【资源目录】:

├──01 – Course Introduction
| ├──001 Course Introduction.mp4 46.58M
| ├──001 Course Introduction.srt 3.13kb
| └──001 Course Introduction_en.srt 3.67kb
├──02 – Preparation – Creating a Hacking Lab
| ├──001 Lab Overview & Needed Software.mp4 29.23M
| ├──001 Lab Overview & Needed Software.srt 3.16kb
| ├──001 Lab Overview & Needed Software_en.srt 7.62kb
| ├──002 Initial Preparation.mp4 251.06M
| ├──002 Initial Preparation.srt 10.65kb
| ├──002 Initial Preparation_en.srt 12.57kb
| ├──003 Installing Kali Linux as a VM on Windows.mp4 76.44M
| ├──003 Installing Kali Linux as a VM on Windows.srt 11.15kb
| ├──003 Installing Kali Linux as a VM on Windows_en.srt 12.22kb
| ├──004 Installing Kali Linux as a VM on Apple Computers (Intel & Apple Silicon).mp4 133.32M
| ├──004 Installing Kali Linux as a VM on Apple Computers (Intel & Apple Silicon).srt 13.31kb
| ├──004 Installing Kali Linux as a VM on Apple Computers (Intel & Apple Silicon)_en.srt 3.03kb
| ├──005 Installing Kali Linux as a VM on Linux.mp4 99.99M
| ├──005 Installing Kali Linux as a VM on Linux.srt 12.55kb
| ├──005 Installing Kali Linux as a VM on Linux_en.srt 14.08kb
| ├──006 Installing Metasploitable As a Virtual Machine.mp4 31.85M
| ├──006 Installing Metasploitable As a Virtual Machine.srt 5.70kb
| └──006 Installing Metasploitable As a Virtual Machine_en.srt 6.42kb
├──03 – Preparation – Linux Basics
| ├──001 Basic Overview Of Kali Linux.mp4 29.80M
| ├──001 Basic Overview Of Kali Linux.srt 6.05kb
| ├──001 Basic Overview Of Kali Linux_en.srt 6.83kb
| ├──002 The Linux Terminal & Basic Linux Commands.mp4 323.64M
| ├──002 The Linux Terminal & Basic Linux Commands.srt 14.89kb
| ├──002 The Linux Terminal & Basic Linux Commands_en.srt 16.73kb
| ├──003 Configuring Metasploitable & Lab Network Settings.mp4 18.71M
| ├──003 Configuring Metasploitable & Lab Network Settings.srt 4.92kb
| └──003 Configuring Metasploitable & Lab Network Settings_en.srt 5.51kb
├──04 – Website Basics
| ├──001 What is a Website.mp4 27.27M
| ├──001 What is a Website.srt 6.61kb
| ├──001 What is a Website_en.srt 7.68kb
| ├──002 How To Hack a Website.mp4 42.25M
| ├──002 How To Hack a Website.srt 6.87kb
| └──002 How To Hack a Website_en.srt 7.99kb
├──05 – Information Gathering
| ├──001 Gathering Information Using Whois Lookup.mp4 67.72M
| ├──001 Gathering Information Using Whois Lookup.srt 5.68kb
| ├──001 Gathering Information Using Whois Lookup_en.srt 6.20kb
| ├──002 Discovering Technologies Used On The Website.mp4 71.70M
| ├──002 Discovering Technologies Used On The Website.srt 7.29kb
| ├──002 Discovering Technologies Used On The Website_en.srt 7.96kb
| ├──003 Gathering Comprehensive DNS Information.mp4 129.95M
| ├──003 Gathering Comprehensive DNS Information.srt 11.85kb
| ├──003 Gathering Comprehensive DNS Information_en.srt 13.29kb
| ├──004 Discovering Websites On The Same Server.mp4 66.35M
| ├──004 Discovering Websites On The Same Server.srt 4.48kb
| ├──004 Discovering Websites On The Same Server_en.srt 4.87kb
