[GigaCourse.com] Udemy - Offensive Security Engineering
File List
- 5. Infrastructure Operations/1. Infrastructure Operations.mp4 140.1 MB
- 11. Scenario 3 - Phishing Attacks and Redirectors/3. C2 Redirectors with AWS Lambda.mp4 97.8 MB
- 10. Scenario 2 - The Dropbox/2. The Dropbox Post-Exploitation.mp4 91.6 MB
- 11. Scenario 3 - Phishing Attacks and Redirectors/2. Phishing Attacks - Configuring Gophish.mp4 84.8 MB
- 11. Scenario 3 - Phishing Attacks and Redirectors/1. Custom C2 Tooling Development.mp4 78.3 MB
- 4. Reverse VPN Tunneling/1. Reverse VPN Tunneling.mp4 76.9 MB
- 9. Scenario 1 - Classic Exploitation/2. Classic Post-Exploitation.mp4 66.0 MB
- 3. Basics of Command and Control (C2)/1. Basics of Command and Control (C2).mp4 50.1 MB
- 1. Introduction/2. AWS Primer.mp4 42.5 MB
- 10. Scenario 2 - The Dropbox/1. The Dropbox.mp4 32.8 MB
- 6. Red Teams/1. Red Teams.mp4 31.8 MB
- 9. Scenario 1 - Classic Exploitation/1. Classic Exploitation.mp4 24.7 MB
- 1. Introduction/1. Introduction.mp4 20.5 MB
- 2. Networks Refresher/1. Networks Refresher.mp4 18.4 MB
- 7. Red Team Operations/1. Red Team Operations.mp4 17.7 MB
- 12. Bonus Scenario - Multiplayer C2/1. Multiplayer C2.mp4 14.0 MB
- 13. Conclusion/1. Conclusion.mp4 7.9 MB
- 8. Scenarios Introduction/1. Scenarios Introduction.mp4 6.0 MB
- 2. Networks Refresher/1.1 Network Refresher Presentation.pdf 277.1 KB
- 6. Red Teams/1.1 Red Teams Presentation.pdf 264.6 KB
- 4. Reverse VPN Tunneling/1.1 Reverse VPN Tunneling Presentation.pdf 134.7 KB
- 13. Conclusion/1.1 Conclusion Presentation.pdf 103.0 KB
- 3. Basics of Command and Control (C2)/1.1 Basics of C2 Presentation.pdf 82.8 KB
- 11. Scenario 3 - Phishing Attacks and Redirectors/3. C2 Redirectors with AWS Lambda.srt 37.8 KB
- 5. Infrastructure Operations/1. Infrastructure Operations.srt 35.9 KB
- 11. Scenario 3 - Phishing Attacks and Redirectors/1. Custom C2 Tooling Development.srt 35.5 KB
- 10. Scenario 2 - The Dropbox/2. The Dropbox Post-Exploitation.srt 34.7 KB
- 11. Scenario 3 - Phishing Attacks and Redirectors/2. Phishing Attacks - Configuring Gophish.srt 34.7 KB
- 1. Introduction/1.1 Intro Presentation.pdf 33.9 KB
- 8. Scenarios Introduction/1.1 Scenarios Presentation.pdf 31.4 KB
- 5. Infrastructure Operations/1.3 Infrastructure Operations Presentation.pdf 31.3 KB
- 7. Red Team Operations/1.1 Infrastructure Operations Presentation.pdf 31.3 KB
- 4. Reverse VPN Tunneling/1. Reverse VPN Tunneling.srt 31.1 KB
- 9. Scenario 1 - Classic Exploitation/2. Classic Post-Exploitation.srt 23.8 KB
- 1. Introduction/2. AWS Primer.srt 22.8 KB
- 10. Scenario 2 - The Dropbox/1. The Dropbox.srt 18.4 KB
- 3. Basics of Command and Control (C2)/1. Basics of Command and Control (C2).srt 16.8 KB
- 2. Networks Refresher/1. Networks Refresher.srt 12.1 KB
- 9. Scenario 1 - Classic Exploitation/1. Classic Exploitation.srt 12.0 KB
- 6. Red Teams/1. Red Teams.srt 9.7 KB
- 12. Bonus Scenario - Multiplayer C2/1. Multiplayer C2.srt 9.7 KB
- 1. Introduction/1. Introduction.srt 8.5 KB
- 7. Red Team Operations/1. Red Team Operations.srt 4.7 KB
- 13. Conclusion/1. Conclusion.srt 3.4 KB
- 8. Scenarios Introduction/1. Scenarios Introduction.srt 1.9 KB
- Readme.txt 962 bytes
- 11. Scenario 3 - Phishing Attacks and Redirectors/3.1 Serverless Lambda Redirector.html 158 bytes
- 1. Introduction/2.1 Course References.html 157 bytes
- 10. Scenario 2 - The Dropbox/1.1 Course References.html 157 bytes
- 10. Scenario 2 - The Dropbox/2.1 Course References.html 157 bytes
- 12. Bonus Scenario - Multiplayer C2/1.1 Course References.html 157 bytes
- 13. Conclusion/1.2 Course References.html 157 bytes
- 4. Reverse VPN Tunneling/1.2 Course References.html 157 bytes
- 5. Infrastructure Operations/1.2 Course References.html 157 bytes
- 11. Scenario 3 - Phishing Attacks and Redirectors/1.1 Simple C2 Source Code.html 154 bytes
- 5. Infrastructure Operations/1.4 Saltstack Config and Instructions.html 151 bytes
- 5. Infrastructure Operations/1.1 Using a VM for Local Setup.html 150 bytes
- 11. Scenario 3 - Phishing Attacks and Redirectors/2.1 Gophish Terraform Config.html 149 bytes
- 10. Scenario 2 - The Dropbox/3. The Dropbox Assignment.html 145 bytes
- 11. Scenario 3 - Phishing Attacks and Redirectors/4. Make a Custom Implant and Implement C2 Redirectors.html 145 bytes
- 4. Reverse VPN Tunneling/1.3 Base VPN Terraform Config.html 145 bytes
- 4. Reverse VPN Tunneling/2. Configure Reverse VPN Tunneling on a Device.html 145 bytes
- 9. Scenario 1 - Classic Exploitation/3. Configuring a Basic C2.html 145 bytes
- 9. Scenario 1 - Classic Exploitation/1.1 Base C2 Terraform Config.html 144 bytes
- 9. Scenario 1 - Classic Exploitation/2.1 Base C2 Terraform Config.html 144 bytes
- 13. Conclusion/2. Course Exam.html 141 bytes
- 2. Networks Refresher/2. Networks Refresher Quiz.html 141 bytes
- 3. Basics of Command and Control (C2)/2. C2 Quiz.html 141 bytes
- 5. Infrastructure Operations/2. DevOps Quiz.html 141 bytes
- 6. Red Teams/2. Red Teaming Quiz.html 141 bytes
- 1. Introduction/1.2 All Course Material.html 124 bytes
- [GigaCourse.com].url 49 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.