Filename Size 1. Introduction and Installation/1. Introduction to the course.mp4 59 MB 1. Introduction and Installation/1. Introduction to the course.vtt 5.3 KB 1. Introduction and Installation/2. VirtualBox installation.mp4 228.3 MB 1. Introduction and Installation/2. VirtualBox installation.vtt 18 KB 1. Introduction and Installation/3. Kali Linux installation.mp4 213.8 MB 1. Introduction and Installation/3. Kali Linux installation.vtt 15.7 KB 1. Introduction and Installation/4. Enabling full-screen.mp4 101.5 MB 1. Introduction and Installation/4. Enabling full-screen.vtt 18.7 KB 10. Python Crash Course/1. Variables.mp4 63.9 MB 10. Python Crash Course/1. Variables.vtt 15.1 KB 10. Python Crash Course/10. Files in Python.mp4 48.8 MB 10. Python Crash Course/10. Files in Python.vtt 13.4 KB 10. Python Crash Course/11. Try and except rule.mp4 27.2 MB 10. Python Crash Course/11. Try and except rule.vtt 5.3 KB 10. Python Crash Course/2. Raw input.mp4 35.2 MB 10. Python Crash Course/2. Raw input.vtt 12.4 KB 10. Python Crash Course/3. If-else statements.mp4 35.1 MB 10. Python Crash Course/3. If-else statements.vtt 10.8 KB 10. Python Crash Course/4. For loops.mp4 22 MB 10. Python Crash Course/4. For loops.vtt 7.1 KB 10. Python Crash Course/5. While loops.mp4 29.2 MB 10. Python Crash Course/5. While loops.vtt 8.6 KB 10. Python Crash Course/6. Python lists.mp4 27.1 MB 10. Python Crash Course/6. Python lists.vtt 9.2 KB 10. Python Crash Course/7. Functions.mp4 60.5 MB 10. Python Crash Course/7. Functions.vtt 16.1 KB 10. Python Crash Course/8. Classes.mp4 38.6 MB 10. Python Crash Course/8. Classes.vtt 11.7 KB 10. Python Crash Course/9. Importing libraries.mp4 33 MB 10. Python Crash Course/9. Importing libraries.vtt 7.9 KB 11. Coding an Advanced Backdoor/1. Theory behind reverse shells.mp4 26.5 MB 11. Coding an Advanced Backdoor/1. Theory behind reverse shells.vtt 7.7 KB 11. Coding an Advanced Backdoor/10. Creating persistence part 1.mp4 54.2 MB 11. Coding an Advanced Backdoor/10. Creating persistence part 1.vtt 7.1 KB 11. Coding an Advanced Backdoor/11. Creating persistence part 2.mp4 124.2 MB 11. Coding an Advanced Backdoor/11. Creating persistence part 2.vtt 18.4 KB 11. Coding an Advanced Backdoor/12. Changing directory.mp4 83 MB 11. Coding an Advanced Backdoor/12. Changing directory.vtt 13 KB 11. Coding an Advanced Backdoor/13. Uploading and downloading files.mp4 208 MB 11. Coding an Advanced Backdoor/13. Uploading and downloading files.vtt 23.8 KB 11. Coding an Advanced Backdoor/14. Downloading files from the internet.mp4 154.4 MB 11. Coding an Advanced Backdoor/14. Downloading files from the internet.vtt 24.6 KB 11. Coding an Advanced Backdoor/15. Starting programs using our backdoor.mp4 45.9 MB 11. Coding an Advanced Backdoor/15. Starting programs using our backdoor.vtt 7.6 KB 11. Coding an Advanced Backdoor/16. Capturing screenshot on the target PC.mp4 147.5 MB 11. Coding an Advanced Backdoor/16. Capturing screenshot on the target PC.vtt 18.9 KB 11. Coding an Advanced Backdoor/17. Embedding backdoor in an image part 1.mp4 91.9 MB 11. Coding an Advanced Backdoor/17. Embedding backdoor in an image part 1.vtt 13.7 KB 11. Coding an Advanced Backdoor/18. Embedding backdoor in an image part 2.mp4 85.7 MB 11. Coding an Advanced Backdoor/18. Embedding backdoor in an image part 2.vtt 9.4 KB 11. Coding an Advanced Backdoor/19. Checking for administrator privileges.mp4 67.3 MB 11. Coding an Advanced Backdoor/19. Checking for administrator privileges.vtt 13.1 KB 11. Coding an Advanced Backdoor/2. Simple server code.mp4 57.4 MB 11. Coding an Advanced Backdoor/2. Simple server code.vtt 13.7 KB 11. Coding an Advanced Backdoor/20. Adding