种子简介
种子名称:
Sektor7 - RED TEAM Operator
文件类型:
视频
文件数目:
85个文件
文件大小:
2.3 GB
收录时间:
2020-7-27 02:44
已经下载:
3次
资源热度:
52
最近下载:
2024-10-24 03:25
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:74c93b4fedb93786528944d3ae91a8da6496e5fc&dn=Sektor7 - RED TEAM Operator
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
Sektor7 - RED TEAM Operator.torrent
RED TEAM Operator_Malware Development Essentials Course/Video/23.combination.mp42.53MB
RED TEAM Operator_ Privilege Escalation in Windows Course/1- intro/02 - Intro Addendum.mp43MB
RED TEAM Operator_ Privilege Escalation in Windows Course/5 - Getting SYSTEM/23-Abusing Tokens [1].mp43.37MB
RED TEAM Operator_ Privilege Escalation in Windows Course/27-Course Closing Information.mp43.62MB
RED TEAM Operator_ Privilege Escalation in Windows Course/5 - Getting SYSTEM/25-Exploiting Named Pipes [1].mp45.04MB
RED TEAM Operator_ Privilege Escalation in Windows Course/5 - Getting SYSTEM/20-Leaked HANDLE [1].mp45.37MB
RED TEAM Operator_ Windows Persistence/3 - Admin Level Persistence/19 - Windows Management Instrumentation - Introduction.mp45.52MB
RED TEAM Operator_Malware Development Essentials Course/Video/01.Intro.mp45.88MB
RED TEAM Operator_ Windows Persistence/2 - Low Privilege Persistence/09 - DLL Proxying - Introduction.mp46.27MB
RED TEAM Operator_ Windows Persistence/1 - Intro/03 - Course VM Setup.mp46.77MB
RED TEAM Operator_Malware Development Essentials Course/Video/26.Summary-Ending.mp47.23MB
RED TEAM Operator_ Windows Persistence/1 - Intro/01 - Introduction to Windows Persistence.mp47.27MB
RED TEAM Operator_ Windows Persistence/3 - Admin Level Persistence/27 - Local Security Authority - Introduction.mp48.43MB
RED TEAM Operator_Malware Development Essentials Course/Video/14.function-call-obfusc.mp48.84MB
RED TEAM Operator_Malware Development Essentials Course/Video/18.code_inject-payload.mp48.87MB
RED TEAM Operator_ Privilege Escalation in Windows Course/1- intro/03-Course VM Setup.mp49.36MB
RED TEAM Operator_Malware Development Essentials Course/Video/16.backdooring-PE.mp49.52MB
RED TEAM Operator_Malware Development Essentials Course/Video/18a.code_inject-why.mp411.14MB
RED TEAM Operator_Malware Development Essentials Course/Video/10.payload-EE.mp411.23MB
RED TEAM Operator_Malware Development Essentials Course/Video/06.payload-storage.mp411.24MB
RED TEAM Operator_Malware Development Essentials Course/Video/20.code_inject-DLL.mp412.47MB
RED TEAM Operator_Malware Development Essentials Course/Video/04.generateEXEvsDLL.mp412.78MB
RED TEAM Operator_ Privilege Escalation in Windows Course/2 - Credentials/08-Robbing Credential Manager.mp413.07MB
RED TEAM Operator_ Privilege Escalation in Windows Course/2 - Credentials/06-Registry.mp413.43MB
RED TEAM Operator_ Privilege Escalation in Windows Course/2 - Credentials/05-Interesting Files.mp413.48MB
RED TEAM Operator_ Windows Persistence/2 - Low Privilege Persistence/07 - Screensavers.mp413.49MB
RED TEAM Operator_ Windows Persistence/2 - Low Privilege Persistence/11 - Component Object Model - Introduction.mp413.86MB
RED TEAM Operator_ Privilege Escalation in Windows Course/2 - Credentials/09-Asking User for Creds.mp414.04MB
RED TEAM Operator_ Privilege Escalation in Windows Course/5 - Getting SYSTEM/19-New Service for SYSTEM.mp414.12MB
RED TEAM Operator_ Windows Persistence/2 - Low Privilege Persistence/08 - Powershell Profile.mp414.29MB
RED TEAM Operator_ Windows Persistence/2 - Low Privilege Persistence/05 - Logon Scripts.mp414.59MB
RED TEAM Operator_Malware Development Essentials Course/Video/001.VM-setup.mp416.54MB
RED TEAM Operator_Malware Development Essentials Course/Video/02.PE-format.mp416.61MB
RED TEAM Operator_Malware Development Essentials Course/Video/03.PE-bear.mp418.32MB
RED TEAM Operator_ Windows Persistence/2 - Low Privilege Persistence/12 - COMs Registry.mp418.39MB
RED TEAM Operator_ Privilege Escalation in Windows Course/4 - Execution Flow Hijacking/15-Missing Service.mp420.12MB
RED TEAM Operator_ Privilege Escalation in Windows Course/1- intro/01-Introduction to Windows Security.mp420.45MB
RED TEAM Operator_ Windows Persistence/2 - Low Privilege Persistence/06 - Shortcut Mods.mp422.4MB
RED TEAM Operator_ Windows Persistence/1 - Intro/02 - Intro Addendum.mp422.59MB
RED TEAM Operator_ Windows Persistence/3 - Admin Level Persistence/15 - Multiaction Tasks.mp422.97MB
RED TEAM Operator_ Windows Persistence/3 - Admin Level Persistence/23 - Netsh Helper DLLs.mp423.29MB
RED TEAM Operator_ Windows Persistence/3 - Admin Level Persistence/29 - LSA-as-a-Persistence - Password Filters.mp423.74MB
