道德黑客+渗透测试训练营 从入门到精通 Complete Ethical Hacking Bootcamp 2023 Zero to Mastery
掌握网络安全技能,成为道德黑客
⭐ 编辑推荐
本训练营从零基础开始,系统学习道德黑客和渗透测试,掌握网络安全技能。
课程亮点
• 实战演练,深入理解渗透测试原理
• 涵盖多种攻击手段,如病毒、木马、中间人攻击等
• 学习如何安全地测试和加固系统
课程目录
📁 10 - Gaining Access (Viruses, Trojans, Payloads ...)
t.zip [1.8 MB]
004 Generating Powershell Payload Using Veil【公众号:密知圈】.mp4 [143.6 MB]
002 Advance Msfvenom Usage Part 1.mp4 [87.1 MB]
007 Hexeditor & Antiviruses.mp4 [33.0 MB]
007 Hexeditor & Antiviruses.srt [15.6 KB]
003 Advance Msfvenom Usage Part 2.mp4 [67.2 MB]
002 Advance Msfvenom Usage Part 1_en.srt [13.2 KB]
005 TheFatRat Payload Creation.srt [17.7 KB]
002 Advance Msfvenom Usage Part 1.srt [21.4 KB]
007 Hexeditor & Antiviruses_en.srt [9.6 KB]
008 Making Our Payload Open An Image_en.srt [11.7 KB]
004 Generating Powershell Payload Using Veil_en.srt [20.6 KB]
001 Generating Basic Payload With Msfvenom.mp4 [67.6 MB]
004 Generating Powershell Payload Using Veil.srt [33.1 KB]
005 TheFatRat Payload Creation_en.srt [11.2 KB]
003 Advance Msfvenom Usage Part 2_en.srt [10.0 KB]
005 TheFatRat Payload Creation.mp4 [77.2 MB]
006 Note My Payloads Are Getting Detected By An Antivirus!.html [2.4 KB]
001 Generating Basic Payload With Msfvenom_en.srt [15.6 KB]
008 Making Our Payload Open An Image.mp4 [52.4 MB]
003 Advance Msfvenom Usage Part 2.srt [16.1 KB]
001 Generating Basic Payload With Msfvenom.srt [25.0 KB]
008 Making Our Payload Open An Image.srt [18.7 KB]
📁 15 - Man In The Middle - MITM
15 - Man In The Middle - MITM必看.png [493.5 KB]
003 Ettercap Password Sniffing.srt [19.4 KB]
004 Manually Poisoning Targets ARP Cache With Scapy.mp4 [80.8 MB]
001 Theory - Man In The Middle Attack.srt [16.6 KB]
002 Bettercap ARP Spoofing.srt [25.2 KB]
002 Bettercap ARP Spoofing.mp4 [126.1 MB]
004 Manually Poisoning Targets ARP Cache With Scapy_en.srt [17.1 KB]
001 Theory - Man In The Middle Attack_en.srt [10.4 KB]
003 Ettercap Password Sniffing_en.srt [12.2 KB]
001 Theory - Man In The Middle Attack.mp4 [24.8 MB]
004 Manually Poisoning Targets ARP Cache With Scapy.srt [27.5 KB]
002 Bettercap ARP Spoofing_en.srt [15.7 KB]
003 Ettercap Password Sniffing.mp4 [31.8 MB]
📁 17 - Extra Gaining Access To An Android Device
17 - Extra Gaining Access To An Android Device文档.zip [1.8 MB]
001 Android Hacking Theory【公众号:密知圈】.mp4 [10.7 MB]
004 Evil Droid_en.srt [11.1 KB]
003 Gaining Access With Android Meterpreter_en.srt [14.3 KB]
002 Android VM Install_en.srt [8.5 KB]
003 Gaining Access With Android Meterpreter.mp4 [40.6 MB]
006 Hack Any Device On Any Network With Ngrok_en.srt [16.0 KB]
005 Is it Flappy Bird or Malware.srt [27.1 KB]
002 Android VM Install.mp4 [41.5 MB]
004 Evil Droid.srt [17.7 KB]
004 Evil Droid.mp4 [21.9 MB]
003 Gaining Access With Android Meterpreter.srt [23.3 KB]
002 Android VM Install.srt [13.5 KB]
006 Hack Any Device On Any Network With Ngrok.srt [25.3 KB]
006 Hack Any Device On Any Network With Ngrok.mp4 [31.2 MB]
001 Android Hacking Theory.srt [7.9 KB]
005 Is it Flappy Bird or Malware.mp4 [90.0 MB]
005 Is it Flappy Bird or Malware_en.srt [17.2 KB]
001 Android Hacking Theory_en.srt [4.9 KB]
📁 13 - Website Application Penetration Testing
13 - Website Application Penetration Testing资料.zip [1.8 MB]
014 Hydra Bruteforce Attack Example 2【公众号:密知圈】.mp4 [61.5 MB]
009 Stored XSS【公众号:密知圈】.mp4 [63.7 MB]
012 CSRF Vulnerability【公众号:密知圈】.mp4 [97.8 MB]
004 Burpsuite Configuration.mp4 [60.8 MB]
011 SQL Injection.mp4 [142.1 MB]
007 Getting Meterpreter Shell With Command Execution.srt [19.5 KB]
008 Reflected XSS & Cookie Stealing.srt [35.4 KB]
001 Website Penetration Testing Theory_en.srt [15.2 KB]
003 Information Gathering & Dirb Tool_en.srt [11.2 KB]
