磁力管家

磁力管家
为您索检到1471条磁力链接,耗时3毫秒。 rss

分享给好友

【影视】 Fundamentos de Ethical Hacking
收录时间:2017-02-08 文档个数:200 文档大小:14.8 GB 最近下载:2025-05-16 人气:2500 磁力链接
  • mp401 Introdução/001 1.1 Apresentação do Professor.mp4 27.9 MB
  • mp401 Introdução/002 1.2 - O que esperar do treinamento.mp4 49.6 MB
  • mp401 Introdução/003 1.3 - Acesso a materiais complementares.mp4 35.9 MB
  • mp401 Introdução/004 1.4 Bibliografia recomendada.mp4 36.2 MB
  • mp401 Introdução/005 1.5 - Como tirar suas dúvidas.mp4 40.4 MB
  • mp401 Introdução/006 1.6 - Obtendo o certificado do curso.mp4 38.0 MB
  • pdf01 Introdução/attached_files/001 1.1 Apresentação do Professor/Apresenta-o-Professor-Marcos-Fl-vio.pdf 988.5 kB
  • mp402 Ethical Hacking - Fundamentos e metodologia/007 2.1 - Afinal o que é Ethical Hacking.mp4 111.8 MB
  • mp402 Ethical Hacking - Fundamentos e metodologia/008 2.2 - Aspectos legais.mp4 69.0 MB
  • mp402 Ethical Hacking - Fundamentos e metodologia/009 2.3 - Mercado de trabalho e certificações.mp4 58.1 MB
  • mp402 Ethical Hacking - Fundamentos e metodologia/010 2.4 - Tipos de Penetration Test.mp4 61.8 MB
  • mp402 Ethical Hacking - Fundamentos e metodologia/011 2.5 - Fases de um teste de invasão.mp4 94.2 MB
  • mp402 Ethical Hacking - Fundamentos e metodologia/012 2.6 - Termo de responsabilidade e confidencialidade.mp4 94.8 MB
  • mp402 Ethical Hacking - Fundamentos e metodologia/013 2.7 - Relatório - Sumário executivo e laudo técnico.mp4 162.7 MB
  • pdf02 Ethical Hacking - Fundamentos e metodologia/attached_files/007 2.1 - Afinal o que é Ethical Hacking/Profissional-Hacker-tico.pdf 3.6 MB
  • mp403 Preparação do ambiente de testes/014 3.1 - Instalação do VirtualBox.mp4 34.0 MB
  • mp403 Preparação do ambiente de testes/015 3.2 - Instalação do Kali Linux.mp4 80.0 MB
  • mp403 Preparação do ambiente de testes/016 3.3 - Configuração do Kali Linux.mp4 118.0 MB
  • mp403 Preparação do ambiente de testes/017 3.4 - Instalação e configuração do Metasploitable.mp4 86.9 MB
  • mp403 Preparação do ambiente de testes/018 3.5 - Instalação do Android 4.4.mp4 68.8 MB
【影视】 Learning Whitehat Hacking and Penetration Testing
收录时间:2017-02-08 文档个数:106 文档大小:1.5 GB 最近下载:2025-05-09 人气:1556 磁力链接
  • mp41. Introduction/0101 What you should expect from the video.mp4 5.3 MB
  • mp41. Introduction/0102 What is Hacking.mp4 7.0 MB
  • mp41. Introduction/0103 Why do we hack.mp4 12.4 MB
  • mp41. Introduction/0104 Types Of Hacking (Ethical, Black Hat, Gray Hat, Hacktivism, Etc).mp4 18.0 MB
  • mp41. Introduction/0105 Being Ethical.mp4 8.8 MB
  • mp41. Introduction/0106 Legal Issues Around Hacking.mp4 18.2 MB
  • mp41. Introduction/0107 Methodology.mp4 15.1 MB
  • mp41. Introduction/0108 Types Of Attacks.mp4 15.6 MB
  • mp41. Introduction/0109 Skills Necessary And Skills To Be Learned.mp4 10.0 MB
  • mp41. Introduction/0110 What Is Penetration Testing Scope.mp4 15.8 MB
  • mp410. Wireless Networking/1001 Wireless Networking.mp4 7.6 MB
  • mp410. Wireless Networking/1002 Encryption Techniques - WEP, WPA, WPA2.mp4 13.0 MB
  • mp410. Wireless Networking/1003 Finding Hotspots.mp4 12.2 MB
  • mp410. Wireless Networking/1004 Breaking WEP Encryption.mp4 16.5 MB
  • mp410. Wireless Networking/1005 Rogue Access Points And Attacks.mp4 8.0 MB
  • mp410. Wireless Networking/1006 Wireless Sniffing.mp4 13.7 MB