| ├──005 Discovering Subdomains.mp4 27.40M
| ├──005 Discovering Subdomains.srt 3.19kb
| ├──005 Discovering Subdomains_en.srt 5.85kb
| ├──006 Discovering Sensitive Files.mp4 46.27M
| ├──006 Discovering Sensitive Files.srt 9.00kb
| ├──006 Discovering Sensitive Files_en.srt 9.88kb
| ├──007 Analysing Discovered Files.mp4 18.51M
| ├──007 Analysing Discovered Files.srt 5.33kb
| ├──007 Analysing Discovered Files_en.srt 5.70kb
| ├──008 Maltego – Discovering Servers, Domains & Files.mp4 42.14M
| ├──008 Maltego – Discovering Servers, Domains & Files.srt 3.12kb
| ├──008 Maltego – Discovering Servers, Domains & Files_en.srt 10.77kb
| ├──009 Maltego – Discovering Websites, Hosting Provider & Emails.mp4 38.38M
| ├──009 Maltego – Discovering Websites, Hosting Provider & Emails.srt 5.81kb
| └──009 Maltego – Discovering Websites, Hosting Provider & Emails_en.srt 6.47kb
├──06 – File Upload Vulnerabilities
| ├──001 How To Discover & Exploit Basic File Upload Vulnerabilities to Hack Websites.mp4 29.26M
| ├──001 How To Discover & Exploit Basic File Upload Vulnerabilities to Hack Websites.srt 8.73kb
| ├──001 How To Discover & Exploit Basic File Upload Vulnerabilities to Hack Websites_en.srt 9.50kb
| ├──002 Intercepting Requests.mp4 61.18M
| ├──002 Intercepting Requests.srt 9.20kb
| ├──002 Intercepting Requests_en.srt 10.51kb
| ├──003 Exploiting Advanced File Upload Vulnerabilities To Hack Websites.mp4 34.06M
| ├──003 Exploiting Advanced File Upload Vulnerabilities To Hack Websites.srt 6.12kb
| ├──003 Exploiting Advanced File Upload Vulnerabilities To Hack Websites_en.srt 7.00kb
| ├──004 Exploiting More Advanced File Upload Vulnerabilities.mp4 35.83M
| ├──004 Exploiting More Advanced File Upload Vulnerabilities.srt 8.22kb
| ├──004 Exploiting More Advanced File Upload Vulnerabilities_en.srt 7.11kb
| ├──005 [Security] Fixing File Upload Vulnerabilities.mp4 32.06M
| ├──005 [Security] Fixing File Upload Vulnerabilities.srt 7.38kb
| ├──005 [Security] Fixing File Upload Vulnerabilities_en.srt 8.33kb
| ├──006 GET & POST Requests.mp4 28.62M
| ├──006 GET & POST Requests.srt 6.36kb
| └──006 GET & POST Requests_en.srt 7.28kb
├──07 – Code Execution Vulnerabilities
| ├──001 How To Discover & Exploit Basic Code Execution Vulnerabilities To Hack Websites.mp4 32.67M
| ├──001 How To Discover & Exploit Basic Code Execution Vulnerabilities To Hack Websites.srt 9.07kb
| ├──001 How To Discover & Exploit Basic Code Execution Vulnerabilities To Hack Websites_en.srt 9.91kb
| ├──002 Exploiting Advanced Code Execution Vulnerabilities.mp4 36.12M
| ├──002 Exploiting Advanced Code Execution Vulnerabilities.srt 7.46kb
| ├──002 Exploiting Advanced Code Execution Vulnerabilities_en.srt 3.12kb
| ├──003 [Security] – Fixing Code Execution Vulnerabilities.mp4 29.20M
| ├──003 [Security] – Fixing Code Execution Vulnerabilities.srt 7.27kb
| └──003 [Security] – Fixing Code Execution Vulnerabilities_en.srt 8.08kb
├──08 – Local File Inclusion Vulnerabilities (LFI)
