Udemy - The Complete Ethical Hacking Course - Kali Linux 2025 Edition

seeders: 57 leechers: 2 updated: 1 week ago
Added 9 months ago by freecoursewb in Other
Downloaded 600 times.
1337x.to
Udemy - The Complete Ethical Hacking Course - Kali Linux 2025 Edition

Torrent Contents Size: 3.8 GB

Udemy - The Complete Ethical Hacking Course - Kali Linux 2025 Edition
▼ show more 70 files
1 -Introduction.mp4
MP4
11.7 MB
10 -10. Get Started with Linux Commands.mp4
MP4
69.8 MB
11 -11. Master KALI Desktop Environment.mp4
MP4
31.3 MB
12 -12. Steps to plan a successfull pentest.mp4
MP4
13.5 MB
13 -13. Threat Modeling.mp4
MP4
40.1 MB
14 -14. Wireshark Simplified.mp4
MP4
61.5 MB
15 -15. How Does Port Scanning Work.mp4
MP4
14.2 MB
16 -16. Introducing NMAP.mp4
MP4
23.9 MB
17 -17. NMAP and ZENMAP Simplified.mp4
MP4
102.7 MB
18 -18. Understand NETBIOS and SMB Attacks.mp4
MP4
24.3 MB
19 -19. Execute Man in the Middle Attacks.mp4
MP4
73.3 MB
2 -02. The Undeniable Power of Ethical Hacking.mp4
MP4
10.3 MB
20 -20. Perform a DNS Spoofing Attack.mp4
MP4
55.7 MB
21 -21. Identify a DNS Zone Transfer Vulnerability.mp4
MP4
45.1 MB
22 -22. Plan DOS and DDOS Attacks.mp4
MP4
18.1 MB
23 -23. All in one Metasploit Framework.mp4
MP4
102 MB
24 -24. Transfering The Payload to Windows Machine.mp4
MP4
31.7 MB
25 -25. Create Your First Trojan and Infiltrate a Target.mp4
MP4
113.2 MB
26 -26. The Powerful Armitage Tool.mp4
MP4
85.7 MB
27 -27. Hide a Payload in a JPEG Image.mp4
MP4
29.1 MB
28 -28. How to Attack Modern Wireless Networks Introduction.mp4
MP4
56.8 MB
29 -29. Cracking WEP.mp4
MP4
20 MB
3 -03. Why KALI.mp4
MP4
6.9 MB
30 -30. Cracking WPA and WPA2.mp4
MP4
77.7 MB
31 -31. WPS Cracking.mp4
MP4
41.4 MB
32 -32. Tips to Improve Your Wireless Network Security.mp4
MP4
4.1 MB
33 -33. Web Applications Security Overview.mp4
MP4
14 MB
34 -34. Web Applications Attack Surface.mp4
MP4
45.1 MB
35 -35. Metasploitable VM.mp4
MP4
28.8 MB
36 -36. Discover Vulnerabilities in Websites.mp4
MP4
118.4 MB
37 -37. Control a Database Server with SQLMap.mp4
MP4
108.8 MB
38 -38. Easily Hack a WordPress Site.mp4
MP4
79.2 MB
39 -39. Intercept Analyze and Replay Web Traffic.mp4
MP4
94.1 MB
4 -04. Different Installation Methods.mp4
MP4
4.1 MB
40 -40. Various Password Attacks.mp4
MP4
18.9 MB
41 -41. Hashing in a Nutshell.mp4
MP4
37.4 MB
42 -42. Execute an Offline Password Attack on Windows.mp4
MP4
70.4 MB
43 -43. Collect and Visualize Data with Maltego.mp4
MP4
67 MB
44 -44. Execute an Offline Password Attack in Linux.mp4
MP4
87.3 MB
45 -45. Run an Online Password Attack on a Router.mp4
MP4
28.7 MB
46 -46. Run an Online Password Attack on Linux.mp4
MP4
47.5 MB
47 -47. Crack Passwords with Rainbow Tables.mp4
MP4
50.7 MB
48 -48. Design Effective Wordlists.mp4
MP4
115.5 MB
49 -49. Password Management Tips.mp4
MP4
12.5 MB
5 -05. Install KALI (Command Center).mp4
MP4
34.3 MB