  • mp410. Wireless Networking/1007 Protecting Wireless Networks.mp4 15.4 MB
  • mp411. Detecting Evasion/1101 What Is Evasion And Why Do We Use It.mp4 3.9 MB
  • mp411. Detecting Evasion/1102 Steganography.mp4 14.5 MB
  • mp412. Programming Attacks/1201 Stacks And Heaps.mp4 4.1 MB
【影视】 [Cybrary] Penetration Testing and Ethical Hacking
收录时间:2017-02-08 文档个数:106 文档大小:2.6 GB 最近下载:2025-05-15 人气:2374 磁力链接
  • txtDisclaimer.txt 156 Bytes
  • MP4Module 1 - Intro/Phases of Penetration Testing (Intro) - Cybrary.MP4 9.0 MB
  • MP4Module 10 - Denial of Service/Denial of Service (Whiteboard) - Cybrary.MP4 62.0 MB
  • MP4Module 10 - Denial of Service/Hping3, what is it, & how is it a Denial of Service Tool- - Cybrary.MP4 5.9 MB
  • MP4Module 10 - Denial of Service/What is Denial of Service and how do I fight it- -Cybrary.MP4 9.8 MB
  • MP4Module 10 - Denial of Service/What's used to test bandwidth or target a DoS test- -Cybrary.MP4 3.6 MB
  • MP4Module 11 - Session Hijacking/How to target hijack testing, and what info to use- -Cybrary.MP4 14.6 MB
  • MP4Module 11 - Session Hijacking/Session Hijacking (Whiteboard) - Cybrary.MP4 126.8 MB
  • MP4Module 11 - Session Hijacking/So what actually happens when a system is hacked- -Cybrary.MP4 8.9 MB
  • MP4Module 11 - Session Hijacking/What is Hamster sniffing and why would it be used- -Cybrary.MP4 10.5 MB
  • MP4Module 12 - Web Server Hack/Are web server application hacks application specific- -Cybrary.MP4 21.0 MB
  • MP4Module 12 - Web Server Hack/Hacking Web Servers (Whiteboard) - Cybrary.MP4 102.5 MB
  • MP4Module 12 - Web Server Hack/How to hack web applications- -Cybrary.MP4 20.3 MB
  • MP4Module 12 - Web Server Hack/In penetration testing, how is a web site hacked- -Cybrary.MP4 8.0 MB
  • MP4Module 13 - Web Applications/How to retrieve web server data & analyze it- -Cybrary.MP4 12.8 MB
  • MP4Module 13 - Web Applications/How to scan a specific file for viruses- -Cybrary.MP4 7.5 MB
  • MP4Module 13 - Web Applications/How to scan for signs of web application attacks- -Cybrary.MP4 14.9 MB
  • MP4Module 13 - Web Applications/How to scan only HTTP_HTTPS path in pen testing- -Cybrary.MP4 7.2 MB
  • MP4Module 13 - Web Applications/How to scan web server host & learn what's there--Cybrary.MP4 18.5 MB
  • MP4Module 13 - Web Applications/Is there such a thing as -User Session- hacking- -Cybrary.MP4 8.0 MB
【影视】 Hacking Related Documentaries
收录时间:2017-02-08 文档个数:37 文档大小:25.6 GB 最近下载:2025-05-15 人气:3671 磁力链接
  • mp4DEF CON 20 Documentary 1080p.mp4 8.8 GB
  • mp4DEF CON 20 Documentary 720p.mp4 4.9 GB
  • m4vDEF CON 20 Documentary Preview 1 1080p.m4v 2.2 GB
  • m4vDEF CON 20 Documentary Preview 1 720p.m4v 1.4 GB
  • aviHacker Documentary - 2001 - Revolution OS - Open Source.avi 735.4 MB
  • aviHacker Documentary - 2001 - Freedom Downtime.avi 733.9 MB
  • mp4Hacker Documentary - 2012 - Free the Network Hackers Take Back the Web.mp4 630.2 MB
  • mpgHacker Documentary - 2001 - Mondo Hacker.mpg 624.9 MB
  • mpgHacker Documentary - 2002 - Hacking group The Realm and Electron.mpg 584.9 MB
  • mp4Hacker Documentary - 1999 - Larry Wall interview - PERL creator.mp4 526.2 MB
  • m4vHacker Documentary - 2005 - BBS Documentary - HPAC (Excerpt).m4v 481.3 MB
  • mp4Hacker Documentary - 1990 - The KGB the Computer and Me by Robin Bates.mp4 320.4 MB
