Details for:

Type:
Files:
Size:

Uploaded On:
Added By:
Trusted

Seeders:
Leechers:
Info Hash:
C8A32AC393B5D319209B4CF2452F82071EC1AA44
  1. 09 HTB Machine/001 Late_it.srt 0 bytes
  2. 04 Vulnerability Assessment/007 Identification and Bypassing Firewall Nmap (Introduction).mp4 245.8 MB
  3. 01 Introduzione/001 Introduzione.srt 695 bytes
  4. 01 Introduzione/001 Introduzione_it.srt 688 bytes
  5. 02 Anonimato/001 Anonimato con Proxychain - Teoria.mp4 54.3 MB
  6. 02 Anonimato/001 Anonimato con Proxychain - Teoria.srt 5.8 KB
  7. 02 Anonimato/001 Anonimato con Proxychain - Teoria_it.srt 6.2 KB
  8. 02 Anonimato/002 Proxychain.mp4 211.8 MB
  9. 02 Anonimato/002 Proxychain.srt 14.8 KB
  10. 02 Anonimato/002 Proxychain_it.srt 15.7 KB
  11. 03 FootPrinting - OSINT/001 Footprinting - Teoria.mp4 87.8 MB
  12. 03 FootPrinting - OSINT/001 Footprinting - Teoria.srt 7.1 KB
  13. 03 FootPrinting - OSINT/001 Footprinting - Teoria_it.srt 7.5 KB
  14. 03 FootPrinting - OSINT/002 Google Hacking.mp4 98.6 MB
  15. 03 FootPrinting - OSINT/002 Google Hacking.srt 11.4 KB
  16. 03 FootPrinting - OSINT/002 Google Hacking_it.srt 12.2 KB
  17. 03 FootPrinting - OSINT/003 Intelligence X.mp4 80.0 MB
  18. 03 FootPrinting - OSINT/003 Intelligence X.srt 9.6 KB
  19. 03 FootPrinting - OSINT/003 Intelligence X_it.srt 10.1 KB
  20. 03 FootPrinting - OSINT/004 SpiderFoot.mp4 117.1 MB
  21. 03 FootPrinting - OSINT/004 SpiderFoot.srt 10.9 KB
  22. 03 FootPrinting - OSINT/004 SpiderFoot_it.srt 11.6 KB
  23. 03 FootPrinting - OSINT/005 MassScan.mp4 160.5 MB
  24. 03 FootPrinting - OSINT/005 MassScan.srt 12.5 KB
  25. 03 FootPrinting - OSINT/005 MassScan_it.srt 13.2 KB
  26. 04 Vulnerability Assessment/001 VA - Teoria.mp4 83.3 MB
  27. 04 Vulnerability Assessment/001 VA - Teoria.srt 5.9 KB
  28. 04 Vulnerability Assessment/001 VA - Teoria_it.srt 6.3 KB
  29. 04 Vulnerability Assessment/002 Nessus - Installazione e Configurazione.mp4 117.7 MB
  30. 04 Vulnerability Assessment/002 Nessus - Installazione e Configurazione.srt 13.2 KB
  31. 04 Vulnerability Assessment/002 Nessus - Installazione e Configurazione_it.srt 14.1 KB
  32. 04 Vulnerability Assessment/003 Nessus - Lancio di una scansione.mp4 69.5 MB
  33. 04 Vulnerability Assessment/003 Nessus - Lancio di una scansione.srt 9.2 KB
  34. 04 Vulnerability Assessment/003 Nessus - Lancio di una scansione_it.srt 9.8 KB
  35. 04 Vulnerability Assessment/004 Nessus - Analisi risultati.mp4 66.4 MB
  36. 04 Vulnerability Assessment/004 Nessus - Analisi risultati.srt 9.0 KB
  37. 04 Vulnerability Assessment/004 Nessus - Analisi risultati_it.srt 9.5 KB
  38. 04 Vulnerability Assessment/005 Nessus - Report.mp4 115.5 MB
  39. 04 Vulnerability Assessment/005 Nessus - Report.srt 11.2 KB
  40. 04 Vulnerability Assessment/005 Nessus - Report_it.srt 11.8 KB
  41. 04 Vulnerability Assessment/006 Nmap Vulners.mp4 153.8 MB
  42. 04 Vulnerability Assessment/006 Nmap Vulners.srt 11.7 KB
  43. 04 Vulnerability Assessment/006 Nmap Vulners_it.srt 12.2 KB
  44. 01 Introduzione/001 Introduzione.mp4 12.2 MB
  45. 04 Vulnerability Assessment/007 Identification and Bypassing Firewall Nmap (Introduction).srt 14.6 KB
  46. 04 Vulnerability Assessment/007 Identification and Bypassing Firewall Nmap (Introduction)_it.srt 15.5 KB