| ├──001 What are they And How To Discover & Exploit Them.mp4 41.50M
| ├──001 What are they And How To Discover & Exploit Them.srt 6.35kb
| ├──001 What are they And How To Discover & Exploit Them_en.srt 7.00kb
| ├──002 Gaining Shell Access From LFI Vulnerabilities – Method 1.mp4 58.19M
| ├──002 Gaining Shell Access From LFI Vulnerabilities – Method 1.srt 8.01kb
| ├──002 Gaining Shell Access From LFI Vulnerabilities – Method 1_en.srt 9.22kb
| ├──003 Gaining Shell Access From LFI Vulnerabilities – Method 2.mp4 92.11M
| ├──003 Gaining Shell Access From LFI Vulnerabilities – Method 2.srt 12.91kb
| └──003 Gaining Shell Access From LFI Vulnerabilities – Method 2_en.srt 14.46kb
├──09 – Remote File Inclusion Vulnerabilities (RFI)
| ├──001 Remote File Inclusion Vulnerabilities – Configuring PHP Settings.mp4 24.84M
| ├──001 Remote File Inclusion Vulnerabilities – Configuring PHP Settings.srt 4.36kb
| ├──001 Remote File Inclusion Vulnerabilities – Configuring PHP Settings_en.srt 4.71kb
| ├──002 Remote File Inclusion Vulnerabilities – Discovery & Exploitation.mp4 15.59M
| ├──002 Remote File Inclusion Vulnerabilities – Discovery & Exploitation.srt 6.94kb
| ├──002 Remote File Inclusion Vulnerabilities – Discovery & Exploitation_en.srt 7.66kb
| ├──003 Exploiting Advanced Remote File Inclusion Vulnerabilities To Hack Websites.mp4 11.29M
| ├──003 Exploiting Advanced Remote File Inclusion Vulnerabilities To Hack Websites.srt 3.32kb
| ├──003 Exploiting Advanced Remote File Inclusion Vulnerabilities To Hack Websites_en.srt 3.71kb
| ├──004 [Security] Fixing File Inclusion Vulnerabilities.mp4 36.35M
| ├──004 [Security] Fixing File Inclusion Vulnerabilities.srt 6.86kb
| └──004 [Security] Fixing File Inclusion Vulnerabilities_en.srt 7.54kb
├──10 – SQL Injection Vulnerabilities
| ├──001 What is SQL.mp4 29.96M
| ├──001 What is SQL.srt 7.15kb
| ├──001 What is SQL_en.srt 7.83kb
| ├──002 Dangers of SQL Injections.mp4 15.47M
| ├──002 Dangers of SQL Injections.srt 4.03kb
| └──002 Dangers of SQL Injections_en.srt 4.39kb
├──11 – SQL Injection Vulnerabilities – SQLi In Login Pages
| ├──001 Discovering SQL Injections In POST.mp4 109.56M
| ├──001 Discovering SQL Injections In POST.srt 10.12kb
| ├──001 Discovering SQL Injections In POST_en.srt 11.52kb
| ├──002 Bypassing Logins Using SQL Injection Vulnerability.mp4 43.27M
| ├──002 Bypassing Logins Using SQL Injection Vulnerability.srt 6.31kb
| ├──002 Bypassing Logins Using SQL Injection Vulnerability_en.srt 7.05kb
| ├──003 Bypassing More Secure Logins Using SQL Injections.mp4 35.14M
| ├──003 Bypassing More Secure Logins Using SQL Injections.srt 7.60kb
| ├──003 Bypassing More Secure Logins Using SQL Injections_en.srt 8.77kb
| ├──004 [Security] Preventing SQL Injections In Login Pages.mp4 34.95M
| ├──004 [Security] Preventing SQL Injections In Login Pages.srt 9.38kb
| └──004 [Security] Preventing SQL Injections In Login Pages_en.srt 10.37kb
├──12 – SQL injection Vulnerabilities – Extracting Data From The Database
| ├──001 Discovering SQL Injections in GET.mp4 40.11M
