open security training - videos/ASM-WIndows-(Part-1)-Processor-Modes.mp4 |
50 MB |
open security training - videos/ASM-WIndows-(Part-2)-Protected-Mode.mp4 |
57.8 MB |
open security training - videos/ASM-Windows-(Part-3)-Win32-ASM-using-MASM32.mp4 |
25.3 MB |
open security training - videos/ASM-Windows-(Part-4)-MASM Data Types.mp4 |
30.6 MB |
open security training - videos/ASM-Windows-(Part-5)-Procedures.mp4 |
32.2 MB |
open security training - videos/ASM-Windows-(Part-6)-Macros.mp4 |
10.7 MB |
open security training - videos/ASM-Windows-(Part-7)-Program-Control-using-JMP.mp4 |
24.9 MB |
open security training - videos/ASM-Windows-(Part-8)-Decision-Directives.mp4 |
12.6 MB |
open security training - videos/ASM-Windows-(Part-9)-Loops.mp4 |
26.9 MB |
open security training - videos/Assembly-Primer-for-Hackers-(Part-1)-System-Organization.mp4 |
12.1 MB |
open security training - videos/Assembly-Primer-for-Hackers-(Part-10)-Functions.mp4 |
13.8 MB |
open security training - videos/Assembly-Primer-for-Hackers-(Part-11)-Functions-Stack.mp4 |
20.8 MB |
open security training - videos/Assembly-Primer-for-Hackers-(Part-2)-Virtual-Memory-Organization.mp4 |
20.5 MB |
open security training - videos/Assembly-Primer-for-Hackers-(Part-3)-GDB-Usage-Primer.mp4 |
19.1 MB |
open security training - videos/Assembly-Primer-for-Hackers-(Part-4)-Hello-World.mp4 |
16.9 MB |
open security training - videos/Assembly-Primer-for-Hackers-(Part-5)-Data-Types.mp4 |
12.7 MB |
open security training - videos/Assembly-Primer-for-Hackers-(Part-6)-Moving-Data.mp4 |
18.4 MB |
open security training - videos/Assembly-Primer-for-Hackers-(Part-6)-Working-with-Strings.mp4 |
37.9 MB |
open security training - videos/Assembly-Primer-for-Hackers-(Part-8)-Unconditional-Branching.mp4 |
15.5 MB |
open security training - videos/Assembly-Primer-for-Hackers-(Part-9)-Conditional-Branching.mp4 |
16.2 MB |
open security training - videos/Buffer-Overflow-Primer-Part-1-(Smashing the Stack).mp4 |
28.4 MB |
open security training - videos/Buffer-Overflow-Primer-Part-2-(Writing-Exit-Shellcode).mp4 |
14 MB |
open security training - videos/Buffer-Overflow-Primer-Part-3-(Executing-Shellcode).mp4 |
12.5 MB |
open security training - videos/Buffer-Overflow-Primer-Part-4-(Shellcode-for-Execve).mp4 |
19.2 MB |
open security training - videos/Buffer-Overflow-Primer-Part-5-(Shellcode-for-Execve).mp4 |
16.4 MB |
open security training - videos/Buffer-Overflow-Primer-Part-6-(Exploiting-a-Program).mp4 |
7.2 MB |
open security training - videos/Buffer-Overflow-Primer-Part-7-(Exploiting-a-Program-Demo).mp4 |
30 MB |
open security training - videos/Buffer-Overflow-Primer-Part-8-(Return-to-Libc-Demo).mp4 |
26.5 MB |
open security training - videos/Buffer-Overflow-Primer-Part-8-(Return-to-Libc-Theory).mp4 |
13.9 MB |
open security training - videos/Format-String-Vulnerabilities-Primer-(Part-1-The-Basics).mp4 |
10.6 MB |
open security training - videos/Format-String-Vulnerabilities-Primer-(Part-2-Crashing-the-Program).mp4 |
12.1 MB |
open security training - videos/Format-String-Vulnerabilities-Primer-(Part-2-Understanding-Format-Functions).mp4 |
19.8 MB |
open security training - videos/Format-String-Vulnerabilities-Primer-(Part-4-Viewing-the-Stack).mp4 |
8.9 MB |
open security training - videos/Metasploit-1-Exploitation Basics and need for Metasploit.mp4 |
32.6 MB |
open security training - videos/Metasploit-10-Post Exploitation Log Deletion and AV Killing.mp4 |
87.8 MB |
open security training - videos/Metasploit-11-Post Exploitation and Stealing Data.mp4 |
61.9 MB |
open security training - videos/Metasploit-12-Post Exploitation Backdoors and Rootkits.mp4 |
63.7 MB |
open security training - videos/Metasploit-13-Post Exploitation Pivoting and Port Forwarding.mp4 |
65.4 MB |
open security training - videos/Metasploit-14-Backdooring Executables.mp4 |
71.9 MB |
open security training - videos/Metasploit-15-Auxiliary Modules.mp4 |
40.3 MB |
open security training - videos/Metasploit-16-Pass the Hash Attack.mp4 |
42.4 MB |
open security training - videos/Metasploit-17-Scenario Based Hacking.mp4 |
7.9 MB |
open security training - videos/Metasploit-2-Getting Started with Metasploit.mp4 |
63.2 MB |
open security training - videos/Metasploit-3-Meterpreter Basics and using Stdapi.mp4 |
172.3 MB |
open security training - videos/Metasploit-4-Meterpreter Extensions Stdapi and Priv.mp4 |
74.5 MB |
open security training - videos/Metasploit-5-Understanding Windows Tokens and Meterpreter Incognito.mp4 |
24.9 MB |
open security training - videos/Metasploit-6-Espia and Sniffer Extensions with Meterpreter Scripts.mp4 |
57.6 MB |
open security training - videos/Metasploit-7-Espia and Sniffer Extensions with Meterpreter Scripts.mp4 |
85.7 MB |
open security training - videos/Metasploit-8-Post Exploitation Kung Fu.mp4 |
53.1 MB |
open security training - videos/Metasploit-9-Post Exploitation Privilege Escalation.mp4 |
11.5 MB |
open security training - videos/README |
88 B |
open security training - videos/Router Hacking Part 1 (The Basics).mp4 |
6.2 MB |
open security training - videos/Router Hacking Part 2 (Service Enumeration, Fingerprinting and Default Accounts).mp4 |
13 MB |
open security training - videos/Router Hacking Part 3 (Bruteforcing and Dictionary Attacks with Hydra).mp4 |
13.9 MB |
open security training - videos/Router Hacking Part 4 (SNMP Attacks using SNMPCheck).mp4 |
6.8 MB |
open security training - videos/Router Hacking Part 5 (SNMP Attacks using SNMPEnum).mp4 |
6.4 MB |
open security training - videos/Router Hacking Part 6 (Dictionary Attack using Metasploit on SNMP).mp4 |
16.3 MB |
open security training - videos/Scenario-Based-Hacking-Part-1-(No-Patches-No-AV-Direct-Access).mp4 |
20.8 MB |
open security training - videos/Scenario-Based-Hacking-Part-2-(No-Patches-No-AV-Behind-NAT).mp4 |
29.5 MB |
open security training - videos/Scenario-Based-Hacking-Part-3-(OS-Patched-No-AV-Behind-NAT).mp4 |
42.4 MB |
open security training - videos/Scenario-Based-Hacking-Part-4-(OS-And-Software-Patched-No-AV-Behind-NAT).mp4 |
29.4 MB |