:Search:

Udemy Professional Ethical Hacker with Kali Linux v2025

Torrent:
Info Hash: 512E73B925C1B4CAEE203FD31A09745E27A7EBFF
Similar Posts:
Uploader: freecoursewb
Source: 1 Logo 1337x
Downloads: 427
Type: Tutorials
Language: English
Category: Other
Size: 3.2 GB
Added: May 29, 2025, 3:18 p.m.
Peers: Seeders: 2, Leechers: 4 (Last updated: 2 weeks ago)
Tracker Data:
Tracker Seeders Leechers Completed
udp://tracker.therarbg.to:6969/announce 0 4 0
udp://tracker.opentrackr.org:1337/announce (Failed to scrape UDP tracker) 0 0 0
udp://open.demonoid.ch:6969/announce 0 0 0
udp://open.demonii.com:1337/announce (Failed to scrape UDP tracker) 0 0 0
udp://open.stealth.si:80/announce 2 0 427
udp://explodie.org:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://exodus.desync.com:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://wepzone.net:6969/announce 0 0 0
udp://tracker1.myporn.club:9337/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.srv00.com:6969/announce (Failed to scrape UDP tracker) 0 0 0
Files:
  1. Get Bonus Downloads Here.url 180 bytes
  2. 1 -Introduction.en_US.vtt 10.6 KB
  3. 1 -Introduction.mp4 38.4 MB
  4. 2 -Theory to Hacking.en_US.vtt 9.6 KB
  5. 2 -Theory to Hacking.mp4 26.8 MB
  6. 3 -Essential knowledge to be a Ethical Hacker.en_US.vtt 18.2 KB
  7. 3 -Essential knowledge to be a Ethical Hacker.mp4 47.6 MB
  8. 1 -Installing VirtualBox.en_US.vtt 7.6 KB
  9. 1 -Installing VirtualBox.mp4 49.5 MB
  10. 2 -Installing Kali Linux.en_US.vtt 18.8 KB
  11. 2 -Installing Kali Linux.mp4 95.6 MB
  12. 3 -First Adjustments.en_US.vtt 13.9 KB
  13. 3 -First Adjustments.mp4 70.1 MB
  14. 4 -Using SSH via PowerShell on Windows.en_US.vtt 8.1 KB
  15. 4 -Using SSH via PowerShell on Windows.mp4 59.1 MB
  16. 5 -Docker Installation.en_US.vtt 3.1 KB
  17. 5 -Docker Installation.mp4 33.0 MB
  18. 1 -Understanding OSINT.en_US.vtt 11.4 KB
  19. 1 -Understanding OSINT.mp4 49.6 MB
  20. 10 -Using GooFuzz.en_US.vtt 7.4 KB
  21. 10 -Using GooFuzz.mp4 30.9 MB
  22. 11 -Using Maigret.en_US.vtt 14.2 KB
  23. 11 -Using Maigret.mp4 106.2 MB
  24. 2 -Service Enumeration with DNSenum.en_US.vtt 8.3 KB
  25. 2 -Service Enumeration with DNSenum.mp4 55.1 MB
  26. 3 -Determine network range.en_US.vtt 12.4 KB
  27. 3 -Determine network range.mp4 120.5 MB
  28. 4 -Using Maltego.en_US.vtt 9.2 KB
  29. 4 -Using Maltego.mp4 117.6 MB
  30. 5 -Using Recon-ng.en_US.vtt 15.6 KB
  31. 5 -Using Recon-ng.mp4 117.4 MB
  32. 6 -Using EyeWitness.en_US.vtt 7.6 KB
  33. 6 -Using EyeWitness.mp4 62.8 MB
  34. 7 -Getting detailed information from an IP.en_US.vtt 6.2 KB
  35. 7 -Getting detailed information from an IP.mp4 49.9 MB
  36. 8 -Capturing information with theHarvester.en_US.vtt 6.8 KB
  37. 8 -Capturing information with theHarvester.mp4 45.5 MB
  38. 9 -Capturing information with RiskIQ.en_US.vtt 6.2 KB
  39. 9 -Capturing information with RiskIQ.mp4 44.1 MB
  40. 1 -Installing Nessus.en_US.vtt 11.9 KB
  41. 1 -Installing Nessus.mp4 72.3 MB
  42. 2 -Finding Network Vulnerabilities with Nessus.en_US.vtt 18.7 KB