  • mp4Hackers Testifying at the United States Senate, May 19, 1998 (L0pht Heavy Industries).mp4 297.1 MB
  • mp4Hacker Documentary - 2012 - We Are Legion The Story of the Hacktivists by Brian Knappenberger.mp4 294.9 MB
  • m4vHacker Documentary - 2000 - Commodore 64 Cracks by Iron Feather.m4v 263.1 MB
  • aviHacker Documentary - 2001 - The Secret History Of Hacking.avi 256.3 MB
  • m4vHacker Documentary - 2008 - Hackers Are People Too by Ashley Schwartau.m4v 254.2 MB
  • mp4Hacker Documentary - 2010 - Hackers Wanted by Samuel Bozo.mp4 249.8 MB
  • mp4Hacker Documentary - 2003 - Hackers Outlaws and Angels.mp4 242.0 MB
  • aviHacker Documentary - 2000 - New York City hackers.avi 228.2 MB
【影视】 Hacking.the.System.S01E10.Money.Hacks.720p.HDTV.x264-DHD[brassetv]
收录时间:2015-02-24 文档个数:3 文档大小:655.0 MB 最近下载:2025-05-15 人气:335 磁力链接
  • txtBookmarkAndRead.txt 116 Bytes
  • mkvHacking.the.System.S01E10.Money.Hacks.720p.HDTV.x264-DHD.mkv 655.0 MB
  • nfohacking.the.system.s01e10.720p-dhd.nfo 488 Bytes
【影视】 UDEMY HACKING WIRELESS NETWORKS THEORY AND PRACTICE TUTORIAL
收录时间:2017-02-08 文档个数:27 文档大小:825.6 MB 最近下载:2025-05-16 人气:4614 磁力链接
  • txt01_-_Download_your_Training_Operating_System_v2.0_CE/01_-_Download_the_TOS_v2.0_CE_CUDA_Extension_ISO_image.txt 3.2 kB
  • txt02_-_Download_the_whole_course_Handbook/02_-_Download_the_course_Handbook_in_PDF.txt 133 Bytes
  • mp404_-_Introduction_to_wireless_networks/10_-_Wireless_network_interface_cards_in_Linux.mp4 8.4 MB
  • mp405_-_Wireless_security_half_measures_-_An_overview/12_-_Changing_the_MAC_address_of_the_wireless_network_card.mp4 17.1 MB
  • mp405_-_Wireless_security_half_measures_-_An_overview/14_-_Finding_a_hidden_access_point_with_disabled_ESSID_broadcast.mp4 16.1 MB
  • mp406_-_Wireless_network_attacks_independent_of_used_encryption/19_-_The_use_of_deauthentication_attack_for_jamming_network_traffic.mp4 15.3 MB
  • mp407_-_WEP_attacks/28_-_Interactive_packet_replay_and_ARP_request_replay.mp4 21.1 MB
  • mp407_-_WEP_attacks/27_-_Generating_packets_without_knowing_the_network_key.mp4 14.8 MB
  • mp407_-_WEP_attacks/25_-_The_overview_and_demonstration_of_the_chop-chop_attack.mp4 14.4 MB
  • mp407_-_WEP_attacks/29_-_The_demonstration_of_the_PTW_and_KoreK_attacks.mp4 12.6 MB
  • mp407_-_WEP_attacks/31_-_Creating_a_fake_access_point_the_Caffe_Latte_attack.mp4 10.4 MB
  • mp408_-_WPA_attacks/34_-_The_dictionary_attack_on_WPA.mp4 12.9 MB
  • mp408_-_WPA_attacks/37_-_The_dictionary_attack_on_WPA_using_hash_tables.mp4 9.3 MB
  • mp409_-_CUDA-powered_attacks/46_-_CUDA_the_attack_on_WPA.mp4 37.3 MB
  • mp409_-_CUDA-powered_attacks/43_-_The_compilation_and_installation_of_the_tools_with_CUDA_support.mp4 29.8 MB
  • mp409_-_CUDA-powered_attacks/48_-_Applications_for_cracking_MD4_and_MD5_hashes_with_the_use_of_CUDA_technology.mp4 21.7 MB
  • mp409_-_CUDA-powered_attacks/44_-_The_optimization_of_the_parameters_of_an_nVidia_video_card.mp4 20.4 MB
  • mp409_-_CUDA-powered_attacks/42_-_The_installation_of_CUDA-SDK_and_CUDA-Toolkit.mp4 15.3 MB
  • mp409_-_CUDA-powered_attacks/45_-_CUDA_preparation_for_the_attack.mp4 9.9 MB
  • mp409_-_CUDA-powered_attacks/47_-_Generating_your_own_dictionary.mp4 9.4 MB
【影视】 Hacking - Unauthorized Access
收录时间:2017-02-08 文档个数:5 文档大小:105.4 MB 最近下载:2025-03-01 人气:449 磁力链接
  • txtINFO.txt 103 Bytes
  • WMVPART1.WMV 32.1 MB
  • WMVPART2.WMV 15.7 MB
