Udemy - Professional Ethical Hacker with Kali Linux v2025
- Category Other
- Type Tutorials
- Language english
- Total size 3.2 GB
- Uploaded By freecoursewb
- Downloads 701
- Last checked 1 day ago
- Date uploaded 1 day ago
- Seeders 23
- Leechers 6
Info Hash : 512E73B925C1B4CAEE203FD31A09745E27A7EBFF
Files:
Udemy - Professional Ethical Hacker with Kali Linux v2025- udp://tracker.torrent.eu.org:451/announce
- udp://tracker.tiny-vps.com:6969/announce
- http://tracker.foreverpirates.co:80/announce
- udp://tracker.cyberia.is:6969/announce
- udp://exodus.desync.com:6969/announce
- udp://explodie.org:6969/announce
- udp://tracker.opentrackr.org:1337/announce
- udp://9.rarbg.to:2780/announce
- udp://tracker.internetwarriors.net:1337/announce
- udp://ipv4.tracker.harry.lu:80/announce
- udp://open.stealth.si:80/announce
- udp://9.rarbg.to:2900/announce
- udp://9.rarbg.me:2720/announce
- udp://opentor.org:2710/announce
Code:
- Get Bonus Downloads Here.url (0.2 KB)
- 1 -Introduction.en_US.vtt (10.6 KB)
- 1 -Introduction.mp4 (38.4 MB)
- 2 -Theory to Hacking.en_US.vtt (9.6 KB)
- 2 -Theory to Hacking.mp4 (26.8 MB)
- 3 -Essential knowledge to be a Ethical Hacker.en_US.vtt (18.2 KB)
- 3 -Essential knowledge to be a Ethical Hacker.mp4 (47.6 MB)
- 1 -Installing VirtualBox.en_US.vtt (7.6 KB)
- 1 -Installing VirtualBox.mp4 (49.5 MB)
- 2 -Installing Kali Linux.en_US.vtt (18.8 KB)
- 2 -Installing Kali Linux.mp4 (95.6 MB)
- 3 -First Adjustments.en_US.vtt (13.9 KB)
- 3 -First Adjustments.mp4 (70.1 MB)
- 4 -Using SSH via PowerShell on Windows.en_US.vtt (8.1 KB)
- 4 -Using SSH via PowerShell on Windows.mp4 (59.1 MB)
- 5 -Docker Installation.en_US.vtt (3.1 KB)
- 5 -Docker Installation.mp4 (33.0 MB)
- 1 -Understanding OSINT.en_US.vtt (11.4 KB)
- 1 -Understanding OSINT.mp4 (49.6 MB)
- 10 -Using GooFuzz.en_US.vtt (7.4 KB)
- 10 -Using GooFuzz.mp4 (30.9 MB)
- 11 -Using Maigret.en_US.vtt (14.2 KB)
- 11 -Using Maigret.mp4 (106.2 MB)
- 2 -Service Enumeration with DNSenum.en_US.vtt (8.3 KB)
- 2 -Service Enumeration with DNSenum.mp4 (55.1 MB)
- 3 -Determine network range.en_US.vtt (12.4 KB)
- 3 -Determine network range.mp4 (120.5 MB)
- 4 -Using Maltego.en_US.vtt (9.2 KB)
- 4 -Using Maltego.mp4 (117.6 MB)
- 5 -Using Recon-ng.en_US.vtt (15.6 KB)
- 5 -Using Recon-ng.mp4 (117.4 MB)
- 6 -Using EyeWitness.en_US.vtt (7.6 KB)
- 6 -Using EyeWitness.mp4 (62.8 MB)
- 7 -Getting detailed information from an IP.en_US.vtt (6.2 KB)
- 7 -Getting detailed information from an IP.mp4 (49.9 MB)
- 8 -Capturing information with theHarvester.en_US.vtt (6.8 KB)
- 8 -Capturing information with theHarvester.mp4 (45.5 MB)
- 9 -Capturing information with RiskIQ.en_US.vtt (6.2 KB)
- 9 -Capturing information with RiskIQ.mp4 (44.1 MB)
- 1 -Installing Nessus.en_US.vtt (11.9 KB)
- 1 -Installing Nessus.mp4 (72.3 MB)
- 2 -Finding Network Vulnerabilities with Nessus.en_US.vtt (18.7 KB)
- 2 -Finding Network Vulnerabilities with Nessus.mp4 (140.5 MB)
