|
|
0
|
|
105.4 KB
|
|
|
1
|
|
121.9 KB
|
|
|
1. Learn Hacking- I.mp4
|
MP4
|
30.3 MB
|
|
|
1. Learn Hacking- I.srt
|
SRT
|
6.2 KB
|
|
|
1. Manage your activities in Google.mp4
|
MP4
|
35 MB
|
|
|
1. Manage your activities in Google.srt
|
SRT
|
7.8 KB
|
|
|
1. OWASP.mp4
|
MP4
|
25.7 MB
|
|
|
1. OWASP.srt
|
SRT
|
6.2 KB
|
|
|
1. Oracle VirtualBox.mp4
|
MP4
|
39.1 MB
|
|
|
1. Oracle VirtualBox.srt
|
SRT
|
8 KB
|
|
|
1. Overview.mp4
|
MP4
|
19.7 MB
|
|
|
1. Overview.srt
|
SRT
|
6.9 KB
|
|
|
2
|
|
298.1 KB
|
|
|
3
|
|
215.3 KB
|
|
|
4
|
|
50.6 KB
|
|
|
5
|
|
300.5 KB
|
|
|
6
|
|
108.3 KB
|
|
|
7
|
|
35.1 KB
|
|
|
8
|
|
316.3 KB
|
|
|
10. The Harvester.mp4
|
MP4
|
31.5 MB
|
|
|
10. The Harvester.srt
|
SRT
|
2.8 KB
|
|
|
10. Tools and Techniques for Hacking- I.mp4
|
MP4
|
13.1 MB
|
|
|
10. Tools and Techniques for Hacking- I.srt
|
SRT
|
3.7 KB
|
|
|
11. Hacker's Search Engine.mp4
|
MP4
|
22.6 MB
|
|
|
11. Hacker's Search Engine.srt
|
SRT
|
3.3 KB
|
|
|
11. Tools and Techniques for Hacking- II.mp4
|
MP4
|
12.5 MB
|
|
|
11. Tools and Techniques for Hacking- II.srt
|
SRT
|
6.2 KB
|
|
|
12. Google Hacking.mp4
|
MP4
|
65.3 MB
|
|
|
12. Google Hacking.srt
|
SRT
|
5.7 KB
|
|
|
12. Tools and Techniques for Hacking- III.mp4
|
MP4
|
8.9 MB
|
|
|
12. Tools and Techniques for Hacking- III.srt
|
SRT
|
4.3 KB
|
|
|
13. Nmap and Hping3- I.mp4
|
MP4
|
24.4 MB
|
|
|
13. Nmap and Hping3- I.srt
|
SRT
|
2.8 KB
|
|
|
13. Tools and Techniques for Hacking- IV.mp4
|
MP4
|
9.2 MB
|
|
|
13. Tools and Techniques for Hacking- IV.srt
|
SRT
|
1.6 KB
|
|
|
14. Nmap and Hping3- II.mp4
|
MP4
|
12.9 MB
|
|
|
14. Nmap and Hping3- II.srt
|
SRT
|
1.5 KB
|
|
|
14. Tools and Techniques for Hacking- V.mp4
|
MP4
|
27.4 MB
|
|
|
14. Tools and Techniques for Hacking- V.srt
|
SRT
|
5 KB
|
|
|
15. Nmap and Hping3- III.mp4
|
MP4
|
11.2 MB
|
|
|
15. Nmap and Hping3- III.srt
|
SRT
|
1.7 KB
|
|
|
15. iOS Security Structure.mp4
|
MP4
|
5.5 MB
|
|
|
15. iOS Security Structure.srt
|
SRT
|
2.8 KB
|
|
|
16. Jailbreaking.mp4
|
MP4
|
7.9 MB
|
|
|
16. Jailbreaking.srt
|
SRT
|
2.6 KB
|
|
|
16. Nmap and Hping3- IV.mp4
|
MP4
|
20.9 MB
|
|
|
16. Nmap and Hping3- IV.srt
|
SRT
|
1.7 KB
|
|
|
17. Dis-assemble iOS Apps.mp4
|
MP4
|
8 MB
|
|
|
17. Dis-assemble iOS Apps.srt
|
SRT
|
1.6 KB
|
|
|
17. Nmap and Hping3- V.mp4
|
MP4
|
20.3 MB
|
|
|
17. Nmap and Hping3- V.srt
|
SRT
|