  47. 04 Vulnerability Assessment/008 JSafe Scanner.mp4 90.1 MB
  48. 04 Vulnerability Assessment/008 JSafe Scanner.srt 12.2 KB
  49. 04 Vulnerability Assessment/008 JSafe Scanner_it.srt 12.9 KB
  50. 04 Vulnerability Assessment/009 WP Scan.mp4 98.2 MB
  51. 04 Vulnerability Assessment/009 WP Scan.srt 9.2 KB
  52. 04 Vulnerability Assessment/009 WP Scan_it.srt 9.7 KB
  53. 05 WAPT - Burp Accademy/001 File Path Traversal.mp4 52.5 MB
  54. 05 WAPT - Burp Accademy/001 File Path Traversal.srt 6.6 KB
  55. 05 WAPT - Burp Accademy/001 File Path Traversal_it.srt 7.0 KB
  56. 05 WAPT - Burp Accademy/002 File Path Traversal - Example 1.mp4 52.5 MB
  57. 05 WAPT - Burp Accademy/002 File Path Traversal - Example 1.srt 6.2 KB
  58. 05 WAPT - Burp Accademy/002 File Path Traversal - Example 1_it.srt 6.6 KB
  59. 05 WAPT - Burp Accademy/003 File Path Traversal - Example 2.mp4 29.4 MB
  60. 05 WAPT - Burp Accademy/003 File Path Traversal - Example 2_it.srt 3.5 KB
  61. 05 WAPT - Burp Accademy/004 File Path Traversal - Example 3.mp4 20.9 MB
  62. 05 WAPT - Burp Accademy/004 File Path Traversal - Example 3_it.srt 2.6 KB
  63. 05 WAPT - Burp Accademy/005 File Path Traversal - Example 4.mp4 25.0 MB
  64. 05 WAPT - Burp Accademy/005 File Path Traversal - Example 4_it.srt 3.4 KB
  65. 05 WAPT - Burp Accademy/006 File Path Traversal - Example 5.mp4 24.6 MB
  66. 05 WAPT - Burp Accademy/006 File Path Traversal - Example 5_it.srt 2.5 KB
  67. 05 WAPT - Burp Accademy/007 File Path Traversal - Example 6.mp4 28.4 MB
  68. 05 WAPT - Burp Accademy/007 File Path Traversal - Example 6_it.srt 3.4 KB
  69. 05 WAPT - Burp Accademy/008 Prevent Directory Traversal.mp4 25.8 MB
  70. 05 WAPT - Burp Accademy/008 Prevent Directory Traversal_it.srt 2.9 KB
  71. 05 WAPT - Burp Accademy/009 File Upload Vulnerabilities.mp4 39.2 MB
  72. 05 WAPT - Burp Accademy/009 File Upload Vulnerabilities_it.srt 3.5 KB
  73. 05 WAPT - Burp Accademy/010 File Upload Vulnerabilities - Example 1.mp4 48.3 MB
  74. 05 WAPT - Burp Accademy/010 File Upload Vulnerabilities - Example 1_it.srt 7.2 KB
  75. 05 WAPT - Burp Accademy/011 File Upload Vulnerabilities - Example 2.mp4 36.8 MB
  76. 05 WAPT - Burp Accademy/011 File Upload Vulnerabilities - Example 2_it.srt 4.9 KB
  77. 05 WAPT - Burp Accademy/012 File Upload Vulnerabilities - Example 3.mp4 44.8 MB
  78. 05 WAPT - Burp Accademy/012 File Upload Vulnerabilities - Example 3_it.srt 6.2 KB
  79. 05 WAPT - Burp Accademy/013 File Upload Vulnerabilities - Example 4.mp4 40.7 MB
  80. 05 WAPT - Burp Accademy/013 File Upload Vulnerabilities - Example 4_it.srt 5.1 KB
  81. 05 WAPT - Burp Accademy/014 File Upload Vulnerabilities - Example 5.mp4 49.5 MB
  82. 05 WAPT - Burp Accademy/014 File Upload Vulnerabilities - Example 5_it.srt 6.6 KB
  83. 05 WAPT - Burp Accademy/015 File Upload Vulnerabilities - Prevention.mp4 27.4 MB
  84. 05 WAPT - Burp Accademy/015 File Upload Vulnerabilities - Prevention_it.srt 3.3 KB
  85. 05 WAPT - Burp Accademy/016 Os Command Injection.mp4 35.9 MB
  86. 05 WAPT - Burp Accademy/016 Os Command Injection_it.srt 4.2 KB
  87. 05 WAPT - Burp Accademy/017 Os Command Injection - Example 1.mp4 44.8 MB
  88. 05 WAPT - Burp Accademy/017 Os Command Injection - Example 1_it.srt 7.2 KB