RED TEAM Operator_Malware Development Essentials Course/Video/08.payload-stor-data.mp424.07MB
RED TEAM Operator_ Windows Persistence/2 - Low Privilege Persistence/04 - Start Folder and Registry Keys.mp424.45MB
RED TEAM Operator_ Windows Persistence/3 - Admin Level Persistence/24 - Winlogon - SHELL-USERINIT.mp424.52MB
RED TEAM Operator_ Windows Persistence/3 - Admin Level Persistence/20 - WMI Event Subscription.mp424.56MB
RED TEAM Operator_ Privilege Escalation in Windows Course/5 - Getting SYSTEM/24-Abusing Tokens [2].mp424.92MB
RED TEAM Operator_ Privilege Escalation in Windows Course/4 - Execution Flow Hijacking/14-Exploiting PATH.mp425.84MB
RED TEAM Operator_ Privilege Escalation in Windows Course/5 - Getting SYSTEM/18-AlwaysInstallElevated Hack.mp427.02MB
RED TEAM Operator_Malware Development Essentials Course/Video/22.hiding-console.mp427.76MB
RED TEAM Operator_Malware Development Essentials Course/Video/13.payload-encrypt-AES.mp427.99MB
RED TEAM Operator_ Windows Persistence/3 - Admin Level Persistence/22 - AppInit DLLs.mp428.18MB
RED TEAM Operator_ Privilege Escalation in Windows Course/5 - Getting SYSTEM/26-Exploiting Named Pipes [2].mp428.5MB
RED TEAM Operator_Malware Development Essentials Course/Video/21.code_inject-DLL-Example.mp430.64MB
RED TEAM Operator_ Windows Persistence/3 - Admin Level Persistence/18 - Application Shims.mp430.7MB
RED TEAM Operator_Malware Development Essentials Course/Video/12.payload-encrypt-XOR.mp432.39MB
RED TEAM Operator_ Privilege Escalation in Windows Course/3 - Unsecured Objects/10-Unsecured Service [1].mp433.15MB
RED TEAM Operator_ Windows Persistence/3 - Admin Level Persistence/26 - Port Monitors.mp433.81MB
RED TEAM Operator_Malware Development Essentials Course/Video/19.code_inject-payload-Example.mp434.99MB
RED TEAM Operator_ Privilege Escalation in Windows Course/3 - Unsecured Objects/12-Unsecured Service [3].mp435.75MB
RED TEAM Operator_ Windows Persistence/3 - Admin Level Persistence/21 - AppCert DLLs.mp435.96MB
RED TEAM Operator_ Privilege Escalation in Windows Course/2 - Credentials/04-Low Hanging Passwords.mp436.05MB
RED TEAM Operator_ Windows Persistence/3 - Admin Level Persistence/14 - Elevated Scheduled Tasks.mp436.3MB
RED TEAM Operator_ Privilege Escalation in Windows Course/5 - Getting SYSTEM/22-Leaked HANDLE [3].mp436.62MB
RED TEAM Operator_ Windows Persistence/3 - Admin Level Persistence/25 - Time Providers.mp437.19MB
RED TEAM Operator_ Privilege Escalation in Windows Course/3 - Unsecured Objects/11-Unsecured Service [2].mp437.42MB
RED TEAM Operator_ Privilege Escalation in Windows Course/4 - Execution Flow Hijacking/16-Missing Task.mp437.64MB
RED TEAM Operator_Malware Development Essentials Course/Video/11.payload-encoding-B64.mp439.19MB
RED TEAM Operator_ Windows Persistence/3 - Admin Level Persistence/16 - Modified Services.mp439.65MB
RED TEAM Operator_Malware Development Essentials Course/Video/15.function-call-obfusc-Example.mp440.23MB
RED TEAM Operator_Malware Development Essentials Course/Video/05.generatePE.mp440.49MB
RED TEAM Operator_Malware Development Essentials Course/Video/09.payload-stor-rsrc.mp441.06MB
RED TEAM Operator_ Privilege Escalation in Windows Course/5 - Getting SYSTEM/21-Leaked HANDLE [2].mp443.17MB
RED TEAM Operator_ Windows Persistence/3 - Admin Level Persistence/28 - LSA-as-a-Persistence - SSPs.mp444.09MB
RED TEAM Operator_Malware Development Essentials Course/Video/07.payload-stor-text.mp446.67MB
RED TEAM Operator_ Privilege Escalation in Windows Course/2 - Credentials/07-Abusing Credential Manager.mp447.43MB
RED TEAM Operator_ Privilege Escalation in Windows Course/4 - Execution Flow Hijacking/17-UACME.mp447.83MB
RED TEAM Operator_ Windows Persistence/2 - Low Privilege Persistence/13 - COM Hijacks and Proxies.mp456.25MB
RED TEAM Operator_ Privilege Escalation in Windows Course/4 - Execution Flow Hijacking/13-Unsecured File System.mp462.27MB
RED TEAM Operator_ Windows Persistence/3 - Admin Level Persistence/17 - IFEO - Debugger - SilentProcessExit - Verifier.mp462.6MB
RED TEAM Operator_Malware Development Essentials Course/Video/25.combination-WD-bypass.mp474.3MB
RED TEAM Operator_ Privilege Escalation in Windows Course/4 - Execution Flow Hijacking/17-DLL Hijacking.mp484.58MB
RED TEAM Operator_ Windows Persistence/2 - Low Privilege Persistence/10 - DLL Proxying - Demo.mp491.49MB
RED TEAM Operator_Malware Development Essentials Course/Video/24.combination-Example.mp4100.49MB
RED TEAM Operator_Malware Development Essentials Course/Video/17.backdooring-PE-Example.mp4103.37MB