  43. 2 -Finding Network Vulnerabilities with Nessus.mp4 140.5 MB
  44. 3 -Finding Vulnerabilities in Linux with Nessus.en_US.vtt 6.0 KB
  45. 3 -Finding Vulnerabilities in Linux with Nessus.mp4 51.8 MB
  46. 4 -Finding vulnerabilities in Windows with Nessus.en_US.vtt 6.2 KB
  47. 4 -Finding vulnerabilities in Windows with Nessus.mp4 48.7 MB
  48. 5 -Installing and Configuring OpenVAS GVM.en_US.vtt 10.4 KB
  49. 5 -Installing and Configuring OpenVAS GVM.mp4 76.1 MB
  50. 6 -Finding Vulnerabilities with OpenVAS.en_US.vtt 24.5 KB
  51. 6 -Finding Vulnerabilities with OpenVAS.mp4 159.7 MB
  52. 7 -Using Nikto.en_US.vtt 5.3 KB
  53. 7 -Using Nikto.mp4 40.3 MB
  54. 1 -Installing BodgeIt and Juice Shop.en_US.vtt 7.6 KB
  55. 1 -Installing BodgeIt and Juice Shop.mp4 59.0 MB
  56. 10 -Crawler-Spider Test.en_US.vtt 9.1 KB
  57. 10 -Crawler-Spider Test.mp4 46.0 MB
  58. 11 -AJAX Spider Test.en_US.vtt 14.4 KB
  59. 11 -AJAX Spider Test.mp4 98.9 MB
  60. 2 -Downloading a page and analyzing it with Wget.en_US.vtt 7.1 KB
  61. 2 -Downloading a page and analyzing it with Wget.mp4 45.2 MB
  62. 3 -Downloading the page for offline analysis with HTTrack.en_US.vtt 7.1 KB
  63. 3 -Downloading the page for offline analysis with HTTrack.mp4 45.5 MB
  64. 4 -Using Burp Suite to crawl a website.en_US.vtt 7.1 KB
  65. 4 -Using Burp Suite to crawl a website.mp4 94.2 MB
  66. 5 -Obtaining and modifying cookies.en_US.vtt 8.4 KB
  67. 5 -Obtaining and modifying cookies.mp4 35.3 MB
  68. 6 -Initial setup of ZAP-Zed Attack Proxy.en_US.vtt 13.8 KB
  69. 6 -Initial setup of ZAP-Zed Attack Proxy.mp4 89.8 MB
  70. 7 -First ZAP settings.en_US.vtt 13.9 KB
  71. 7 -First ZAP settings.mp4 41.0 MB
  72. 8 -Fuzzer Concept.en_US.vtt 16.0 KB
  73. 8 -Fuzzer Concept.mp4 72.1 MB
  74. 9 -Fuzzing in practice.en_US.vtt 16.0 KB
  75. 9 -Fuzzing in practice.mp4 60.7 MB
  76. 1 -Getting to know Metasploit.en_US.vtt 9.3 KB
  77. 1 -Getting to know Metasploit.mp4 55.6 MB
  78. 10 -Exploring SSH Access.en_US.vtt 16.0 KB
  79. 10 -Exploring SSH Access.mp4 98.1 MB
  80. 11 -Metasploitable Tomcat.en_US.vtt 8.4 KB
  81. 11 -Metasploitable Tomcat.mp4 76.8 MB
  82. 2 -Performing a vulnerability scan with Metasploit.en_US.vtt 11.5 KB
  83. 2 -Performing a vulnerability scan with Metasploit.mp4 85.7 MB
  84. 3 -Exploring and gaining access.en_US.vtt 5.9 KB
  85. 3 -Exploring and gaining access.mp4 50.0 MB
  86. 4 -Post-invasion exploration.en_US.vtt 8.3 KB
  87. 4 -Post-invasion exploration.mp4 73.4 MB
  88. 5 -Post-invasion exploration 2.en_US.vtt 13.6 KB
  89. 5 -Post-invasion exploration 2.mp4 99.9 MB
  90. 6 -Using XSS and Metasploit to obtain a remote shell.en_US.vtt 6.4 KB
  91. 6 -Using XSS and Metasploit to obtain a remote shell.mp4 41.1 MB
  92. 7 -Hacking Windows systems.en_US.vtt 19.3 KB
  93. 7 -Hacking Windows systems.mp4 91.5 MB
  94. 8 -Privilege Escalation.en_US.vtt 10.0 KB
  95. 8 -Privilege Escalation.mp4 61.6 MB
  96. 9 -Installing Metasploitable3.en_US.vtt 9.5 KB
  97. 9 -Installing Metasploitable3.mp4 54.1 MB
  98. Bonus Resources.txt 70 bytes

Discussion