switch to basic browser
📂
📝
📟

🌲 / learning Testing - security Ethical Hacking and CompTIA PenTest+ Exam Prep (PT0-002) Chapter 10 Post-Exploitation

c File Name Size files dur q vq aq Vc Ac Fmt Res fps T Date
-001. Post-Exploitation Techniques en.srt16505srtsrt2023-09-06 06:28:42
-001. Post-Exploitation Techniques.mp4103339526667.17895712391105125h264aacmov1280x72029.97mp42023-09-06 06:23:41
-002. Post-Exploitation Tools en.srt5030srtsrt2023-09-06 06:28:43
-002. Post-Exploitation Tools.mp423673844202.570884934802125h264aacmov1280x72029.97mp42023-09-06 06:23:44
-003. Network Segmentation Testing en.srt3749srtsrt2023-09-06 06:28:44
-003. Network Segmentation Testing.mp423451488180.3958281040907125h264aacmov1280x72029.97mp42023-09-06 06:23:48
-004. Persistence and Stealth en.srt16820srtsrt2023-09-06 06:28:45
-004. Persistence and Stealth.mp4103704834645.1212861152125h264aacmov1280x72029.97mp42023-09-06 06:23:58
-005. Detection Avoidance Techniques en.srt8987srtsrt2023-09-06 06:28:46
-005. Detection Avoidance Techniques.mp457727686376.18650812271094125h264aacmov1280x72029.97mp42023-09-06 06:24:03

control-panel

π
f69dc311a936 // 3.77 TiB free of 3.98 TiB