2.1 KB
|
|
|
18. Zenmap.mp4
|
MP4
|
38.7 MB
|
|
|
18. Zenmap.srt
|
SRT
|
4.9 KB
|
|
|
19. Detecting Target OS.mp4
|
MP4
|
29.2 MB
|
|
|
19. Detecting Target OS.srt
|
SRT
|
4.1 KB
|
|
|
2. How to hack a SmartPhone in 30 seconds.mp4
|
MP4
|
26.8 MB
|
|
|
2. How to hack a SmartPhone in 30 seconds.srt
|
SRT
|
6.4 KB
|
|
|
2. Kali Installation.mp4
|
MP4
|
40.7 MB
|
|
|
2. Kali Installation.srt
|
SRT
|
7 KB
|
|
|
2. Learn Hacking- II.mp4
|
MP4
|
41.4 MB
|
|
|
2. Learn Hacking- II.srt
|
SRT
|
5.8 KB
|
|
|
2. Rooting an Android Mobile Device.mp4
|
MP4
|
28.2 MB
|
|
|
2. Rooting an Android Mobile Device.srt
|
SRT
|
5 KB
|
|
|
2. Types of Hackers.mp4
|
MP4
|
3.3 MB
|
|
|
2. Types of Hackers.srt
|
SRT
|
2.1 KB
|
|
|
20. Detecting Topology.mp4
|
MP4
|
12.8 MB
|
|
|
20. Detecting Topology.srt
|
SRT
|
2.9 KB
|
|
|
21. Installing Veil.mp4
|
MP4
|
54.2 MB
|
|
|
21. Installing Veil.srt
|
SRT
|
7.7 KB
|
|
|
22. Generating Undetectable Backdoor.mp4
|
MP4
|
64 MB
|
|
|
22. Generating Undetectable Backdoor.srt
|
SRT
|
9 KB
|
|
|
23. Backdoor Modification and Testing.mp4
|
MP4
|
50.1 MB
|
|
|
23. Backdoor Modification and Testing.srt
|
SRT
|
6.9 KB
|
|
|
24. Using Backdoor to Gain Access.mp4
|
MP4
|
63.7 MB
|
|
|
24. Using Backdoor to Gain Access.srt
|
SRT
|
9.2 KB
|
|
|
25. Email Spoofing.mp4
|
MP4
|
53.1 MB
|
|
|
25. Email Spoofing.srt
|
SRT
|
6.7 KB
|
|
|
26. Steganography- I.mp4
|
MP4
|
49.2 MB
|
|
|
26. Steganography- I.srt
|
SRT
|
6.7 KB
|
|
|
27. Steganography- II.mp4
|
MP4
|
26.6 MB
|
|
|
27. Steganography- II.srt
|
SRT
|
4.5 KB
|
|
|
28. Steganography- III.mp4
|
MP4
|
36.5 MB
|
|
|
28. Steganography- III.srt
|
SRT
|
5 KB
|
|
|
29. Steganography- IV.mp4
|
MP4
|
19.1 MB
|
|
|
29. Steganography- IV.srt
|
SRT
|
1.9 KB
|
|
|
3. Data Recovery.mp4
|
MP4
|
43.2 MB
|
|
|
3. Data Recovery.srt
|
SRT
|
6 KB
|
|
|
3. Network Configuration in VirtualBox.mp4
|
MP4
|
11 MB
|
|
|
3. Network Configuration in VirtualBox.srt
|
SRT
|
2.2 KB
|
|
|
3. What is BYOD.mp4
|
MP4
|
5 MB
|
|
|
3. What is BYOD.srt
|
SRT
|
3.1 KB
|
|
|
3. Win 7 Installation.mp4
|
MP4
|
33.2 MB
|
|
|
3. Win 7 Installation.srt
|
SRT
|
4.8 KB
|
|
|
30. Finding hidden files using ADS Spy.mp4
|
MP4
|
13.3 MB
|
|
|
30. Finding hidden files using ADS Spy.srt
|
SRT
|
2.2 KB
|
|
|
31. Best Keylogger.mp4
|
MP4
|
73.5 MB
|
|
|
31. Best Keylogger.srt
|
SRT
|
9.9 KB
|
|
|