  • WMVPART3.WMV 24.7 MB
  • WMVPART4.WMV 33.0 MB
【影视】 Pluralsight - Ethical Hacking - Sniffing
收录时间:2017-02-08 文档个数:39 文档大小:264.4 MB 最近下载:2025-05-15 人气:4504 磁力链接
  • mp401. Sniffing Its Not the Cold Season/01_01-Introduction.mp4 8.1 MB
  • mp401. Sniffing Its Not the Cold Season/01_02-Old Method, New Technology.mp4 13.5 MB
  • mp401. Sniffing Its Not the Cold Season/01_03-Sniffing Dangers.mp4 5.0 MB
  • mp401. Sniffing Its Not the Cold Season/01_04-Types of Sniffing.mp4 13.1 MB
  • mp401. Sniffing Its Not the Cold Season/01_05-Hardware vs. Software.mp4 7.7 MB
  • mp401. Sniffing Its Not the Cold Season/01_06-Summary.mp4 2.8 MB
  • mp402. DHCP Assaults/02_01-Introduction.mp4 2.9 MB
  • mp402. DHCP Assaults/02_02-A Refresher on DHCP.mp4 13.8 MB
  • mp402. DHCP Assaults/02_03-The Starvation.mp4 7.2 MB
  • mp402. DHCP Assaults/02_04-Going Rogue.mp4 3.8 MB
  • mp402. DHCP Assaults/02_05-Countermeasures.mp4 9.0 MB
  • mp402. DHCP Assaults/02_06-Summary.mp4 2.5 MB
  • mp403. BigMAC Attacks/03_01-BigMAC Attack.mp4 2.6 MB
  • mp403. BigMAC Attacks/03_02-Whats a MAC.mp4 5.1 MB
  • mp403. BigMAC Attacks/03_03-MAC Spelled Backwards CAM.mp4 7.4 MB
  • mp403. BigMAC Attacks/03_04-Flooding.mp4 3.8 MB
  • mp403. BigMAC Attacks/03_05-Countermeasures.mp4 3.3 MB
  • mp403. BigMAC Attacks/03_06-Summary.mp4 2.9 MB
  • mp404. ARP Poisoning/04_01-ARP Poisoning.mp4 3.6 MB
  • mp404. ARP Poisoning/04_02-A ARP Review.mp4 12.6 MB
【影视】 Pluralsight - Ethical Hacking - Buffer Overflow
收录时间:2017-02-08 文档个数:33 文档大小:465.1 MB 最近下载:2025-05-15 人气:3413 磁力链接
  • mp401.What Are Buffer Overflows/0103.What Happens After a Buffer Overflows.mp4 17.9 MB
  • mp401.What Are Buffer Overflows/0104.How Do You Keep Buffers from Overflowing.mp4 14.1 MB
  • mp401.What Are Buffer Overflows/0101.What Are Buffer Overflows.mp4 13.1 MB
  • mp401.What Are Buffer Overflows/0102.Why Do Buffers Overflow.mp4 11.6 MB
  • mp401.What Are Buffer Overflows/0105.Summary.mp4 5.2 MB
  • mp402.Inside Buffer Overflows/0205.Exploiting Stack Overflows.mp4 26.4 MB
  • mp402.Inside Buffer Overflows/0201.Inside Buffer Overflows.mp4 14.2 MB
  • mp402.Inside Buffer Overflows/0207.Exploiting Heap Overflows.mp4 12.9 MB
  • mp402.Inside Buffer Overflows/0203.The Stack in Code.mp4 10.4 MB
  • mp402.Inside Buffer Overflows/0202.Inside the Stack.mp4 9.2 MB
  • mp402.Inside Buffer Overflows/0208.Structured Exception Handling.mp4 9.0 MB
  • mp402.Inside Buffer Overflows/0209.Inside Integer Overflows.mp4 8.2 MB
  • mp402.Inside Buffer Overflows/0206.Inside the Heap.mp4 7.9 MB
  • mp402.Inside Buffer Overflows/0204.Overflowing the Stack.mp4 6.1 MB
  • mp402.Inside Buffer Overflows/0210.Summary.mp4 2.3 MB
  • mp403.Finding Buffer Overflows/0303.Vulnerability Databases and Reports.mp4 26.3 MB
  • mp403.Finding Buffer Overflows/0305.Static Code Analysis.mp4 25.1 MB
  • mp403.Finding Buffer Overflows/0304.Programming Standards and Guidelines.mp4 24.6 MB
  • mp403.Finding Buffer Overflows/0307.Automated Code Analysis.mp4 17.9 MB
  • mp403.Finding Buffer Overflows/0308.Reporting Buffer Overflows.mp4 17.8 MB
【影视】 Pluralsight - Ethical Hacking - Session Hijacking
收录时间:2017-02-08 文档个数:54 文档大小:426.2 MB 最近下载:2025-05-13 人气:3133 磁力链接
  • mp401. Understanding Session Hijacking/01_01-Overview.mp4 3.3 MB
  • mp401. Understanding Session Hijacking/01_02-What Is Session Hijacking.mp4 2.2 MB
