本站已收录 番号和无损神作磁力链接/BT种子 

[GigaCourse.Com] Udemy - Learn Python Ethical Hacking From Scratch

种子简介

种子名称: [GigaCourse.Com] Udemy - Learn Python Ethical Hacking From Scratch
文件类型: 视频
文件数目: 183个文件
文件大小: 7.94 GB
收录时间: 2023-8-29 17:28
已经下载: 3
资源热度: 63
最近下载: 2024-5-28 05:09

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:824809fe5693882a19b557cdc96dc65a24b4cdc6&dn=[GigaCourse.Com] Udemy - Learn Python Ethical Hacking From Scratch 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

[GigaCourse.Com] Udemy - Learn Python Ethical Hacking From Scratch.torrent
  • 01 - Introduction/001 Teaser.mp485.01MB
  • 01 - Introduction/002 Course Introduction.mp472MB
  • 01 - Introduction/003 Introduction to Python Programming & Ethical Hacking.mp4109.14MB
  • 01 - Introduction/004 Lab Overview.mp415.87MB
  • 01 - Introduction/005 Initial Preparation.mp480.51MB
  • 01 - Introduction/006 Installing Kali Linux as a VM on Windows.mp443.35MB
  • 01 - Introduction/007 Installing Kali Linux as a VM on Apple Mac OS.mp434.82MB
  • 01 - Introduction/008 Installing Kali Linux as a VM on M1 Apple Computers.mp434.9MB
  • 01 - Introduction/009 Installing Kali Linux as a VM on Linux.mp454.75MB
  • 01 - Introduction/010 Basic Overview of Kali Linux.mp415.66MB
  • 01 - Introduction/011 The Terminal & Linux Commands.mp4151.34MB
  • 01 - Introduction/012 Python 2 VS Python 3 & Writing Our First Program.mp427.86MB
  • 01 - Introduction/013 Installing & Using a Python IDE.mp428.85MB
  • 02 - Writing a MAC Address Changer - Python Basics/001 What is MAC Address & How To Change it.mp490.97MB
  • 02 - Writing a MAC Address Changer - Python Basics/002 Using Python Modules & Executing System Commands.mp460.45MB
  • 02 - Writing a MAC Address Changer - Python Basics/003 Implementing a Very Basic MAC Changer.mp49.98MB
  • 02 - Writing a MAC Address Changer - Python Basics/004 Variables & Strings.mp421.15MB
  • 02 - Writing a MAC Address Changer - Python Basics/005 Using Variables in MAC Changer.mp414.66MB
  • 02 - Writing a MAC Address Changer - Python Basics/006 Getting Input From The User.mp427.08MB
  • 02 - Writing a MAC Address Changer - Python Basics/007 Handling User Input.mp452.63MB
  • 02 - Writing a MAC Address Changer - Python Basics/008 Handling Command-line Arguments.mp439.01MB
  • 02 - Writing a MAC Address Changer - Python Basics/009 Initialising Variables Based on Command-line Arguments.mp438.69MB
  • 02 - Writing a MAC Address Changer - Python Basics/010 Python Functions.mp478.92MB
  • 02 - Writing a MAC Address Changer - Python Basics/011 Returning Values From Functions.mp421.94MB
  • 02 - Writing a MAC Address Changer - Python Basics/012 Decision Making in Python.mp426.63MB
  • 02 - Writing a MAC Address Changer - Python Basics/013 Using Conditional Statements in MAC Changer.mp453.25MB
  • 03 - MAC Changer - Algorithm Design/001 Introduction to Algorithms.mp430.53MB
  • 03 - MAC Changer - Algorithm Design/002 Reading Output Returned By System Commands.mp432.34MB
  • 03 - MAC Changer - Algorithm Design/003 Introduction to Regular Expressions (Regex).mp417.95MB
  • 03 - MAC Changer - Algorithm Design/004 Extracting a Substring Using Regex.mp433.7MB
  • 03 - MAC Changer - Algorithm Design/005 Refactoring & Housekeeping.mp436.91MB