32. System Hacking.mp4
|
MP4
|
65.7 MB
|
|
|
32. System Hacking.srt
|
SRT
|
10.6 KB
|
|
|
33. Gaining Remote Access.mp4
|
MP4
|
68.4 MB
|
|
|
33. Gaining Remote Access.srt
|
SRT
|
10.4 KB
|
|
|
34. Trojan Creation and Hacking.mp4
|
MP4
|
47.8 MB
|
|
|
34. Trojan Creation and Hacking.srt
|
SRT
|
6.4 KB
|
|
|
35. ARP Spoofing.mp4
|
MP4
|
25.1 MB
|
|
|
35. ARP Spoofing.srt
|
SRT
|
4.7 KB
|
|
|
36. ARP Poisioning.mp4
|
MP4
|
15.5 MB
|
|
|
36. ARP Poisioning.srt
|
SRT
|
2.3 KB
|
|
|
37. Password Breaking of Win 10.mp4
|
MP4
|
50 MB
|
|
|
37. Password Breaking of Win 10.srt
|
SRT
|
6.1 KB
|
|
|
38. Social Engineering- I.mp4
|
MP4
|
57.4 MB
|
|
|
38. Social Engineering- I.srt
|
SRT
|
6.8 KB
|
|
|
39. Social Engineering- II.mp4
|
MP4
|
34.7 MB
|
|
|
39. Social Engineering- II.srt
|
SRT
|
4.8 KB
|
|
|
4. Mobile Device Management.mp4
|
MP4
|
4.3 MB
|
|
|
4. Mobile Device Management.srt
|
SRT
|
2.8 KB
|
|
|
4. Mobile Security Guidelines.mp4
|
MP4
|
16.8 MB
|
|
|
4. Mobile Security Guidelines.srt
|
SRT
|
5.9 KB
|
|
|
4. Understanding Network.mp4
|
MP4
|
5.1 MB
|
|
|
4. Understanding Network.srt
|
SRT
|
3.3 KB
|
|
|
4. Win 10 Installation.mp4
|
MP4
|
32.3 MB
|
|
|
4. Win 10 Installation.srt
|
SRT
|
5.3 KB
|
|
|
40. Social Engineering- III.mp4
|
MP4
|
28.4 MB
|
|
|
40. Social Engineering- III.srt
|
SRT
|
3.2 KB
|
|
|
41. Social Engineering- IV.mp4
|
MP4
|
22.3 MB
|
|
|
41. Social Engineering- IV.srt
|
SRT
|
3.2 KB
|
|
|
42. Netcraft Toolbar.mp4
|
MP4
|
21.6 MB
|
|
|
42. Netcraft Toolbar.srt
|
SRT
|
3.2 KB
|
|
|
43. PhishTank.mp4
|
MP4
|
14.6 MB
|
|
|
43. PhishTank.srt
|
SRT
|
2.1 KB
|
|
|
44. Clearing Tracks.mp4
|
MP4
|
37.4 MB
|
|
|
44. Clearing Tracks.srt
|
SRT
|
4.6 KB
|
|
|
45. Pentesting Reports- I.mp4
|
MP4
|
6.1 MB
|
|
|
45. Pentesting Reports- I.srt
|
SRT
|
3.8 KB
|
|
|
46. Pentesting Reports- II.mp4
|
MP4
|
40.8 MB
|
|
|
46. Pentesting Reports- II.srt
|
SRT
|
5.3 KB
|
|
|
5. Check for Traget Reachability.mp4
|
MP4
|
57 MB
|
|
|
5. Check for Traget Reachability.srt
|
SRT
|
6.9 KB
|
|
|
5. Mobile Device Security.mp4
|
MP4
|
6.2 MB
|
|
|
5. Mobile Device Security.srt
|
SRT
|
2.5 KB
|
|
|
5. Server 2012 Installation.mp4
|
MP4
|
33.6 MB
|
|
|
5. Server 2012 Installation.srt
|
SRT
|
6.3 KB
|
|
|
6. Android Security Structure- I.mp4
|
MP4
|
10.8 MB
|
|
|
6. Android Security Structure- I.srt
|
SRT
|
5 KB
|
|
|
6. Metasploitable.mp4
