Network Pen Testing with Python

Network Pen Testing with Python

File Size: 195.05 MB

Creat Time: 2024-07-30 17:11:58

Last Active: 2024-11-20 02:21:59

Active Degree: 50

Magnet Link: Magnet LinkMagnet Link

Statement: This site does not provide download links, only text displays, and does not contain any infringement.

File List:

  1. 4. Actions on Objectives and Data Exfiltration with Python/06. Demo - Exfiltrating Data via Cloud Object Storage Services.mp4 18.47 MB
  2. 3. Post Exploitation with Python/04. Demo - Establishing Persistence via Windows Service.mp4 14.69 MB
  3. 3. Post Exploitation with Python/02. Interacting with Windows Internals.mp4 13.31 MB
  4. 4. Actions on Objectives and Data Exfiltration with Python/02. Avoiding Signature Detections and DLP.mp4 12.17 MB
  5. 4. Actions on Objectives and Data Exfiltration with Python/04. Demo - Encrypting Data with Python.mp4 11.89 MB
  6. 2. Initial Access and Network Scanning with Python/03. Demo - Crafting DNS and Ping Requests.mp4 11.41 MB
  7. 2. Initial Access and Network Scanning with Python/05. Demo - Performing Network and Port Scanning with Scapy.mp4 11.21 MB
  8. 3. Post Exploitation with Python/03. Demo - Identifying and Exploiting Local Scripts.mp4 10.46 MB
  9. 2. Initial Access and Network Scanning with Python/06. Parsing PCAP Files with Scapy.mp4 9.43 MB
  10. 2. Initial Access and Network Scanning with Python/08. Demo - Performing ARP MitM with Scapy.mp4 9.38 MB
  11. 4. Actions on Objectives and Data Exfiltration with Python/05. Demo - Exfiltrating Data via SMTP.mp4 8.12 MB
  12. exercise.zip 8.00 MB
  13. 2. Initial Access and Network Scanning with Python/09. Abusing Common Network Protocols.mp4 7.93 MB
  14. 2. Initial Access and Network Scanning with Python/02. Getting Started with Scapy.mp4 6.52 MB
  15. 2. Initial Access and Network Scanning with Python/01. Introduction.mp4 6.51 MB
  16. 2. Initial Access and Network Scanning with Python/04. Performing Network Discovery with Scapy.mp4 5.87 MB
  17. 4. Actions on Objectives and Data Exfiltration with Python/01. Introduction.mp4 4.91 MB
  18. 3. Post Exploitation with Python/01. Introduction.mp4 4.72 MB
  19. 4. Actions on Objectives and Data Exfiltration with Python/03. Demo - Encoding and Compressing Data with Python.mp4 4.67 MB
  20. 2. Initial Access and Network Scanning with Python/07. Overview of Man-in-the-Middle Attacks.mp4 4.46 MB
  21. 1. Course Overview/01. Course Overview.mp4 3.92 MB
  22. 4. Actions on Objectives and Data Exfiltration with Python/07. Summary.mp4 3.75 MB
  23. 3. Post Exploitation with Python/05. Summary.mp4 1.67 MB
  24. 2. Initial Access and Network Scanning with Python/10. Summary.mp4 1.47 MB
  25. 4. Actions on Objectives and Data Exfiltration with Python/06. Demo - Exfiltrating Data via Cloud Object Storage Services.vtt 7 KB
  26. 4. Actions on Objectives and Data Exfiltration with Python/02. Avoiding Signature Detections and DLP.vtt 6 KB
  27. 3. Post Exploitation with Python/04. Demo - Establishing Persistence via Windows Service.vtt 6 KB
  28. 2. Initial Access and Network Scanning with Python/05. Demo - Performing Network and Port Scanning with Scapy.vtt 6 KB
  29. 2. Initial Access and Network Scanning with Python/03. Demo - Crafting DNS and Ping Requests.vtt 5 KB
  30. 3. Post Exploitation with Python/03. Demo - Identifying and Exploiting Local Scripts.vtt 5 KB
  31. 4. Actions on Objectives and Data Exfiltration with Python/04. Demo - Encrypting Data with Python.vtt 5 KB
  32. 3. Post Exploitation with Python/02. Interacting with Windows Internals.vtt 4 KB
  33. 2. Initial Access and Network Scanning with Python/09. Abusing Common Network Protocols.vtt 4 KB
  34. 2. Initial Access and Network Scanning with Python/06. Parsing PCAP Files with Scapy.vtt 4 KB
  35. 2. Initial Access and Network Scanning with Python/02. Getting Started with Scapy.vtt 4 KB
  36. 2. Initial Access and Network Scanning with Python/01. Introduction.vtt 4 KB
  37. 4. Actions on Objectives and Data Exfiltration with Python/05. Demo - Exfiltrating Data via SMTP.vtt 4 KB
  38. 2. Initial Access and Network Scanning with Python/08. Demo - Performing ARP MitM with Scapy.vtt 4 KB
  39. 2. Initial Access and Network Scanning with Python/04. Performing Network Discovery with Scapy.vtt 4 KB
  40. 3. Post Exploitation with Python/01. Introduction.vtt 3 KB
  41. 4. Actions on Objectives and Data Exfiltration with Python/03. Demo - Encoding and Compressing Data with Python.vtt 3 KB
  42. 4. Actions on Objectives and Data Exfiltration with Python/01. Introduction.vtt 2 KB
  43. 4. Actions on Objectives and Data Exfiltration with Python/07. Summary.vtt 2 KB
  44. 2. Initial Access and Network Scanning with Python/07. Overview of Man-in-the-Middle Attacks.vtt 2 KB
  45. playlist.m3u 2 KB
  46. 1. Course Overview/01. Course Overview.vtt 1 KB
  47. 3. Post Exploitation with Python/05. Summary.vtt 1 KB
  48. 2. Initial Access and Network Scanning with Python/10. Summary.vtt 1 KB