  • 03 - MAC Changer - Algorithm Design/006 Implementing The Validation Algorithm.mp439.65MB
  • 03 - MAC Changer - Algorithm Design/007 Python 3 Compatibility.mp416.46MB
  • 04 - Programming a Network Scanner/001 Introduction & Teaser.mp476.22MB
  • 04 - Programming a Network Scanner/002 Installing Windows as a Virtual Machine.mp423.04MB
  • 04 - Programming a Network Scanner/003 Introduction to ARP.mp430.05MB
  • 04 - Programming a Network Scanner/004 Designing an Algorithm To Discover Clients on The Same Network.mp415.32MB
  • 04 - Programming a Network Scanner/005 Using Scapy To Create an ARP Request.mp417.55MB
  • 04 - Programming a Network Scanner/006 Combining Frames To Broadcast Packets.mp425.23MB
  • 04 - Programming a Network Scanner/007 Sending & Receiving Packets.mp422.69MB
  • 04 - Programming a Network Scanner/008 Introduction Lists in Python.mp426.71MB
  • 04 - Programming a Network Scanner/009 Iterating Over Lists & Analysing Packet.mp473.39MB
  • 04 - Programming a Network Scanner/010 Using Escape Characters To Improve Program Output.mp420.9MB
  • 04 - Programming a Network Scanner/011 Introduction to Dictionaries in Python.mp433.61MB
  • 04 - Programming a Network Scanner/012 Improving the Program Using a List of Dictionaries.mp422.98MB
  • 04 - Programming a Network Scanner/013 Iterating Over Nested Data Structures.mp446.25MB
  • 04 - Programming a Network Scanner/014 Testing The Network Scanner With Python 3.mp418.5MB
  • 05 - Writing an ARP Spoofer/001 What is ARP Spoofing.mp424.49MB
  • 05 - Writing an ARP Spoofer/002 Intercepting Data in a Network Using arpspoof.mp418.43MB
  • 05 - Writing an ARP Spoofer/003 Creating an ARP Response.mp420.03MB
  • 05 - Writing an ARP Spoofer/004 Sending ARP Responses.mp429.96MB
  • 05 - Writing an ARP Spoofer/005 Extracting MAC Address From Responses.mp445.24MB
  • 05 - Writing an ARP Spoofer/006 Introduction to Loops in Python.mp468.12MB
  • 05 - Writing an ARP Spoofer/007 More on Loops & Counters.mp420.61MB
  • 05 - Writing an ARP Spoofer/008 Dynamic Printing.mp417.7MB
  • 05 - Writing an ARP Spoofer/009 Exception Handling in Python.mp427.15MB
  • 05 - Writing an ARP Spoofer/010 Implementing a Restore Function.mp439.47MB
  • 05 - Writing an ARP Spoofer/011 Restoring ARP Tables on Exception.mp421.78MB
  • 06 - Writing a Packet Sniffer/001 Introduction & Teaser.mp475.48MB
  • 06 - Writing a Packet Sniffer/002 Sniffing Packets Using Scapy.mp432.58MB
  • 06 - Writing a Packet Sniffer/003 Extracting data From a Specific Layer.mp450.21MB
  • 06 - Writing a Packet Sniffer/004 Analysing Sniffed Packets & Extracting Fields From Layers.mp490.97MB
  • 06 - Writing a Packet Sniffer/005 Analysing Fields & Extracting Passwords.mp473.41MB
  • 06 - Writing a Packet Sniffer/006 Extracting URLs.mp477.19MB
  • 06 - Writing a Packet Sniffer/007 Capturing Passwords From Any Computer Connected to the Same Network.mp419.55MB
  • 06 - Writing a Packet Sniffer/008 Strings & Bytes in Python 3.mp450.54MB
  • 07 - Writing a DNS Spoofer/001 Intercepting Packets - Creating a Proxy.mp442.23MB
  • 07 - Writing a DNS Spoofer/002 Converting Packets to Scapy Packets.mp434.42MB
  • 07 - Writing a DNS Spoofer/003 Introduction to DNS Spoofing.mp469.15MB
  • 07 - Writing a DNS Spoofer/004 Filtering DNS Responses.mp421.65MB