014 Hydra Bruteforce Attack Example 2_en.srt [10.0 KB]
005 ShellShock Exploitation.mp4 [83.0 MB]
009 Stored XSS.srt [18.7 KB]
005 ShellShock Exploitation_en.srt [21.6 KB]
004 Burpsuite Configuration_en.srt [10.8 KB]
007 Getting Meterpreter Shell With Command Execution.mp4 [52.8 MB]
015 Burpsuite Intruder_en.srt [11.0 KB]
011 SQL Injection_en.srt [27.5 KB]
001 Website Penetration Testing Theory.srt [24.5 KB]
001 Website Penetration Testing Theory.mp4 [35.4 MB]
007 Getting Meterpreter Shell With Command Execution_en.srt [12.2 KB]
008 Reflected XSS & Cookie Stealing.mp4 [105.1 MB]
006 Command Injection Exploitation.srt [25.8 KB]
002 HTTP Request & Response_en.srt [5.1 KB]
014 Hydra Bruteforce Attack Example 2.srt [15.9 KB]
013 Hydra Bruteforce Attack Example 1.mp4 [56.9 MB]
006 Command Injection Exploitation.mp4 [78.5 MB]
009 Stored XSS_en.srt [11.6 KB]
011 SQL Injection.srt [43.7 KB]
002 HTTP Request & Response.srt [8.1 KB]
008 Reflected XSS & Cookie Stealing_en.srt [22.2 KB]
013 Hydra Bruteforce Attack Example 1_en.srt [14.8 KB]
005 ShellShock Exploitation.srt [34.6 KB]
010 HTML Injection.mp4 [27.5 MB]
002 HTTP Request & Response.mp4 [31.3 MB]
015 Burpsuite Intruder.mp4 [36.6 MB]
006 Command Injection Exploitation_en.srt [16.1 KB]
003 Information Gathering & Dirb Tool.srt [17.9 KB]
013 Hydra Bruteforce Attack Example 1.srt [23.8 KB]
015 Burpsuite Intruder.srt [17.6 KB]
012 CSRF Vulnerability_en.srt [16.9 KB]
003 Information Gathering & Dirb Tool.mp4 [65.8 MB]
010 HTML Injection.srt [14.8 KB]
004 Burpsuite Configuration.srt [17.3 KB]
010 HTML Injection_en.srt [9.2 KB]
012 CSRF Vulnerability.srt [27.2 KB]
📁 24 - Learn Python 4 File IO
24 - Learn Python 4 File IO说明.png [493.5 KB]
external-links【公众号:密知圈】.txt [63.0 B]
005 Next Steps【公众号:密知圈】.html [834.0 B]
002 File Paths.srt [13.8 KB]
006 Exercise Translator_en.srt [14.5 KB]
004 Read, Write, Append.srt [15.1 KB]
003 File IO Errors.srt [4.6 KB]
006 Exercise Translator.srt [22.2 KB]
003 File IO Errors_en.srt [2.8 KB]
002 File Paths.mp4 [50.5 MB]
002 Pathlib.url [70.0 B]
004 Read, Write, Append.mp4 [53.6 MB]
003 File IO Errors.mp4 [15.3 MB]
002 File Paths_en.srt [8.5 KB]
001 Working With Files In Python_en.srt [11.4 KB]
001 Working With Files In Python.mp4 [30.8 MB]
006 Exercise Translator.mp4 [81.6 MB]
004 Read, Write, Append_en.srt [9.6 KB]
001 Working With Files In Python.srt [18.3 KB]
📁 12 - Python Coding Project #2 - Backdoor
007 Uploading & Downloading Files【公众号:密知圈】.mp4 [35.1 MB]
001 What Are We Creating.srt [5.9 KB]
002 Connecting Server And Backdoor_en.srt [14.8 KB]
006 Changing Directory Inside Of Our Backdoor.mp4 [40.9 MB]
008 Testing All The Commands.srt [20.1 KB]
001 What Are We Creating_en.srt [3.6 KB]
004 Sending and Receiving Data.mp4 [20.6 MB]
008 backdoor.py [1.6 KB]
005 Executing Commands And Compiling The Program.mp4 [97.9 MB]
008 Testing All The Commands_en.srt [12.6 KB]
001 What Are We Creating.mp4 [8.5 MB]
004 Sending and Receiving Data_en.srt [8.5 KB]
007 Uploading & Downloading Files.srt [23.9 KB]
008 server.py [1.3 KB]
009 Note You Can Continue Building Onto This Project!.html [1.2 KB]
002 Connecting Server And Backdoor.srt [23.3 KB]
003 Processing Instructional Commands.mp4 [35.2 MB]
007 Uploading & Downloading Files_en.srt [15.0 KB]
003 Processing Instructional Commands_en.srt [9.3 KB]
002 Connecting Server And Backdoor.mp4 [37.6 MB]
008 Testing All The Commands.mp4 [78.1 MB]
005 Executing Commands And Compiling The Program.srt [26.3 KB]
004 Sending and Receiving Data.srt [13.5 KB]
006 Changing Directory Inside Of Our Backdoor.srt [12.8 KB]
003 Processing Instructional Commands.srt [14.6 KB]
