Filename Size 1. Introduction/1. Introduction.mp4 7 MB 1. Introduction/1. Introduction.vtt 8 B 1. Introduction/2. Introduction to Termux.mp4 9.1 MB 1. Introduction/2. Introduction to Termux.vtt 1.1 KB 1. Introduction/3. Installing Termux Application on Android Phone.mp4 12.5 MB 1. Introduction/3. Installing Termux Application on Android Phone.vtt 2.5 KB 1. Introduction/4. Hacker Keyboard Installation.mp4 13.7 MB 1. Introduction/4. Hacker Keyboard Installation.vtt 2.1 KB 1. Introduction/5. Top Commands.mp4 19.2 MB 1. Introduction/5. Top Commands.vtt 4.8 KB 2. Miscellaneous/1. Sending SMS.mp4 8.5 MB 2. Miscellaneous/1. Sending SMS.vtt 1.7 KB 2. Miscellaneous/2. Make Call.mp4 5.4 MB 2. Miscellaneous/2. Make Call.vtt 1.3 KB 2. Miscellaneous/3. Creating Storage.mp4 12 MB 2. Miscellaneous/3. Creating Storage.vtt 3 KB 3. Programming/1. C Programming.mp4 8.6 MB 3. Programming/1. C Programming.vtt 2.1 KB 3. Programming/2. c ++ Programming.mp4 10.1 MB 3. Programming/2. c ++ Programming.vtt 2.3 KB 3. Programming/3. Python Programming.mp4 7 MB 3. Programming/3. Python Programming.vtt 1.5 KB 4. Metasploit/1. Installation Metasploit Framework.mp4 12.2 MB 4. Metasploit/1. Installation Metasploit Framework.vtt 2.6 KB 4. Metasploit/2. Android Phone Hacking.mp4 11.6 MB 4. Metasploit/2. Android Phone Hacking.vtt 2.3 KB 4. Metasploit/3. Accessing the Files and Contacts of Android Phone.mp4 17.2 MB 4. Metasploit/3. Accessing the Files and Contacts of Android Phone.vtt 3.6 KB 4. Metasploit/4. Hacking Windows.mp4 14.2 MB 4. Metasploit/4. Hacking Windows.vtt 3.1 KB 5. AUXILIRY MODULES METASPLOIT/1. Http enum_wayback auxiliary scanner.mp4 7.5 MB 5. AUXILIRY MODULES METASPLOIT/1. Http enum_wayback auxiliary scanner.vtt 2.6 KB 5. AUXILIRY MODULES METASPLOIT/2. Endpoint_mapper - Scanner DCERPC Auxiliary Modules.mp4 13 MB 5. AUXILIRY MODULES METASPLOIT/2. Endpoint_mapper - Scanner DCERPC Auxiliary Modules.vtt 2.4 KB 5. AUXILIRY MODULES METASPLOIT/3. Autopwn - auxiliary scanner.mp4 17.9 MB 5. AUXILIRY MODULES METASPLOIT/3. Autopwn - auxiliary scanner.vtt 2.9 KB 5. AUXILIRY MODULES METASPLOIT/4. Email harvesting Using Metasploit.mp4 13.8 MB 5. AUXILIRY MODULES METASPLOIT/4. Email harvesting Using Metasploit.vtt 3.1 KB 5. AUXILIRY MODULES METASPLOIT/5. SSH version Scanner.mp4 14.3 MB 5. AUXILIRY MODULES METASPLOIT/5. SSH version Scanner.vtt 2.9 KB 5. AUXILIRY MODULES METASPLOIT/6. FTP Version Scanning.mp4 12.7 MB 5. AUXILIRY MODULES METASPLOIT/6. FTP Version Scanning.vtt 2.6 KB 5. AUXILIRY MODULES METASPLOIT/7. Heartbleed Vulnerability(openssl scanner).mp4 15.9 MB 5. AUXILIRY MODULES METASPLOIT/7. Heartbleed Vulnerability(openssl scanner).vtt 2.6 KB 6. Nmap/1. Checking the status of target Machine.mp4 9.3 MB 6. Nmap/1. Checking the status of target Machine.vtt 1.6 KB 6. Nmap/2. Checking the ports of target Machines.mp4 15.1 MB 6. Nmap/2. Checking the ports of target Machines.vtt 3.3 KB 7. Miscellaneous Hackings/1. DDOS Attack.mp4 12.1 MB 7. Miscellaneous Hackings/1. DDOS Attack.vtt 2.9 KB 7. Miscellaneous Hackings/2. SQL mapping.mp4 20.2 MB 7. Miscellaneous Hackings/2. SQL mapping.vtt 3.1 KB 7. Miscellaneous Hackings/3. Finding Location.mp4 14.7 MB 7. Miscellaneous Hackings/3. Finding Location.vtt 3 KB 7. Miscellaneous Hackings/4. Web Scanning.mp4 12.2 MB 7. Miscellaneous Hackings/4. Web Scanning.vtt 2 KB 7. Miscellaneous Hackings/5. Phishing Attack.mp4 19.8 MB 7. Miscellaneous Hackings/5. Phishing Attack.vtt 3.3 KB 7. Miscellaneous Hackings/6. Brute Force Attack.mp4 12.1 MB 7. Miscellaneous Hackings/6. Brute Force Attack.vtt 3.1 KB 7. Miscellaneous Hackings/7. Installation SEtoolkit.mp4 11.6 MB 7. Miscellaneous Hackings/7. Installation SEtoolkit.vtt 2.3 KB