Filename Size ~Get Your Files Here !/1 - Course 1 Fedora Linux from Scratch/1. Introduction.mp4 9.9 MB ~Get Your Files Here !/1 - Course 1 Fedora Linux from Scratch/10. How to Change File Permissions in Linux.mp4 13.8 MB ~Get Your Files Here !/1 - Course 1 Fedora Linux from Scratch/11. How to easily Encrypt Decrypt a File with Gpg.mp4 9.2 MB ~Get Your Files Here !/1 - Course 1 Fedora Linux from Scratch/2. Introduction to Linux.mp4 11.2 MB ~Get Your Files Here !/1 - Course 1 Fedora Linux from Scratch/3. Setting Up Fedora in Virtualbox.mp4 45.8 MB ~Get Your Files Here !/1 - Course 1 Fedora Linux from Scratch/4. Basic Linux Commands Part 1.mp4 49.1 MB ~Get Your Files Here !/1 - Course 1 Fedora Linux from Scratch/5. Basic Linux Commands Part 2.mp4 14.1 MB ~Get Your Files Here !/1 - Course 1 Fedora Linux from Scratch/6. How to add new user in Linux.mp4 16.5 MB ~Get Your Files Here !/1 - Course 1 Fedora Linux from Scratch/7. Using the DNF Package Manager.mp4 16.2 MB ~Get Your Files Here !/1 - Course 1 Fedora Linux from Scratch/8. Useful Networking Commands.mp4 19.8 MB ~Get Your Files Here !/1 - Course 1 Fedora Linux from Scratch/9. Useful Networking Tools.mp4 35.8 MB ~Get Your Files Here !/10 - Evil Twin Attacks/63. How to Sniff Login Credentials from the Captive Portal.mp4 22.4 MB ~Get Your Files Here !/10 - Evil Twin Attacks/64. Capture the Login Information using a PhP Script.mp4 24.7 MB ~Get Your Files Here !/10 - Evil Twin Attacks/65. Setting up an Access Point with a Fake Captive Portal.mp4 50.4 MB ~Get Your Files Here !/10 - Evil Twin Attacks/66. Stealing Credentials with the Social Engineering Toolkit.mp4 32.5 MB ~Get Your Files Here !/10 - Evil Twin Attacks/67. How to use BeEF with the Captive Portal.mp4 37.3 MB ~Get Your Files Here !/10 - Evil Twin Attacks/68. How to Set up an Access Point with Internet Access.mp4 32.5 MB ~Get Your Files Here !/10 - Evil Twin Attacks/capture.txt 0 B ~Get Your Files Here !/10 - Evil Twin Attacks/post.php 160 B ~Get Your Files Here !/11 - WiFi Hacking Tools/69. How to use Wireshark Filters to Inspect Packets.mp4 33.2 MB ~Get Your Files Here !/11 - WiFi Hacking Tools/70. Evil Twin Attack with Airgeddon.mp4 48.3 MB ~Get Your Files Here !/11 - WiFi Hacking Tools/71. Customizing the Captive Portal Page.mp4 18.5 MB ~Get Your Files Here !/11 - WiFi Hacking Tools/72. Stealing Login Credentials from a WPA Enterprise Network.mp4 41.8 MB ~Get Your Files Here !/11 - WiFi Hacking Tools/73. Stealing Social Media Accounts using a Captive Portal.mp4 61.6 MB ~Get Your Files Here !/11 - WiFi Hacking Tools/74. How to use Dns Spoofing and BeEF using WiFi Pumpkin.mp4 35 MB ~Get Your Files Here !/12 - Security/75. Detect WiFi Attacks using Wireshark.mp4 28.4 MB ~Get Your Files Here !/12 - Security/76. How to Detect Evil Twin Attacks using EvilAP Defender.mp4 20.4 MB ~Get Your Files Here !/12 - Security/76. Protect from Evil Twin.pdf 324.6 KB ~Get Your Files Here !/12 - Security/77. Protect your Home Network using Guest WiFi.mp4 21.6 MB ~Get Your Files Here !/13 - Course 5 Social Engineering/78. Course Introduction.mp4 23.5 MB ~Get Your Files Here !/13 - Course 5 Social Engineering/79. Social Engineering Defined.mp4 12.8 MB ~Get Your Files Here !/14 - Evil Files/80. Create a Malicious File with MSFvenom.mp4 48.6 MB ~Get Your Files Here !