  89. 05 WAPT - Burp Accademy/018 Os Command Injection - Example 2.mp4 34.3 MB
  90. 05 WAPT - Burp Accademy/018 Os Command Injection - Example 2_it.srt 5.2 KB
  91. 05 WAPT - Burp Accademy/019 Os Command Injection - Example 3.mp4 37.4 MB
  92. 05 WAPT - Burp Accademy/019 Os Command Injection - Example 3_it.srt 5.1 KB
  93. 05 WAPT - Burp Accademy/020 Information Disclosure.mp4 24.1 MB
  94. 05 WAPT - Burp Accademy/020 Information Disclosure_it.srt 2.1 KB
  95. 05 WAPT - Burp Accademy/021 Information Disclosure - Example 1.mp4 25.5 MB
  96. 05 WAPT - Burp Accademy/021 Information Disclosure - Example 1_it.srt 2.7 KB
  97. 05 WAPT - Burp Accademy/022 Information Disclosure - Example 2.mp4 35.0 MB
  98. 05 WAPT - Burp Accademy/022 Information Disclosure - Example 2_it.srt 3.2 KB
  99. 05 WAPT - Burp Accademy/023 Information Disclosure - Example 3.mp4 27.5 MB
  100. 05 WAPT - Burp Accademy/023 Information Disclosure - Example 3_it.srt 3.5 KB
  101. 05 WAPT - Burp Accademy/024 Information Disclosure - Example 4.mp4 60.6 MB
  102. 05 WAPT - Burp Accademy/024 Information Disclosure - Example 4_it.srt 9.8 KB
  103. 05 WAPT - Burp Accademy/025 SSRF - Server Side Request Forgery.mp4 45.3 MB
  104. 05 WAPT - Burp Accademy/025 SSRF - Server Side Request Forgery_it.srt 5.6 KB
  105. 05 WAPT - Burp Accademy/026 SSRF - Server Side Request Forgery - Example 1.mp4 60.5 MB
  106. 05 WAPT - Burp Accademy/026 SSRF - Server Side Request Forgery - Example 1_it.srt 6.8 KB
  107. 05 WAPT - Burp Accademy/027 SSRF - Server Side Request Forgery - Example 2.mp4 74.8 MB
  108. 05 WAPT - Burp Accademy/027 SSRF - Server Side Request Forgery - Example 2_it.srt 8.6 KB
  109. 05 WAPT - Burp Accademy/028 XXE - Xml External Entity.mp4 30.1 MB
  110. 05 WAPT - Burp Accademy/028 XXE - Xml External Entity_it.srt 3.7 KB
  111. 05 WAPT - Burp Accademy/029 XXE - Xml External Entity - Example 1.mp4 33.5 MB
  112. 05 WAPT - Burp Accademy/029 XXE - Xml External Entity - Example 1_it.srt 3.1 KB
  113. 05 WAPT - Burp Accademy/030 XXE - Xml External Entity - Example 2.mp4 51.8 MB
  114. 05 WAPT - Burp Accademy/030 XXE - Xml External Entity - Example 2_it.srt 5.0 KB
  115. 05 WAPT - Burp Accademy/031 XXE - Xml External Entity - Example 3.mp4 40.0 MB
  116. 05 WAPT - Burp Accademy/031 XXE - Xml External Entity - Example 3_it.srt 3.9 KB
  117. 05 WAPT - Burp Accademy/032 XXE - Xml External Entity - Example 4.mp4 31.9 MB
  118. 05 WAPT - Burp Accademy/032 XXE - Xml External Entity - Example 4_it.srt 4.5 KB
  119. 05 WAPT - Burp Accademy/033 SSTI - Server Side Template Injection.mp4 55.8 MB
  120. 05 WAPT - Burp Accademy/033 SSTI - Server Side Template Injection_it.srt 5.7 KB
  121. 05 WAPT - Burp Accademy/034 SSTI - Server Side Template Injection - Example 1.mp4 69.8 MB
  122. 05 WAPT - Burp Accademy/034 SSTI - Server Side Template Injection - Example 1_it.srt 8.1 KB
  123. 05 WAPT - Burp Accademy/035 SSTI - Server Side Template Injection - Example 2.mp4 74.0 MB
  124. 05 WAPT - Burp Accademy/035 SSTI - Server Side Template Injection - Example 2_it.srt 10.0 KB
  125. 06 Cracking Password/001 Password Cracking - Teoria.mp4 128.9 MB
  126. 06 Cracking Password/001 Password Cracking - Teoria_it.srt 12.8 KB
