| zip | Chapter 1 Introduction/ | 145644450 | 12 | --- | 2023-09-06 06:27:33 |
| zip | Chapter 10 Post-Exploitation/ | 623896938 | 20 | --- | 2023-09-06 06:28:46 |
| zip | Chapter 11 Post-Engagement Activities/ | 897029408 | 36 | --- | 2023-09-06 06:28:53 |
| zip | Chapter 12 Tools and Programming/ | 1307032606 | 52 | --- | 2023-09-06 06:29:04 |
| zip | Chapter 13 Tools Inventory/ | 975850120 | 56 | --- | 2023-09-06 06:29:16 |
| zip | Chapter 2 Planning and Engagement/ | 2458995376 | 64 | --- | 2023-09-06 06:27:47 |
| zip | Chapter 3 Information Gathering and Vulnerability Scanning/ | 3044146712 | 96 | --- | 2023-09-06 06:28:08 |
| zip | Chapter 4 Network-Based Attacks/ | 524304110 | 32 | --- | 2023-09-06 06:28:15 |
| zip | Chapter 5 Selecting Pen Testing Tools/ | 376466078 | 12 | --- | 2023-09-06 06:28:18 |
| zip | Chapter 6 Reporting and Communication/ | 1969735722 | 60 | --- | 2023-09-06 06:28:31 |
| zip | Chapter 7 Attacking the Cloud/ | 132188052 | 8 | --- | 2023-09-06 06:28:32 |
| zip | Chapter 8 Specialized and Fragile Systems/ | 642368476 | 20 | --- | 2023-09-06 06:28:37 |
| zip | Chapter 9 Social Engineering and Physical Attacks/ | 627351234 | 18 | --- | 2023-09-06 06:28:41 |
| - | Ethical Hacking and CompTIA PenTest+ Exam Prep (PT0-002).pdf | 146688 | | pdf | 2023-09-06 06:33:48 |