| ├──001 Discovering SQL Injections in GET.srt 8.38kb
| ├──001 Discovering SQL Injections in GET_en.srt 9.29kb
| ├──002 Reading Database Information.mp4 32.51M
| ├──002 Reading Database Information.srt 6.00kb
| ├──002 Reading Database Information_en.srt 6.49kb
| ├──003 Finding Database Tables.mp4 17.28M
| ├──003 Finding Database Tables.srt 3.52kb
| ├──003 Finding Database Tables_en.srt 3.83kb
| ├──004 Extracting Sensitive Data Such As Passwords.mp4 23.21M
| ├──004 Extracting Sensitive Data Such As Passwords.srt 4.31kb
| └──004 Extracting Sensitive Data Such As Passwords_en.srt 5.31kb
├──13 – SQL injection Vulnerabilities – Advanced Exploitation
| ├──001 Discovering & Exploiting Blind SQL Injections.mp4 42.39M
| ├──001 Discovering & Exploiting Blind SQL Injections.srt 7.27kb
| ├──001 Discovering & Exploiting Blind SQL Injections_en.srt 7.99kb
| ├──002 Discovering Complex SQL Injection Vulnerabilities.mp4 43.02M
| ├──002 Discovering Complex SQL Injection Vulnerabilities.srt 9.06kb
| ├──002 Discovering Complex SQL Injection Vulnerabilities_en.srt 9.73kb
| ├──003 Exploiting an advanced SQL Injection Vulnerability to Extract Passwords.mp4 20.57M
| ├──003 Exploiting an advanced SQL Injection Vulnerability to Extract Passwords.srt 3.07kb
| ├──003 Exploiting an advanced SQL Injection Vulnerability to Extract Passwords_en.srt 6.08kb
| ├──004 Bypassing Filters.mp4 12.74M
| ├──004 Bypassing Filters.srt 3.20kb
| ├──004 Bypassing Filters_en.srt 6.08kb
| ├──005 Bypassing Security & Accessing All Records.mp4 36.41M
| ├──005 Bypassing Security & Accessing All Records.srt 9.94kb
| ├──005 Bypassing Security & Accessing All Records_en.srt 11.35kb
| ├──006 [Security] Quick Fix To Prevent SQL Injections.mp4 112.54M
| ├──006 [Security] Quick Fix To Prevent SQL Injections.srt 8.04kb
| ├──006 [Security] Quick Fix To Prevent SQL Injections_en.srt 9.12kb
| ├──007 Reading & Writing Files On The Server Using SQL Injections.mp4 83.11M
| ├──007 Reading & Writing Files On The Server Using SQL Injections.srt 6.96kb
| ├──007 Reading & Writing Files On The Server Using SQL Injections_en.srt 7.53kb
| ├──008 Getting A Shell & Controlling The Target Server Using an SQL Injection.mp4 26.73M
| ├──008 Getting A Shell & Controlling The Target Server Using an SQL Injection.srt 10.46kb
| ├──008 Getting A Shell & Controlling The Target Server Using an SQL Injection_en.srt 11.53kb
| ├──009 Discovering SQL Injections & Extracting Data Using SQLmap.mp4 86.67M
| ├──009 Discovering SQL Injections & Extracting Data Using SQLmap.srt 8.05kb
| ├──009 Discovering SQL Injections & Extracting Data Using SQLmap_en.srt 9.05kb
| ├──010 Getting a Direct SQL Shell using SQLmap.mp4 38.11M
| ├──010 Getting a Direct SQL Shell using SQLmap.srt 3.08kb
| ├──010 Getting a Direct SQL Shell using SQLmap_en.srt 3.17kb
| ├──011 [Security] – The Right Way To Prevent SQL Injection Vulnerabilites.mp4 23.41M
| ├──011 [Security] – The Right Way To Prevent SQL Injection Vulnerabilites.srt 5.83kb
