_FILE_ | Taille |
---|
01 Introduzione/001 Introduzione.mp4 | 12.18 MB |
01 Introduzione/001 Introduzione.srt | 695.00 B |
01 Introduzione/001 Introduzione_it.srt | 688.00 B |
02 Anonimato/001 Anonimato con Proxychain - Teoria.mp4 | 54.32 MB |
02 Anonimato/001 Anonimato con Proxychain - Teoria.srt | 5.78 kB |
02 Anonimato/001 Anonimato con Proxychain - Teoria_it.srt | 6.16 kB |
02 Anonimato/002 Proxychain.mp4 | 211.77 MB |
02 Anonimato/002 Proxychain.srt | 14.82 kB |
02 Anonimato/002 Proxychain_it.srt | 15.74 kB |
03 FootPrinting - OSINT/001 Footprinting - Teoria.mp4 | 87.83 MB |
03 FootPrinting - OSINT/001 Footprinting - Teoria.srt | 7.09 kB |
03 FootPrinting - OSINT/001 Footprinting - Teoria_it.srt | 7.45 kB |
03 FootPrinting - OSINT/002 Google Hacking.mp4 | 98.57 MB |
03 FootPrinting - OSINT/002 Google Hacking.srt | 11.42 kB |
03 FootPrinting - OSINT/002 Google Hacking_it.srt | 12.20 kB |
03 FootPrinting - OSINT/003 Intelligence X.mp4 | 79.98 MB |
03 FootPrinting - OSINT/003 Intelligence X.srt | 9.64 kB |
03 FootPrinting - OSINT/003 Intelligence X_it.srt | 10.07 kB |
03 FootPrinting - OSINT/004 SpiderFoot.mp4 | 117.13 MB |
03 FootPrinting - OSINT/004 SpiderFoot.srt | 10.93 kB |
03 FootPrinting - OSINT/004 SpiderFoot_it.srt | 11.60 kB |
03 FootPrinting - OSINT/005 MassScan.mp4 | 160.50 MB |
03 FootPrinting - OSINT/005 MassScan.srt | 12.47 kB |
03 FootPrinting - OSINT/005 MassScan_it.srt | 13.18 kB |
04 Vulnerability Assessment/001 VA - Teoria.mp4 | 83.32 MB |
04 Vulnerability Assessment/001 VA - Teoria.srt | 5.93 kB |
04 Vulnerability Assessment/001 VA - Teoria_it.srt | 6.30 kB |
04 Vulnerability Assessment/002 Nessus - Installazione e Configurazione.mp4 | 117.75 MB |
04 Vulnerability Assessment/002 Nessus - Installazione e Configurazione.srt | 13.21 kB |
04 Vulnerability Assessment/002 Nessus - Installazione e Configurazione_it.srt | 14.11 kB |
04 Vulnerability Assessment/003 Nessus - Lancio di una scansione.mp4 | 69.55 MB |
04 Vulnerability Assessment/003 Nessus - Lancio di una scansione.srt | 9.23 kB |
04 Vulnerability Assessment/003 Nessus - Lancio di una scansione_it.srt | 9.83 kB |
04 Vulnerability Assessment/004 Nessus - Analisi risultati.mp4 | 66.37 MB |
04 Vulnerability Assessment/004 Nessus - Analisi risultati.srt | 8.96 kB |
04 Vulnerability Assessment/004 Nessus - Analisi risultati_it.srt | 9.50 kB |
04 Vulnerability Assessment/005 Nessus - Report.mp4 | 115.54 MB |
04 Vulnerability Assessment/005 Nessus - Report.srt | 11.19 kB |
04 Vulnerability Assessment/005 Nessus - Report_it.srt | 11.82 kB |
04 Vulnerability Assessment/006 Nmap Vulners.mp4 | 153.75 MB |
04 Vulnerability Assessment/006 Nmap Vulners.srt | 11.67 kB |
04 Vulnerability Assessment/006 Nmap Vulners_it.srt | 12.16 kB |
04 Vulnerability Assessment/007 Identification and Bypassing Firewall Nmap (Introduction).mp4 | 245.84 MB |
04 Vulnerability Assessment/007 Identification and Bypassing Firewall Nmap (Introduction).srt | 14.56 kB |
04 Vulnerability Assessment/007 Identification and Bypassing Firewall Nmap (Introduction)_it.srt | 15.48 kB |
