04 Ethical Hacking 2_ Information Gathering & Enumeration/001 Initial Reconnaissance with OSINT Framework.mp4 194.18 MB
09 Ethical Hacking 7_ Web App Pentesting (OWASP-TOP 10)/014 OWASP Mutillidae II Lab - Part 1.mp4 193.95 MB
02 Get Your Hands Dirty/007 Capture The Flags(CTF)_ HTB and others.mp4 187.85 MB
13 Cobalt Strike_ Operations & Development/002 Introduction to Red Teaming - Part 2.mp4 186.54 MB
11 Practical Pentest with CTFs (Let's Capture The Flags)/004 Easy 3 - NETMON (PRTG Exploit with Python, Creds Discovery & Guessing) - Part 1.mp4 186.07 MB
07 Ethical Hacking 5_ Network Attacks (Wired & Wireless)/002 Man in the Middle Attacks (Sniffing & Spoofing) - Part 2.mp4 184.51 MB
06 Ethical Hacking 4_ Exploitation, Post Exploitation and Password Attacks/007 Metasploitable3 Ubuntu - Part 2.mp4 180.77 MB
11 Practical Pentest with CTFs (Let's Capture The Flags)/018 Hard 1 - CONTROL (Read & Write Webshells with SQLMap, winPEAS) - Part 2.mp4 180.58 MB
06 Ethical Hacking 4_ Exploitation, Post Exploitation and Password Attacks/005 Metasploitable2 - Part 4.mp4 180.51 MB
11 Practical Pentest with CTFs (Let's Capture The Flags)/015 Medium 4 - MANGO (Write NoSQL Injector with Python) - Part 3.mp4 177.66 MB
04 Ethical Hacking 2_ Information Gathering & Enumeration/008 Enum with Metasploit and other tools.mp4 176.48 MB
14 Active Directory Attacks in Depth/007 AS-REP Roast, Hashcat, Pass The Ticket Attacks.mp4 176.20 MB
11 Practical Pentest with CTFs (Let's Capture The Flags)/019 Hard 1 - CONTROL (Windows Priv. Esc Abusing SDDL Perms, Service Exec) - Part 3.mp4 175.10 MB
04 Ethical Hacking 2_ Information Gathering & Enumeration/007 Enum with NMAP Part 2.mp4 172.90 MB
11 Practical Pentest with CTFs (Let's Capture The Flags)/007 Medium 2 - BLUNDER (Gobuster, Bludit CMS exploits) - Part 1.mp4 172.00 MB
06 Ethical Hacking 4_ Exploitation, Post Exploitation and Password Attacks/001 Initial Presentation.mp4 171.46 MB
11 Practical Pentest with CTFs (Let's Capture The Flags)/013 Medium 4 - MANGO (Recon, NoSQL MongoDB Injection) - Part 1.mp4 169.61 MB
06 Ethical Hacking 4_ Exploitation, Post Exploitation and Password Attacks/013 Password Hash Crack - Part 1.mp4 168.55 MB
14 Active Directory Attacks in Depth/006 AD Enumeration, Credentials Replay Attacks, Over-PTH, Secretsdump and Evil-WinRM.mp4 168.32 MB
06 Ethical Hacking 4_ Exploitation, Post Exploitation and Password Attacks/008 Metasploitable3 Ubuntu - Part 3.mp4 165.44 MB
06 Ethical Hacking 4_ Exploitation, Post Exploitation and Password Attacks/012 Metasploitable3 Win2k8 - Part 3.mp4 163.83 MB
01 Crash Course_ Linux/005 Docker on Linux.mp4 163.56 MB
06 Ethical Hacking 4_ Exploitation, Post Exploitation and Password Attacks/004 Metasploitable2 - Part 3.mp4 162.27 MB
14 Active Directory Attacks in Depth/001 Active Directory Attacks Concepts - Part 1.mp4 161.75 MB
06 Ethical Hacking 4_ Exploitation, Post Exploitation and Password Attacks/006 Metasploitable3 Ubuntu - Part 1.mp4 159.58 MB
14 Active Directory Attacks in Depth/008 Golden Tickets, Kerberoasting against User SPNs and Mimikatz Attacks.mp4 159.10 MB
11 Practical Pentest with CTFs (Let's Capture The Flags)/017 Hard 1 - CONTROL (Manual SQL Injection, SQLmap) - Part 1.mp4 158.73 MB
14 Active Directory Attacks in Depth/005 Vulnerable AD Lab Preparation.mp4 156.73 MB
13 Cobalt Strike_ Operations & Development/004 Red Teaming Operations - Part 2.mp4 156.38 MB
15 MITRE ATT&CK Framework/002 Introduction to MITRE ATT&CK - Part 2.mp4 156.27 MB
11 Practical Pentest with CTFs (Let's Capture The Flags)/016 Medium 4 - MANGO (LinPEAS, GTFOBins Priv. Esc. Attack Vectors) - Part 4.mp4 156.09 MB
13 Cobalt Strike_ Operations & Development/001 Introduction to Red Teaming - Part 1.mp4 156.03 MB
11 Practical Pentest with CTFs (Let's Capture The Flags)/012 Medium 3 - SNIPER (CrackMapExec, Impacket, Cookie Poisoning) - Part 3.mp4 155.43 MB
09 Ethical Hacking 7_ Web App Pentesting (OWASP-TOP 10)/008 Damn Vulnerable Web Application Lab - Part 2.mp4 151.94 MB