| └──011 [Security] – The Right Way To Prevent SQL Injection Vulnerabilites_en.srt 6.53kb
├──14 – XSS Vulnerabilities
| ├──001 Introduction – What is XSS or Cross Site Scripting.mp4 17.48M
| ├──001 Introduction – What is XSS or Cross Site Scripting.srt 3.43kb
| ├──001 Introduction – What is XSS or Cross Site Scripting_en.srt 3.88kb
| ├──002 Discovering Basic Reflected XSS.mp4 17.81M
| ├──002 Discovering Basic Reflected XSS.srt 3.83kb
| ├──002 Discovering Basic Reflected XSS_en.srt 4.10kb
| ├──003 Discovering Advanced Reflected XSS.mp4 23.12M
| ├──003 Discovering Advanced Reflected XSS.srt 5.39kb
| ├──003 Discovering Advanced Reflected XSS_en.srt 6.22kb
| ├──004 Discovering An Even More Advanced Reflected XSS.mp4 37.62M
| ├──004 Discovering An Even More Advanced Reflected XSS.srt 8.80kb
| ├──004 Discovering An Even More Advanced Reflected XSS_en.srt 9.85kb
| ├──005 Discovering Stored XSS.mp4 15.38M
| ├──005 Discovering Stored XSS.srt 3.95kb
| ├──005 Discovering Stored XSS_en.srt 4.22kb
| ├──006 Discovering Advanced Stored XSS.mp4 13.12M
| ├──006 Discovering Advanced Stored XSS.srt 4.04kb
| └──006 Discovering Advanced Stored XSS_en.srt 4.67kb
├──15 – XSS Vulnerabilities – Exploitation
| ├──001 Installing Windows As a Virtual Machine.mp4 39.80M
| ├──001 Installing Windows As a Virtual Machine.srt 6.88kb
| ├──001 Installing Windows As a Virtual Machine_en.srt 7.63kb
| ├──002 Installing Windows as a Virtual Machine on Apple Silicon Computers.mp4 45.41M
| ├──002 Installing Windows as a Virtual Machine on Apple Silicon Computers.srt 6.17kb
| ├──002 Installing Windows as a Virtual Machine on Apple Silicon Computers_en.srt 7.07kb
| ├──003 Hooking Victims To BeEF Using Reflected XSS.mp4 32.58M
| ├──003 Hooking Victims To BeEF Using Reflected XSS.srt 7.14kb
| ├──003 Hooking Victims To BeEF Using Reflected XSS_en.srt 7.66kb
| ├──004 Hooking Victims To BeEF Using Stored XSS.mp4 25.05M
| ├──004 Hooking Victims To BeEF Using Stored XSS.srt 5.29kb
| ├──004 Hooking Victims To BeEF Using Stored XSS_en.srt 5.96kb
| ├──005 Interacting With Hooked Targets.mp4 15.51M
| ├──005 Interacting With Hooked Targets.srt 5.15kb
| ├──005 Interacting With Hooked Targets_en.srt 5.58kb
| ├──006 Running Basic Commands On Victims.mp4 17.91M
| ├──006 Running Basic Commands On Victims.srt 5.87kb
| ├──006 Running Basic Commands On Victims_en.srt 6.26kb
| ├──007 Stealing CredentialsPasswords Using A Fake Login Prompt.mp4 14.34M
| ├──007 Stealing CredentialsPasswords Using A Fake Login Prompt.srt 2.62kb
| ├──007 Stealing CredentialsPasswords Using A Fake Login Prompt_en.srt 3.20kb
| ├──008 Bonus – Installing Veil Framework.mp4 85.67M
| ├──008 Bonus – Installing Veil Framework.srt 5.31kb
| ├──008 Bonus – Installing Veil Framework_en.srt 5.92kb
| ├──009 Bonus – Veil Overview & Payloads Basics.mp4 22.89M
| ├──009 Bonus – Veil Overview & Payloads Basics.srt 8.98kb
| ├──009 Bonus – Veil Overview & Payloads Basics_en.srt 10.28kb
| ├──010 Bonus – Generating An Undetectable Backdoor Using Veil 3.mp4 127.72M
