[Coursera] Advanced Python Scripting for Cybersecurity Specialization - 3 course series
File List
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_04_detecting-ssh-brute-force-with-scapy.mp4 47.4 MB
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_07_connection-hijacking-with-scapy.mp4 46.1 MB
- python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_02_generating-password-variations-with-python.mp4 44.4 MB
- python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_05_service-detection-with-python.mp4 43.5 MB
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_05_feature-selection-for-traffic-analysis.mp4 43.1 MB
- establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_03_searching-the-registry-with-python.mp4 43.1 MB
- python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_02_querying-shodan-with-python.mp4 41.9 MB
- establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_02_traffic-analysis-with-python.mp4 41.7 MB
- python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_04_network-scanning-with-scapy.mp4 37.0 MB
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_02_brute-force-detection-with-windows-events.mp4 37.0 MB
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_03_detecting-ftp-brute-force-with-scapy.mp4 33.5 MB
- establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_04_searching-the-system-with-python.mp4 33.3 MB
- establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_02_dumping-chrome-credentials-with-python.mp4 33.1 MB
- establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_06_analyzing-passwords-with-python.mp4 32.9 MB
- python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_03_dns-queries-with-python.mp4 29.4 MB
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_06_detecting-anomalous-network-traffic-with-scapy.mp4 27.5 MB
- establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_05_building-c2-packets-with-python.mp4 25.9 MB
- python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_04_automating-brute-force.mp4 24.7 MB
- establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_05_cracking-the-linux-passwords-with-python.mp4 23.3 MB
- establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_04_detecting-encodings-with-python.mp4 23.0 MB
- python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_01_introduction-to-reconnaissance.mp4 22.0 MB
- python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_01_introduction-to-initial-access.mp4 21.3 MB
- python-in-recon/01_introduction onehack.us/01_introduction-to-advanced-python-for-cybersecurity/01_03_introduction-to-mitre-att-ck-and-shield.mp4 20.6 MB
- establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_01_introduction-to-command-and-control.mp4 20.3 MB
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_01_introduction-to-defensive-python.mp4 19.4 MB
- establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_01_introduction-to-credential-access.mp4 19.3 MB
- establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_03_calculating-entropy-with-python.mp4 18.8 MB
- python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_03_generating-three-random-words-with-python.mp4 17.9 MB
- python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_06_cve-lookups-with-python.mp4 12.6 MB
- python-in-recon/01_introduction onehack.us/01_introduction-to-advanced-python-for-cybersecurity/01_02_introduction-to-python.mp4 10.6 MB
- python-in-recon/01_introduction onehack.us/01_introduction-to-advanced-python-for-cybersecurity/01_01_welcome-to-advanced-python-for-cybersecurity.mp4 8.2 MB
- python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_05_service-detection-with-python.en.srt 31.7 KB
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_07_connection-hijacking-with-scapy.en.srt 28.2 KB
- establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_02_traffic-analysis-with-python.en.srt 26.9 KB
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_04_detecting-ssh-brute-force-with-scapy.en.srt 25.4 KB
- python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_04_network-scanning-with-scapy.en.srt 25.1 KB
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_02_brute-force-detection-with-windows-events.en.srt 24.7 KB
- establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_04_searching-the-system-with-python.en.srt 23.7 KB
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_05_feature-selection-for-traffic-analysis.en.srt 23.2 KB
- establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_03_searching-the-registry-with-python.en.srt 23.0 KB
- establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_06_analyzing-passwords-with-python.en.srt 22.4 KB
- python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_01_introduction-to-initial-access.en.srt 20.5 KB
- python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_02_querying-shodan-with-python.en.srt 20.3 KB
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_03_detecting-ftp-brute-force-with-scapy.en.srt 20.1 KB
- python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_02_generating-password-variations-with-python.en.srt 19.7 KB
- establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_05_building-c2-packets-with-python.en.srt 19.0 KB
- python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_03_dns-queries-with-python.en.srt 18.6 KB
- python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_01_introduction-to-reconnaissance.en.srt 18.0 KB
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_07_connection-hijacking-with-scapy.en.txt 17.8 KB
- establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_02_dumping-chrome-credentials-with-python.en.srt 17.2 KB
- establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_01_introduction-to-command-and-control.en.srt 16.9 KB
- python-in-recon/01_introduction onehack.us/01_introduction-to-advanced-python-for-cybersecurity/01_03_introduction-to-mitre-att-ck-and-shield.en.srt 16.5 KB
- python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_05_service-detection-with-python.en.txt 16.4 KB
- establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_01_introduction-to-credential-access.en.srt 16.2 KB
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_01_introduction-to-defensive-python.en.srt 16.0 KB
- establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_05_cracking-the-linux-passwords-with-python.en.srt 15.4 KB
- python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_03_generating-three-random-words-with-python.en.srt 14.9 KB
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_06_detecting-anomalous-network-traffic-with-scapy.en.srt 14.6 KB
- python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_04_automating-brute-force.en.srt 14.6 KB
- establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_04_detecting-encodings-with-python.en.srt 14.4 KB
- establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_03_searching-the-registry-with-python.en.txt 14.3 KB
- establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_02_traffic-analysis-with-python.en.txt 14.0 KB
- establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_03_calculating-entropy-with-python.en.srt 14.0 KB
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_04_detecting-ssh-brute-force-with-scapy.en.txt 13.4 KB
- python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_04_network-scanning-with-scapy.en.txt 13.0 KB
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_02_brute-force-detection-with-windows-events.en.txt 12.9 KB
- establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_04_searching-the-system-with-python.en.txt 12.4 KB
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_05_feature-selection-for-traffic-analysis.en.txt 12.0 KB
- establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_06_analyzing-passwords-with-python.en.txt 11.7 KB
- python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_03_dns-queries-with-python.en.txt 11.7 KB
- python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_01_introduction-to-reconnaissance.en.txt 11.4 KB
- python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_05_advanced-python-reconnaissance_exam.html 11.3 KB
- python-in-recon/01_introduction onehack.us/01_introduction-to-advanced-python-for-cybersecurity/01_02_introduction-to-python.en.srt 11.1 KB
- python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_01_introduction-to-initial-access.en.txt 10.8 KB
- establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_01_introduction-to-command-and-control.en.txt 10.7 KB
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_03_detecting-ftp-brute-force-with-scapy.en.txt 10.6 KB
- python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_02_querying-shodan-with-python.en.txt 10.6 KB
- establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_07_establishing-command-and-control-and-finding-credentials_exam.html 10.5 KB
- python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_02_generating-password-variations-with-python.en.txt 10.3 KB
- establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_01_introduction-to-credential-access.en.txt 10.2 KB
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_01_introduction-to-defensive-python.en.txt 10.2 KB
- establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_05_cracking-the-linux-passwords-with-python.en.txt 9.9 KB
- establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_05_building-c2-packets-with-python.en.txt 9.8 KB
- python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_04_automating-brute-force.en.txt 9.3 KB
- establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_04_detecting-encodings-with-python.en.txt 9.1 KB
- establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_02_dumping-chrome-credentials-with-python.en.txt 8.9 KB
- python-in-recon/01_introduction onehack.us/01_introduction-to-advanced-python-for-cybersecurity/01_03_introduction-to-mitre-att-ck-and-shield.en.txt 8.6 KB
- python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_06_cve-lookups-with-python.en.srt 7.9 KB
- python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_03_generating-three-random-words-with-python.en.txt 7.8 KB
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_06_detecting-anomalous-network-traffic-with-scapy.en.txt 7.6 KB
- establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_03_calculating-entropy-with-python.en.txt 7.3 KB
- python-in-recon/01_introduction onehack.us/01_introduction-to-advanced-python-for-cybersecurity/01_02_introduction-to-python.en.txt 5.8 KB
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_08_defensive-python_exam.html 5.1 KB
- python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_06_cve-lookups-with-python.en.txt 5.0 KB
- python-in-recon/01_introduction onehack.us/01_introduction-to-advanced-python-for-cybersecurity/01_01_welcome-to-advanced-python-for-cybersecurity.en.srt 1.9 KB
- python-in-recon/01_introduction onehack.us/01_introduction-to-advanced-python-for-cybersecurity/01_01_welcome-to-advanced-python-for-cybersecurity.en.txt 1009 bytes
- 0. Join Our Discord for More Awesome Stuff!.txt 156 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.