  • 07 - Writing a DNS Spoofer/005 Analysing & Creating a Custom DNS Response.mp423.31MB
  • 07 - Writing a DNS Spoofer/006 Modifying Packets On The Fly.mp423.96MB
  • 07 - Writing a DNS Spoofer/007 Redirecting DNS Responses.mp450.6MB
  • 08 - Writing a File Interceptor/001 Introduction & Teaser.mp465.1MB
  • 08 - Writing a File Interceptor/002 Filtering Traffic Based on the Port Used.mp477.97MB
  • 08 - Writing a File Interceptor/003 Analysing HTTP Requests.mp440.65MB
  • 08 - Writing a File Interceptor/004 Intercepting HTTP Requests.mp473.06MB
  • 08 - Writing a File Interceptor/005 Modifying HTTP Responses on The Fly.mp488.47MB
  • 08 - Writing a File Interceptor/006 Intercepting & Replacing Downloads on The Network.mp424.81MB
  • 09 - Writing a Code Injector/001 Introduction & Teaser.mp428.26MB
  • 09 - Writing a Code Injector/002 Analysing HTTP Responses.mp461.11MB
  • 09 - Writing a Code Injector/003 Replacing a Substring Using Regex.mp440.28MB
  • 09 - Writing a Code Injector/004 Decoding HTTP Responses.mp490.26MB
  • 09 - Writing a Code Injector/005 Modifying HTTP Responses & Injecting Javascript Code in HTML Pages.mp467.69MB
  • 09 - Writing a Code Injector/006 Refactoring & Housekeeping.mp450.47MB
  • 09 - Writing a Code Injector/007 Debugging Issues in Python.mp468.42MB
  • 09 - Writing a Code Injector/008 Using Groups & None-capturing Regex.mp471.17MB
  • 09 - Writing a Code Injector/009 Recalculating Content Length.mp476.23MB
  • 09 - Writing a Code Injector/010 BeEF Overview & Basic Hook Method.mp4148.36MB
  • 09 - Writing a Code Injector/011 Hooking Computers Using code_injector.mp432.09MB
  • 09 - Writing a Code Injector/012 Basic BeEF Commands.mp411.24MB
  • 09 - Writing a Code Injector/013 Delivering Malware Using BeEF.mp420.44MB
  • 10 - Bypassing HTTPS/001 How to Bypass HTTPS.mp4145.52MB
  • 10 - Bypassing HTTPS/002 Bypassing HTTPS & Sniffing Login Credentials.mp443.78MB
  • 10 - Bypassing HTTPS/003 Replacing Downloads on HTTPS Pages.mp452.63MB
  • 10 - Bypassing HTTPS/004 Injecting Code in HTTPS Pages.mp457.39MB
  • 11 - Writing an ARP Spoof Detector/001 Running Python Programs on Windows.mp436.06MB
  • 11 - Writing an ARP Spoof Detector/002 Capturing & Analysing ARP Responses.mp418.22MB
  • 11 - Writing an ARP Spoof Detector/003 Detecting ARP Spoofing Attacks Using Python.mp443.25MB
  • 12 - Writing Malware/001 Introduction & Teaser.mp443.38MB
  • 12 - Writing Malware/002 Execute System Command Payload.mp426.83MB
  • 12 - Writing Malware/003 Sending Emails Using Python.mp433.71MB
  • 12 - Writing Malware/004 Filtering Command Output Using Regex.mp424.2MB
  • 12 - Writing Malware/005 Stealing WiFi Passwords Saved on a Computer.mp441.79MB
  • 12 - Writing Malware/006 Downloading Files Using Python.mp455.37MB
  • 12 - Writing Malware/007 Writing Files on Disk.mp451.79MB
  • 12 - Writing Malware/008 Password Recovery Basics.mp469.69MB
  • 12 - Writing Malware/009 Stealing Saved Passwords From Remote Computers.mp438.23MB
  • 12 - Writing Malware/010 Interacting With The File System Using Python.mp428.21MB
  • 13 - Writing Malware - Keylogger/001 Introduction & Teaser.mp455.46MB
  • 13 - Writing Malware - Keylogger/002 Writing a Basic Local Keylogger Using Python.mp425.46MB
  • 13 - Writing Malware - Keylogger/003 Introduction to Global Variables.mp442.45MB