005 Executing Commands And Compiling The Program_en.srt [16.6 KB]
006 Changing Directory Inside Of Our Backdoor_en.srt [8.0 KB]
📁 02 - Setting Up Our Hacking Lab
006 Creating Our First Virtual Machine【公众号:密知圈】.mp4 [25.3 MB]
003 Monthly Coding Challenges, Free Resources and Guides【公众号:密知圈】.html [1.6 KB]
012 Note Getting Familiar With Kali Linux!【公众号:密知圈】.html [1.0 KB]
001 What is A Virtual Machine【公众号:密知圈】.mp4 [78.9 MB]
001 What is A Virtual Machine.srt [13.9 KB]
004 Downloading Virtual Box & Kali Linux_en.srt [7.4 KB]
006 Creating Our First Virtual Machine_en.srt [12.3 KB]
006 Creating Our First Virtual Machine.srt [20.0 KB]
002 Why Linux.srt [7.3 KB]
007 Installing Kali Linux Operating System.mp4 [51.2 MB]
004 Downloading Virtual Box & Kali Linux.mp4 [58.0 MB]
001 What is A Virtual Machine_en.srt [8.4 KB]
010 Full Screen Mode & Network Settings_en.srt [16.5 KB]
011 Troubleshooting Network Connection in Kali Linux_en.srt [8.2 KB]
008 Update 1 - New & Old Versions of Kali Linux.srt [4.5 KB]
010 Full Screen Mode & Network Settings.srt [26.3 KB]
008 Update 1 - New & Old Versions of Kali Linux.mp4 [7.5 MB]
008 Update 1 - New & Old Versions of Kali Linux_en.srt [2.7 KB]
013 5 Stages Of A Penetration Test.mp4 [23.4 MB]
013 5 Stages Of A Penetration Test_en.srt [10.1 KB]
009 Networking Basics.html [438.0 B]
002 Why Linux.mp4 [40.2 MB]
004 Downloading Virtual Box & Kali Linux.srt [12.3 KB]
007 Installing Kali Linux Operating System_en.srt [17.6 KB]
011 Troubleshooting Network Connection in Kali Linux.mp4 [50.1 MB]
007 Installing Kali Linux Operating System.srt [27.9 KB]
010 Full Screen Mode & Network Settings.mp4 [86.5 MB]
005 Note Kali Linux Updates All The Time!.html [1.4 KB]
002 Why Linux_en.srt [4.3 KB]
013 5 Stages Of A Penetration Test.srt [16.5 KB]
011 Troubleshooting Network Connection in Kali Linux.srt [13.5 KB]
009 Networking-101.pdf [404.0 KB]
📁 05 - Scanning
009 Discovering Target Operating System【公众号:密知圈】.mp4 [35.9 MB]
005 Netdiscover【公众号:密知圈】.mp4 [42.0 MB]
013 Using Decoys and Packet Fragmentation【公众号:密知圈】.mp4 [90.1 MB]
007 Different Nmap Scan Types【公众号:密知圈】.mp4 [92.8 MB]
012 What is a FirewallIDS【公众号:密知圈】.mp4 [30.8 MB]
010 Detecting Version Of Service Running On An Open Port【公众号:密知圈】.mp4 [29.6 MB]
004 Installing Vulnerable Virtual Machine.mp4 [47.2 MB]
001 Theory Behind Scanning_en.srt [9.8 KB]
011 Filtering Port Range & Output Of Scan Results.mp4 [57.0 MB]
012 What is a FirewallIDS_en.srt [3.1 KB]
014 Security Evasion Nmap Options.srt [11.7 KB]
001 Theory Behind Scanning.mp4 [88.4 MB]
011 Filtering Port Range & Output Of Scan Results.srt [26.6 KB]
011 Filtering Port Range & Output Of Scan Results_en.srt [16.4 KB]
008 ZTM Nmap Cheat Sheet.html [1.1 KB]
002 TCP & UDP.mp4 [13.4 MB]
009 Discovering Target Operating System.srt [12.9 KB]
006 Performing First Nmap Scan_en.srt [11.8 KB]
002 TCP & UDP.srt [9.2 KB]
012 What is a FirewallIDS.srt [5.1 KB]
014 Security Evasion Nmap Options.mp4 [32.8 MB]
002 TCP & UDP_en.srt [5.8 KB]
010 Detecting Version Of Service Running On An Open Port_en.srt [10.1 KB]
007 Different Nmap Scan Types_en.srt [14.2 KB]
010 Detecting Version Of Service Running On An Open Port.srt [16.0 KB]
001 Theory Behind Scanning.srt [15.5 KB]
external-links.txt [115.0 B]
005 Netdiscover_en.srt [8.5 KB]
005 Netdiscover.srt [13.6 KB]
015 Note Time To Switch Things Up!.html [1.2 KB]
004 Installing Vulnerable Virtual Machine.srt [13.2 KB]
006 Performing First Nmap Scan.mp4 [76.3 MB]
013 Using Decoys and Packet Fragmentation_en.srt [16.4 KB]
004 Installing Vulnerable Virtual Machine_en.srt [8.2 KB]
014 Security Evasion Nmap Options_en.srt [7.3 KB]
