zhongziso种子搜
首页
功能
磁力转BT
BT转磁力
使用教程
免责声明
关于
zhongziso
搜索
[FreeCoursesOnline.Me] PacktPub - Python for Automating Information Security [Video]
magnet:?xt=urn:btih:28e2ef179f043b4a812744bc2033870ffc5bc464&dn=[FreeCoursesOnline.Me] PacktPub - Python for Automating Information Security [Video]
磁力链接详情
Hash值:
28e2ef179f043b4a812744bc2033870ffc5bc464
点击数:
247
文件大小:
562.48 MB
文件数量:
36
创建日期:
2022-12-24 15:53
最后访问:
2024-12-26 06:33
访问标签:
FreeCoursesOnline
Me
PacktPub
-
Python
for
Automating
Information
Security
Video
文件列表详情
1 - Reading, Modifying, and Testing an Exploit Script/01 - The Course Overview.mp4 13.51 MB
1 - Reading, Modifying, and Testing an Exploit Script/02 - Setting Up Your Virtual Environment.mp4 11.2 MB
1 - Reading, Modifying, and Testing an Exploit Script/03 - Finding an Exploit Script.mp4 9.87 MB
1 - Reading, Modifying, and Testing an Exploit Script/04 - Understanding the Script.mp4 11.48 MB
1 - Reading, Modifying, and Testing an Exploit Script/05 - Modifying the Script.mp4 19.16 MB
1 - Reading, Modifying, and Testing an Exploit Script/06 - Testing the Script.mp4 13.99 MB
2 - Analyzing a Packet Capture File/07 - Viewing a Packet Capture File in Wireshark.mp4 20.4 MB
2 - Analyzing a Packet Capture File/08 - Understanding Normal Traffic Patterns.mp4 16.98 MB
2 - Analyzing a Packet Capture File/09 - Writing a Python Script to Look for Malicious Network Traffic.mp4 17.76 MB
2 - Analyzing a Packet Capture File/10 - Writing a Python Script to Calculate a Network Traffic Baseline.mp4 22.12 MB
2 - Analyzing a Packet Capture File/11 - Writing a Python Script to Compare a Baseline Against Network Traffic.mp4 18.01 MB
3 - Gathering Open-Source Intelligence/12 - What OSINT Is.mp4 12.05 MB
3 - Gathering Open-Source Intelligence/13 - Enumerating Domain Names with Python.mp4 15.43 MB
3 - Gathering Open-Source Intelligence/14 - What Is Google Dorking.mp4 12.9 MB
3 - Gathering Open-Source Intelligence/15 - Automating Google Dorking with Python.mp4 12.96 MB
3 - Gathering Open-Source Intelligence/16 - Web Directory Enumeration with Python.mp4 15.47 MB
4 - Analyzing a Log File/17 - Reading a Log File.mp4 15.85 MB
4 - Analyzing a Log File/18 - Understanding Normal Log Messages.mp4 14.58 MB
4 - Analyzing a Log File/19 - Writing a Python Script to Look for Logs Indicating Malicious Activity.mp4 17.55 MB
4 - Analyzing a Log File/20 - Writing a Python Script to Calculate a Log Message Baseline.mp4 17.58 MB
4 - Analyzing a Log File/21 - Writing a Python Script to Compare a Baseline Against a Log File.mp4 14.69 MB
5 - Writing a Python Replacement for Netcat/22 - What Is Netcat.mp4 13.65 MB
5 - Writing a Python Replacement for Netcat/23 - Writing the Input Arguments.mp4 20.1 MB
5 - Writing a Python Replacement for Netcat/24 - Writing the Client.mp4 14.01 MB
5 - Writing a Python Replacement for Netcat/25 - Writing the Server.mp4 17.28 MB
5 - Writing a Python Replacement for Netcat/26 - Testing Your Program.mp4 13.47 MB
6 - Collecting Network Packets Off the Wire/27 - Introduction to Passive Network Capture.mp4 8.51 MB
6 - Collecting Network Packets Off the Wire/28 - Writing a Python Packet Sniffer.mp4 14.36 MB
6 - Collecting Network Packets Off the Wire/29 - Capturing Plain-Text Credentials from Network Packets with Python.mp4 15.18 MB
6 - Collecting Network Packets Off the Wire/30 - Introduction to ARP Cache Poisoning.mp4 9.15 MB
6 - Collecting Network Packets Off the Wire/31 - Writing a Python ARP Cache Poisoner.mp4 17.88 MB
7 - Building a Penetration Testing Tool/32 - Introduction to the Metasploit Framework.mp4 20.79 MB
7 - Building a Penetration Testing Tool/33 - Writing the Discovery Module.mp4 16.51 MB
7 - Building a Penetration Testing Tool/34 - Writing the Exploit Framework.mp4 19.07 MB
7 - Building a Penetration Testing Tool/35 - Stitching It All Together with an Interactive Command Shell.mp4 23.65 MB
7 - Building a Penetration Testing Tool/36 - Testing MSFPY.mp4 15.29 MB
其他位置