• Anonymous
  • 2025-02-16 07:57:07
  • Unknown

RELEASE >

ReScene version pyReScene Auto 0.7 LERNSTUF File size CRC
Download
25,266
Stored files
4,307 CB8AC407
1,674 46118C35
RAR-files
ls9s5nly0225.rar 500,000,000 FC717BEC
ls9s5nly0225.r00 500,000,000 EB14F2B6
ls9s5nly0225.r01 500,000,000 529999F5
ls9s5nly0225.r02 500,000,000 6C3186D7
ls9s5nly0225.r03 500,000,000 510D0B94
ls9s5nly0225.r04 500,000,000 4D5FE198
ls9s5nly0225.r05 500,000,000 D91CB062
ls9s5nly0225.r06 500,000,000 7EF9E664
ls9s5nly0225.r07 500,000,000 3CB7EC8C
ls9s5nly0225.r08 500,000,000 2AA8A37C
ls9s5nly0225.r09 500,000,000 D41913FE
ls9s5nly0225.r10 500,000,000 07F0932B
ls9s5nly0225.r11 500,000,000 8951A12D
ls9s5nly0225.r12 500,000,000 A7A91781
ls9s5nly0225.r13 500,000,000 8567B4D3
ls9s5nly0225.r14 500,000,000 03587E92
ls9s5nly0225.r15 500,000,000 D41A5A15
ls9s5nly0225.r16 500,000,000 2B98E818
ls9s5nly0225.r17 500,000,000 C79B28F9
ls9s5nly0225.r18 500,000,000 1BBA9B64
ls9s5nly0225.r19 500,000,000 EAD6B1D7
ls9s5nly0225.r20 500,000,000 C7BC0811
ls9s5nly0225.r21 500,000,000 D39EADD7
ls9s5nly0225.r22 500,000,000 12EE7358
ls9s5nly0225.r23 500,000,000 B53CCB84
ls9s5nly0225.r24 500,000,000 68D3451C
ls9s5nly0225.r25 500,000,000 AB19BBFE
ls9s5nly0225.r26 500,000,000 2D359D46
ls9s5nly0225.r27 500,000,000 5E9DD955
ls9s5nly0225.r28 500,000,000 1796A2B2
ls9s5nly0225.r29 500,000,000 390D7009
ls9s5nly0225.r30 500,000,000 F5ACBE2F
ls9s5nly0225.r31 500,000,000 1B3B2F87
ls9s5nly0225.r32 500,000,000 3A286E7C
ls9s5nly0225.r33 500,000,000 DBA50FDC
ls9s5nly0225.r34 500,000,000 3C9897F6
ls9s5nly0225.r35 500,000,000 DADEF91F
ls9s5nly0225.r36 500,000,000 CBF6AEFA
ls9s5nly0225.r37 500,000,000 475AED13
ls9s5nly0225.r38 500,000,000 51369044
ls9s5nly0225.r39 500,000,000 95BBC02D
ls9s5nly0225.r40 500,000,000 6A5FD1B4
ls9s5nly0225.r41 500,000,000 2867E899
ls9s5nly0225.r42 500,000,000 E81AF88D
ls9s5nly0225.r43 500,000,000 351139DF
ls9s5nly0225.r44 500,000,000 88D192E7
ls9s5nly0225.r45 500,000,000 54F778C2
ls9s5nly0225.r46 500,000,000 47DAF288
ls9s5nly0225.r47 500,000,000 164F45C8
ls9s5nly0225.r48 500,000,000 ECFC4F04
ls9s5nly0225.r49 500,000,000 20EF1178
ls9s5nly0225.r50 500,000,000 7727A9C1
ls9s5nly0225.r51 500,000,000 1C17EC13
ls9s5nly0225.r52 500,000,000 FCE11099
ls9s5nly0225.r53 500,000,000 8F0CF407
ls9s5nly0225.r54 500,000,000 3A1236E0
ls9s5nly0225.r55 500,000,000 3F545BAF
ls9s5nly0225.r56 500,000,000 1BF22827
ls9s5nly0225.r57 500,000,000 7EB5045C
ls9s5nly0225.r58 500,000,000 2FC796A4
ls9s5nly0225.r59 500,000,000 4D01AF4F
ls9s5nly0225.r60 1,406,375 F08C497E

Total size: 30,501,406,375
Archived files
01-Network_And_Perimeter_Hacking_Session_Hijacking\01-introduction_to_the_course_advanced_network_attacks_web_hacking_and_cryptography_instructions.html 7,676 9E886052
01-Network_And_Perimeter_Hacking_Session_Hijacking\02-full_specialization_resources_instructions.html 1,350 D467C941
