 English.srt
16 KB
[TutsNode.net] - Learn Social Engineering From Scratch/13 - Delivery Methods/72 - Mail Delivery Spoofing Emails method 2 French.srt
18 KB
[TutsNode.net] - Learn Social Engineering From Scratch/13 - Delivery Methods/72 - Mail Delivery Spoofing Emails method 2 Italian.srt
16.5 KB
[TutsNode.net] - Learn Social Engineering From Scratch/13 - Delivery Methods/72 - Mail Delivery Spoofing Emails method 2 Portuguese.srt
16.5 KB
[TutsNode.net] - Learn Social Engineering From Scratch/13 - Delivery Methods/72 - Mail Delivery Spoofing Emails method 2 Spanish.srt
17.2 KB
[TutsNode.net] - Learn Social Engineering From Scratch/13 - Delivery Methods/73 - Hacking OS X & Linux Using Pure Social Engineering Without Sending Any Files French.srt
15.7 KB
[TutsNode.net] - Learn Social Engineering From Scratch/13 - Delivery Methods/73 - Hacking OS X & Linux Using Pure Social Engineering Without Sending Any Files.mp4
165.9 MB
[TutsNode.net] - Learn Social Engineering From Scratch/13 - Delivery Methods/75 - Stealing Login Info Using Fake A Login Page English.srt
15.4 KB
[TutsNode.net] - Learn Social Engineering From Scratch/13 - Delivery Methods/75 - Stealing Login Info Using Fake A Login Page French.srt
17 KB
[TutsNode.net] - Learn Social Engineering From Scratch/13 - Delivery Methods/75 - Stealing Login Info Using Fake A Login Page Italian.srt
15.9 KB
[TutsNode.net] - Learn Social Engineering From Scratch/13 - Delivery Methods/75 - Stealing Login Info Using Fake A Login Page Portuguese.srt
15.6 KB
[TutsNode.net] - Learn Social Engineering From Scratch/13 - Delivery Methods/75 - Stealing Login Info Using Fake A Login Page Spanish.srt
16.2 KB
[TutsNode.net] - Learn Social Engineering From Scratch/13 - Delivery Methods/78 - URL Manipulation French.srt
15.4 KB
[TutsNode.net] - Learn Social Engineering From Scratch/13 - Delivery Methods/79 - Luring Targets Into Accessing Evil URL Without Direct Interaction French.srt
14.8 KB
[TutsNode.net] - Learn Social Engineering From Scratch/13 - Delivery Methods/82 - Hacking Windows 10 Using A Fake Update Spanish.srt
6.5 KB
[TutsNode.net] - Learn Social Engineering From Scratch/15 - Post Exploitation/89 - Introduction Italian.srt
3.4 KB
[TutsNode.net] - Learn Social Engineering From Scratch/16 - Post Exploitation Meterpreter/99 - Maintaining Access On OS X French.srt
15.3 KB
[TutsNode.net] - Learn Social Engineering From Scratch/18 - Security/106 - Security.pdf
100 KB
[TutsNode.net] - Learn Social Engineering From Scratch/2 - Preparation Linux Basics/10 - ExplainShell.txt
25 B
[TutsNode.net] - Learn Social Engineering From Scratch/2 - Preparation Linux Basics/10 - Linux Commands List.txt
61 B
[TutsNode.net] - Learn Social Engineering From Scratch/2 - Preparation Linux Basics/10 - The Linux Terminal & Basic Linux Commands English.srt
17.2 KB
[TutsNode.net] - Learn Social Engineering From Scratch/2 - Preparation Linux Basics/10 - The Linux Terminal & Basic Linux Commands French.srt
19.4 KB
[TutsNode.net] - Learn Social Engineering From Scratch/2 - Preparation Linux Basics/10 - The Linux Terminal & Basic Linux Commands Italian.srt
17.8 KB
[TutsNode.net] - Learn Social Engineering From Scratch/2 - Preparation Linux Basics/10 - The Linux Terminal & Basic Linux Commands Portuguese.srt
18.1 KB
[TutsNode.net] - Learn Social Engineering From Scratch/2 - Preparation Linux Basics/10 - The Linux Terminal & Basic Linux Commands Spanish.srt
18 KB
[TutsNode.net] - Learn Social Engineering From Scratch/2 - Preparation Linux Basics/10 - The Linux Terminal & Basic Linux Commands.mp4
273.3 MB
[TutsNode.net] - Learn Social Engineering From Scratch/3 - Information Gathering/11 - 02-Information-Gathering.pdf
