FileMood

Download [FreeTutorials.Us] Udemy - learn-social-engineering-from-scratch

FreeTutorials Us Udemy learn social engineering from scratch

Name

[FreeTutorials.Us] Udemy - learn-social-engineering-from-scratch

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

1.7 GB

Total Files

233

Hash

7878E3BE0DAB16A56C41EA3EBCC551D8F3F27698

/001 What Is Social Engineering/

001 What Is Social Engineering.mp4

11.5 MB

001 What Is Social Engineering-subtitle-en.srt

4.7 KB

002 Teaser - Hacking An Android Phone & Accessing The Camera.mp4

16.2 MB

002 Teaser - Hacking An Android Phone & Accessing The Camera-subtitle-en.srt

8.1 KB

003 Course Overview.mp4

11.1 MB

003 Course Overview-subtitle-en.srt

6.3 KB

/01 Preparation - Creating a Penetration Testing Lab/

004 Lab Overview & Needed Software.mp4

7.0 MB

004 Lab Overview & Needed Software-subtitle-en.srt

5.2 KB

005 Installing Kali E7 As a Virtual Machine Using a Ready Image.mp4

22.0 MB

005 Installing Kali E7 As a Virtual Machine Using a Ready Image-subtitle-en.srt

11.9 KB

006 Installing Windows As a Virtual Machine.mp4

9.8 MB

006 Installing Windows As a Virtual Machine-subtitle-en.srt

4.7 KB

007 Installing Ubuntu As a Virtual Machine.mp4

14.2 MB

007 Installing Ubuntu As a Virtual Machine-subtitle-en.srt

10.2 KB

external_links.txt

0.4 KB

/02 Preparation - Linux Basics/

008 Basic Overview Of Kali Linux.mp4

15.1 MB

008 Basic Overview Of Kali Linux-subtitle-en.srt

6.4 KB

009 The Linux Terminal & Basic Linux Commands.mp4

32.4 MB

009 The Linux Terminal & Basic Linux Commands-subtitle-en.srt

13.0 KB

010 Creating & Using Snapshots.mp4

16.0 MB

010 Creating & Using Snapshots-subtitle-en.srt

9.5 KB

011 Updating Sources & Installing Programs.mp4

18.7 MB

011 Updating Sources & Installing Programs-subtitle-en.srt

7.0 KB

/03 Information Gathering/

012 Introduction.mp4

4.8 MB

012 Introduction-subtitle-en.srt

2.7 KB

/04 Information Gathering - Gathering Info About A Company_Website/

013 Maltego Overview.mp4

17.4 MB

013 Maltego Overview-subtitle-en.srt

12.3 KB

014 Discovering Domain Info & Emails Associated With Target.mp4

13.3 MB

014 Discovering Domain Info & Emails Associated With Target-subtitle-en.srt

10.2 KB

015 Discovering Information About Hosting Company_ Support Team Emails & Admin Email.mp4

14.8 MB

015 Discovering Information About Hosting Company_ Support Team Emails & Admin Email-subtitle-en.srt

8.9 KB

016 Discovering Files_ Links_ Websites & Other Companies Related To Target.mp4

14.2 MB

016 Discovering Files_ Links_ Websites & Other Companies Related To Target-subtitle-en.srt

6.3 KB

017 Using The Gathered Info To Build An Attack Strategy.mp4

9.5 MB

017 Using The Gathered Info To Build An Attack Strategy-subtitle-en.srt

6.1 KB

external_links.txt

0.1 KB

/05 Information Gathering - Gathering Info About A Person/

018 Discovering Websites_ Links & Social Networking Accounts.mp4

23.6 MB

018 Discovering Websites_ Links & Social Networking Accounts-subtitle-en.srt

14.0 KB

019 Discovering Twitter Friends & Associated Accounts.mp4

9.8 MB

019 Discovering Twitter Friends & Associated Accounts-subtitle-en.srt