  127. 06 Cracking Password/002 John The Ripper.mp4 58.0 MB
  128. 06 Cracking Password/002 John The Ripper_it.srt 8.2 KB
  129. 06 Cracking Password/003 Hydra.mp4 68.7 MB
  130. 06 Cracking Password/003 Hydra_it.srt 8.0 KB
  131. 06 Cracking Password/004 Hashcat.mp4 128.6 MB
  132. 06 Cracking Password/004 Hashcat_it.srt 16.3 KB
  133. 06 Cracking Password/005 Raimbow Tables.mp4 72.7 MB
  134. 06 Cracking Password/005 Raimbow Tables_it.srt 7.6 KB
  135. 07 HoneyPot/001 HoneyPot - Teoria.mp4 66.1 MB
  136. 07 HoneyPot/001 HoneyPot - Teoria_it.srt 5.8 KB
  137. 07 HoneyPot/002 Honeypot SSHICMP (Esempio di Jhoneypot).mp4 47.9 MB
  138. 07 HoneyPot/002 Honeypot SSHICMP (Esempio di Jhoneypot)_it.srt 7.0 KB
  139. 08 HARDWARETELCO HACKING/001 Introduzione del dispositivo da testare (Hardware).mp4 59.4 MB
  140. 08 HARDWARETELCO HACKING/001 Introduzione del dispositivo da testare (Hardware)_it.srt 6.1 KB
  141. 08 HARDWARETELCO HACKING/002 Utilizzo del Multimetro.mp4 61.7 MB
  142. 08 HARDWARETELCO HACKING/002 Utilizzo del Multimetro_it.srt 4.9 KB
  143. 08 HARDWARETELCO HACKING/003 Logic Analyzer.mp4 175.6 MB
  144. 08 HARDWARETELCO HACKING/003 Logic Analyzer_it.srt 12.2 KB
  145. 08 HARDWARETELCO HACKING/004 BootLoader attraverso la UART.mp4 90.8 MB
  146. 08 HARDWARETELCO HACKING/004 BootLoader attraverso la UART_it.srt 7.3 KB
  147. 08 HARDWARETELCO HACKING/005 Dumping SPI - Parte 1.mp4 90.8 MB
  148. 08 HARDWARETELCO HACKING/005 Dumping SPI - Parte 1_it.srt 6.6 KB
  149. 08 HARDWARETELCO HACKING/006 Dumping SPI (Con presa dell'utente Root) - Parte 2.mp4 45.4 MB
  150. 08 HARDWARETELCO HACKING/006 Dumping SPI (Con presa dell'utente Root) - Parte 2_it.srt 5.1 KB
  151. 08 HARDWARETELCO HACKING/007 Flipper Zero - Intro and 125Khz attack.mp4 105.8 MB
  152. 08 HARDWARETELCO HACKING/007 Flipper Zero - Intro and 125Khz attack_it.srt 7.9 KB
  153. 08 HARDWARETELCO HACKING/008 Flipper Zero - Attack on NFC and SubGhz.mp4 60.4 MB
  154. 08 HARDWARETELCO HACKING/008 Flipper Zero - Attack on NFC and SubGhz_it.srt 3.4 KB
  155. 08 HARDWARETELCO HACKING/009 Flipper Zero - Bad USB and Infrared Attack.mp4 89.6 MB
  156. 08 HARDWARETELCO HACKING/009 Flipper Zero - Bad USB and Infrared Attack_it.srt 4.8 KB
  157. 09 HTB Machine/001 Late.mp4 202.8 MB
  158. Read Me.txt 17 bytes
  159. 09 HTB Machine/002 Paper - WriteUp.html 220 bytes
  160. 10 Caso Reale/001 Vulnerabilità Log4J - Parte 1.mp4 155.0 MB
  161. 10 Caso Reale/001 Vulnerabilità Log4J - Parte 1_it.srt 13.3 KB
  162. 10 Caso Reale/002 Vulnerabilità Log4J - Parte 2.mp4 174.0 MB
  163. 10 Caso Reale/002 Vulnerabilità Log4J - Parte 2_it.srt 15.5 KB
  164. 10 Caso Reale/003 Vulnerabilità Log4J - Parte 3.mp4 132.8 MB
  165. 10 Caso Reale/003 Vulnerabilità Log4J - Parte 3_it.srt 10.9 KB

Similar Posts:

  1. Other Udemy - Diventare Web Designer da zero [Il corso completo Ita] Jan. 29, 2023, 9:14 a.m.
  2. Other Udemy - Impara PowerPoint da zero [Ita] Nov. 18, 2023, 6:47 a.m.
  3. Other Udemy - Computer Base da zero a Windows 10 [Ita] Dec. 6, 2023, 8:34 a.m.
  4. Other Udemy - Python Pro - La Guida Completa, da Zero a Professionista (2024 [Ita] Nov. 20, 2024, 4:12 a.m.
  5. Other Udemy - Programmare con Unity 3D Creare videogiochi da zero [Ita] Nov. 20, 2024, 8:19 a.m.