01-Network_And_Perimeter_Hacking_Session_Hijacking\03-session_hijacking_concepts.mp4 [28c862d574af9066] 438,123,116 88D175EF
01-Network_And_Perimeter_Hacking_Session_Hijacking\04-network_level_session_hijacking.mp4 [d5bf4a6a1e1f358f] 745,272,410 349090E2
01-Network_And_Perimeter_Hacking_Session_Hijacking\05-application_level_session_hijacking.mp4 [a395137c66a313b7] 694,184,513 2C609A00
01-Network_And_Perimeter_Hacking_Session_Hijacking\06-session_hijacking_countermeasures.mp4 [2f60d8150f896b67] 488,009,890 A215633B
02-Network_And_Perimeter_Hacking_Evading_Firewalls_Ids_And_Honeypots\01-ids_and_ips.mp4 [9cd8f8cf824555a3] 761,540,078 B8D36F75
02-Network_And_Perimeter_Hacking_Evading_Firewalls_Ids_And_Honeypots\02-firewalls.mp4 [de1e7d8e2b63b62f] 762,325,097 C6CDA941
02-Network_And_Perimeter_Hacking_Evading_Firewalls_Ids_And_Honeypots\03-honeypots.mp4 [dad33c8e9bba6c0c] 588,580,626 666E5381
03-Web_Application_Hacking_Hacking_Web_Servers\01-web_server_basics.mp4 [d54caf1fbff10a90] 595,757,073 72138379
03-Web_Application_Hacking_Hacking_Web_Servers\02-web_server_attacks.mp4 [6b92a146354a3878] 668,723,802 DD6DAF43
03-Web_Application_Hacking_Hacking_Web_Servers\03-web_server_hacking_methodology.mp4 [e1626780d3170347] 535,423,574 FE53B509
04-Web_Application_Hacking_Hacking_Web_Applications\01-web_app_basics.mp4 [af42a435251adfeb] 636,841,216 81F28DEB
04-Web_Application_Hacking_Hacking_Web_Applications\02-owasp_top_10_web_application_attacks_2021.mp4 [8b7cf1af5986e4cb] 863,050,398 A0F986D4
04-Web_Application_Hacking_Hacking_Web_Applications\03-web_app_hacking_methodology.mp4 [bb914746506698b2] 643,320,504 FD99F626
04-Web_Application_Hacking_Hacking_Web_Applications\04-unvalidated_redirects_and_forwards.mp4 [d8e53420b72b9f76] 570,153,464 A2E9BD16
04-Web_Application_Hacking_Hacking_Web_Applications\05-xss_and_csrf.mp4 [923e992f7044a170] 524,869,714 8CCF5952
04-Web_Application_Hacking_Hacking_Web_Applications\06-new_video.mp4 [d6ada97196c63837] 389,076,963 786D0917
04-Web_Application_Hacking_Hacking_Web_Applications\07-idor.mp4 [cffa62de569723cc] 199,490,835 6DC4EAE9
04-Web_Application_Hacking_Hacking_Web_Applications\08-lfi_rfi.mp4 [7998e7abdb44361d] 510,896,243 6F3B3E30
04-Web_Application_Hacking_Hacking_Web_Applications\09-apis_and_webhooks.mp4 [89b3a46cb1448b9b] 653,295,618 E6D83806
05-Web_Application_Hacking_Sql_Injection\01-sqli_concepts.mp4 [4f7d6829b9fc792b] 800,075,161 86C4D9C4
05-Web_Application_Hacking_Sql_Injection\02-error_based_sqli_attacks.mp4 [8469b4ebfd8f9492] 399,120,675 89B26E12
05-Web_Application_Hacking_Sql_Injection\03-blind_based_sqli_attacks.mp4 [7e6b2c455789d976] 469,404,395 FD02AA0E
05-Web_Application_Hacking_Sql_Injection\04-sqli_to_system_access.mp4 [89537327488a8e45] 467,451,834 73C24074
05-Web_Application_Hacking_Sql_Injection\05-sqlmap.mp4 [7012194e972b0399] 509,556,773 44C6CE5B
06-Wireless_Network_Hacking_Hacking_Wireless_Networks\01-wireless_basics.mp4 [899f2fc040859672] 811,376,298 652AD1D5