6.7 KB

020 Discovering Emails Of The Target's Friends.mp4

9.4 MB

020 Discovering Emails Of The Target's Friends-subtitle-en.srt

6.1 KB

021 Analysing The Gathered Info & Building An Attack Strategy.mp4

22.2 MB

021 Analysing The Gathered Info & Building An Attack Strategy-subtitle-en.srt

12.2 KB

/06 Windows Evil Files/

022 Introduction.mp4

5.3 MB

022 Introduction-subtitle-en.srt

2.9 KB

/07 Windows Evil Files - Generating Undetectable Backdoors/

023 Installing Veil 3_0.mp4

16.1 MB

023 Installing Veil 3_0-subtitle-en.srt

10.1 KB

024 Veil Overview & Payloads Basics.mp4

12.1 MB

024 Veil Overview & Payloads Basics-subtitle-en.srt

10.6 KB

025 Generating An Undetectable Backdoor Using Veil 3.mp4

21.8 MB

025 Generating An Undetectable Backdoor Using Veil 3-subtitle-en.srt

13.2 KB

026 Listening For Incoming Connections.mp4

13.3 MB

026 Listening For Incoming Connections-subtitle-en.srt

9.8 KB

027 Hacking A Windows 10 Machine Using The Generated Backdoor.mp4

16.7 MB

027 Hacking A Windows 10 Machine Using The Generated Backdoor-subtitle-en.srt

9.6 KB

028 Installing The Fat Rat.mp4

14.3 MB

028 Installing The Fat Rat-subtitle-en.srt

8.9 KB

029 Generating An Undetectable Backdoor Using TheFatRat.mp4

28.3 MB

029 Generating An Undetectable Backdoor Using TheFatRat-subtitle-en.srt

15.4 KB

030 Installing Empire.mp4

13.2 MB

030 Installing Empire-subtitle-en.srt

5.8 KB

031 Creating An Empire Listener.mp4

12.8 MB

031 Creating An Empire Listener-subtitle-en.srt

7.7 KB

032 Creating a Windows Powershell Stager & Hacking Windows 10.mp4

17.0 MB

032 Creating a Windows Powershell Stager & Hacking Windows 10-subtitle-en.srt

8.5 KB

033 Modifying Backdoor Source To Bypass All Anti-virus Programs.mp4

14.7 MB

033 Modifying Backdoor Source To Bypass All Anti-virus Programs-subtitle-en.srt

11.1 KB

external_links.txt

0.2 KB

/08 Windows Evil Files - Spying/

034 What Is A Keylogger _.mp4

16.4 MB

034 What Is A Keylogger _-subtitle-en.srt

9.1 KB

035 Creating A Remote Keylogger.mp4

11.6 MB

035 Creating A Remote Keylogger-subtitle-en.srt

6.2 KB

036 Using A Remote Keylogger To Capture Key Strikes Including Passwords.mp4

18.2 MB

036 Using A Remote Keylogger To Capture Key Strikes Including Passwords-subtitle-en.srt

9.9 KB

037 Password Recovery Basics.mp4

23.0 MB

037 Password Recovery Basics-subtitle-en.srt

10.6 KB

038 Recovering Saved Passwords From Local Machine.mp4

8.6 MB

038 Recovering Saved Passwords From Local Machine-subtitle-en.srt

4.4 KB

039 Recovering Saved Passwords From A Remote Machine.mp4

25.8 MB

039 Recovering Saved Passwords From A Remote Machine-subtitle-en.srt

16.1 KB

039 run-laZagne.txt

0.9 KB

external_links.txt

0.1 KB

/09 Windows Evil Files - Enhancing Evil Files/

040 Bypassing All Anti-Virus Programs By Modifying Hex Vales.mp4

23.4 MB

040 Bypassing All Anti-Virus Programs By Modifying Hex Vales-subtitle-en.srt

13.8 KB

041 download-and-execute.txt

0.2 KB

041 Download & Execute Payload.mp4

15.6 MB

041 Download & Execute Payload-subtitle-en.srt

9.5 KB

042 Creating The Perfect Spying Tool.mp4

19.8 MB

042 Creating The Perfect Spying Tool-subtitle-en.srt

