013. Generating shellcode with msfvenom.mp4 - 86.3 MB
011. Exploring Kali webshells.mp4 - 60.7 MB
012. Weeving a shell.mp4 - 42.3 MB
010. Introduction to shells.mp4 - 32.7 MB
015. Using shellcode in exploits.mp4 - 31.7 MB
014. Injecting images with jhead.mp4 - 29.7 MB
013. Generating shellcode with msfvenom.en.srt - 9.43 kB
011. Exploring Kali webshells.en.srt - 7.47 kB
012. Weeving a shell.en.srt - 6.33 kB
010. Introduction to shells.en.srt - 4.01 kB
015. Using shellcode in exploits.en.srt - 3.86 kB
014. Injecting images with jhead.en.srt - 3.66 kB
034. Exploiting the Devel.mp4 - 84.2 MB
036. Cronos revisited Getting to the root.mp4 - 59.9 MB
033. Exploiting rejetto.mp4 - 59 MB
035. Time to exploit Cronos.mp4 - 47.5 MB
032. Hacking the box.mp4 - 39.9 MB
037. Using a nightmare escalator.mp4 - 39.4 MB
034. Exploiting the Devel.en.srt - 9.07 kB
033. Exploiting rejetto.en.srt - 7.13 kB
036. Cronos revisited Getting to the root.en.srt - 6.83 kB
032. Hacking the box.en.srt - 6.74 kB
035. Time to exploit Cronos.en.srt - 5.93 kB
037. Using a nightmare escalator.en.srt - 3.84 kB
07. Preparing to use exploits for testing.mp4 - 75.1 MB
06. Preparing your toolbox.mp4 - 48.8 MB
04. Testing with Kali Linux.mp4 - 43.1 MB
08. Managing the Kali menu.mp4 - 38.9 MB
05. Understanding Kali deployments.mp4 - 34 MB
09. Using the LinkedIn Learning penetration testing lab.mp4 - 33.8 MB
07. Preparing to use exploits for testing.en.srt - 9.76 kB
04. Testing with Kali Linux.en.srt - 8.13 kB
06. Preparing your toolbox.en.srt - 7.35 kB
05. Understanding Kali deployments.en.srt - 6.3 kB
09. Using the LinkedIn Learning penetration testing lab.en.srt - 5.62 kB
08. Managing the Kali menu.en.srt - 4.73 kB
031. Escalating to root.mp4 - 48.4 MB
025. Exploiting with ProFTPD.mp4 - 44.3 MB
024. Exploiting VSFTPD.mp4 - 30.5 MB
029. Exploiting network files.mp4 - 27.2 MB
026. Exploiting Tomcat.mp4 - 26.9 MB
028. Exploiting the distributed compile system.mp4 - 14.6 MB
027. Exploiting IRC.mp4 - 13 MB
023. Targeting Metasploitable.mp4 - 7.09 MB
030. Hiding in plain sight.mp4 - 6.44 MB
031. Escalating to root.en.srt - 5.28 kB
025. Exploiting with ProFTPD.en.srt - 4.94 kB
024. Exploiting VSFTPD.en.srt - 3.79 kB
026. Exploiting Tomcat.en.srt - 3.4 kB
029. Exploiting network files.en.srt - 2.95 kB
028. Exploiting the distributed compile system.en.srt - 1.53 kB
027. Exploiting IRC.en.srt - 1.23 kB
023. Targeting Metasploitable.en.srt - 927 B
030. Hiding in plain sight.en.srt - 836 B
017. Exploiting with Python.mp4 - 23.9 MB
020. Exploiting with CPP.mp4 - 22.8 MB
019. Exploiting with C.mp4 - 17.3 MB
018. Exploiting with Perl.mp4 - 16.4 MB
016. Exploiting systems with Kali.mp4 - 6.88 MB
017. Exploiting with Python.en.srt - 3.58 kB
020. Exploiting with CPP.en.srt - 2.77 kB
018. Exploiting with Perl.en.srt - 2.6 kB
019. Exploiting with C.en.srt - 2.05 kB
016. Exploiting systems with Kali.en.srt - 1.23 kB
01. Using Kali Linux as the basis for advanced penetration testing.mp4 - 13 MB
03. Disclaimer.mp4 - 11.2 MB
02. What you should know.mp4 - 8.69 MB
01. Using Kali Linux as the basis for advanced penetration testing.en.srt - 2.27 kB
03. Disclaimer.en.srt - 2.17 kB
02. What you should know.en.srt - 1.48 kB