006 Performing First Nmap Scan.srt [19.1 KB]
003 Note Installing Vulnerable Machine.html [293.0 B]
004 Metasploitable-Download.url [106.0 B]
013 Using Decoys and Packet Fragmentation.srt [26.2 KB]
007 Different Nmap Scan Types.srt [23.1 KB]
009 Discovering Target Operating System_en.srt [8.0 KB]
📁 07 - Vulnerability Analysis
005 Scanning Windows 7 Machine With Nessus【公众号:密知圈】.mp4 [14.5 MB]
001 Finding First Vulnerability With Nmap Scripts【公众号:密知圈】.mp4 [156.1 MB]
006 Lets cool down for a bit!_en.srt [1.7 KB]
002 Manual Vulnerability Analysis & Searchsploit_en.srt [10.6 KB]
006 Lets cool down for a bit!.srt [2.7 KB]
004 Discovering Vulnerabilities With Nessus.mp4 [56.1 MB]
005 Scanning Windows 7 Machine With Nessus.srt [9.6 KB]
005 Scanning Windows 7 Machine With Nessus_en.srt [6.2 KB]
002 Manual Vulnerability Analysis & Searchsploit.srt [16.8 KB]
004 Discovering Vulnerabilities With Nessus_en.srt [21.6 KB]
003 Nessus Installation.mp4 [23.4 MB]
006 Lets cool down for a bit!.mp4 [3.8 MB]
003 Nessus Installation.srt [12.7 KB]
001 Finding First Vulnerability With Nmap Scripts_en.srt [22.7 KB]
002 Manual Vulnerability Analysis & Searchsploit.mp4 [80.6 MB]
001 Finding First Vulnerability With Nmap Scripts.srt [36.1 KB]
003 Nessus Installation_en.srt [8.0 KB]
004 Discovering Vulnerabilities With Nessus.srt [34.2 KB]
📁 04 - Reconnaissance & Information Gathering
010 Note More About Information Gathering【公众号:密知圈】.html [1.4 KB]
007 How To Download Tools Online【公众号:密知圈】.mp4 [91.9 MB]
002 Obtaining IP Address, Physical Address Using Whois Tool【公众号:密知圈】.mp4 [56.3 MB]
006 Gathering Emails Using theHarvester & Hunter.io【公众号:密知圈】.mp4 [49.5 MB]
001 What is Information Gathering【公众号:密知圈】.mp4 [14.1 MB]
001 What is Information Gathering.srt [9.5 KB]
004 Aggressive Website Technology Discovering on IP Range.srt [20.7 KB]
008 Finding Usernames With Sherlock.srt [17.7 KB]
006 Gathering Emails Using theHarvester & Hunter.io_en.srt [13.7 KB]
008 Finding Usernames With Sherlock_en.srt [11.0 KB]
003 Whatweb Stealthy Scan.srt [18.3 KB]
003 Whatweb Stealthy Scan.mp4 [94.8 MB]
009 Bonus - Email Scraper Tool In Python 3_en.srt [9.0 KB]
007 How To Download Tools Online_en.srt [14.8 KB]
004 Aggressive Website Technology Discovering on IP Range_en.srt [13.0 KB]
002 Obtaining IP Address, Physical Address Using Whois Tool_en.srt [12.8 KB]
009 Bonus - Email Scraper Tool In Python 3.srt [14.5 KB]
001 What is Information Gathering_en.srt [5.9 KB]
004 Aggressive Website Technology Discovering on IP Range.mp4 [96.0 MB]
002 Obtaining IP Address, Physical Address Using Whois Tool.srt [20.7 KB]
009 email-scarper.py [1.4 KB]
006 Gathering Emails Using theHarvester & Hunter.io.srt [22.0 KB]
005 Note Same Tools Different Results!.html [833.0 B]
003 Whatweb Stealthy Scan_en.srt [11.3 KB]
008 Finding Usernames With Sherlock.mp4 [73.8 MB]
007 How To Download Tools Online.srt [23.9 KB]
009 Bonus - Email Scraper Tool In Python 3.mp4 [39.3 MB]
📁 16 - Extra Wireless Access Point Cracking
004 Aircrack Password Cracking【公众号:密知圈】.mp4 [29.7 MB]
001 Wireless Cracking Theory【公众号:密知圈】.mp4 [18.0 MB]
002 Putting Wireless Card In Monitor Mode_en.srt [5.1 KB]
004 Aircrack Password Cracking.srt [15.3 KB]
005 Hashcat Password Cracking.srt [20.9 KB]
002 Putting Wireless Card In Monitor Mode.srt [8.2 KB]
005 Hashcat Password Cracking.mp4 [86.3 MB]
002 Putting Wireless Card In Monitor Mode.mp4 [15.4 MB]
005 Hashcat Password Cracking_en.srt [13.2 KB]
004 Aircrack Password Cracking_en.srt [9.6 KB]
001 Wireless Cracking Theory.srt [12.1 KB]
003 Deauthenticating Devices & Grabbing Password.mp4 [111.7 MB]
003 Deauthenticating Devices & Grabbing Password_en.srt [15.7 KB]