06-Wireless_Network_Hacking_Hacking_Wireless_Networks\02-wireless_threats.mp4 [e4401aae85bc71a0] 663,328,171 57069660
06-Wireless_Network_Hacking_Hacking_Wireless_Networks\03-wireless_hacking_tools.mp4 [1952bc8e9b919514] 485,987,463 B6CDB19D
06-Wireless_Network_Hacking_Hacking_Wireless_Networks\04-wireless_hacking.mp4 [671308875f317eb7] 647,066,832 1ACC8BC5
06-Wireless_Network_Hacking_Hacking_Wireless_Networks\05-wireless_hacking_countermeasures.mp4 [381be4ed6770a1b7] 626,864,044 07FC49D4
07-Mobile_Platform_Iot_And_Ot_Hacking_Hacking_Mobile_Platforms\01-mobile_security_basics.mp4 [7d723272fda7843a] 702,335,317 E855B284
07-Mobile_Platform_Iot_And_Ot_Hacking_Hacking_Mobile_Platforms\02-android_security.mp4 [cc9200c4e5b0925c] 741,197,949 238EC87E
07-Mobile_Platform_Iot_And_Ot_Hacking_Hacking_Mobile_Platforms\03-ios_security.mp4 [1eb99f9c61bc6d73] 645,598,338 CDAB1112
07-Mobile_Platform_Iot_And_Ot_Hacking_Hacking_Mobile_Platforms\04-mobile_device_management.mp4 [c14c6b22eb8d9b49] 692,114,972 164AA5D8
08-Mobile_Platform_Iot_And_Ot_Hacking_Iot_And_Ot_Hacking\01-iot_basics.mp4 [5609ea52e3abad12] 614,742,694 D3AC2FD6
08-Mobile_Platform_Iot_And_Ot_Hacking_Iot_And_Ot_Hacking\02-iot_threats_and_vulnerabilities.mp4 [19eecdaed41734e5] 411,805,209 7661E562
08-Mobile_Platform_Iot_And_Ot_Hacking_Iot_And_Ot_Hacking\03-iot_attacks_tools_and_countermeasures.mp4 [5c21ecdde983ec6a] 638,500,606 97F8E081
08-Mobile_Platform_Iot_And_Ot_Hacking_Iot_And_Ot_Hacking\04-ot_basics.mp4 [ec6e7c14f202b96f] 1,021,146,350 596242D2
08-Mobile_Platform_Iot_And_Ot_Hacking_Iot_And_Ot_Hacking\05-ot_attacks_tools_and_countermeasures.mp4 [2babbb1cec282c87] 1,106,672,640 90743D2B
09-Cloud_Computing\01-cloud_computing_basics.mp4 [cfa181e7d049c1] 935,679,818 2421D5D9
09-Cloud_Computing\02-container_basics.mp4 [fb2e7a2130e7dde8] 508,994,422 8C65A854
09-Cloud_Computing\03-hacking_cloud_services.mp4 [2d20a661499f99c8] 984,157,104 FF3A145F
09-Cloud_Computing\04-cloud_security_controls.mp4 [c4b34633bd90dbe4] 673,019,038 48525AF1
10-Cryptography\01-cryptography_basics.mp4 [763833d445e75999] 902,313,781 33EC7E00
10-Cryptography\02-crypto_algorithms_and_implementations.mp4 [b6185904c455905a] 738,752,414 158AC1A7
10-Cryptography\03-cryptography_tools.mp4 [92482bb5fcbcc5e3] 586,065,034 3FB3597B
10-Cryptography\04-public_key_infrastructure.mp4 [b3965d56148dc972] 499,859,414 A25BB530
10-Cryptography\05-cryptanalysis.mp4 [c843d1b3031d54d1] 601,173,672 EFB1BDEE
10-Cryptography\06-crypto_attack_countermeasures.mp4 [911502edf0aa3dfe] 347,419,287 0A1D620D
10-Cryptography\07-conclusion_to_the_course_advanced_network_attacks_web_hacking_and_cryptography_instructions.html 3,146 B9D21A05
LERNSTUF\lernstuf.nfo 1,819 F3BC8590
LERNSTUF\lernstuf_introduction_2025.rar 662,425 D97798A6

Total size: 30,501,391,255
RAR Recovery
Not Present
Labels UNKNOWN