| zip | Introduction/ | 88755848 | 4 | --- | 2023-09-06 06:12:00 |
| zip | Lesson 1 Overview of Ethical Hacking and Penetration Testing/ | 826326656 | 40 | --- | 2023-09-06 06:12:10 |
| zip | Lesson 10 Buffer Overflows/ | 525032884 | 32 | --- | 2023-09-06 06:13:13 |
| zip | Lesson 11 Powershell Attacks/ | 648694722 | 20 | --- | 2023-09-06 06:13:17 |
| zip | Lesson 12 Evasion and Post Exploitation Techniques/ | 201944550 | 16 | --- | 2023-09-06 06:13:20 |
| zip | Lesson 13 Social Engineering/ | 580234582 | 20 | --- | 2023-09-06 06:13:25 |
| zip | Lesson 14 Maintaining Persistence, Pivoting, and Data Exfiltration/ | 595182688 | 28 | --- | 2023-09-06 06:13:31 |
| zip | Lesson 15 Writing Penetration Testing Reports/ | 220069962 | 24 | --- | 2023-09-06 06:13:36 |
| zip | Lesson 2 Kali Linux/ | 274864386 | 16 | --- | 2023-09-06 06:12:13 |
| zip | Lesson 3 Passive Reconnaissance/ | 913857140 | 28 | --- | 2023-09-06 06:12:19 |
| zip | Lesson 4 Active Reconnaissance/ | 372852096 | 20 | --- | 2023-09-06 06:12:24 |
| zip | Lesson 5 Hacking Web Applications/ | 643685634 | 40 | --- | 2023-09-06 06:12:33 |
| zip | Lesson 6 Hacking User Credentials/ | 640720618 | 32 | --- | 2023-09-06 06:12:40 |
| zip | Lesson 7 Hacking Databases/ | 377818800 | 20 | --- | 2023-09-06 06:12:44 |
| zip | Lesson 8 Hacking Networking Devices/ | 2003215964 | 76 | --- | 2023-09-06 06:13:01 |
| zip | Lesson 9 Fundamentals of Wireless Hacking/ | 706836540 | 24 | --- | 2023-09-06 06:13:06 |
| zip | Summary/ | 17828672 | 4 | --- | 2023-09-06 06:13:37 |
| - | Security Penetration Testing The Art of Hacking Series LiveLessons.pdf | 194294 | | pdf | 2023-09-06 06:11:47 |