  • 13 - Writing Malware - Keylogger/004 Logging Special Keys.mp420.86MB
  • 13 - Writing Malware - Keylogger/005 Introduction to Threading & Recursion in Python.mp430.05MB
  • 13 - Writing Malware - Keylogger/006 Introduction Object Oriented Programming.mp443.15MB
  • 13 - Writing Malware - Keylogger/007 Constructor Methods & Instance Variables.mp424.37MB
  • 13 - Writing Malware - Keylogger/008 Logging Key-strikes and Reporting Them By Email.mp433.48MB
  • 14 - Writing Malware - Backdoors/001 Introduction & Teaser.mp463.48MB
  • 14 - Writing Malware - Backdoors/002 Client - Server Communication & Connection Types.mp421.51MB
  • 14 - Writing Malware - Backdoors/003 Connecting Two Remote Computers Using Sockets.mp416.68MB
  • 14 - Writing Malware - Backdoors/004 Sending & Receiving Data Over TCP.mp49.58MB
  • 14 - Writing Malware - Backdoors/005 Executing System Commands Remotely.mp427.06MB
  • 14 - Writing Malware - Backdoors/006 Implementing a Server.mp415.33MB
  • 14 - Writing Malware - Backdoors/007 Implementing Skeleton For Server - Client Communication.mp415.01MB
  • 14 - Writing Malware - Backdoors/008 Refactoring - Creating a Listener Class.mp424.87MB
  • 14 - Writing Malware - Backdoors/009 Refactoring - Creating a Backdoor Class.mp416MB
  • 14 - Writing Malware - Backdoors/010 Serialisation - Theory.mp496.24MB
  • 14 - Writing Malware - Backdoors/011 Serialisation - Implementing Reliable Methods to Send & Receive Data Over TCP.mp425.67MB
  • 14 - Writing Malware - Backdoors/012 Serialisation - Reliably Sending & Receiving Data.mp424.26MB
  • 14 - Writing Malware - Backdoors/013 Sending Commands as List & Implementing Exit Command.mp424.73MB
  • 14 - Writing Malware - Backdoors/014 Interacting With the File System - Implementing cd Command.mp432.06MB
  • 14 - Writing Malware - Backdoors/015 Reading Files Using Python.mp446.03MB
  • 14 - Writing Malware - Backdoors/016 Writing Files Using Python.mp425.63MB
  • 14 - Writing Malware - Backdoors/017 Downloading Files From Hacked Computer.mp459.15MB
  • 14 - Writing Malware - Backdoors/018 Implementing Upload Functionality in Listener.mp428.85MB
  • 14 - Writing Malware - Backdoors/019 Implementing Upload Functionality in Backdoor.mp437.89MB
  • 14 - Writing Malware - Backdoors/020 Handling Unknown Exceptions.mp473.8MB
  • 14 - Writing Malware - Backdoors/021 Using the Backdoor to Hack Windows, Linux & OS X.mp4106.79MB
  • 14 - Writing Malware - Backdoors/022 Testing The Backdoor With Python 3.mp490.79MB
  • 15 - Writing Malware - Packaging/001 Introduction & Teaser.mp465.97MB
  • 15 - Writing Malware - Packaging/002 Converting Python Programs To Windows Binary Executables.mp447.97MB
  • 15 - Writing Malware - Packaging/003 Running Executables Silentely.mp441.6MB
  • 15 - Writing Malware - Packaging/004 Installing Windows Pyinstaller on Linux.mp427.34MB
  • 15 - Writing Malware - Packaging/005 Packaging Programs For Windows From Linux.mp425.19MB
  • 15 - Writing Malware - Packaging/006 Introduction to Persistence.mp430.87MB
  • 15 - Writing Malware - Packaging/007 Running Programs on Startup.mp497.61MB
  • 15 - Writing Malware - Packaging/008 Creating a Basic Trojan Using Download & Execute Payload.mp431.55MB
  • 15 - Writing Malware - Packaging/009 Creating a Trojan By Embedding Files In Program Code.mp425.82MB
