f69dc311a936 // 3.77 TiB free of 3.98 TiB

c File Name Size Date
parent folder--
-001. Learning objectives en.srt11412023-09-05 21:08:07
-001. Learning objectives.mp467984082023-09-05 21:02:57
-002. 9.1 Understanding the Different Use Cases of Penetration Testing Tools en.srt30702023-09-05 21:08:08
-003. 9.2 Exploring Tools for Reconnaissance en.srt123262023-09-05 21:08:09
-003. 9.2 Exploring Tools for Reconnaissance.mp4407640472023-09-05 21:03:06
-004. 9.3 Exploring Tools for Vulnerability Scanning en.srt25892023-09-05 21:08:10
-004. 9.3 Exploring Tools for Vulnerability Scanning.mp444346012023-09-05 21:03:08
-005. 9.4 Exploring Tools for Credential Attacks en.srt59342023-09-05 21:08:11
-005. 9.4 Exploring Tools for Credential Attacks.mp4166736502023-09-05 21:03:23
-006. 9.5 Exploring Tools for Persistence en.srt20332023-09-05 21:08:12
-006. 9.5 Exploring Tools for Persistence.mp477923662023-09-05 21:03:36
-007. 9.6 Exploring Tools for Evasion en.srt60562023-09-05 21:08:13
-007. 9.6 Exploring Tools for Evasion.mp4215490722023-09-05 21:03:51
-008. 9.7 Exploring Tools for De-compilation en.srt79262023-09-05 21:08:14
-008. 9.7 Exploring Tools for De-compilation.mp4219302632023-09-05 21:03:55
-009. 9.8 Exploring Tools for Forensics en.srt46752023-09-05 21:08:16
-009. 9.8 Exploring Tools for Forensics.mp4128196472023-09-05 21:03:57
-010. 9.9 Exploring Tools for Software Assurance en.srt59972023-09-05 21:08:17
-010. 9.9 Exploring Tools for Software Assurance.mp4144884122023-09-05 21:03:59
-011. 9.10 Leveraging Bash, Python, Ruby, and PowerShell in Penetration Testing Engagements en.srt34052023-09-05 21:08:18
-011. 9.10 Leveraging Bash, Python, Ruby, and PowerShell in Penetration Testing Engagements.mp493632142023-09-05 21:04:01

control-panel