003 Deauthenticating Devices & Grabbing Password.srt [24.9 KB]
001 Wireless Cracking Theory_en.srt [7.6 KB]
📁 20 - Where To Go From Here
003 What is Next【公众号:密知圈】.mp4 [7.9 MB]
008 Exploit Development【公众号:密知圈】.html [1.1 KB]
004 Learning Guideline【公众号:密知圈】.html [336.0 B]
005 Practice.html [625.0 B]
003 What is Next_en.srt [3.4 KB]
002 Endorsements On LinkedIN.html [1.4 KB]
009 Python Monthly.html [917.0 B]
007 Coding For Hackers.html [901.0 B]
006 Bug Bounty.html [670.0 B]
003 What is Next.srt [5.5 KB]
001 Become An Alumni.html [944.0 B]
📁 03 - Linux Operating System
003 Network Commands & Sudo Privileges In Kali【公众号:密知圈】.mp4 [77.3 MB]
002 Creating Files & Managing Directories.srt [27.4 KB]
003 Network Commands & Sudo Privileges In Kali.srt [22.9 KB]
001 Navigating Through Linux System.srt [23.4 KB]
005 Endorsements On LinkedIN.html [1.4 KB]
004 Note Linux File System & Additional Commands.html [1.1 KB]
001 Navigating Through Linux System_en.srt [14.6 KB]
002 Creating Files & Managing Directories.mp4 [71.2 MB]
001 Navigating Through Linux System.mp4 [73.1 MB]
003 Network Commands & Sudo Privileges In Kali_en.srt [13.9 KB]
002 Creating Files & Managing Directories_en.srt [16.6 KB]
📁 23 - Learn Python 3 Error Handling
002 Error Handling【公众号:密知圈】.mp4 [39.1 MB]
001 Errors in Python_en.srt [7.7 KB]
004 Exercises Error Handling_en.srt [7.1 KB]
002 Built-in-Exceptions.url [73.0 B]
005 Error Handling 3.mp4 [10.6 MB]
001 Errors in Python.srt [12.4 KB]
005 Error Handling 3_en.srt [3.8 KB]
003 Error Handling 2_en.srt [7.4 KB]
002 Error Handling_en.srt [10.6 KB]
001 Errors in Python.mp4 [31.5 MB]
005 Error Handling 3.srt [6.1 KB]
003 Error Handling 2.mp4 [20.1 MB]
003 Error Handling 2.srt [12.0 KB]
001 Built-in-Exceptions.url [73.0 B]
004 Exercises Error Handling.mp4 [16.6 MB]
004 Exercises Error Handling.srt [11.1 KB]
external-links.txt [156.0 B]
002 Error Handling.srt [16.8 KB]
📁 09 - SMBGhost CVE 2020-0796 - Windows 10 Manual Exploitation
003 Crashing Windows 10 Machine Remotely【公众号:密知圈】.mp4 [43.6 MB]
002 Setting Up Vulnerable Windows 10_en.srt [11.0 KB]
004 Exploiting Windows 10 Machine Remotely.mp4 [149.9 MB]
003 Crashing Windows 10 Machine Remotely_en.srt [9.3 KB]
002 Setting Up Vulnerable Windows 10.srt [17.4 KB]
002 Setting Up Vulnerable Windows 10.mp4 [35.4 MB]
004 Exploiting Windows 10 Machine Remotely.srt [31.9 KB]
003 Crashing Windows 10 Machine Remotely.srt [14.7 KB]
001 Note Not Everything Will Work Smooth!.html [1.7 KB]
004 Exploiting Windows 10 Machine Remotely_en.srt [20.3 KB]
📁 06 - Python Coding Project #1 - Portscanner
002 Note Do We Need To Learn Programming To Be An Ethical Hacker【公众号:密知圈】.html [1.5 KB]
001 The 2 Paths.html [868.0 B]
003 portscanner.py [653.0 B]
003 Coding a Portscanner in Python 3_en.srt [32.9 KB]
003 Coding a Portscanner in Python 3.mp4 [74.5 MB]
003 Coding a Portscanner in Python 3.srt [52.1 KB]
📁 11 - Post Exploitation - Elevating Privileges, Extracting Data, Running Keyloggers
006 Post Exploitation Modules【公众号:密知圈】.mp4 [81.9 MB]
007 Exploitation Recap.mp4 [12.1 MB]
005 Creating Persistence On The Target System.srt [18.0 KB]
001 Post Exploitation Theory.srt [9.8 KB]
004 Elevating Privileges With Different Modules.srt [19.2 KB]
001 Post Exploitation Theory_en.srt [6.1 KB]
002 Meterpreter Basic Commands Part 1_en.srt [15.9 KB]
007 Exploitation Recap_en.srt [5.4 KB]
006 Post Exploitation Modules.srt [18.2 KB]
003 Meterpreter Basic Commands Part 2_en.srt [14.6 KB]
005 Creating Persistence On The Target System.mp4 [63.6 MB]
004 Elevating Privileges With Different Modules.mp4 [101.2 MB]