04 Vulnerability Assessment/008 JSafe Scanner.mp4 | 90.08 MB |
04 Vulnerability Assessment/008 JSafe Scanner.srt | 12.16 kB |
04 Vulnerability Assessment/008 JSafe Scanner_it.srt | 12.90 kB |
04 Vulnerability Assessment/009 WP Scan.mp4 | 98.18 MB |
04 Vulnerability Assessment/009 WP Scan.srt | 9.15 kB |
04 Vulnerability Assessment/009 WP Scan_it.srt | 9.73 kB |
05 WAPT - Burp Accademy/001 File Path Traversal.mp4 | 52.46 MB |
05 WAPT - Burp Accademy/001 File Path Traversal.srt | 6.58 kB |
05 WAPT - Burp Accademy/001 File Path Traversal_it.srt | 7.01 kB |
05 WAPT - Burp Accademy/002 File Path Traversal - Example 1.mp4 | 52.51 MB |
05 WAPT - Burp Accademy/002 File Path Traversal - Example 1.srt | 6.24 kB |
05 WAPT - Burp Accademy/002 File Path Traversal - Example 1_it.srt | 6.60 kB |
05 WAPT - Burp Accademy/003 File Path Traversal - Example 2.mp4 | 29.36 MB |
05 WAPT - Burp Accademy/003 File Path Traversal - Example 2_it.srt | 3.46 kB |
05 WAPT - Burp Accademy/004 File Path Traversal - Example 3.mp4 | 20.92 MB |
05 WAPT - Burp Accademy/004 File Path Traversal - Example 3_it.srt | 2.59 kB |
05 WAPT - Burp Accademy/005 File Path Traversal - Example 4.mp4 | 25.02 MB |
05 WAPT - Burp Accademy/005 File Path Traversal - Example 4_it.srt | 3.36 kB |
05 WAPT - Burp Accademy/006 File Path Traversal - Example 5.mp4 | 24.65 MB |
05 WAPT - Burp Accademy/006 File Path Traversal - Example 5_it.srt | 2.51 kB |
05 WAPT - Burp Accademy/007 File Path Traversal - Example 6.mp4 | 28.38 MB |
05 WAPT - Burp Accademy/007 File Path Traversal - Example 6_it.srt | 3.41 kB |
05 WAPT - Burp Accademy/008 Prevent Directory Traversal.mp4 | 25.75 MB |
05 WAPT - Burp Accademy/008 Prevent Directory Traversal_it.srt | 2.93 kB |
05 WAPT - Burp Accademy/009 File Upload Vulnerabilities.mp4 | 39.25 MB |
05 WAPT - Burp Accademy/009 File Upload Vulnerabilities_it.srt | 3.54 kB |
05 WAPT - Burp Accademy/010 File Upload Vulnerabilities - Example 1.mp4 | 48.28 MB |
05 WAPT - Burp Accademy/010 File Upload Vulnerabilities - Example 1_it.srt | 7.23 kB |
05 WAPT - Burp Accademy/011 File Upload Vulnerabilities - Example 2.mp4 | 36.78 MB |
05 WAPT - Burp Accademy/011 File Upload Vulnerabilities - Example 2_it.srt | 4.86 kB |
05 WAPT - Burp Accademy/012 File Upload Vulnerabilities - Example 3.mp4 | 44.83 MB |
05 WAPT - Burp Accademy/012 File Upload Vulnerabilities - Example 3_it.srt | 6.19 kB |
05 WAPT - Burp Accademy/013 File Upload Vulnerabilities - Example 4.mp4 | 40.69 MB |
05 WAPT - Burp Accademy/013 File Upload Vulnerabilities - Example 4_it.srt | 5.10 kB |
05 WAPT - Burp Accademy/014 File Upload Vulnerabilities - Example 5.mp4 | 49.48 MB |
05 WAPT - Burp Accademy/014 File Upload Vulnerabilities - Example 5_it.srt | 6.57 kB |
05 WAPT - Burp Accademy/015 File Upload Vulnerabilities - Prevention.mp4 | 27.41 MB |
05 WAPT - Burp Accademy/015 File Upload Vulnerabilities - Prevention_it.srt | 3.34 kB |
05 WAPT - Burp Accademy/016 Os Command Injection.mp4 | 35.88 MB |
