RAR-files |
linkedin.learning.metasploit.essential.training-xqzt.rar |
50,000,000 |
460BA983 |
linkedin.learning.metasploit.essential.training-xqzt.r00 |
50,000,000 |
353D33C0 |
linkedin.learning.metasploit.essential.training-xqzt.r01 |
50,000,000 |
AD118B10 |
linkedin.learning.metasploit.essential.training-xqzt.r02 |
50,000,000 |
180C3C88 |
linkedin.learning.metasploit.essential.training-xqzt.r03 |
50,000,000 |
DEDBE85A |
linkedin.learning.metasploit.essential.training-xqzt.r04 |
50,000,000 |
C6D76209 |
linkedin.learning.metasploit.essential.training-xqzt.r05 |
50,000,000 |
7B858A7B |
linkedin.learning.metasploit.essential.training-xqzt.r06 |
50,000,000 |
281CBD41 |
linkedin.learning.metasploit.essential.training-xqzt.r07 |
50,000,000 |
428B77C8 |
linkedin.learning.metasploit.essential.training-xqzt.r08 |
50,000,000 |
1969363E |
linkedin.learning.metasploit.essential.training-xqzt.r09 |
50,000,000 |
0BCF3922 |
linkedin.learning.metasploit.essential.training-xqzt.r10 |
11,972,040 |
A3ECBC04 |
|
Total size: |
561,972,040 |
|
|
Archived
files |
01.01-the_essentials_of_metasploit.mkv
[1446ef5470d2efad]
|
3,035,733 |
F1D8855A |
01.02-what_you_should_know.mkv
[39792b23a884c206]
|
2,089,988 |
E8B6C16F |
02.01-what_is_metasploit.mkv
[33d2f9071b4fa1c1]
|
14,089,558 |
F7458AD7 |
02.02-why_use_metasploit.mkv
[f81e760a24985de3]
|
10,414,972 |
28C03AF4 |
02.03-understanding_the_metasploit_structure.mkv
[739e060a875f06cc]
|
9,949,660 |
352AC84B |
02.04-the_metasploit_database.mkv
[928df8cb491191a7]
|
9,356,070 |
10A37DC5 |
03.01-understand_the_msfconsole.mkv
[50955c6c34173b5b]
|
24,247,464 |
8F707EBD |
03.02-understanding_payloads_and_stagers_within_metasploit.mkv
[893a11b182c4af10]
|
17,754,298 |
0CCF50AD |
03.03-how_to_create_payloads_and_stagers.mkv
[951b5bf2d9b39a3c]
|
25,781,275 |
35AB232F |
03.04-understanding_encoders_within_metasploit.mkv
[5ff768b44095a517]
|
7,297,089 |
B65C1037 |
04.01-what_is_meterpreter.mkv
[88834ee8f8c9d3e2]
|
9,944,629 |
D09F7AF7 |
04.02-how_to_use_meterpreter.mkv
[1d1e722a26939524]
|
18,391,992 |
0C8BD99A |
04.03-what_is_msfvenom.mkv
[2e4c582540ad0f9c]
|
8,417,149 |
106E78EC |
04.04-how_to_use_msfvenom.mkv
[b327abb0c5def44b]
|
22,399,857 |
39E0FD72 |
04.05-understand_how_to_use_the_incognito_extension.mkv
[ea96fb22632dd7e]
|
9,853,551 |
14BA39D6 |
05.01-understand_information_gathering_and_scanning.mkv
[93ee88220bed0bff]
|
7,335,911 |
2C95237D |
05.02-understanding_scanners_within_metasploit.mkv
[3eed1ce2b83dc0fb]
|
4,021,500 |
6BB56909 |
05.03-how_to_use_scanners.mkv
[b436030ae99616eb]
|
11,168,839 |
0232EEBE |
05.04-discovering_services_and_exploits.mkv
[87273b7a542a6882]
|
8,466,965 |
82E4A9F8 |
05.05-how_to_discover_services.mkv
[c334bdc79a1b4cf2]
|
17,967,846 |
2BBEDCBF |
05.06-how_to_discover_exploits.mkv
[8a35c0cd443dc902]
|
13,428,046 |
5FA98C73 |
06.01-understanding_attack_terminology.mkv
[ecc06a99f2745e6d]
|
15,859,590 |
923EF1CC |
06.02-selecting_the_type_of_attack.mkv
[48377f928005b080]
|
12,927,476 |
059A006C |
06.03-configuring_an_exploit_and_payload.mkv
[c168f136d9a42d07]
|
25,740,697 |
D9A12E00 |
06.04-launching_an_attack.mkv
[70d904f7afc0f2ea]
|
16,001,325 |
6EA203CA |
07.01-generating_client_payloads.mkv
[4f8d77f266ed93ec]
|
23,259,282 |
757BFF33 |
07.02-creating_handlers_for_reverse_shells.mkv
[d694b3f5749931ed]
|
8,914,102 |
9D2CB3F9 |
07.03-creating_and_using_a_reverse_shell.mkv
[af587d636b849a6]
|
22,123,306 |
0E0B4A02 |
07.04-understand_how_to_bypass_antivirus.mkv
[a17c7be5ffb7d38]
|
9,451,380 |
026A669D |
07.05-exploit_a_windows_workstation.mkv
[ebdea0b0b884d183]
|
19,268,675 |
3E69887E |
07.06-use_an_office_macro_attack.mkv
[649139c4b2a8f7d6]
|
19,467,021 |
768C8A9C |
07.07-bypass_antivirus_protection.mkv
[f52f883b88076f8e]
|
24,656,716 |
085DBF72 |
07.08-bypass_antivirus_protection_(part_2).mkv
[e37e1401b34505f0]
|
14,311,799 |
73899D1F |
08.01-using_post-exploitation_modules.mkv
[5716d5fdd24d1601]
|
21,616,113 |
33A03314 |
08.02-understand_how_to_pivot.mkv
[be5b9ce98ab93979]
|
7,684,701 |
7115BD51 |
08.03-using_port-forwarding.mkv
[886bac85231be85e]
|
25,182,742 |
1380C62E |
08.04-using_mimikatz.mkv
[2c1594b73b69ba1e]
|
19,467,170 |
91CBE66A |
08.05-using_enumeration_modules.mkv
[4ef263ab68298584]
|
18,178,336 |
EB6F5855 |
09.01-next_steps.mkv
[170f40781bf034a5]
|
2,444,978 |
E69DE19E |
|
Total size: |
561,967,801 |
|
|