  • 15 - Writing Malware - Packaging/010 Bypassing Anti-Virus Programs - Theory.mp414.98MB
  • 15 - Writing Malware - Packaging/011 Bypassing Anti-Virus Programs - Practical.mp449.18MB
  • 15 - Writing Malware - Packaging/012 Adding an Icon to Generated Executables.mp411.31MB
  • 15 - Writing Malware - Packaging/013 Spoofing File Extension.mp435.15MB
  • 15 - Writing Malware - Packaging/014 Converting Python Programs To OS X Executables.mp476.2MB
  • 15 - Writing Malware - Packaging/015 Converting Python Programs to Linux Executables.mp424.83MB
  • 16 - Website Web Application Hacking/001 Introduction & Teaser.mp4114.76MB
  • 16 - Website Web Application Hacking/002 What is a Website.mp451.42MB
  • 16 - Website Web Application Hacking/003 How to Hack a Website.mp422.24MB
  • 17 - Website Hacking - Writing a Crawler/001 Sending GET Requests To Web Servers.mp423.32MB
  • 17 - Website Hacking - Writing a Crawler/002 Discovering Website Subdomains Using Python.mp433.3MB
  • 17 - Website Hacking - Writing a Crawler/003 Discovering Hidden Paths in Websites.mp467.97MB
  • 17 - Website Hacking - Writing a Crawler/004 Reading Response Content.mp469.04MB
  • 17 - Website Hacking - Writing a Crawler/005 Extracting Useful Data From Response.mp484.72MB
  • 17 - Website Hacking - Writing a Crawler/006 Filtering Results.mp437.15MB
  • 17 - Website Hacking - Writing a Crawler/007 Extracting Unique Links & Storing Them In a List.mp461.4MB
  • 17 - Website Hacking - Writing a Crawler/008 Recursively Discovering All Paths On a Target Website.mp456.9MB
  • 17 - Website Hacking - Writing a Crawler/009 Testing The Crawler With Python 3.mp432.69MB
  • 18 - Writing a Program To Guess Login Information/001 Sending Post Requests to Websites.mp472.6MB
  • 18 - Writing a Program To Guess Login Information/002 Guessing Login Information on Login Pages.mp462.19MB
  • 19 - Writing a Vulnerability Scanner/001 Introduction & Teaser.mp410.11MB
  • 19 - Writing a Vulnerability Scanner/002 HTTP Requests - POST VS GET.mp425.14MB
  • 19 - Writing a Vulnerability Scanner/003 Parsing HTML Code Using Python.mp450.45MB
  • 19 - Writing a Vulnerability Scanner/004 Extracting HTML Attributes.mp497.1MB
  • 19 - Writing a Vulnerability Scanner/005 Posting Forms.mp439.76MB
  • 19 - Writing a Vulnerability Scanner/006 Building Basic Structure For a Vulnerability Scanner.mp441.77MB
  • 19 - Writing a Vulnerability Scanner/007 Using Default Parameters.mp424.15MB
  • 19 - Writing a Vulnerability Scanner/008 Sending Requests in a Session.mp458.07MB
  • 19 - Writing a Vulnerability Scanner/009 Extracting & Submitting Forms Automatically.mp489.51MB
  • 19 - Writing a Vulnerability Scanner/010 Implementing a Method To Run The Scanner.mp419.56MB
  • 19 - Writing a Vulnerability Scanner/011 Discovering XSS Vulnerabilities.mp434.46MB
  • 19 - Writing a Vulnerability Scanner/012 Exploiting XSS Vulnerabilities.mp421.7MB
  • 19 - Writing a Vulnerability Scanner/013 Implementing Code To Discover XSS in Forms.mp427.72MB
  • 19 - Writing a Vulnerability Scanner/014 Implementing Code To Discover XSS in Parameters.mp440.86MB
  • 19 - Writing a Vulnerability Scanner/015 Automatically Discovering Vulnerabilities Using the Vulnerability Scanner.mp434.64MB