switch to basic browser
📂
📝
📟

🌲 / learning Testing - security The Complete Cybersecurity Bootcamp, 2nd Edition Lesson 26 Post-Exploitation Techniques

c File Name Size files dur q vq aq Vc Ac Fmt Res fps T Date
-001. Learning objectives en.srt577srtsrt2023-08-23 17:39:57
-001. Learning objectives.mp4302365431.811338760628125h264aacmov1280x72030mp42023-08-23 15:59:00
-002. 26.1 Maintaining Persistence After Compromising a System en.srt11803srtsrt2023-08-23 17:39:58
-002. 26.1 Maintaining Persistence After Compromising a System.mp431792437466.11737545412125h264aacmov1280x72030mp42023-08-23 15:59:03
-003. 26.2 Understanding How to Perform Lateral Movement and Pivoting en.srt5633srtsrt2023-08-23 17:39:59
-003. 26.2 Understanding How to Perform Lateral Movement and Pivoting.mp413460968209.002812515381125h264aacmov1280x72030mp42023-08-23 15:59:04
-004. 26.3 Understanding How to Cover Your Tracks and Clean up Systems After a Penetration Testing Engagement en.srt3018srtsrt2023-08-23 17:40:00
-004. 26.3 Understanding How to Cover Your Tracks and Clean up Systems After a Penetration Testing Engagement.mp46719890110.039365488355125h264aacmov1280x72030mp42023-08-23 15:59:05

control-panel

π
f69dc311a936 // 3.77 TiB free of 3.98 TiB