/14 - Evil Files/81. How to Create an Undetectable Payload with FatRat.mp4 61.7 MB ~Get Your Files Here !/14 - Evil Files/82. Inject Payload in exe file using Shellter.mp4 32.5 MB ~Get Your Files Here !/14 - Evil Files/83. Make A Malicious Microsoft Word Document.mp4 25.9 MB ~Get Your Files Here !/15 - Exploitation/84. Meterpreter Basics.mp4 25.2 MB ~Get Your Files Here !/15 - Exploitation/85. Extract Saved Passwords with LaZagne.mp4 11.9 MB ~Get Your Files Here !/15 - Exploitation/86. Capture VNC Session.mp4 9.6 MB ~Get Your Files Here !/15 - Exploitation/87. How to view saved WiFi passwords.mp4 22.3 MB ~Get Your Files Here !/15 - Exploitation/88. How to perform a Man in the middle (MITM) Attack.mp4 25.7 MB ~Get Your Files Here !/16 - Social Engineering Tools/89. How To Create a Fake Login Page Using Setoolkit.mp4 26.9 MB ~Get Your Files Here !/16 - Social Engineering Tools/90. Blackeye Phishing Tool.mp4 18.8 MB ~Get Your Files Here !/17 - Browser Exploitation/91. How to Exploit Web Browsers with BeEF.mp4 38.3 MB ~Get Your Files Here !/17 - Browser Exploitation/92. Hook Web Browsers with MITMf and BeEF.mp4 12.8 MB ~Get Your Files Here !/17 - Browser Exploitation/93. Gain Full Control over the Target Machine using BeEF.mp4 27.5 MB ~Get Your Files Here !/18 - Attacking Outside The Local Network/94. Hacking Over the Internet Without Port Forwarding.mp4 31.9 MB ~Get Your Files Here !/18 - Attacking Outside The Local Network/95. How To Use Setoolkit Outside The Local Network.mp4 23.4 MB ~Get Your Files Here !/18 - Attacking Outside The Local Network/96. BeEF Attack Outside the Local Network.mp4 24.2 MB ~Get Your Files Here !/18 - Attacking Outside The Local Network/97. Phishing Email Attack.mp4 29.3 MB ~Get Your Files Here !/19 - Security/100. How to Avoid Phishing Attacks.mp4 16.6 MB ~Get Your Files Here !/19 - Security/98. How to Detect Meterpreter in Your PC.mp4 16.9 MB ~Get Your Files Here !/19 - Security/99. Protect Yourself from Browser Exploits.mp4 17.4 MB ~Get Your Files Here !/2 - Advanced/12. Linux Commands.pdf 338.5 KB ~Get Your Files Here !/2 - Advanced/12. Middle Level Linux Commands.mp4 17.6 MB ~Get Your Files Here !/2 - Advanced/13. Compress and Extract Files in Linux.mp4 12.1 MB ~Get Your Files Here !/2 - Advanced/14. Partitioning with Gparted.mp4 15.7 MB ~Get Your Files Here !/2 - Advanced/15. Understand Linux Shell Scripting.mp4 15.3 MB ~Get Your Files Here !/2 - Advanced/16. How to use Systemctl to Manage Services.mp4 18.2 MB ~Get Your Files Here !/2 - Advanced/17. Automating Tasks with Crontab.mp4 29.4 MB ~Get Your Files Here !/2 - Advanced/18. Set Up Your Own Web Server.mp4 28.6 MB ~Get Your Files Here !/2 - Advanced/19. How to Install WordPress on your Web Server.mp4 29.3 MB ~Get Your Files Here !/2 - Advanced/20. How to Set up an FTP Server.mp4 28.5 MB ~Get Your Files Here !/3 - Course 2 Web Hacking for Beginners/21. Introduction to the Course.mp4 36.5 MB ~Get Your Files Here !/3 - Course 2 Web Hacking for Beginners/22. How the Web Works.mp4 18.5 MB ~Get Your Files Here !/3 - Course 2 Web Hacking for Beginners/23. How to capture HTTP packets with Wireshark.mp4 48.7 MB ~Get Your Files Here !/3 - Course 2 Web Hacking for Beginners/24. Set up your Web Testing Lab.mp4 37.1 MB ~Get Your Files Here !