  • mp401. Understanding Session Hijacking/01_03-Types of Session Hijacking.mp4 4.1 MB
  • mp401. Understanding Session Hijacking/01_04-Attack Vectors.mp4 3.5 MB
  • mp401. Understanding Session Hijacking/01_05-The Impact of Session Hijacking.mp4 6.4 MB
  • mp401. Understanding Session Hijacking/01_06-Session Hijacking and the OWASP Top 10.mp4 8.5 MB
  • mp401. Understanding Session Hijacking/01_07-Summary.mp4 1.8 MB
  • mp402. Session Persistence in Web Applications/02_01-Overview.mp4 2.2 MB
  • mp402. Session Persistence in Web Applications/02_02-The Stateless Nature of HTTP.mp4 4.8 MB
  • mp402. Session Persistence in Web Applications/02_03-Persisting State Over HTTP.mp4 7.3 MB
  • mp402. Session Persistence in Web Applications/02_04-Session Persistence in Cookies.mp4 16.7 MB
  • mp402. Session Persistence in Web Applications/02_05-Session Persistence in the URL.mp4 11.7 MB
  • mp402. Session Persistence in Web Applications/02_06-Session Persistence in Hidden Form Fields.mp4 4.7 MB
  • mp402. Session Persistence in Web Applications/02_07-Summary.mp4 3.3 MB
  • mp403. Hijacking Sessions in Web Applications/03_01-Overview.mp4 3.1 MB
  • mp403. Hijacking Sessions in Web Applications/03_02-Hijacking Cookies with Cross Site Scripting.mp4 21.4 MB
  • mp403. Hijacking Sessions in Web Applications/03_03-Exposed Cookie Based Session IDs in Logs.mp4 11.2 MB
  • mp403. Hijacking Sessions in Web Applications/03_04-Exposed URL Based Session IDs in Logs.mp4 12.5 MB
  • mp403. Hijacking Sessions in Web Applications/03_05-Leaking URL Persisted Sessions in the Referrer.mp4 12.3 MB
  • mp403. Hijacking Sessions in Web Applications/03_06-Session Sniffing.mp4 14.4 MB
【影视】 Tekpub - Hacking WebMatrix
收录时间:2017-02-08 文档个数:6 文档大小:1.1 GB 最近下载:2025-05-16 人气:1125 磁力链接
  • flv6 - High Level Testing With Quixote.flv 222.7 MB
  • flv1 - What Do We Have To Work With Here-.flv 211.6 MB
  • flv4 - Layouts and URLs.flv 202.9 MB
  • flv5 - Migrations with Manatee.flv 152.7 MB
  • flv2 - Cleaning Things Up_ Making It Sweeter.flv 142.7 MB
  • flv3 - Data Access with Massive.flv 134.9 MB
【影视】 Mr.Robot.S02E00.Hacking.Robot.101.720p.HDTV.x264-BATV[rarbg]
收录时间:2017-02-08 文档个数:3 文档大小:1.0 GB 最近下载:2025-05-15 人气:2649 磁力链接
  • mkvMr.Robot.S02E00.Hacking.Robot.101.720p.HDTV.x264-BATV.mkv 1.0 GB
  • txtRARBG.com.txt 34 Bytes
  • nfomr.robot.s02e00.hacking.robot.101.720p.hdtv.x264-batv.nfo 3.9 kB
【影视】 Mr.Robot.S02E00.Hacking.Robot.102.HDTV.x264-BATV[ettv]
收录时间:2017-02-08 文档个数:2 文档大小:233.5 MB 最近下载:2025-05-15 人气:2328 磁力链接
  • mkvMr.Robot.S02E00.Hacking.Robot.102.HDTV.x264-BATV[ettv].mkv 233.5 MB
  • txtTorrent-Downloaded-from-ExtraTorrent.cc.txt 169 Bytes
【影视】 scenario based hacking
收录时间:2017-02-09 文档个数:4 文档大小:124.9 MB 最近下载:2025-05-09 人气:197 磁力链接
  • mp430059862_2.mp4 46.6 MB
  • mp429950797.mp4 30.1 MB
  • mp430130465.mp4 28.3 MB
  • mp429949243.mp4 20.0 MB
【影视】 UDEMY WEBSITE HACKING IN PRACTICE TUTORIAL
收录时间:2017-02-09 文档个数:21 文档大小:402.6 MB 最近下载:2025-05-14 人气:6661 磁力链接
  • txt02_-_Download_your_training_code_and_examples/03_-_Your_ZIP_package_with_source_codes_and_examples.txt 79 Bytes
  • mp403_-_Environment_setup_and_training_system_configuration/05_-_Module_01._Introduction_and_environment_configuration_-_Video_Training.mp4 74.6 MB