help option.mp4 60.6 MB 11. Coding an Advanced Backdoor/20. Adding help option.vtt 8.5 KB 11. Coding an Advanced Backdoor/3. Connection with reverse shell.mp4 43.6 MB 11. Coding an Advanced Backdoor/3. Connection with reverse shell.vtt 8 KB 11. Coding an Advanced Backdoor/4. Sending and receiving messages.mp4 66.7 MB 11. Coding an Advanced Backdoor/4. Sending and receiving messages.vtt 12.1 KB 11. Coding an Advanced Backdoor/5. Sending messages with while true loop.mp4 54 MB 11. Coding an Advanced Backdoor/5. Sending messages with while true loop.vtt 9.3 KB 11. Coding an Advanced Backdoor/6. Executing commands on target system.mp4 64 MB 11. Coding an Advanced Backdoor/6. Executing commands on target system.vtt 10.1 KB 11. Coding an Advanced Backdoor/7. Fixing backdoor bugs and adding functions.mp4 139.8 MB 11. Coding an Advanced Backdoor/7. Fixing backdoor bugs and adding functions.vtt 22.3 KB 11. Coding an Advanced Backdoor/8. First test using our backdoor.mp4 127.7 MB 11. Coding an Advanced Backdoor/8. First test using our backdoor.vtt 21.8 KB 11. Coding an Advanced Backdoor/9. Trying to connect every 20 seconds.mp4 92 MB 11. Coding an Advanced Backdoor/9. Trying to connect every 20 seconds.vtt 14 KB 12. Creating a Keylogger for the Backdoor/1. Importing Pynput.mp4 43.1 MB 12. Creating a Keylogger for the Backdoor/1. Importing Pynput.vtt 11.8 KB 12. Creating a Keylogger for the Backdoor/2. Simple keylogger.mp4 47.8 MB 12. Creating a Keylogger for the Backdoor/2. Simple keylogger.vtt 10.4 KB 12. Creating a Keylogger for the Backdoor/3. Adding report function.mp4 54.7 MB 12. Creating a Keylogger for the Backdoor/3. Adding report function.vtt 11.2 KB 12. Creating a Keylogger for the Backdoor/4. Writing keystrokes to a file.mp4 73.6 MB 12. Creating a Keylogger for the Backdoor/4. Writing keystrokes to a file.vtt 13.9 KB 12. Creating a Keylogger for the Backdoor/5. Adding the keylogger to our reverse shell part 1.mp4 159.3 MB 12. Creating a Keylogger for the Backdoor/5. Adding the keylogger to our reverse shell part 1.vtt 22.3 KB 12. Creating a Keylogger for the Backdoor/6. Adding the keylogger to our reverse shell part 2.mp4 45.4 MB 12. Creating a Keylogger for the Backdoor/6. Adding the keylogger to our reverse shell part 2.vtt 7.8 KB 12. Creating a Keylogger for the Backdoor/7. Final project test.mp4 126.7 MB 12. Creating a Keylogger for the Backdoor/7. Final project test.vtt 15.6 KB 13. Basic Authentication Bruteforcer/1. Printing banner.mp4 60 MB 13. Basic Authentication Bruteforcer/1. Printing banner.vtt 13 KB 13. Basic Authentication Bruteforcer/2. Adding available options.mp4 57.3 MB 13. Basic Authentication Bruteforcer/2. Adding available options.vtt 12.1 KB 13. Basic Authentication Bruteforcer/3. Starting threads for bruteforce.mp4 43.6 MB 13. Basic Authentication Bruteforcer/3. Starting threads for bruteforce.vtt 9.2 KB 13. Basic Authentication Bruteforcer/4. Writing function to run the attack.mp4 65.1 MB 13. Basic Authentication Bruteforcer/4. Writing function to run the attack.vtt 12.2 KB 13. Basic Authentication Bruteforcer/5. Bruteforcing router login.mp4 49.2 MB 13. Basic Authentication Bruteforcer/5. Bruteforcing router login.vtt 10.3 KB 13. Basic Authentication Bruteforcer/6. Bypassing antivirus with your future programs.mp4 103.8 MB 13. Basic Authentication Bruteforcer/6. Bypassing antivirus with your future programs.vtt 14.7 KB 13. Basic Authentication Bruteforcer/7. Sending malware with spoofed email.mp4 77.9 MB 13. Basic Authentication Bruteforcer/7. Sending malware with spoofed email.vtt 17 KB 14. BONUS - Building a Career in Cyber Security/1. What will you learn in this section.mp4 5.1 MB