|
MP4
|
36.4 MB
|
|
|
6. Metasploitable.srt
|
SRT
|
4.9 KB
|
|
|
6. NSLOOKUP.mp4
|
MP4
|
16.8 MB
|
|
|
6. NSLOOKUP.srt
|
SRT
|
2.9 KB
|
|
|
7. Android Security Structure- II.mp4
|
MP4
|
17 MB
|
|
|
7. Android Security Structure- II.srt
|
SRT
|
8.4 KB
|
|
|
7. Extracting Data.mp4
|
MP4
|
17.2 MB
|
|
|
7. Extracting Data.srt
|
SRT
|
2.9 KB
|
|
|
7. Snapshots.mp4
|
MP4
|
20.7 MB
|
|
|
7. Snapshots.srt
|
SRT
|
3.3 KB
|
|
|
8. Android Security Structure- III.mp4
|
MP4
|
13 MB
|
|
|
8. Android Security Structure- III.srt
|
SRT
|
5.1 KB
|
|
|
8. Website Mirroring.mp4
|
MP4
|
26.8 MB
|
|
|
8. Website Mirroring.srt
|
SRT
|
2.7 KB
|
|
|
9. Email Tracing.srt
|
SRT
|
3.6 KB
|
|
|
TutsNode.com.txt
|
TXT
|
102.4 B
|
|
|
[TGx]Downloaded from torrentgalaxy.to .txt
|
TXT
|
614.4 B
|
|
|
9
|
|
414.4 KB
|
|
|
9. Android Emulators.mp4
|
MP4
|
11.2 MB
|
|
|
9. Android Emulators.srt
|
SRT
|
4.4 KB
|
|
|
9. Email Tracing.mp4
|
MP4
|
34.7 MB
|
|
|
10
|
|
379.8 KB
|
|
|
11
|
|
50.8 KB
|
|
|
12
|
|
284.4 KB
|
|
|
13
|
|
210.9 KB
|
|
|
14
|
|
326.9 KB
|
|
|
15
|
|
100.8 KB
|
|
|
16
|
|
246.2 KB
|
|
|
17
|
|
355.3 KB
|
|
|
18
|
|
387.1 KB
|
|
|
19
|
|
331.2 KB
|
|
|
20
|
|
78.1 KB
|
|
|
21
|
|
2.7 KB
|
|
|
22
|
|
110.7 KB
|
|
|
23
|
|
35.5 KB
|
|
|
24
|
|
286.5 KB
|
|
|
25
|
|
321.2 KB
|
|
|
26
|
|
439.1 KB
|
|
|
27
|
|
266.6 KB
|
|
|
28
|
|
238.3 KB
|
|
|
29
|
|
34.5 KB
|
|
|
30
|
|
178.6 KB
|
|
|
31
|
|
358 KB
|
|
|
32
|
|
102.2 KB
|
|
|
33
|
|
329.4 KB
|
|
|
34
|
|
97.3 KB
|
|
|
35
|
|
189.3 KB
|
|
|
36
|
|
235.7 KB
|
|
|
37
|
|
452.6 KB
|
|
|
38
|
|
291.9 KB
|
|
|
39
|
|
364.9 KB
|
|
|
40
|
|
76.1 KB
|
|
|
41
|
|
442.9 KB
|
|
|
42
|
|
167 KB
|
|
|
43
|
|
432.4 KB
|
|
|
44
|
|
90.4 KB
|
|
|
45
|
|
279.8 KB
|
|
|
46
|
|
196.4 KB
|
|
|
47
|
|
353.8 KB
|
|
|
48
|
|
458.9 KB
|
|
|
49
|
|
290.5 KB
|
|
|
50
|
|
496.7 KB
|
|
|
51
|
|
237.2 KB
|
|
|
52
|
|
251.1 KB
|
|
|
53
|
|
499.8 KB
|
|
|
54
|
|
359.7 KB
|
|
|
55
|
|
213.4 KB
|
|
|
56
|
|
434.2 KB
|
|
|
57
|
|
15.2 KB
|
|
|
58
|
|
72.1 KB
|
|
|
59
|
|
219.7 KB
|
|
|
60
|
|
13.5 KB
|
|
|
61
|
|
301.5 KB
|
|
|
62
|
|
316.1 KB
|
|
|
63
|
|
19.8 KB
|
|
|
64
|
|
254.4 KB
|
|
|
65
|
|
298.9 KB
|
|
|
66
|
|
127.6 KB
|
|
|
67
|
|
490.7 KB
|
|
|
68
|
|
122.9 KB
|
|
|
69
|
|
347.9 KB
|
|
|
70
|
|
376.7 KB
|
|
|
71
|
|
3.9 KB
|
|
|
72
|
|
375.7 KB
|
|
|
73
|
|
490.8 KB
|
|
|
74
|
|
251.1 KB
|