zhongziso种子搜
首页
功能
磁力转BT
BT转磁力
使用教程
免责声明
关于
zhongziso
搜索
[FreeCourseLab.com] Udemy - How Hackers Create Malware and Infiltrate Victim Machines
magnet:?xt=urn:btih:57a2b4882a2748e4cfed5a9652450da0df285556&dn=[FreeCourseLab.com] Udemy - How Hackers Create Malware and Infiltrate Victim Machines
磁力链接详情
Hash值:
57a2b4882a2748e4cfed5a9652450da0df285556
点击数:
168
文件大小:
165.58 MB
文件数量:
10
创建日期:
2018-12-30 16:17
最后访问:
2024-12-26 13:42
访问标签:
FreeCourseLab
com
Udemy
-
How
Hackers
Create
Malware
and
Infiltrate
Victim
Machines
文件列表详情
1. Introduction/1. Introduction and Welcome.mp4 13.24 MB
2. Initial Building Blocks/1. Introduction to Malware and Trojans.mp4 7.72 MB
2. Initial Building Blocks/2. Installing C C++ Compiler.mp4 14.22 MB
2. Initial Building Blocks/3. Downloading Additional Applications.mp4 14.41 MB
3. Lets Create Malware!/1. Creating a Malware Program with Codeblocks.mp4 22.22 MB
3. Lets Create Malware!/2. Running Apache Server and Uploading Malware to Server.mp4 29.85 MB
3. Lets Create Malware!/3. Using Reverse Shell on Victim's PC.mp4 25.16 MB
3. Lets Create Malware!/4. Viewing Access Logs and Introduction to the Metasploit Framerwork.mp4 22.15 MB
3. Lets Create Malware!/5. What to Do When Victim is on a Different Network.mp4 8.36 MB
3. Lets Create Malware!/6. Using Metasploit to Create an Exploit.mp4 8.25 MB
其他位置