- 3 -Finding Vulnerabilities in Linux with Nessus.en_US.vtt (6.0 KB)
- 3 -Finding Vulnerabilities in Linux with Nessus.mp4 (51.8 MB)
- 4 -Finding vulnerabilities in Windows with Nessus.en_US.vtt (6.2 KB)
- 4 -Finding vulnerabilities in Windows with Nessus.mp4 (48.7 MB)
- 5 -Installing and Configuring OpenVAS GVM.en_US.vtt (10.4 KB)
- 5 -Installing and Configuring OpenVAS GVM.mp4 (76.1 MB)
- 6 -Finding Vulnerabilities with OpenVAS.en_US.vtt (24.5 KB)
- 6 -Finding Vulnerabilities with OpenVAS.mp4 (159.7 MB)
- 7 -Using Nikto.en_US.vtt (5.3 KB)
- 7 -Using Nikto.mp4 (40.3 MB)
- 1 -Installing BodgeIt and Juice Shop.en_US.vtt (7.6 KB)
- 1 -Installing BodgeIt and Juice Shop.mp4 (59.0 MB)
- 10 -Crawler-Spider Test.en_US.vtt (9.1 KB)
- 10 -Crawler-Spider Test.mp4 (46.0 MB)
- 11 -AJAX Spider Test.en_US.vtt (14.4 KB)
- 11 -AJAX Spider Test.mp4 (98.9 MB)
- 2 -Downloading a page and analyzing it with Wget.en_US.vtt (7.1 KB)
- 2 -Downloading a page and analyzing it with Wget.mp4 (45.2 MB)
- 3 -Downloading the page for offline analysis with HTTrack.en_US.vtt (7.1 KB)
- 3 -Downloading the page for offline analysis with HTTrack.mp4 (45.5 MB)
- 4 -Using Burp Suite to crawl a website.en_US.vtt (7.1 KB)
- 4 -Using Burp Suite to crawl a website.mp4 (94.2 MB)
- 5 -Obtaining and modifying cookies.en_US.vtt (8.4 KB)
- 5 -Obtaining and modifying cookies.mp4 (35.3 MB)
- 6 -Initial setup of ZAP-Zed Attack Proxy.en_US.vtt (13.8 KB)
- 6 -Initial setup of ZAP-Zed Attack Proxy.mp4 (89.8 MB)
- 7 -First ZAP settings.en_US.vtt (13.9 KB)
- 7 -First ZAP settings.mp4 (41.0 MB)
- 8 -Fuzzer Concept.en_US.vtt (16.0 KB)
- 8 -Fuzzer Concept.mp4 (72.1 MB)
- 9 -Fuzzing in practice.en_US.vtt (16.0 KB)
- 9 -Fuzzing in practice.mp4 (60.7 MB)
- 1 -Getting to know Metasploit.en_US.vtt (9.3 KB)
- 1 -Getting to know Metasploit.mp4 (55.6 MB)
- 10 -Exploring SSH Access.en_US.vtt (16.0 KB)
- 10 -Exploring SSH Access.mp4 (98.1 MB)
- 11 -Metasploitable Tomcat.en_US.vtt (8.4 KB)
- 11 -Metasploitable Tomcat.mp4 (76.8 MB)
- 2 -Performing a vulnerability scan with Metasploit.en_US.vtt (11.5 KB)
- 2 -Performing a vulnerability scan with Metasploit.mp4 (85.7 MB)
- 3 -Exploring and gaining access.en_US.vtt (5.9 KB)
- 3 -Exploring and gaining access.mp4 (50.0 MB)
- 4 -Post-invasion exploration.en_US.vtt (8.3 KB)
- 4 -Post-invasion exploration.mp4 (73.4 MB)
- 5 -Post-invasion exploration 2.en_US.vtt (13.6 KB)
- 5 -Post-invasion exploration 2.mp4 (99.9 MB)
- 6 -Using XSS and Metasploit to obtain a remote shell.en_US.vtt (6.4 KB)
- 6 -Using XSS and Metasploit to obtain a remote shell.mp4 (41.1 MB)
- 7 -Hacking Windows systems.en_US.vtt (19.3 KB)
- 7 -Hacking Windows systems.mp4 (91.5 MB)
- 8 -Privilege Escalation.en_US.vtt (10.0 KB)
- 8 -Privilege Escalation.mp4 (61.6 MB)
- 9 -Installing Metasploitable3.en_US.vtt (9.5 KB)
- 9 -Installing Metasploitable3.mp4 (54.1 MB)
- Bonus Resources.txt (0.1 KB)