  • mp404_-_Basic_techniques/09_-_Module_03._Brute-force_and_dictionary_attacks_-_Video_Training.mp4 45.4 MB
  • mp404_-_Basic_techniques/11_-_Module_04._Account_lockout_attack_-_Video_Training.mp4 15.4 MB
  • mp404_-_Basic_techniques/07_-_Module_02._Deep_data_hiding_-_Video_Training.mp4 6.6 MB
  • mp405_-_Lets_get_deeper_-_data_leaks/15_-_Module_06._Path_and_information_disclosure_-_Video_Training.mp4 19.7 MB
  • mp405_-_Lets_get_deeper_-_data_leaks/19_-_Module_08._Path_traversal_-_Video_Training.mp4 18.2 MB
  • mp405_-_Lets_get_deeper_-_data_leaks/22_-_Module_10._Parameter_delimiter_-_Video_Training.mp4 13.0 MB
  • mp405_-_Lets_get_deeper_-_data_leaks/17_-_Module_07._Forced_browsing_-_Video_Training.mp4 6.5 MB
  • mp405_-_Lets_get_deeper_-_data_leaks/13_-_Module_05._Web_parameter_tampering_-_Video_Training.mp4 5.5 MB
  • mp406_-_Incjection_attacks/28_-_Module_13._SQL_injection_-_Video_Training.mp4 39.5 MB
  • mp406_-_Incjection_attacks/26_-_Module_12._Direct_static_code_injection_-_Video_Training.mp4 20.6 MB
  • mp406_-_Incjection_attacks/24_-_Module_11._PHP_injection_-_Video_Training.mp4 19.0 MB
  • mp407_-_XSS_related_attacks/30_-_Module_14._XSS_-_Cross_Site_Scripting_attack_-_Video_Training.mp4 19.1 MB
  • mp407_-_XSS_related_attacks/34_-_Module_15._XSRF_-_Cross_Site_Request_Forgery_attack_-_Video_Training.mp4 13.3 MB
  • mp407_-_XSS_related_attacks/32_-_Module_14B._XST_-_Cross_Site_Tracing_attack_-_Video_Training.mp4 11.7 MB
  • mp408_-_More_advanced_techniques/36_-_Module_16._Spying_on_data_with_a_browser_-_Video_Training.mp4 16.9 MB
  • mp408_-_More_advanced_techniques/38_-_Module_17._Session_hijacking_-_Video_Training.mp4 10.3 MB
  • mp408_-_More_advanced_techniques/40_-_Module_18._Session_fixation_-_Video_Training.mp4 8.5 MB
  • mp409_-_Phishing/42_-_Module_19._Phishing_-_Video_Training.mp4 12.2 MB
【影视】 INE - Certified Ethical Hacker (CEH) Module 1 Introduction to Ethical Hacking
收录时间:2017-02-09 文档个数:5 文档大小:271.1 MB 最近下载:2025-05-16 人气:1306 磁力链接
  • mp401 - Topic/02 - Cyber Attacks in Real Life.mp4 68.7 MB
  • mp401 - Topic/05 - InfoSec Practices.mp4 61.8 MB
  • mp401 - Topic/03 - Ethical Hacking Overview.mp4 50.8 MB
  • mp401 - Topic/01 - Intro to Certified Ethical Hacker Course.mp4 50.7 MB
  • mp401 - Topic/04 - Concepts and Terminology.mp4 39.0 MB
【影视】 creativeLive - Learn Anything Hacking Your Education
收录时间:2017-02-09 文档个数:6 文档大小:5.4 GB 最近下载:2025-05-15 人气:1356 磁力链接
  • wmvCreativeLive - Dale J. Stephens - Learn Anything Hacking Your Education - Day 1.wmv 2.0 GB
  • wmvCreativeLive - Dale J. Stephens - Learn Anything Hacking Your Education - Day 2.wmv 2.0 GB
  • wmvCreativeLive - Dale J. Stephens - Learn Anything Hacking Your Education - Day 3.wmv 1.5 GB
  • txt000. GFX Stuff.txt 209.3 kB
  • txtLanguage Learning.txt 822 Bytes
  • txtshareislove.txt 759 Bytes
【影视】 Udemy- Learn.The.Basics.of.Ethical.Hacking.and.Penetration.Testing
收录时间:2017-02-09 文档个数:55 文档大小:3.4 GB 最近下载:2025-05-16 人气:471 磁力链接
  • mp4Section 8 - Windows Exploit Development/54. Using Immunity Debugger and Metasploit to develop a windows exploit.mp4 480.2 MB
  • mp4Section 7 - Web Exploitation Techniques/48. Exploiting SQL Injection to Full System Access (MYSQL).mp4 249.0 MB
  • mp4Section 5 - Windows and Linux Attacking Techniques/41. Attacking and Hacking Windows.mp4 244.2 MB