005 Creating Persistence On The Target System_en.srt [11.2 KB]
006 Post Exploitation Modules_en.srt [11.3 KB]
003 Meterpreter Basic Commands Part 2.srt [23.2 KB]
007 Exploitation Recap.srt [8.5 KB]
003 Meterpreter Basic Commands Part 2.mp4 [90.2 MB]
004 Elevating Privileges With Different Modules_en.srt [12.0 KB]
001 Post Exploitation Theory.mp4 [13.5 MB]
002 Meterpreter Basic Commands Part 1.mp4 [103.6 MB]
002 Meterpreter Basic Commands Part 1.srt [25.2 KB]
📁 18 - Extra Introduction To Anonymity
002 Tor Browser【公众号:密知圈】.mp4 [52.3 MB]
004 Installing VPN in Kali Linux【公众号:密知圈】.mp4 [36.0 MB]
002 Tor Browser_en.srt [10.9 KB]
003 Proxychains With Nmap.mp4 [55.1 MB]
002 Tor Browser.srt [17.3 KB]
003 Proxychains With Nmap_en.srt [8.8 KB]
001 Anonymity Theory.srt [8.1 KB]
005 WhoAmI Anonymity Tool_en.srt [10.8 KB]
003 Proxychains With Nmap.srt [13.9 KB]
001 Anonymity Theory.mp4 [13.3 MB]
001 Anonymity Theory_en.srt [5.0 KB]
005 WhoAmI Anonymity Tool.srt [17.1 KB]
004 Installing VPN in Kali Linux_en.srt [6.9 KB]
004 Installing VPN in Kali Linux.srt [10.7 KB]
005 WhoAmI Anonymity Tool.mp4 [67.2 MB]
📁 01 - Introduction
001 Course Outline【公众号:密知圈】.mp4 [96.0 MB]
004 What Is Ethical Hacking【公众号:密知圈】.mp4 [86.9 MB]
005 Course Resources + Guide.html [322.0 B]
002 Join Our Online Classroom!.mp4 [77.8 MB]
004 What Is Ethical Hacking.srt [17.4 KB]
001 Course Outline_en.srt [10.2 KB]
001 Course Outline.srt [16.9 KB]
005 zerotomastery.io-Complete-Ethical-Hacking-Bootcamp-Zero-to-Mastery-Guide.pdf [119.2 KB]
003 Exercise Meet Your Classmates and Instructor.html [3.7 KB]
002 Join Our Online Classroom!.srt [9.5 KB]
004 What Is Ethical Hacking_en.srt [10.7 KB]
002 Join Our Online Classroom!_en.srt [6.0 KB]
📁 14 - Python Coding Project #3 - Login Bruteforce, Directory Discovery
001 Creating 2 Programs【公众号:密知圈】.mp4 [5.4 MB]
002 bruteforce.py [1.1 KB]
001 Creating 2 Programs_en.srt [2.3 KB]
001 Creating 2 Programs.srt [3.7 KB]
002 Bruteforcer In Python.srt [57.3 KB]
002 Bruteforcer In Python.mp4 [200.1 MB]
003 Hidden Directory Discovery.mp4 [74.8 MB]
003 Hidden Directory Discovery.srt [24.8 KB]
002 Bruteforcer In Python_en.srt [36.2 KB]
003 directories.py [474.0 B]
003 Hidden Directory Discovery_en.srt [15.7 KB]
📁 08 - Exploitation & Gaining Access
002 What is a Vulnerability【公众号:密知圈】.mp4 [16.4 MB]
009 Software Vulnerability - Samba Exploitation【公众号:密知圈】.mp4 [91.9 MB]
011 Exploitation Challenge - 5 Different Exploits【公众号:密知圈】.mp4 [168.2 MB]
007 Misconfigurations Happen - Bindshell Exploitation【公众号:密知圈】.mp4 [20.5 MB]
018 Update 3 - Router Default Credentials【公众号:密知圈】.mp4 [39.8 MB]
014 DoublePulsar Attack - Windows Exploit【公众号:密知圈】.mp4 [76.9 MB]
010 Attacking SSH - Bruteforce Attack.mp4 [109.8 MB]
018 Update 3 - Router Default Credentials_en.srt [9.4 KB]
015 BlueKeep Vulnerability - Windows Exploit.mp4 [89.3 MB]
008 Information Disclosure - Telnet Exploit.srt [8.5 KB]
009 Software Vulnerability - Samba Exploitation.srt [19.6 KB]
003 Reverse Shells, Bind Shells_en.srt [3.7 KB]
012 Explaining Windows 7 Setup.srt [19.0 KB]
008 Information Disclosure - Telnet Exploit_en.srt [5.3 KB]
017 Update 2 - Routersploit.srt [13.5 KB]
013 Eternal Blue Attack - Windows 7 Exploitation.mp4 [108.2 MB]
011 Exploitation Challenge - 5 Different Exploits_en.srt [24.2 KB]
001 What is Exploitation_en.srt [9.6 KB]
004 Metasploit Framework Structure_en.srt [18.2 KB]
003 Reverse Shells, Bind Shells.mp4 [8.2 MB]
016 Note We Can Also Target Routers!.html [605.0 B]
018 Update 3 - Router Default Credentials.srt [15.0 KB]
019 Exercise Imposter Syndrome.mp4 [26.6 MB]
006 Our First Exploit - vsftp 2.3.4 Exploitation.mp4 [37.5 MB]