/3 - Course 2 Web Hacking for Beginners/25. How to use Vega Web Vulnerability Scanner.mp4 35.1 MB ~Get Your Files Here !/4 - SQL Injection/26. SQL Introduction and Examples.mp4 58.6 MB ~Get Your Files Here !/4 - SQL Injection/27. Understanding How SQL Injection Attacks Work.mp4 35.2 MB ~Get Your Files Here !/4 - SQL Injection/28. How to Use SQLMAP.mp4 61.1 MB ~Get Your Files Here !/4 - SQL Injection/29. Preventing SQL Injection.mp4 25.2 MB ~Get Your Files Here !/5 - WordPress Exploitation/30. Introduction to WPScan.mp4 24.6 MB ~Get Your Files Here !/5 - WordPress Exploitation/31. How to Hack a WordPress Website with WPScan.mp4 65.6 MB ~Get Your Files Here !/5 - WordPress Exploitation/32. How to Secure Your WordPress Website.mp4 52.3 MB ~Get Your Files Here !/6 - Cross Site Scripting (XSS)/33. Understand Cross Site Scripting.mp4 25.4 MB ~Get Your Files Here !/6 - Cross Site Scripting (XSS)/34. Stored Cross Site Scripting.mp4 36.3 MB ~Get Your Files Here !/6 - Cross Site Scripting (XSS)/35. Preventing Cross Site Scripting Attacks.mp4 23.9 MB ~Get Your Files Here !/7 - Browser Exploitation/36. How to Hack Web Browsers Using BeEF Framework.mp4 47.9 MB ~Get Your Files Here !/7 - Browser Exploitation/37. Gaining Full Control Using BeEF.mp4 56.8 MB ~Get Your Files Here !/7 - Browser Exploitation/38. How to Defeat BeEF using Vegan Extension.mp4 22.2 MB ~Get Your Files Here !/7 - Browser Exploitation/39. How to Use Weevely PHP Backdoor.mp4 32.2 MB ~Get Your Files Here !/7 - Browser Exploitation/40. CSRF example.pdf 325.4 KB ~Get Your Files Here !/7 - Browser Exploitation/40. How to perform CSRF Attack.mp4 31.5 MB ~Get Your Files Here !/7 - Browser Exploitation/41. Phishing Attack.mp4 34.4 MB ~Get Your Files Here !/7 - Browser Exploitation/41. Phishing.pdf 333.6 KB ~Get Your Files Here !/8 - Course 3 WiFi Hacking for Beginners/42. Introduction.mp4 8.5 MB ~Get Your Files Here !/8 - Course 3 WiFi Hacking for Beginners/43. Introduction to Wireless Networks.mp4 32.3 MB ~Get Your Files Here !/8 - Course 3 WiFi Hacking for Beginners/44. How to Install Kali Linux in VMware Player.mp4 61.4 MB ~Get Your Files Here !/8 - Course 3 WiFi Hacking for Beginners/45. Packet Injection and Monitor Mode.mp4 29.7 MB ~Get Your Files Here !/8 - Course 3 WiFi Hacking for Beginners/46. How to Find Hidden Wireless Networks.mp4 36.3 MB ~Get Your Files Here !/8 - Course 3 WiFi Hacking for Beginners/47. How to Spoof your Mac Address.mp4 30.2 MB ~Get Your Files Here !/8 - Course 3 WiFi Hacking for Beginners/48. How to use Wireshark.mp4 52.4 MB ~Get Your Files Here !/8 - Course 3 WiFi Hacking for Beginners/49. How to Perform a Denial of Service Attack.mp4 57.4 MB ~Get Your Files Here !/8 - Course 3 WiFi Hacking for Beginners/50. Break WiFi Networks with WEP encryption.mp4 55.5 MB ~Get Your Files Here !/8 - Course 3 WiFi Hacking for Beginners/51. Break WiFi Networks with WPA WPA2 encryption.mp4 41.5 MB ~Get Your Files Here !/8 - Course 3 WiFi Hacking for Beginners/52. Create your own Wordlist using Crunch.mp4 39.5 MB ~Get Your Files Here !/8 - Course 3 WiFi Hacking for Beginners/53. Speeding up WPA2 Cracking.mp4 45.6 MB ~Get Your Files Here !/8 - Course 3 WiFi Hacking for Beginners/54. Break WiFi Networks using Pyrit.mp4 42.8 MB