88 KB
[TutsNode.net] - Learn Social Engineering From Scratch/3 - Information Gathering/11 - Introduction English.srt
2.7 KB
[TutsNode.net] - Learn Social Engineering From Scratch/3 - Information Gathering/11 - Introduction French.srt
3 KB
[TutsNode.net] - Learn Social Engineering From Scratch/3 - Information Gathering/11 - Introduction Italian.srt
2.7 KB
[TutsNode.net] - Learn Social Engineering From Scratch/3 - Information Gathering/11 - Introduction Portuguese.srt
2.7 KB
[TutsNode.net] - Learn Social Engineering From Scratch/3 - Information Gathering/11 - Introduction Spanish.srt
2.8 KB
[TutsNode.net] - Learn Social Engineering From Scratch/4 - Information Gathering Gathering Info About A CompanyWebsite/12 - How to fix Maltego if its not starting.txt
28 B
[TutsNode.net] - Learn Social Engineering From Scratch/4 - Information Gathering Gathering Info About A CompanyWebsite/12 - Request a trial using this link.txt
37 B
[TutsNode.net] - Learn Social Engineering From Scratch/5 - Information Gathering Gathering Info About A Person/17 - Discovering Websites Links & Social Networking Accounts French.srt
15.3 KB
[TutsNode.net] - Learn Social Engineering From Scratch/6 - Windows Malware/21 - 03-Generating-Evil-Files-For-Windows.pdf
692.1 KB
[TutsNode.net] - Learn Social Engineering From Scratch/7 - Windows Malware Generating Undetectable Backdoors/23 - Veil 30 Git Repo.txt
38 B
[TutsNode.net] - Learn Social Engineering From Scratch/7 - Windows Malware Generating Undetectable Backdoors/25 - Generating Undetectable Backdoors For Windows French.srt
15.1 KB
[TutsNode.net] - Learn Social Engineering From Scratch/7 - Windows Malware Generating Undetectable Backdoors/29 - Generating An Undetectable Backdoor For Windows Method 2 French.srt
16.2 KB
[TutsNode.net] - Learn Social Engineering From Scratch/7 - Windows Malware Generating Undetectable Backdoors/29 - Generating An Undetectable Backdoor For Windows Method 2 Spanish.srt
14.9 KB
[TutsNode.net] - Learn Social Engineering From Scratch/7 - Windows Malware Generating Undetectable Backdoors/29 - Generating An Undetectable Backdoor For Windows Method 2.mp4
355.9 MB
[TutsNode.net] - Learn Social Engineering From Scratch/8 - Windows Malware Spying/38 - Recovering Saved Passwords From A Remote Machine English.srt
16.2 KB
[TutsNode.net] - Learn Social Engineering From Scratch/8 - Windows Malware Spying/38 - Recovering Saved Passwords From A Remote Machine French.srt
18 KB
[TutsNode.net] - Learn Social Engineering From Scratch/8 - Windows Malware Spying/38 - Recovering Saved Passwords From A Remote Machine Italian.srt
16.6 KB
[TutsNode.net] - Learn Social Engineering From Scratch/8 - Windows Malware Spying/38 - Recovering Saved Passwords From A Remote Machine Portuguese.srt
16.4 KB
[TutsNode.net] - Learn Social Engineering From Scratch/8 - Windows Malware Spying/38 - Recovering Saved Passwords From A Remote Machine Spanish.srt
16.9 KB
[TutsNode.net] - Learn Social Engineering From Scratch/8 - Windows Malware Spying/38 - Recovering Saved Passwords From A Remote Machine.mp4
174.1 MB
[TutsNode.net] - Learn Social Engineering From Scratch/9 - Windows Malware Enhancing Malware/39 - Bypassing All AntiVirus Programs By Modifying Hex Vales French.srt
15 KB
[TutsNode.net] - Learn Social Engineering From Scratch/9 - Windows Malware Enhancing Malware/40 - Download & Execute Payload Italian.srt
8.8 KB
[TutsNode.net] - Learn Social Engineering From Scratch/Teaser Hacking An Android Phone & Accessing The Camera/2 - What-is-Social-Engineering.pdf
98.7 KB
[TutsNode.net] - Learn Social Engineering From Scratch/Teaser Hacking An Android Phone & Accessing The Camera/3 - 00-Intro-Perperation.pdf