  • mp4Section 6 - Windows and Linux Post-Exploitation Techniques/43. Windows post exploitation techniques.mp4 194.7 MB
  • mp4Section 6 - Windows and Linux Post-Exploitation Techniques/44. Linux post exploitation techniques.mp4 167.1 MB
  • mp4Section 7 - Web Exploitation Techniques/53. Exploiting XSS ( Reflected and Stored ) and CSRF to Full System Access.mp4 163.1 MB
  • mp4Section 7 - Web Exploitation Techniques/51. Exploiting Blind SQL Injection to Full System Access (MSSQL).mp4 148.0 MB
  • mp4Section 4 - Network Attacking Techniques/38. Password cracking, MITM, Sniffing SSL and RDP Attacks.mp4 147.2 MB
  • mp4Section 7 - Web Exploitation Techniques/52. Exploiting RFI, Local File include, File Uploads and RCE.mp4 122.5 MB
  • mp4Section 3 - Scanning and vulnerability Assessment/35. Network scanning techniques.mp4 121.2 MB
  • mp4Section 3 - Scanning and vulnerability Assessment/36. Vulnerability Identification and Assessment techniques.mp4 96.7 MB
  • mp4Section 5 - Windows and Linux Attacking Techniques/39. Windows Security Overview for Penetration Testers.mp4 88.4 MB
  • mp4Section 7 - Web Exploitation Techniques/47.Web Application Scanning and Mapping.mp4 84.2 MB
  • mp4Section 7 - Web Exploitation Techniques/49. Exploiting SQL Injection to Full System Access (MSSQL).mp4 77.3 MB
  • mp4Section 5 - Windows and Linux Attacking Techniques/42. Attacking and Hacking Linux.mp4 71.3 MB
  • mp4Section 7 - Web Exploitation Techniques/46. Web Application Primer.mp4 70.0 MB
  • mp4Section 2 - Real World Information Intelligence Techniques/20. Google Search Techniques for penetration testers.mp4 66.8 MB
  • mp4Section 2 - Real World Information Intelligence Techniques/29. DNS Enumerating for penetration testers.mp4 66.2 MB
  • mp4Section 3 - Scanning and vulnerability Assessment/37. Practical Evasion and avoidance Techniques.mp4 57.3 MB
  • mp4Section 2 - Real World Information Intelligence Techniques/28.Web Application Firewall Detection, HTTP and DNS load balancer detection.mp4 56.7 MB
【影视】 IT Security Beginner Certified Hacking Training
收录时间:2017-02-09 文档个数:25 文档大小:2.4 GB 最近下载:2025-05-12 人气:1146 磁力链接
  • mp4IT Security Beginner Certified Hacking Training/Section 4 - Network administration/Lecture 13 - Monitoring transmitted data.mp4 284.8 MB
  • mp4IT Security Beginner Certified Hacking Training/Section 6 - Operating Systems Security/Lecture 19 - Malware.mp4 252.3 MB
  • mp4IT Security Beginner Certified Hacking Training/Section 2 - Computer Network Security/Lecture 6 - Network Protocols.mp4 163.3 MB
  • mp4IT Security Beginner Certified Hacking Training/Section 5 - Wireless Networks Security/Lecture 15 - Standards and Security Solutions.mp4 149.4 MB
  • mp4IT Security Beginner Certified Hacking Training/Section 8 - Windows Security/Lecture 25 - Encryption.mp4 137.6 MB
  • mp4IT Security Beginner Certified Hacking Training/Section 3 - Designing Secure Computer Networks/Lecture 11 - Protocols and Services.mp4 134.0 MB
  • mp4IT Security Beginner Certified Hacking Training/Section 1 - IT Security Trends/Lecture 3 - Changing IT Security Trends.mp4 130.4 MB
  • mp4IT Security Beginner Certified Hacking Training/Section 7 - Access Control/Lecture 21 - Authentication.mp4 129.9 MB
  • mp4IT Security Beginner Certified Hacking Training/Section 6 - Operating Systems Security/Lecture 18 - OS Security Boundaries.mp4 126.0 MB
