switch to basic browser
📂
📝
📟

🌲 / learning Testing - security CompTIA PenTest+ (PT1-001) Lesson 9 Penetration Testing Tools

c File Name Size files dur q vq aq Vc Ac Fmt Res fps T Date
-001. Learning objectives en.srt1141srtsrt2023-09-05 21:08:07
-001. Learning objectives.mp4679840855.04988853128h264aacmov1280x72030mp42023-09-05 21:02:57
-002. 9.1 Understanding the Different Use Cases of Penetration Testing Tools en.srt3070srtsrt2023-09-05 21:08:08
-003. 9.2 Exploring Tools for Reconnaissance en.srt12326srtsrt2023-09-05 21:08:09
-003. 9.2 Exploring Tools for Reconnaissance.mp440764047443.361814735602125h264aacmov1280x72030mp42023-09-05 21:03:06
-004. 9.3 Exploring Tools for Vulnerability Scanning en.srt2589srtsrt2023-09-05 21:08:10
-004. 9.3 Exploring Tools for Vulnerability Scanning.mp4443460196.107007369234128h264aacmov1280x72030mp42023-09-05 21:03:08
-005. 9.4 Exploring Tools for Credential Attacks en.srt5934srtsrt2023-09-05 21:08:11
-005. 9.4 Exploring Tools for Credential Attacks.mp416673650240.46585554421125h264aacmov1280x72030mp42023-09-05 21:03:23
-006. 9.5 Exploring Tools for Persistence en.srt2033srtsrt2023-09-05 21:08:12
-006. 9.5 Exploring Tools for Persistence.mp4779236685.739002727592128h264aacmov1280x72030mp42023-09-05 21:03:36
-007. 9.6 Exploring Tools for Evasion en.srt6056srtsrt2023-09-05 21:08:13
-007. 9.6 Exploring Tools for Evasion.mp421549072250.287891688555125h264aacmov1280x72030mp42023-09-05 21:03:51
-008. 9.7 Exploring Tools for De-compilation en.srt7926srtsrt2023-09-05 21:08:14
-008. 9.7 Exploring Tools for De-compilation.mp421930263301.487891581448125h264aacmov1280x72030mp42023-09-05 21:03:55
-009. 9.8 Exploring Tools for Forensics en.srt4675srtsrt2023-09-05 21:08:16
-009. 9.8 Exploring Tools for Forensics.mp412819647182.392744562428125h264aacmov1280x72030mp42023-09-05 21:03:57
-010. 9.9 Exploring Tools for Software Assurance en.srt5997srtsrt2023-09-05 21:08:17
-010. 9.9 Exploring Tools for Software Assurance.mp414488412235.891542491358125h264aacmov1280x72030mp42023-09-05 21:03:59
-011. 9.10 Leveraging Bash, Python, Ruby, and PowerShell in Penetration Testing Engagements en.srt3405srtsrt2023-09-05 21:08:18
-011. 9.10 Leveraging Bash, Python, Ruby, and PowerShell in Penetration Testing Engagements.mp49363214131.494603569436125h264aacmov1280x72030mp42023-09-05 21:04:01

control-panel

π
f69dc311a936 // 3.77 TiB free of 3.98 TiB