011 Exploitation Challenge - 5 Different Exploits.srt [38.4 KB]
002 What is a Vulnerability_en.srt [7.4 KB]
002 What is a Vulnerability.srt [11.8 KB]
006 Our First Exploit - vsftp 2.3.4 Exploitation.srt [20.4 KB]
014 DoublePulsar Attack - Windows Exploit.srt [31.1 KB]
007 Misconfigurations Happen - Bindshell Exploitation_en.srt [6.4 KB]
014 DoublePulsar Attack - Windows Exploit_en.srt [19.5 KB]
008 Information Disclosure - Telnet Exploit.mp4 [18.0 MB]
005 Msfconsole Basic Commands_en.srt [22.7 KB]
004 Metasploit Framework Structure.mp4 [79.8 MB]
019 Exercise Imposter Syndrome.srt [7.2 KB]
007 Misconfigurations Happen - Bindshell Exploitation.srt [10.1 KB]
017 Update 2 - Routersploit.mp4 [63.3 MB]
015 BlueKeep Vulnerability - Windows Exploit_en.srt [12.9 KB]
009 Software Vulnerability - Samba Exploitation_en.srt [12.3 KB]
012 Explaining Windows 7 Setup.mp4 [48.0 MB]
004 Metasploit Framework Structure.srt [29.3 KB]
005 Msfconsole Basic Commands.srt [37.0 KB]
010 Attacking SSH - Bruteforce Attack_en.srt [16.3 KB]
003 Reverse Shells, Bind Shells.srt [5.9 KB]
001 What is Exploitation.mp4 [21.9 MB]
005 Msfconsole Basic Commands.mp4 [131.7 MB]
013 Eternal Blue Attack - Windows 7 Exploitation.srt [26.5 KB]
013 Eternal Blue Attack - Windows 7 Exploitation_en.srt [16.5 KB]
015 BlueKeep Vulnerability - Windows Exploit.srt [20.5 KB]
012 Explaining Windows 7 Setup_en.srt [11.9 KB]
006 Our First Exploit - vsftp 2.3.4 Exploitation_en.srt [12.8 KB]
010 Attacking SSH - Bruteforce Attack.srt [25.8 KB]
017 Update 2 - Routersploit_en.srt [8.5 KB]
019 Exercise Imposter Syndrome_en.srt [4.5 KB]
001 What is Exploitation.srt [15.4 KB]
📁 21 - Learn Python Basics
004 Our First Python Program【公众号:密知圈】.mp4 [41.9 MB]
002 Python Interpreter【公众号:密知圈】.mp4 [70.9 MB]
006 Python 2 vs Python 3.srt [13.6 KB]
004 Our First Python Program_en.srt [10.2 KB]
003 How To Run Python Code_en.srt [6.8 KB]
002 python.org.url [47.0 B]
005 Latest Version Of Python_en.srt [2.5 KB]
006 Python-2-vs-Python-3.url [91.0 B]
002 Python Interpreter.srt [14.3 KB]
002 Python Interpreter_en.srt [9.0 KB]
001 What Is A Programming Language.mp4 [18.8 MB]
005 Latest Version Of Python.mp4 [5.2 MB]
004 Our First Python Program.srt [16.1 KB]
001 What Is A Programming Language_en.srt [7.8 KB]
003 How To Run Python Code.mp4 [36.8 MB]
007 Exercise How Does Python Work.mp4 [15.3 MB]
003 How To Run Python Code.srt [11.0 KB]
006 Python 2 vs Python 3_en.srt [8.6 KB]
007 Exercise How Does Python Work_en.srt [3.1 KB]
003 Repl.it.url [40.0 B]
006 The-Story-of-Python.url [67.0 B]
006 Python-2-vs-Python-3-another-one.url [124.0 B]
005 Latest Version Of Python.srt [3.9 KB]
001 What Is A Programming Language.srt [12.4 KB]
007 Exercise How Does Python Work.srt [4.8 KB]
003 Glot.io.url [40.0 B]
006 Python 2 vs Python 3.mp4 [70.8 MB]
external-links.txt [420.0 B]
📁 22 - Learn Python Intermediate
006 DEVELOPER FUNDAMENTALS I【公众号:密知圈】.mp4 [47.7 MB]
042 Sets 2【公众号:密知圈】.mp4 [52.5 MB]
063 Functions【公众号:密知圈】.mp4 [21.3 MB]
060 Our First GUI【公众号:密知圈】.mp4 [46.1 MB]
013 Strings【公众号:密知圈】.mp4 [11.2 MB]
032 List Unpacking【公众号:密知圈】.mp4 [6.2 MB]
033 None【公众号:密知圈】.mp4 [3.1 MB]
037 Dictionary Methods【公众号:密知圈】.mp4 [10.1 MB]
038 Dictionary Methods 2【公众号:密知圈】.mp4 [28.2 MB]
059 break, continue, pass【公众号:密知圈】.mp4 [9.3 MB]
028 List Methods【公众号:密知圈】.mp4 [40.2 MB]
010 Variables【公众号:密知圈】.mp4 [56.9 MB]
022 Exercise Type Conversion【公众号:密知圈】.mp4 [21.8 MB]
071 Exercise Functions【公众号:密知圈】.mp4 [8.9 MB]
061 DEVELOPER FUNDAMENTALS IV【公众号:密知圈】.mp4 [24.7 MB]
029 List Methods 2【公众号:密知圈】.mp4 [17.6 MB]
035 DEVELOPER FUNDAMENTALS III【公众号:密知圈】.mp4 [8.7 MB]
081 Different Ways To Import【公众号:密知圈】.mp4 [23.9 MB]