9.3 KB

/10 Windows Evil Files - Converting Evil File To A Trojan/

043 Embedding Evil Files With Any File Type Like An Image Or PDF.mp4

22.1 MB

043 Embedding Evil Files With Any File Type Like An Image Or PDF-subtitle-en.srt

13.9 KB

044 Running Evil Files Silently In The Background.mp4

24.7 MB

044 Running Evil Files Silently In The Background-subtitle-en.srt

12.2 KB

045 Changing Trojan's Icon.mp4

23.5 MB

045 Changing Trojan's Icon-subtitle-en.srt

10.5 KB

046 Spoofing File Extension from _exe to anything else (pdf_ png __etc).mp4

24.8 MB

046 Spoofing File Extension from _exe to anything else (pdf_ png __etc)-subtitle-en.srt

15.2 KB

047 autoit-download-and-execute.txt

0.5 KB

047 Download & Execute Payload (Method 2).mp4

19.8 MB

047 Download & Execute Payload (Method 2)-subtitle-en.srt

8.6 KB

048 Embedding Evil Files With Any File Type Like An Image Or PDF (Method 2).mp4

19.2 MB

048 Embedding Evil Files With Any File Type Like An Image Or PDF (Method 2)-subtitle-en.srt

9.3 KB

049 Embedding backdoor In A Legitimate Microsoft Office Document.mp4

19.7 MB

049 Embedding backdoor In A Legitimate Microsoft Office Document-subtitle-en.srt

10.9 KB

050 download-and-execute-macro.txt

0.5 KB

050 Embedding Any Evil File In A Legitimate Microsoft Office Document.mp4

22.0 MB

050 Embedding Any Evil File In A Legitimate Microsoft Office Document-subtitle-en.srt

12.8 KB

external_links.txt

0.1 KB

/11 Mac OS X Evil Files/

051 Introduction.mp4

11.8 MB

051 Introduction-subtitle-en.srt

3.9 KB

052 Hacking Mac OS X Using A Meterpreter Backdoor.mp4

36.3 MB

052 Hacking Mac OS X Using A Meterpreter Backdoor-subtitle-en.srt

15.5 KB

053 Hacking Mac OS X Using An Empire Stager.mp4

15.0 MB

053 Hacking Mac OS X Using An Empire Stager-subtitle-en.srt

9.2 KB

054 Converting Basic Backdoor To An Executable.mp4

8.8 MB

054 Converting Basic Backdoor To An Executable-subtitle-en.srt

4.7 KB

055 Embedding A Normal File With Backdoor.mp4

28.0 MB

055 Embedding A Normal File With Backdoor-subtitle-en.srt

12.8 KB

056 Download & Execute Payload.mp4

21.2 MB

056 Download & Execute Payload-subtitle-en.srt

9.6 KB

057 Changing Trojan's Icon.mp4

21.2 MB

057 Changing Trojan's Icon-subtitle-en.srt

8.4 KB

058 Configuring The Trojan To Run Silently.mp4

17.9 MB

058 Configuring The Trojan To Run Silently-subtitle-en.srt

8.1 KB

059 Embedding Backdoor In A Legitimate Microsoft Office Document.mp4

14.6 MB

059 Embedding Backdoor In A Legitimate Microsoft Office Document-subtitle-en.srt

7.9 KB

/12 Linux Evil Files/

060 Hacking Into Linux-Like Systems Using One Command.mp4

17.5 MB

060 Hacking Into Linux-Like Systems Using One Command-subtitle-en.srt

11.7 KB

061 More Advanced Linux Backdoor.mp4

10.7 MB

061 More Advanced Linux Backdoor-subtitle-en.srt

8.4 KB

062 Generating A Persistent Remote Keylogger.mp4

8.3 MB

062 Generating A Persistent Remote Keylogger-subtitle-en.srt

6.3 KB

063 Using A Remote Keylogger To Capture Key Strikes Including Passwords.mp4

14.4 MB

063 Using A Remote Keylogger To Capture Key Strikes Including Passwords-subtitle-en.srt

8.6 KB

064 Recovering Saved Passwords From A Local Machine.mp4

16.4 MB

064 Recovering Saved Passwords From A Local Machine-subtitle-en.srt

9.7 KB

065 Execute & Report Payload.mp4

12.2 MB

065 Execute & Report Payload-subtitle-en.srt

9.8 KB

065 ZReporter.py

0.4 KB

066 Recovering Saved Passwords From A Remote Machine.mp4

16.7 MB

066 Recovering Saved Passwords From A Remote Machine-subtitle-en.srt

8.9 KB

067 Embedding Evil Code In A Legitimate Linux Package - Part 1.mp4

20.2 MB

067 Embedding Evil Code In A Legitimate Linux Package - Part 1-subtitle-en.srt

18.0 KB

068 Embedding Evil Code In A Legitimate Linux Package - Part 2.mp4

12.4 MB

068 Embedding Evil Code In A Legitimate Linux Package - Part 2-subtitle-en.srt

7.0 KB

069 Backdooring a Legitimate Android App.mp4

19.2 MB

069 Backdooring a Legitimate Android App-subtitle-en.srt

13.4 KB

external_links.txt

0.2 KB

/13 Delivery Methods/

070 Introduction.mp4

6.5 MB

070 Introduction-subtitle-en.srt

2.7 KB

071 Preparing Evil Files To Be Delivered Via A URL.mp4

11.5 MB

071 Preparing Evil Files To Be Delivered Via A URL-subtitle-en.srt

9.2 KB

072 Email Spoofing - Send Emails As Any Email Account.mp4

20.4 MB

072 Email Spoofing - Send Emails As Any Email Account-subtitle-en.srt

10.6 KB

073 Hacking OS X & Linux Using Pure Social Engineering Without Sending Any Files.mp4

26.5 MB

073 Hacking OS X & Linux Using Pure Social Engineering Without Sending Any Files-subtitle-en.srt

14.5 KB

074 Creating A Replica Of Any Website _ Login Page.mp4

9.4 MB

074 Creating A Replica Of Any Website _ Login Page-subtitle-en.srt

8.1 KB

075 Stealing Login Info Using Fake A Login Page.mp4

18.5 MB

075 Stealing Login Info Using Fake A Login Page-subtitle-en.srt

12.0 KB

076 BeEF Overview & Basic Hook Method.mp4

14.5 MB

076 BeEF Overview & Basic Hook Method-subtitle-en.srt

9.5 KB

077 Injecting BeEF's Hook In Any Webpage.mp4

11.8 MB

077 Injecting BeEF's Hook In Any Webpage-subtitle-en.srt

6.5 KB

078 Luring Target Into Accessing Evil URL Without Direct Interaction.mp4

21.9 MB

078 Luring Target Into Accessing Evil URL Without Direct Interaction-subtitle-en.srt

14.6 KB

079 Basic BeEF Commands.mp4

12.2 MB

079 Basic BeEF Commands-subtitle-en.srt

6.1 KB

080 Stealing Credentials_Passwords Using A Fake Login Prompt.mp4

6.2 MB

080 Stealing Credentials_Passwords Using A Fake Login Prompt-subtitle-en.srt

3.1 KB

081 Hacking Windows 10 Using A Fake Update.mp4

9.4 MB

081 Hacking Windows 10 Using A Fake Update-subtitle-en.srt

6.6 KB

082 Hacking Mac OS X Using A Fake Update.mp4

11.5 MB

082 Hacking Mac OS X Using A Fake Update-subtitle-en.srt

5.7 KB

083 Hacking Linux Using A Fake Update.mp4

9.3 MB

083 Hacking Linux Using A Fake Update-subtitle-en.srt

6.2 KB

external_links.txt

0.2 KB

/14 Using The Above Attacks Outside The Local Network/

084 Overview of the Setup.mp4

15.8 MB

084 Overview of the Setup-subtitle-en.srt

8.9 KB

085 Ex1 - Generating a Backdoor That Works Outside The Network.mp4

13.9 MB

085 Ex1 - Generating a Backdoor That Works Outside The Network-subtitle-en.srt

7.5 KB

086 Configuring The Router To Forward Connections To Kali.mp4

16.0 MB

086 Configuring The Router To Forward Connections To Kali-subtitle-en.srt

9.8 KB

087 Ex2 - Using BeEF Outside The Network.mp4

16.3 MB

087 Ex2 - Using BeEF Outside The Network-subtitle-en.srt

7.5 KB

/15 Post Exploitation/

088 Introduction.mp4

7.5 MB

088 Introduction-subtitle-en.srt

3.4 KB

089 Upgrading Basic Shell Access To A Meterpreter_Empire Access.mp4

13.1 MB

089 Upgrading Basic Shell Access To A Meterpreter_Empire Access-subtitle-en.srt

13.0 KB

/16 Post Exploitation - Meterpreter/

090 Meterpreter Basics.mp4

16.2 MB

090 Meterpreter Basics-subtitle-en.srt

8.3 KB

091 File System Commands.mp4

13.7 MB

091 File System Commands-subtitle-en.srt

5.7 KB

092 Maintaining Access Basic Methods.mp4

13.7 MB

092 Maintaining Access Basic Methods-subtitle-en.srt

7.0 KB

093 Maintaining Access - Using a Reliable & undetectable Method.mp4

19.6 MB

093 Maintaining Access - Using a Reliable & undetectable Method-subtitle-en.srt

8.5 KB

094 Spying - Capturing Key Strikes & Taking Screen Shots.mp4

4.5 MB

094 Spying - Capturing Key Strikes & Taking Screen Shots-subtitle-en.srt

3.5 KB

095 Pivoting - Theory (What is Pivoting_).mp4

22.8 MB

095 Pivoting - Theory (What is Pivoting_)-subtitle-en.srt

8.2 KB

096 Pivoting - Exploiting Devices on The Same Network As The Target Computer.mp4

20.7 MB

096 Pivoting - Exploiting Devices on The Same Network As The Target Computer-subtitle-en.srt

10.2 KB

097 Controlling Android Phone & Accessing Mic_ Camera_ Messages_ File System & More.mp4

17.2 MB

097 Controlling Android Phone & Accessing Mic_ Camera_ Messages_ File System & More-subtitle-en.srt

12.5 KB

098 Maintaining Access On OS X.mp4

24.1 MB

098 Maintaining Access On OS X-subtitle-en.srt

13.8 KB

/17 Post Exploitation - Empire/

099 Basics Of Empire Agents.mp4

13.1 MB

099 Basics Of Empire Agents-subtitle-en.srt

8.9 KB

100 File System Commands.mp4

13.0 MB

100 File System Commands-subtitle-en.srt

8.9 KB

101 Upload & Execute Shell Commands.mp4

10.2 MB

101 Upload & Execute Shell Commands-subtitle-en.srt

6.0 KB

102 Injecting Backdoor Process In System Processes.mp4

22.9 MB

102 Injecting Backdoor Process In System Processes-subtitle-en.srt

12.6 KB

103 Stealing root Password & Escalating Privileges On OS X.mp4

15.4 MB

103 Stealing root Password & Escalating Privileges On OS X-subtitle-en.srt

9.9 KB

104 Maintaining Access On OS X.mp4

14.3 MB

104 Maintaining Access On OS X-subtitle-en.srt

7.2 KB

/18 Security/

105 Detecting Fake_Spoofed Emails.mp4

11.8 MB

105 Detecting Fake_Spoofed Emails-subtitle-en.srt

9.2 KB

106 How to Protect Against BeEF & Other Browser Exploits.mp4

11.4 MB

106 How to Protect Against BeEF & Other Browser Exploits-subtitle-en.srt

5.5 KB

107 Detecting Trojans Manually.mp4

11.7 MB

107 Detecting Trojans Manually-subtitle-en.srt

6.8 KB

108 Detecting Trojans Using a Sandbox.mp4

8.0 MB

108 Detecting Trojans Using a Sandbox-subtitle-en.srt

4.2 KB

external_links.txt

0.1 KB

/19 Bonus Section/

109 Bonus Lecture - What's Next_.html

4.7 KB

/

[Discuss.FreeTutorials.us].url

0.3 KB

[FreeCoursesOnline.Us].url

0.1 KB

[FreeTutorials.Us].url

0.1 KB

 

Total files 233


Copyright © 2025 FileMood.com