| ├──010 Bonus – Generating An Undetectable Backdoor Using Veil 3.srt 12.49kb
| ├──010 Bonus – Generating An Undetectable Backdoor Using Veil 3_en.srt 11.09kb
| ├──011 Bonus – Listening For Incoming Connections.mp4 18.89M
| ├──011 Bonus – Listening For Incoming Connections.srt 8.49kb
| ├──011 Bonus – Listening For Incoming Connections_en.srt 9.22kb
| ├──012 Bonus – Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10.mp4 43.56M
| ├──012 Bonus – Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10.srt 8.56kb
| ├──012 Bonus – Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10_en.srt 9.51kb
| ├──013 Gaining Full Control Over Windows Target.mp4 19.76M
| ├──013 Gaining Full Control Over Windows Target.srt 4.18kb
| ├──013 Gaining Full Control Over Windows Target_en.srt 4.65kb
| ├──014 [Security] Fixing XSS Vulnerabilities.mp4 46.86M
| ├──014 [Security] Fixing XSS Vulnerabilities.srt 8.50kb
| └──014 [Security] Fixing XSS Vulnerabilities_en.srt 3.12kb
├──16 – Insecure Session Management
| ├──001 Logging In As Admin Without a Password By Manipulating Cookies.mp4 31.52M
| ├──001 Logging In As Admin Without a Password By Manipulating Cookies.srt 7.02kb
| ├──001 Logging In As Admin Without a Password By Manipulating Cookies_en.srt 7.91kb
| ├──002 Discovering Cross Site Request Forgery Vulnerabilities (CSRF).mp4 39.66M
| ├──002 Discovering Cross Site Request Forgery Vulnerabilities (CSRF).srt 8.44kb
| ├──002 Discovering Cross Site Request Forgery Vulnerabilities (CSRF)_en.srt 9.48kb
| ├──003 Exploiting CSRF To Change Admin Password Using a HTML File.mp4 41.31M
| ├──003 Exploiting CSRF To Change Admin Password Using a HTML File.srt 9.39kb
| ├──003 Exploiting CSRF To Change Admin Password Using a HTML File_en.srt 10.13kb
| ├──004 Exploiting CSRF Vulnerabilities To Change Admin Password Using Link.mp4 112.71M
| ├──004 Exploiting CSRF Vulnerabilities To Change Admin Password Using Link.srt 7.13kb
| ├──004 Exploiting CSRF Vulnerabilities To Change Admin Password Using Link_en.srt 8.00kb
| ├──005 [Security] The Right Way To Prevent CSRF Vulnerabilities.mp4 61.68M
| ├──005 [Security] The Right Way To Prevent CSRF Vulnerabilities.srt 11.00kb
| └──005 [Security] The Right Way To Prevent CSRF Vulnerabilities_en.srt 3.06kb
├──17 – Brute Force & Dictionary Attacks
| ├──001 Introduction to Brute Force & Dictionary Attacks.mp4 20.38M
| ├──001 Introduction to Brute Force & Dictionary Attacks.srt 4.49kb
| ├──001 Introduction to Brute Force & Dictionary Attacks_en.srt 3.11kb
| ├──002 Creating a Wordlist.mp4 103.29M
| ├──002 Creating a Wordlist.srt 7.91kb
| ├──002 Creating a Wordlist_en.srt 9.24kb
| ├──003 Guessing Login Password Using a Wordlist Attack With Hydra.mp4 241.98M
| ├──003 Guessing Login Password Using a Wordlist Attack With Hydra.srt 15.32kb
| └──003 Guessing Login Password Using a Wordlist Attack With Hydra_en.srt 17.53kb
├──18 – Discovering Vulnerabilities Automatically Using Owasp ZAP