05 WAPT - Burp Accademy/016 Os Command Injection_it.srt | 4.15 kB |
05 WAPT - Burp Accademy/017 Os Command Injection - Example 1.mp4 | 44.80 MB |
05 WAPT - Burp Accademy/017 Os Command Injection - Example 1_it.srt | 7.19 kB |
05 WAPT - Burp Accademy/018 Os Command Injection - Example 2.mp4 | 34.26 MB |
05 WAPT - Burp Accademy/018 Os Command Injection - Example 2_it.srt | 5.19 kB |
05 WAPT - Burp Accademy/019 Os Command Injection - Example 3.mp4 | 37.43 MB |
05 WAPT - Burp Accademy/019 Os Command Injection - Example 3_it.srt | 5.12 kB |
05 WAPT - Burp Accademy/020 Information Disclosure.mp4 | 24.07 MB |
05 WAPT - Burp Accademy/020 Information Disclosure_it.srt | 2.09 kB |
05 WAPT - Burp Accademy/021 Information Disclosure - Example 1.mp4 | 25.48 MB |
05 WAPT - Burp Accademy/021 Information Disclosure - Example 1_it.srt | 2.66 kB |
05 WAPT - Burp Accademy/022 Information Disclosure - Example 2.mp4 | 34.97 MB |
05 WAPT - Burp Accademy/022 Information Disclosure - Example 2_it.srt | 3.24 kB |
05 WAPT - Burp Accademy/023 Information Disclosure - Example 3.mp4 | 27.47 MB |
05 WAPT - Burp Accademy/023 Information Disclosure - Example 3_it.srt | 3.49 kB |
05 WAPT - Burp Accademy/024 Information Disclosure - Example 4.mp4 | 60.57 MB |
05 WAPT - Burp Accademy/024 Information Disclosure - Example 4_it.srt | 9.84 kB |
05 WAPT - Burp Accademy/025 SSRF - Server Side Request Forgery.mp4 | 45.34 MB |
05 WAPT - Burp Accademy/025 SSRF - Server Side Request Forgery_it.srt | 5.61 kB |
05 WAPT - Burp Accademy/026 SSRF - Server Side Request Forgery - Example 1.mp4 | 60.50 MB |
05 WAPT - Burp Accademy/026 SSRF - Server Side Request Forgery - Example 1_it.srt | 6.82 kB |
05 WAPT - Burp Accademy/027 SSRF - Server Side Request Forgery - Example 2.mp4 | 74.77 MB |
05 WAPT - Burp Accademy/027 SSRF - Server Side Request Forgery - Example 2_it.srt | 8.60 kB |
05 WAPT - Burp Accademy/028 XXE - Xml External Entity.mp4 | 30.09 MB |
05 WAPT - Burp Accademy/028 XXE - Xml External Entity_it.srt | 3.67 kB |
05 WAPT - Burp Accademy/029 XXE - Xml External Entity - Example 1.mp4 | 33.52 MB |
05 WAPT - Burp Accademy/029 XXE - Xml External Entity - Example 1_it.srt | 3.07 kB |
05 WAPT - Burp Accademy/030 XXE - Xml External Entity - Example 2.mp4 | 51.78 MB |
05 WAPT - Burp Accademy/030 XXE - Xml External Entity - Example 2_it.srt | 5.01 kB |
05 WAPT - Burp Accademy/031 XXE - Xml External Entity - Example 3.mp4 | 40.04 MB |
05 WAPT - Burp Accademy/031 XXE - Xml External Entity - Example 3_it.srt | 3.87 kB |
05 WAPT - Burp Accademy/032 XXE - Xml External Entity - Example 4.mp4 | 31.91 MB |
05 WAPT - Burp Accademy/032 XXE - Xml External Entity - Example 4_it.srt | 4.54 kB |
05 WAPT - Burp Accademy/033 SSTI - Server Side Template Injection.mp4 | 55.84 MB |
05 WAPT - Burp Accademy/033 SSTI - Server Side Template Injection_it.srt | 5.69 kB |
05 WAPT - Burp Accademy/034 SSTI - Server Side Template Injection - Example 1.mp4 | 69.76 MB |
05 WAPT - Burp Accademy/034 SSTI - Server Side Template Injection - Example 1_it.srt | 8.15 kB |
