switch to basic browser
📂
📝
📟

🌲 / learning Testing - security Mastering Pentesting Using Kali Linux Chapter 5 Exploitation

c File Name Size files Tdate dur q vq aq Vc Ac Fmt Res fps T Date
-001. Metasploit Introduction.mp4229855452021-08-28T08:40:52.000000Z370.474496357129h264aacmov1920x108030mp42023-09-05 19:08:02
-002. Windows 10 Exploitation Using Trojan.mp4156869952021-08-28T08:42:02.000000Z362.709345211124h264aacmov1920x108030mp42023-09-05 19:08:06
-003. Antivirus Bypass Frameworks.mp4253727472021-08-28T08:43:10.000000Z341.866667593445138h264aacmov1920x108030mp42023-09-05 19:08:09
-004. Windows 10 Defender Bypass.mp4230162892021-08-28T08:44:17.000000Z434.752423290123h264aacmov1920x108030mp42023-09-05 19:08:13
-005. Windows 10 Antivirus Bypass.mp4309832982021-08-28T08:45:40.000000Z624.448396266121h264aacmov1920x108030mp42023-09-05 19:08:16

control-panel

π
f69dc311a936 // 3.77 TiB free of 3.98 TiB