种子简介
种子名称:
[FreeCoursesOnline.Me] PacktPub - Python for Automating Information Security [Video]
文件类型:
视频
文件数目:
36个文件
文件大小:
562.48 MB
收录时间:
2022-12-24 15:53
已经下载:
3次
资源热度:
235
最近下载:
2024-11-24 06:09
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:28e2ef179f043b4a812744bc2033870ffc5bc464&dn=[FreeCoursesOnline.Me] PacktPub - Python for Automating Information Security [Video]
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
[FreeCoursesOnline.Me] PacktPub - Python for Automating Information Security [Video].torrent
1 - Reading, Modifying, and Testing an Exploit Script/01 - The Course Overview.mp413.51MB
1 - Reading, Modifying, and Testing an Exploit Script/02 - Setting Up Your Virtual Environment.mp411.2MB
1 - Reading, Modifying, and Testing an Exploit Script/03 - Finding an Exploit Script.mp49.87MB
1 - Reading, Modifying, and Testing an Exploit Script/04 - Understanding the Script.mp411.48MB
1 - Reading, Modifying, and Testing an Exploit Script/05 - Modifying the Script.mp419.16MB
1 - Reading, Modifying, and Testing an Exploit Script/06 - Testing the Script.mp413.99MB
2 - Analyzing a Packet Capture File/07 - Viewing a Packet Capture File in Wireshark.mp420.4MB
2 - Analyzing a Packet Capture File/08 - Understanding Normal Traffic Patterns.mp416.98MB
2 - Analyzing a Packet Capture File/09 - Writing a Python Script to Look for Malicious Network Traffic.mp417.76MB
2 - Analyzing a Packet Capture File/10 - Writing a Python Script to Calculate a Network Traffic Baseline.mp422.12MB
2 - Analyzing a Packet Capture File/11 - Writing a Python Script to Compare a Baseline Against Network Traffic.mp418.01MB
3 - Gathering Open-Source Intelligence/12 - What OSINT Is.mp412.05MB
3 - Gathering Open-Source Intelligence/13 - Enumerating Domain Names with Python.mp415.43MB
3 - Gathering Open-Source Intelligence/14 - What Is Google Dorking.mp412.9MB
3 - Gathering Open-Source Intelligence/15 - Automating Google Dorking with Python.mp412.96MB
3 - Gathering Open-Source Intelligence/16 - Web Directory Enumeration with Python.mp415.47MB
4 - Analyzing a Log File/17 - Reading a Log File.mp415.85MB
4 - Analyzing a Log File/18 - Understanding Normal Log Messages.mp414.58MB
4 - Analyzing a Log File/19 - Writing a Python Script to Look for Logs Indicating Malicious Activity.mp417.55MB
4 - Analyzing a Log File/20 - Writing a Python Script to Calculate a Log Message Baseline.mp417.58MB
4 - Analyzing a Log File/21 - Writing a Python Script to Compare a Baseline Against a Log File.mp414.69MB
5 - Writing a Python Replacement for Netcat/22 - What Is Netcat.mp413.65MB
5 - Writing a Python Replacement for Netcat/23 - Writing the Input Arguments.mp420.1MB
5 - Writing a Python Replacement for Netcat/24 - Writing the Client.mp414.01MB
5 - Writing a Python Replacement for Netcat/25 - Writing the Server.mp417.28MB
5 - Writing a Python Replacement for Netcat/26 - Testing Your Program.mp413.47MB
6 - Collecting Network Packets Off the Wire/27 - Introduction to Passive Network Capture.mp48.51MB
6 - Collecting Network Packets Off the Wire/28 - Writing a Python Packet Sniffer.mp414.36MB
6 - Collecting Network Packets Off the Wire/29 - Capturing Plain-Text Credentials from Network Packets with Python.mp415.18MB
6 - Collecting Network Packets Off the Wire/30 - Introduction to ARP Cache Poisoning.mp49.15MB
6 - Collecting Network Packets Off the Wire/31 - Writing a Python ARP Cache Poisoner.mp417.88MB
7 - Building a Penetration Testing Tool/32 - Introduction to the Metasploit Framework.mp420.79MB
7 - Building a Penetration Testing Tool/33 - Writing the Discovery Module.mp416.51MB
7 - Building a Penetration Testing Tool/34 - Writing the Exploit Framework.mp419.07MB
7 - Building a Penetration Testing Tool/35 - Stitching It All Together with an Interactive Command Shell.mp423.65MB
7 - Building a Penetration Testing Tool/36 - Testing MSFPY.mp415.29MB