05 WAPT - Burp Accademy/035 SSTI - Server Side Template Injection - Example 2.mp4 | 73.99 MB |
05 WAPT - Burp Accademy/035 SSTI - Server Side Template Injection - Example 2_it.srt | 10.03 kB |
06 Cracking Password/001 Password Cracking - Teoria.mp4 | 128.94 MB |
06 Cracking Password/001 Password Cracking - Teoria_it.srt | 12.81 kB |
06 Cracking Password/002 John The Ripper.mp4 | 58.00 MB |
06 Cracking Password/002 John The Ripper_it.srt | 8.20 kB |
06 Cracking Password/003 Hydra.mp4 | 68.68 MB |
06 Cracking Password/003 Hydra_it.srt | 8.02 kB |
06 Cracking Password/004 Hashcat.mp4 | 128.61 MB |
06 Cracking Password/004 Hashcat_it.srt | 16.31 kB |
06 Cracking Password/005 Raimbow Tables.mp4 | 72.66 MB |
06 Cracking Password/005 Raimbow Tables_it.srt | 7.59 kB |
07 HoneyPot/001 HoneyPot - Teoria.mp4 | 66.11 MB |
07 HoneyPot/001 HoneyPot - Teoria_it.srt | 5.79 kB |
07 HoneyPot/002 Honeypot SSHICMP (Esempio di Jhoneypot).mp4 | 47.90 MB |
07 HoneyPot/002 Honeypot SSHICMP (Esempio di Jhoneypot)_it.srt | 6.98 kB |
08 HARDWARETELCO HACKING/001 Introduzione del dispositivo da testare (Hardware).mp4 | 59.39 MB |
08 HARDWARETELCO HACKING/001 Introduzione del dispositivo da testare (Hardware)_it.srt | 6.11 kB |
08 HARDWARETELCO HACKING/002 Utilizzo del Multimetro.mp4 | 61.74 MB |
08 HARDWARETELCO HACKING/002 Utilizzo del Multimetro_it.srt | 4.91 kB |
08 HARDWARETELCO HACKING/003 Logic Analyzer.mp4 | 175.59 MB |
08 HARDWARETELCO HACKING/003 Logic Analyzer_it.srt | 12.25 kB |
08 HARDWARETELCO HACKING/004 BootLoader attraverso la UART.mp4 | 90.85 MB |
08 HARDWARETELCO HACKING/004 BootLoader attraverso la UART_it.srt | 7.28 kB |
08 HARDWARETELCO HACKING/005 Dumping SPI - Parte 1.mp4 | 90.83 MB |
08 HARDWARETELCO HACKING/005 Dumping SPI - Parte 1_it.srt | 6.60 kB |
08 HARDWARETELCO HACKING/006 Dumping SPI (Con presa dell'utente Root) - Parte 2.mp4 | 45.43 MB |
08 HARDWARETELCO HACKING/006 Dumping SPI (Con presa dell'utente Root) - Parte 2_it.srt | 5.07 kB |
08 HARDWARETELCO HACKING/007 Flipper Zero - Intro and 125Khz attack.mp4 | 105.75 MB |
08 HARDWARETELCO HACKING/007 Flipper Zero - Intro and 125Khz attack_it.srt | 7.86 kB |
08 HARDWARETELCO HACKING/008 Flipper Zero - Attack on NFC and SubGhz.mp4 | 60.44 MB |
08 HARDWARETELCO HACKING/008 Flipper Zero - Attack on NFC and SubGhz_it.srt | 3.41 kB |
08 HARDWARETELCO HACKING/009 Flipper Zero - Bad USB and Infrared Attack.mp4 | 89.64 MB |
08 HARDWARETELCO HACKING/009 Flipper Zero - Bad USB and Infrared Attack_it.srt | 4.80 kB |
09 HTB Machine/001 Late.mp4 | 202.78 MB |
09 HTB Machine/001 Late_it.srt | 0.00 B |
09 HTB Machine/002 Paper - WriteUp.html | 220.00 B |
10 Caso Reale/001 Vulnerabilità Log4J - Parte 1.mp4 | 155.01 MB |
10 Caso Reale/001 Vulnerabilità Log4J - Parte 1_it.srt | 13.35 kB |
10 Caso Reale/002 Vulnerabilità Log4J - Parte 2.mp4 | 173.99 MB |
10 Caso Reale/002 Vulnerabilità Log4J - Parte 2_it.srt | 15.53 kB |
10 Caso Reale/003 Vulnerabilità Log4J - Parte 3.mp4 | 132.83 MB |
10 Caso Reale/003 Vulnerabilità Log4J - Parte 3_it.srt | 10.86 kB |
Read Me.txt | 17.00 B |