017 Formatted Strings【公众号:密知圈】.mp4 [21.8 MB]
055 range()【公众号:密知圈】.mp4 [20.8 MB]
076 Why Do We Need Scope【公众号:密知圈】.mp4 [8.6 MB]
054 Exercise Tricky Counter【公众号:密知圈】.mp4 [6.8 MB]
048 Short Circuiting【公众号:密知圈】.mp4 [8.1 MB]
036 Dictionary Keys【公众号:密知圈】.mp4 [7.9 MB]
046 Truthy vs Falsey【公众号:密知圈】.mp4 [42.8 MB]
052 For Loops【公众号:密知圈】.mp4 [34.3 MB]
005 Math Functions【公众号:密知圈】.mp4 [25.9 MB]
023 DEVELOPER FUNDAMENTALS II_en.srt [5.6 KB]
001 Learning Python.srt [4.3 KB]
034 Dictionaries_en.srt [8.7 KB]
079 Optional PyCharm_en.srt [11.6 KB]
077 Modules in Python_en.srt [15.2 KB]
011 Expressions vs Statements.srt [3.0 KB]
070 args and kwargs.srt [14.7 KB]
029 Exercise-Repl.url [65.0 B]
079 Optional PyCharm.srt [18.4 KB]
002 Python Data Types.srt [9.6 KB]
068 Docstrings.mp4 [10.3 MB]
060 Solution-Repl.url [62.0 B]
015 Type Conversion_en.srt [3.7 KB]
017 Formatted Strings.srt [16.4 KB]
068 Docstrings.srt [7.7 KB]
002 Python Data Types.mp4 [9.9 MB]
046 Truthy vs Falsey.srt [10.7 KB]
043 Breaking The Flow.srt [4.9 KB]
044 Conditional Logic.srt [28.5 KB]
072 Scope.mp4 [8.1 MB]
067 Methods vs Functions.mp4 [26.4 MB]
018 String Indexes.srt [17.3 KB]
071 Exercise Functions_en.srt [5.5 KB]
009 Optional bin() and complex.srt [8.5 KB]
017 Formatted Strings_en.srt [10.4 KB]
064 Parameters and Arguments.srt [8.7 KB]
012 Augmented Assignment Operator.mp4 [5.7 MB]
036 Dictionary Keys_en.srt [4.9 KB]
008 Exercise Operator Precedence.html [704.0 B]
068 Docstrings_en.srt [4.9 KB]
043 Breaking The Flow.mp4 [7.4 MB]
037 Dictionary Methods.srt [10.0 KB]
075 Solution-Repl.url [58.0 B]
025 Lists.mp4 [8.9 MB]
061 DEVELOPER FUNDAMENTALS IV_en.srt [8.5 KB]
066 return.mp4 [63.0 MB]
064 Parameters and Arguments.mp4 [9.3 MB]
069 Clean Code_en.srt [6.0 KB]
026 List Slicing.mp4 [17.5 MB]
042 Sets-Methods.url [75.0 B]
075 nonlocal Keyword.srt [6.9 KB]
026 List Slicing.srt [15.3 KB]
026 Exercise-Repl.url [55.0 B]
060 Our First GUI_en.srt [11.6 KB]
039 Tuples_en.srt [6.4 KB]
026 List Slicing_en.srt [9.6 KB]
external-links.txt [2.0 KB]
018 String Indexes_en.srt [11.2 KB]
022 Exercise Type Conversion.srt [15.7 KB]
038 Dictionary Methods 2_en.srt [8.6 KB]
019 Immutability.mp4 [8.2 MB]
003 How To Succeed.html [280.0 B]
022 Exercise Type Conversion_en.srt [10.0 KB]
030 List Methods 3.srt [9.8 KB]
064 Parameters and Arguments_en.srt [5.5 KB]
052 For Loops_en.srt [8.6 KB]
045 Indentation In Python.mp4 [11.3 MB]
043 Breaking The Flow_en.srt [3.0 KB]
080 Packages in Python_en.srt [14.1 KB]
047 Ternary Operator.srt [8.5 KB]
024 Exercise Password Checker.mp4 [21.2 MB]
047 Ternary Operator.mp4 [8.3 MB]
080 Packages in Python.srt [22.2 KB]
075 nonlocal Keyword.mp4 [9.3 MB]
015 Type Conversion.srt [5.7 KB]
020 Built-In Functions + Methods.mp4 [44.1 MB]
049 Logical Operators_en.srt [10.0 KB]
027 Matrix.mp4 [8.7 MB]
069 Clean Code.mp4 [17.6 MB]
070 args and kwargs_en.srt [9.2 KB]
031 Exercise-Repl.url [57.0 B]
020 Built-In Functions + Methods.srt [19.2 KB]
009 Base-Numbers.url [74.0 B]
📁 25 - BONUS SECTION
001 Special Bonus Lecture.html [1.2 KB]
📁 19 - Extra Hacking Active Directory
003 Escalating Privileges on the Domain.mp4 [125.5 MB]
003 Escalating Privileges on the Domain.srt [26.3 KB]
001 Enumerating Active Directory_en.srt [24.7 KB]
002 Exploiting Active Directory.srt [27.7 KB]
001 Enumerating Active Directory.srt [39.6 KB]
002 Exploiting Active Directory.mp4 [116.9 MB]
003 Escalating Privileges on the Domain_en.srt [16.7 KB]
002 Exploiting Active Directory_en.srt [17.3 KB]
001 Enumerating Active Directory.mp4 [189.5 MB]适合人群
- 网络安全爱好者
- IT从业者
- 想要提升网络安全技能的人
学习收获
了解网络安全基础知识
掌握渗透测试工具和技术
提升网络安全防护能力
祝您学习愉快!
学有所成,前程似锦!