50 -50. SE Attack Vectors new.mp4
MP4
12.5 MB
51 -51. Open source Intelligence (OSINT).mp4
MP4
5.8 MB
52 -52. Google Dorks Live Examples.mp4
MP4
60.9 MB
53 -53. Execute a Phishing Attack.mp4
MP4
69.9 MB
54 -54. Hack Facebook, Twitter, and Gmail Accounts.mp4
MP4
84.4 MB
55 -55. Mobile Attacks Surface.mp4
MP4
13.6 MB
56 -56. Decrypt SSL Session.mp4
MP4
87.7 MB
57 -57. Reverse Engineer an Android Application.mp4
MP4
75.2 MB
58 -58. Hack an Android Phone with Armitage.mp4
MP4
68.6 MB
59 -59. Post Exploitation Terminologies.mp4
MP4
11.4 MB
6 -06. Root User Color Coding.mp4
MP4
8.3 MB
60 -60. Backdoor Tools Explained.mp4
MP4
13.2 MB
61 -61. Netcat Simplified.mp4
MP4
83.6 MB
62 -62. Install a Backdoor.mp4
MP4
88.3 MB
63 -63. Deface a Website in Few Seconds.mp4
MP4
51.5 MB
64 -64. Create a Simple Ransomware.mp4
MP4
32.4 MB
65 -65. Hidden Tear Ransomware Setup.mp4
MP4
107.7 MB
66 -66. Bypass Firewalls by Tunneling Data and Commands over DNS new.mp4
MP4
68.2 MB
67 -67. Publish Your Weapons Online.mp4
MP4
28.5 MB
68 -68. Stay Anonymous Online.mp4
MP4
40.1 MB
69 -69. Setup a Stealthy Command and Control Center Online.mp4
MP4
49.1 MB
7 -07. Understand Color Codings.mp4
MP4
13.6 MB
70 -70. Broken Access Control.mp4
MP4
4.4 MB
71 -71. Broken Authentication.mp4
MP4
27.9 MB
72 -72. Components with Known Vulnerabilities.mp4
MP4
5.1 MB
73 -73. Cross Site Scripting.mp4
MP4
41.1 MB
74 -74. Injection.mp4
MP4
19.9 MB
75 -75. Insecure Deserialization.mp4
MP4
3.9 MB
76 -76. Insufficient Logging and Monitoring.mp4
MP4
9.9 MB
77 -77. Security Misconfiguration.mp4
MP4
10.3 MB
78 -78. Sensitive Data Exposure.mp4
MP4
12.7 MB
79 -79. XML External Entity.mp4
MP4
6.3 MB
8 -08. Update, Upgrade, and Alias Commands.mp4
MP4
33.4 MB
80 -80. How to Prepare and Present Your Report final mp4 new.mp4
MP4
77.6 MB
81 -81. How Can Pentest.mp4
MP4
67.4 MB
82 -82. Create an IoT WIFI Jammer.mp4
MP4
124.7 MB
83 -83. Create a $3 Rubber Ducky Key logger new.mp4
MP4
110.5 MB
9 -09. Installing Windows.mp4
MP4
15.9 MB
Bonus Resources.txt
TXT
102.4 B
Get Bonus Downloads Here.url
URL
204.8 B

Description

Related Torrents

Location

Trackers

Tracker name
udp://tracker.torrent.eu.org:451/announce
udp://tracker.tiny-vps.com:6969/announce
http://tracker.foreverpirates.co:80/announce
udp://tracker.cyberia.is:6969/announce
udp://exodus.desync.com:6969/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2780/announce
udp://tracker.internetwarriors.net:1337/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://open.stealth.si:80/announce
udp://9.rarbg.to:2900/announce
udp://9.rarbg.me:2720/announce
udp://opentor.org:2710/announce
udp://tracker.opentrackr.org:1337/announce
http://tracker.openbittorrent.com:80/announce
udp://opentracker.i2p.rocks:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://coppersurfer.tk:6969/announce
udp://tracker.zer0day.to:1337/announce
Torrent hash: