首页 磁力链接怎么用

[GigaCourse.Com] Udemy - Learn Python Ethical Hacking From Scratch

文件类型 收录时间 最后活跃 资源热度 文件大小 文件数量
视频 2023-8-29 17:28 2024-12-18 13:07 122 7.94 GB 183
二维码链接
[GigaCourse.Com] Udemy - Learn Python  Ethical Hacking From Scratch的二维码
种子下载(838888不存储任何种子文件)
种子下载线路1(迅雷)--推荐
种子下载线路2(比特彗星)
种子下载线路3(torcache)
3条线路均为国内外知名下载网站种子链接,内容跟本站无关!
文件列表
  1. 01 - Introduction/001 Teaser.mp485.01MB
  2. 01 - Introduction/002 Course Introduction.mp472MB
  3. 01 - Introduction/003 Introduction to Python Programming & Ethical Hacking.mp4109.14MB
  4. 01 - Introduction/004 Lab Overview.mp415.87MB
  5. 01 - Introduction/005 Initial Preparation.mp480.51MB
  6. 01 - Introduction/006 Installing Kali Linux as a VM on Windows.mp443.35MB
  7. 01 - Introduction/007 Installing Kali Linux as a VM on Apple Mac OS.mp434.82MB
  8. 01 - Introduction/008 Installing Kali Linux as a VM on M1 Apple Computers.mp434.9MB
  9. 01 - Introduction/009 Installing Kali Linux as a VM on Linux.mp454.75MB
  10. 01 - Introduction/010 Basic Overview of Kali Linux.mp415.66MB
  11. 01 - Introduction/011 The Terminal & Linux Commands.mp4151.34MB
  12. 01 - Introduction/012 Python 2 VS Python 3 & Writing Our First Program.mp427.86MB
  13. 01 - Introduction/013 Installing & Using a Python IDE.mp428.85MB
  14. 02 - Writing a MAC Address Changer - Python Basics/001 What is MAC Address & How To Change it.mp490.97MB
  15. 02 - Writing a MAC Address Changer - Python Basics/002 Using Python Modules & Executing System Commands.mp460.45MB
  16. 02 - Writing a MAC Address Changer - Python Basics/003 Implementing a Very Basic MAC Changer.mp49.98MB
  17. 02 - Writing a MAC Address Changer - Python Basics/004 Variables & Strings.mp421.15MB
  18. 02 - Writing a MAC Address Changer - Python Basics/005 Using Variables in MAC Changer.mp414.66MB
  19. 02 - Writing a MAC Address Changer - Python Basics/006 Getting Input From The User.mp427.08MB
  20. 02 - Writing a MAC Address Changer - Python Basics/007 Handling User Input.mp452.63MB
  21. 02 - Writing a MAC Address Changer - Python Basics/008 Handling Command-line Arguments.mp439.01MB
  22. 02 - Writing a MAC Address Changer - Python Basics/009 Initialising Variables Based on Command-line Arguments.mp438.69MB
  23. 02 - Writing a MAC Address Changer - Python Basics/010 Python Functions.mp478.92MB
  24. 02 - Writing a MAC Address Changer - Python Basics/011 Returning Values From Functions.mp421.94MB
  25. 02 - Writing a MAC Address Changer - Python Basics/012 Decision Making in Python.mp426.63MB
  26. 02 - Writing a MAC Address Changer - Python Basics/013 Using Conditional Statements in MAC Changer.mp453.25MB
  27. 03 - MAC Changer - Algorithm Design/001 Introduction to Algorithms.mp430.53MB
  28. 03 - MAC Changer - Algorithm Design/002 Reading Output Returned By System Commands.mp432.34MB
  29. 03 - MAC Changer - Algorithm Design/003 Introduction to Regular Expressions (Regex).mp417.95MB
  30. 03 - MAC Changer - Algorithm Design/004 Extracting a Substring Using Regex.mp433.7MB
  31. 03 - MAC Changer - Algorithm Design/005 Refactoring & Housekeeping.mp436.91MB
  32. 03 - MAC Changer - Algorithm Design/006 Implementing The Validation Algorithm.mp439.65MB
  33. 03 - MAC Changer - Algorithm Design/007 Python 3 Compatibility.mp416.46MB
  34. 04 - Programming a Network Scanner/001 Introduction & Teaser.mp476.22MB
  35. 04 - Programming a Network Scanner/002 Installing Windows as a Virtual Machine.mp423.04MB
  36. 04 - Programming a Network Scanner/003 Introduction to ARP.mp430.05MB
  37. 04 - Programming a Network Scanner/004 Designing an Algorithm To Discover Clients on The Same Network.mp415.32MB
  38. 04 - Programming a Network Scanner/005 Using Scapy To Create an ARP Request.mp417.55MB
  39. 04 - Programming a Network Scanner/006 Combining Frames To Broadcast Packets.mp425.23MB
  40. 04 - Programming a Network Scanner/007 Sending & Receiving Packets.mp422.69MB
  41. 04 - Programming a Network Scanner/008 Introduction Lists in Python.mp426.71MB
  42. 04 - Programming a Network Scanner/009 Iterating Over Lists & Analysing Packet.mp473.39MB
  43. 04 - Programming a Network Scanner/010 Using Escape Characters To Improve Program Output.mp420.9MB
  44. 04 - Programming a Network Scanner/011 Introduction to Dictionaries in Python.mp433.61MB
  45. 04 - Programming a Network Scanner/012 Improving the Program Using a List of Dictionaries.mp422.98MB
  46. 04 - Programming a Network Scanner/013 Iterating Over Nested Data Structures.mp446.25MB
  47. 04 - Programming a Network Scanner/014 Testing The Network Scanner With Python 3.mp418.5MB
  48. 05 - Writing an ARP Spoofer/001 What is ARP Spoofing.mp424.49MB
  49. 05 - Writing an ARP Spoofer/002 Intercepting Data in a Network Using arpspoof.mp418.43MB
  50. 05 - Writing an ARP Spoofer/003 Creating an ARP Response.mp420.03MB
  51. 05 - Writing an ARP Spoofer/004 Sending ARP Responses.mp429.96MB
  52. 05 - Writing an ARP Spoofer/005 Extracting MAC Address From Responses.mp445.24MB
  53. 05 - Writing an ARP Spoofer/006 Introduction to Loops in Python.mp468.12MB
  54. 05 - Writing an ARP Spoofer/007 More on Loops & Counters.mp420.61MB
  55. 05 - Writing an ARP Spoofer/008 Dynamic Printing.mp417.7MB
  56. 05 - Writing an ARP Spoofer/009 Exception Handling in Python.mp427.15MB
  57. 05 - Writing an ARP Spoofer/010 Implementing a Restore Function.mp439.47MB
  58. 05 - Writing an ARP Spoofer/011 Restoring ARP Tables on Exception.mp421.78MB
  59. 06 - Writing a Packet Sniffer/001 Introduction & Teaser.mp475.48MB
  60. 06 - Writing a Packet Sniffer/002 Sniffing Packets Using Scapy.mp432.58MB
  61. 06 - Writing a Packet Sniffer/003 Extracting data From a Specific Layer.mp450.21MB
  62. 06 - Writing a Packet Sniffer/004 Analysing Sniffed Packets & Extracting Fields From Layers.mp490.97MB
  63. 06 - Writing a Packet Sniffer/005 Analysing Fields & Extracting Passwords.mp473.41MB
  64. 06 - Writing a Packet Sniffer/006 Extracting URLs.mp477.19MB
  65. 06 - Writing a Packet Sniffer/007 Capturing Passwords From Any Computer Connected to the Same Network.mp419.55MB
  66. 06 - Writing a Packet Sniffer/008 Strings & Bytes in Python 3.mp450.54MB
  67. 07 - Writing a DNS Spoofer/001 Intercepting Packets - Creating a Proxy.mp442.23MB
  68. 07 - Writing a DNS Spoofer/002 Converting Packets to Scapy Packets.mp434.42MB
  69. 07 - Writing a DNS Spoofer/003 Introduction to DNS Spoofing.mp469.15MB
  70. 07 - Writing a DNS Spoofer/004 Filtering DNS Responses.mp421.65MB
  71. 07 - Writing a DNS Spoofer/005 Analysing & Creating a Custom DNS Response.mp423.31MB
  72. 07 - Writing a DNS Spoofer/006 Modifying Packets On The Fly.mp423.96MB
  73. 07 - Writing a DNS Spoofer/007 Redirecting DNS Responses.mp450.6MB
  74. 08 - Writing a File Interceptor/001 Introduction & Teaser.mp465.1MB
  75. 08 - Writing a File Interceptor/002 Filtering Traffic Based on the Port Used.mp477.97MB
  76. 08 - Writing a File Interceptor/003 Analysing HTTP Requests.mp440.65MB
  77. 08 - Writing a File Interceptor/004 Intercepting HTTP Requests.mp473.06MB
  78. 08 - Writing a File Interceptor/005 Modifying HTTP Responses on The Fly.mp488.47MB
  79. 08 - Writing a File Interceptor/006 Intercepting & Replacing Downloads on The Network.mp424.81MB
  80. 09 - Writing a Code Injector/001 Introduction & Teaser.mp428.26MB
  81. 09 - Writing a Code Injector/002 Analysing HTTP Responses.mp461.11MB
  82. 09 - Writing a Code Injector/003 Replacing a Substring Using Regex.mp440.28MB
  83. 09 - Writing a Code Injector/004 Decoding HTTP Responses.mp490.26MB
  84. 09 - Writing a Code Injector/005 Modifying HTTP Responses & Injecting Javascript Code in HTML Pages.mp467.69MB
  85. 09 - Writing a Code Injector/006 Refactoring & Housekeeping.mp450.47MB
  86. 09 - Writing a Code Injector/007 Debugging Issues in Python.mp468.42MB
  87. 09 - Writing a Code Injector/008 Using Groups & None-capturing Regex.mp471.17MB
  88. 09 - Writing a Code Injector/009 Recalculating Content Length.mp476.23MB
  89. 09 - Writing a Code Injector/010 BeEF Overview & Basic Hook Method.mp4148.36MB
  90. 09 - Writing a Code Injector/011 Hooking Computers Using code_injector.mp432.09MB
  91. 09 - Writing a Code Injector/012 Basic BeEF Commands.mp411.24MB
  92. 09 - Writing a Code Injector/013 Delivering Malware Using BeEF.mp420.44MB
  93. 10 - Bypassing HTTPS/001 How to Bypass HTTPS.mp4145.52MB
  94. 10 - Bypassing HTTPS/002 Bypassing HTTPS & Sniffing Login Credentials.mp443.78MB
  95. 10 - Bypassing HTTPS/003 Replacing Downloads on HTTPS Pages.mp452.63MB
  96. 10 - Bypassing HTTPS/004 Injecting Code in HTTPS Pages.mp457.39MB
  97. 11 - Writing an ARP Spoof Detector/001 Running Python Programs on Windows.mp436.06MB
  98. 11 - Writing an ARP Spoof Detector/002 Capturing & Analysing ARP Responses.mp418.22MB
  99. 11 - Writing an ARP Spoof Detector/003 Detecting ARP Spoofing Attacks Using Python.mp443.25MB
  100. 12 - Writing Malware/001 Introduction & Teaser.mp443.38MB
  101. 12 - Writing Malware/002 Execute System Command Payload.mp426.83MB
  102. 12 - Writing Malware/003 Sending Emails Using Python.mp433.71MB
  103. 12 - Writing Malware/004 Filtering Command Output Using Regex.mp424.2MB
  104. 12 - Writing Malware/005 Stealing WiFi Passwords Saved on a Computer.mp441.79MB
  105. 12 - Writing Malware/006 Downloading Files Using Python.mp455.37MB
  106. 12 - Writing Malware/007 Writing Files on Disk.mp451.79MB
  107. 12 - Writing Malware/008 Password Recovery Basics.mp469.69MB
  108. 12 - Writing Malware/009 Stealing Saved Passwords From Remote Computers.mp438.23MB
  109. 12 - Writing Malware/010 Interacting With The File System Using Python.mp428.21MB
  110. 13 - Writing Malware - Keylogger/001 Introduction & Teaser.mp455.46MB
  111. 13 - Writing Malware - Keylogger/002 Writing a Basic Local Keylogger Using Python.mp425.46MB
  112. 13 - Writing Malware - Keylogger/003 Introduction to Global Variables.mp442.45MB
  113. 13 - Writing Malware - Keylogger/004 Logging Special Keys.mp420.86MB
  114. 13 - Writing Malware - Keylogger/005 Introduction to Threading & Recursion in Python.mp430.05MB
  115. 13 - Writing Malware - Keylogger/006 Introduction Object Oriented Programming.mp443.15MB
  116. 13 - Writing Malware - Keylogger/007 Constructor Methods & Instance Variables.mp424.37MB
  117. 13 - Writing Malware - Keylogger/008 Logging Key-strikes and Reporting Them By Email.mp433.48MB
  118. 14 - Writing Malware - Backdoors/001 Introduction & Teaser.mp463.48MB
  119. 14 - Writing Malware - Backdoors/002 Client - Server Communication & Connection Types.mp421.51MB
  120. 14 - Writing Malware - Backdoors/003 Connecting Two Remote Computers Using Sockets.mp416.68MB
  121. 14 - Writing Malware - Backdoors/004 Sending & Receiving Data Over TCP.mp49.58MB
  122. 14 - Writing Malware - Backdoors/005 Executing System Commands Remotely.mp427.06MB
  123. 14 - Writing Malware - Backdoors/006 Implementing a Server.mp415.33MB
  124. 14 - Writing Malware - Backdoors/007 Implementing Skeleton For Server - Client Communication.mp415.01MB
  125. 14 - Writing Malware - Backdoors/008 Refactoring - Creating a Listener Class.mp424.87MB
  126. 14 - Writing Malware - Backdoors/009 Refactoring - Creating a Backdoor Class.mp416MB
  127. 14 - Writing Malware - Backdoors/010 Serialisation - Theory.mp496.24MB
  128. 14 - Writing Malware - Backdoors/011 Serialisation - Implementing Reliable Methods to Send & Receive Data Over TCP.mp425.67MB
  129. 14 - Writing Malware - Backdoors/012 Serialisation - Reliably Sending & Receiving Data.mp424.26MB
  130. 14 - Writing Malware - Backdoors/013 Sending Commands as List & Implementing Exit Command.mp424.73MB
  131. 14 - Writing Malware - Backdoors/014 Interacting With the File System - Implementing cd Command.mp432.06MB
  132. 14 - Writing Malware - Backdoors/015 Reading Files Using Python.mp446.03MB
  133. 14 - Writing Malware - Backdoors/016 Writing Files Using Python.mp425.63MB
  134. 14 - Writing Malware - Backdoors/017 Downloading Files From Hacked Computer.mp459.15MB
  135. 14 - Writing Malware - Backdoors/018 Implementing Upload Functionality in Listener.mp428.85MB
  136. 14 - Writing Malware - Backdoors/019 Implementing Upload Functionality in Backdoor.mp437.89MB
  137. 14 - Writing Malware - Backdoors/020 Handling Unknown Exceptions.mp473.8MB
  138. 14 - Writing Malware - Backdoors/021 Using the Backdoor to Hack Windows, Linux & OS X.mp4106.79MB
  139. 14 - Writing Malware - Backdoors/022 Testing The Backdoor With Python 3.mp490.79MB
  140. 15 - Writing Malware - Packaging/001 Introduction & Teaser.mp465.97MB
  141. 15 - Writing Malware - Packaging/002 Converting Python Programs To Windows Binary Executables.mp447.97MB
  142. 15 - Writing Malware - Packaging/003 Running Executables Silentely.mp441.6MB
  143. 15 - Writing Malware - Packaging/004 Installing Windows Pyinstaller on Linux.mp427.34MB
  144. 15 - Writing Malware - Packaging/005 Packaging Programs For Windows From Linux.mp425.19MB
  145. 15 - Writing Malware - Packaging/006 Introduction to Persistence.mp430.87MB
  146. 15 - Writing Malware - Packaging/007 Running Programs on Startup.mp497.61MB
  147. 15 - Writing Malware - Packaging/008 Creating a Basic Trojan Using Download & Execute Payload.mp431.55MB
  148. 15 - Writing Malware - Packaging/009 Creating a Trojan By Embedding Files In Program Code.mp425.82MB
  149. 15 - Writing Malware - Packaging/010 Bypassing Anti-Virus Programs - Theory.mp414.98MB
  150. 15 - Writing Malware - Packaging/011 Bypassing Anti-Virus Programs - Practical.mp449.18MB
  151. 15 - Writing Malware - Packaging/012 Adding an Icon to Generated Executables.mp411.31MB
  152. 15 - Writing Malware - Packaging/013 Spoofing File Extension.mp435.15MB
  153. 15 - Writing Malware - Packaging/014 Converting Python Programs To OS X Executables.mp476.2MB
  154. 15 - Writing Malware - Packaging/015 Converting Python Programs to Linux Executables.mp424.83MB
  155. 16 - Website Web Application Hacking/001 Introduction & Teaser.mp4114.76MB
  156. 16 - Website Web Application Hacking/002 What is a Website.mp451.42MB
  157. 16 - Website Web Application Hacking/003 How to Hack a Website.mp422.24MB
  158. 17 - Website Hacking - Writing a Crawler/001 Sending GET Requests To Web Servers.mp423.32MB
  159. 17 - Website Hacking - Writing a Crawler/002 Discovering Website Subdomains Using Python.mp433.3MB
  160. 17 - Website Hacking - Writing a Crawler/003 Discovering Hidden Paths in Websites.mp467.97MB
  161. 17 - Website Hacking - Writing a Crawler/004 Reading Response Content.mp469.04MB
  162. 17 - Website Hacking - Writing a Crawler/005 Extracting Useful Data From Response.mp484.72MB
  163. 17 - Website Hacking - Writing a Crawler/006 Filtering Results.mp437.15MB
  164. 17 - Website Hacking - Writing a Crawler/007 Extracting Unique Links & Storing Them In a List.mp461.4MB
  165. 17 - Website Hacking - Writing a Crawler/008 Recursively Discovering All Paths On a Target Website.mp456.9MB
  166. 17 - Website Hacking - Writing a Crawler/009 Testing The Crawler With Python 3.mp432.69MB
  167. 18 - Writing a Program To Guess Login Information/001 Sending Post Requests to Websites.mp472.6MB
  168. 18 - Writing a Program To Guess Login Information/002 Guessing Login Information on Login Pages.mp462.19MB
  169. 19 - Writing a Vulnerability Scanner/001 Introduction & Teaser.mp410.11MB
  170. 19 - Writing a Vulnerability Scanner/002 HTTP Requests - POST VS GET.mp425.14MB
  171. 19 - Writing a Vulnerability Scanner/003 Parsing HTML Code Using Python.mp450.45MB
  172. 19 - Writing a Vulnerability Scanner/004 Extracting HTML Attributes.mp497.1MB
  173. 19 - Writing a Vulnerability Scanner/005 Posting Forms.mp439.76MB
  174. 19 - Writing a Vulnerability Scanner/006 Building Basic Structure For a Vulnerability Scanner.mp441.77MB
  175. 19 - Writing a Vulnerability Scanner/007 Using Default Parameters.mp424.15MB
  176. 19 - Writing a Vulnerability Scanner/008 Sending Requests in a Session.mp458.07MB
  177. 19 - Writing a Vulnerability Scanner/009 Extracting & Submitting Forms Automatically.mp489.51MB
  178. 19 - Writing a Vulnerability Scanner/010 Implementing a Method To Run The Scanner.mp419.56MB
  179. 19 - Writing a Vulnerability Scanner/011 Discovering XSS Vulnerabilities.mp434.46MB
  180. 19 - Writing a Vulnerability Scanner/012 Exploiting XSS Vulnerabilities.mp421.7MB
  181. 19 - Writing a Vulnerability Scanner/013 Implementing Code To Discover XSS in Forms.mp427.72MB
  182. 19 - Writing a Vulnerability Scanner/014 Implementing Code To Discover XSS in Parameters.mp440.86MB
  183. 19 - Writing a Vulnerability Scanner/015 Automatically Discovering Vulnerabilities Using the Vulnerability Scanner.mp434.64MB
友情提示
不会用的朋友看这里 把磁力链接复制到离线下载,或者bt下载软件里即可下载文件,或者直接复制迅雷链接到迅雷里下载! 亲,你造吗?将网页分享给您的基友,下载的人越多速度越快哦!

违规内容投诉邮箱:[email protected]

概述 838888磁力搜索是一个磁力链接搜索引擎,是学术研究的副产品,用于解决资源过度分散的问题 它通过BitTorrent协议加入DHT网络,实时的自动采集数据,仅存储文件的标题、大小、文件列表、文件标识符(磁力链接)等基础信息 838888磁力搜索不下载任何真实资源,无法判断资源的合法性及真实性,使用838888磁力搜索服务的用户需自行鉴别内容的真伪 838888磁力搜索不上传任何资源,不提供Tracker服务,不提供种子文件的下载,这意味着838888磁力搜索 838888磁力搜索是一个完全合法的系统