| ├──001 Scanning Target Website For Vulnerabilities.mp4 23.68M
| ├──001 Scanning Target Website For Vulnerabilities.srt 5.03kb
| ├──001 Scanning Target Website For Vulnerabilities_en.srt 5.62kb
| ├──002 Analysing Scan Results.mp4 29.37M
| ├──002 Analysing Scan Results.srt 4.57kb
| └──002 Analysing Scan Results_en.srt 5.08kb
├──19 – Post Exploitation
| ├──001 Post Exploitation Introduction.mp4 11.85M
| ├──001 Post Exploitation Introduction.srt 4.59kb
| ├──001 Post Exploitation Introduction_en.srt 5.34kb
| ├──002 Executing System Commands On Hacked Web Servers.mp4 27.17M
| ├──002 Executing System Commands On Hacked Web Servers.srt 8.80kb
| ├──002 Executing System Commands On Hacked Web Servers_en.srt 9.54kb
| ├──003 Escalating Reverse Shell Access To Weevely Shell.mp4 53.66M
| ├──003 Escalating Reverse Shell Access To Weevely Shell.srt 9.10kb
| ├──003 Escalating Reverse Shell Access To Weevely Shell_en.srt 9.99kb
| ├──004 Weevely Basics – Accessing Other Websites, Running Shell Commands …etc.mp4 77.24M
| ├──004 Weevely Basics – Accessing Other Websites, Running Shell Commands …etc.srt 8.07kb
| ├──004 Weevely Basics – Accessing Other Websites, Running Shell Commands …etc_en.srt 8.84kb
| ├──005 Bypassing Limited Privileges & Executing Shell Commands.mp4 62.69M
| ├──005 Bypassing Limited Privileges & Executing Shell Commands.srt 6.18kb
| ├──005 Bypassing Limited Privileges & Executing Shell Commands_en.srt 7.16kb
| ├──006 Downloading Files From Target Webserver.mp4 73.52M
| ├──006 Downloading Files From Target Webserver.srt 5.62kb
| ├──006 Downloading Files From Target Webserver_en.srt 6.39kb
| ├──007 Uploading Files To Target Webserver.mp4 55.01M
| ├──007 Uploading Files To Target Webserver.srt 9.76kb
| ├──007 Uploading Files To Target Webserver_en.srt 10.54kb
| ├──008 Getting a Reverse Connection From Weevely.mp4 70.97M
| ├──008 Getting a Reverse Connection From Weevely.srt 9.37kb
| ├──008 Getting a Reverse Connection From Weevely_en.srt 10.44kb
| ├──009 Accessing The Database.mp4 138.96M
| ├──009 Accessing The Database.srt 10.70kb
| ├──009 Accessing The Database_en.srt 11.63kb
| ├──010 Conclusion.mp4 22.27M
| ├──010 Conclusion.srt 6.76kb
| ├──010 Conclusion_en.srt 7.76kb
| ├──011 Writing a Pentest Report.mp4 149.45M
| ├──011 Writing a Pentest Report.srt 19.24kb
| ├──011 Writing a Pentest Report_en.srt 21.45kb
| ├──012 4 Ways to Secure Websites & Apps.mp4 212.33M
| ├──012 4 Ways to Secure Websites & Apps.srt 11.86kb
| └──012 4 Ways to Secure Websites & Apps_en.srt 13.58kb
└──20 – Bonus Section
| └──001 Bonus Lecture – Discounts.html 10.92kb

本站所有资源版权均属于原作者所有,这里所提供资源均只能用于参考学习用,请勿直接商用。若由于商用引起版权纠纷,一切责任均由使用者承担。更多说明请参考 VIP介绍。

最常见的情况是下载不完整: 可对比下载完压缩包的与网盘上的容量,若小于网盘提示的容量则是这个原因。这是浏览器下载的bug,建议用百度网盘软件或迅雷下载。 若排除这种情况,可在对应资源底部留言,或联络我们。

对于会员专享、整站源码、程序插件、网站模板、网页模版等类型的素材,文章内用于介绍的图片通常并不包含在对应可供下载素材包内。这些相关商业图片需另外购买,且本站不负责(也没有办法)找到出处。 同样地一些字体文件也是这种情况,但部分素材会在素材包内有一份字体下载链接清单。

如果您已经成功付款但是网站没有弹出成功提示,请联系站长提供付款信息为您处理

源码素材属于虚拟商品,具有可复制性,可传播性,一旦授予,不接受任何形式的退款、换货要求。请您在购买获取之前确认好 是您所需要的资源