  • mp4IT Security Beginner Certified Hacking Training/Section 2 - Computer Network Security/Lecture 8 - Application Protocols.mp4 109.7 MB
  • mp4IT Security Beginner Certified Hacking Training/Section 5 - Wireless Networks Security/Lecture 16 - Wi-Fi Security Threats.mp4 97.9 MB
  • mp4IT Security Beginner Certified Hacking Training/Section 7 - Access Control/Lecture 22 - Identity Theft.mp4 96.9 MB
  • mp4IT Security Beginner Certified Hacking Training/Section 1 - IT Security Trends/Lecture 4 - Data security.mp4 89.6 MB
  • mp4IT Security Beginner Certified Hacking Training/Section 8 - Windows Security/Lecture 24 - Techniques and Methods.mp4 88.3 MB
  • mp4IT Security Beginner Certified Hacking Training/Section 3 - Designing Secure Computer Networks/Lecture 10 - Subnetting.mp4 81.6 MB
  • mp4IT Security Beginner Certified Hacking Training/Section 2 - Computer Network Security/Lecture 7 - Transport Protocols.mp4 81.0 MB
  • mp4IT Security Beginner Certified Hacking Training/Section 1 - IT Security Trends/Lecture 1-Current Cyber Threats.mp4 77.5 MB
  • mp4IT Security Beginner Certified Hacking Training/Section 1 - IT Security Trends/Lecture 2- Popular Myths About Computer System Security.mp4 60.6 MB
  • mp4IT Security Beginner Certified Hacking Training/Section 6 - Operating Systems Security/Lecture 17 - OS Security - Introduction.mp4 35.6 MB
  • mp4IT Security Beginner Certified Hacking Training/Section 2 - Computer Network Security/Lecture 5 - Computer Network Security - Introduction.mp4 16.6 MB
【影视】 Lynda - Ethical Hacking - Social Engineering
收录时间:2017-02-09 文档个数:20 文档大小:298.5 MB 最近下载:2025-05-14 人气:2756 磁力链接
  • mp40. Introduction/503993_00_01_WL30_Welcome.mp4 27.0 MB
  • mp40. Introduction/503993_00_03_XR15_Disclaimer.mp4 2.6 MB
  • mp40. Introduction/503993_00_02_XR15_Wht_You_Shd_Know.mp4 2.2 MB
  • mp41. Social Engineering Overview/503993_01_04_MM30_Recogn_an_Att.mp4 16.0 MB
  • mp41. Social Engineering Overview/503993_01_02_MM30_Visualize_The_Victim.mp4 13.2 MB
  • mp41. Social Engineering Overview/503993_01_03_XR15_Skills_of_a_SE.mp4 10.1 MB
  • mp41. Social Engineering Overview/503993_01_01_XR15_Define_Soc_Eng.mp4 9.0 MB
  • mp42. Social Engineering Mechanisms/503993_02_01_MM30_Charm_Pwr_Inf.mp4 32.9 MB
  • mp42. Social Engineering Mechanisms/503993_02_04_XR15_Manip_W_Soc_Med.mp4 20.3 MB
  • mp42. Social Engineering Mechanisms/503993_02_02_XR15_Browser_Based_SE.mp4 19.3 MB
  • mp42. Social Engineering Mechanisms/503993_02_03_XR15_Deploy_Mobile_Attacks.mp4 8.7 MB
  • mp43. Misuse of Trust/503993_03_02_XR15_Pre_In_Attacks.mp4 20.4 MB
  • mp43. Misuse of Trust/503993_03_01_MM30_Gr_Disgrutled_Emp.mp4 19.7 MB
  • mp43. Misuse of Trust/503993_03_03_XR15_Steal_an_Identity.mp4 14.5 MB
  • mp44. Penetration Testing with Social Engineering/503993_04_04_XR15_SET_Kali.mp4 24.1 MB
  • mp44. Penetration Testing with Social Engineering/503993_04_02_MM30_InPerson_OnPhone.mp4 20.4 MB
  • mp44. Penetration Testing with Social Engineering/503993_04_01_XR15_UsingEmailWebsites.mp4 14.3 MB
  • mp44. Penetration Testing with Social Engineering/503993_04_05_XR15_Impacts_Counter.mp4 11.1 MB
  • mp44. Penetration Testing with Social Engineering/503993_04_03_XR15_Using_SET.mp4 8.4 MB
  • mp45. Conclusion/503993_05_01_XR15_Summary.mp4 4.1 MB
共74页 上一页 2 3 4 5 6 7 8 9 10 下一页