Codename Samurai Skills Course

mp4   Hot:180   Size:2.57 GB   Created:2017-08-28 16:56:10   Update:2021-12-11 05:35:48  

Download link

File List

  • Module 7 - Web Exploitation Techniques/Module 7 - Web Exploitation Techniques.mp4 746.74 MB
    Module 2 - Real World Information Intelligence Techniques/Module 2 - Real World Information Intelligence Techniques.mp4 385.85 MB
    Module 8 - Windows exploit development/Module 8 - Windows exploit development.mp4 367.47 MB
    Module 5 - Windows and Unix Attacking Techniques/Module 5 - Windows and Unix Attacking Techniques.mp4 328.13 MB
    Module 3 - Scanning and vulnerability Assessment/Module 3 - Scanning and vulnerability Assessment.mp4 306.65 MB
    Module 6 - Windows and Unix Post Exploitation Techniques/Module 6 - Windows and Unix Post Exploitation Techniques.mp4 285.69 MB
    Module 4 - Network Attacking Techniques/Module 4 - Network Attacking Techniques.mp4 119.45 MB
    Module 1 - Solid Introduction to penetration testing/Module 1 - Solid Introduction to penetration testing.mp4 82.81 MB
    books/Module 5- Windows & Unix Attacking Techniques.pdf 1.84 MB
    books/Module 2- Real World Information Intelligence Techniques .pdf 1.64 MB
    books/Module 3- Scanning and Assessment.pdf 1.53 MB
    books/Module 6- Windows &Unix Post-Exploitation Techniques.pdf 1.34 MB
    books/Module 7- Web Exploitation Techniques .pdf 640.9 KB
    books/Module 4- Network Attacking Techniques.pdf 569.89 KB
    Module 7 - Web Exploitation Techniques/Module 7 - Web Exploitation Techniques_controller.swf 439.86 KB
    Module 6 - Windows and Unix Post Exploitation Techniques/Module 6 - Windows and Unix Post Exploitation Techniques_controller.swf 439.86 KB
    Module 1 - Solid Introduction to penetration testing/Module 1 - Solid Introduction to penetration testing_controller.swf 439.86 KB
    Module 8 - Windows exploit development/Module 8 - Windows exploit development_controller.swf 439.86 KB
    Module 4 - Network Attacking Techniques/Module 4 - Network Attacking Techniques_controller.swf 439.86 KB
    Module 5 - Windows and Unix Attacking Techniques/Module 5 - Windows and Unix Attacking Techniques_controller.swf 439.86 KB
    Module 2 - Real World Information Intelligence Techniques/Module 2 - Real World Information Intelligence Techniques_controller.swf 439.86 KB
    Module 3 - Scanning and vulnerability Assessment/Module 3 - Scanning and vulnerability Assessment_controller.swf 439.86 KB
    books/Module 1- Solid Introduction to Penetration Testing .pdf 425.25 KB
    books/Module 8- Windows_exploit_development.pdf 337.49 KB
    books/Thumbs.db 33.5 KB
    Module 1 - Solid Introduction to penetration testing/Thumbs.db 12.5 KB
    Module 4 - Network Attacking Techniques/Thumbs.db 12 KB
    Module 5 - Windows and Unix Attacking Techniques/Module 5 - Windows and Unix Attacking Techniques_config.xml 11.31 KB
    Module 8 - Windows exploit development/swfobject.js 9.53 KB
    Module 1 - Solid Introduction to penetration testing/swfobject.js 9.53 KB
    Module 2 - Real World Information Intelligence Techniques/swfobject.js 9.53 KB
    Module 3 - Scanning and vulnerability Assessment/swfobject.js 9.53 KB
    Module 5 - Windows and Unix Attacking Techniques/swfobject.js 9.53 KB
    Module 4 - Network Attacking Techniques/swfobject.js 9.53 KB
    Module 7 - Web Exploitation Techniques/swfobject.js 9.53 KB
    Module 6 - Windows and Unix Post Exploitation Techniques/swfobject.js 9.53 KB
    Module 6 - Windows and Unix Post Exploitation Techniques/Module 6 - Windows and Unix Post Exploitation Techniques_config.xml 8.24 KB
    Module 3 - Scanning and vulnerability Assessment/Module 3 - Scanning and vulnerability Assessment_config.xml 7.31 KB
    Module 2 - Real World Information Intelligence Techniques/Module 2 - Real World Information Intelligence Techniques_config.xml 6.8 KB
    Module 1 - Solid Introduction to penetration testing/Module 1 - Solid Introduction to penetration testing_config.xml 5.28 KB
    Module 4 - Network Attacking Techniques/Module 4 - Network Attacking Techniques_config.xml 5.18 KB
    Module 7 - Web Exploitation Techniques/Module 7 - Web Exploitation Techniques_config.xml 4.93 KB
    Module 8 - Windows exploit development/Module 8 - Windows exploit development_config.xml 4.83 KB
    Module 2 - Real World Information Intelligence Techniques/Module 2 - Real World Information Intelligence Techniques.html 3.45 KB
    Module 6 - Windows and Unix Post Exploitation Techniques/Module 6 - Windows and Unix Post Exploitation Techniques.html 3.45 KB
    Module 1 - Solid Introduction to penetration testing/Module 1 - Solid Introduction to penetration testing.html 3.42 KB
    Module 5 - Windows and Unix Attacking Techniques/Module 5 - Windows and Unix Attacking Techniques.html 3.39 KB
    Module 3 - Scanning and vulnerability Assessment/Module 3 - Scanning and vulnerability Assessment.html 3.39 KB
    Module 8 - Windows exploit development/Module 8 - Windows exploit development.html 3.33 KB
    Module 4 - Network Attacking Techniques/Module 4 - Network Attacking Techniques.html 3.32 KB
    Module 7 - Web Exploitation Techniques/Module 7 - Web Exploitation Techniques.html 3.32 KB
    Module 6 - Windows and Unix Post Exploitation Techniques/expressInstall.swf 773 B
    Module 8 - Windows exploit development/expressInstall.swf 773 B
    Module 7 - Web Exploitation Techniques/expressInstall.swf 773 B
    Module 5 - Windows and Unix Attacking Techniques/expressInstall.swf 773 B
    Module 4 - Network Attacking Techniques/expressInstall.swf 773 B
    Module 3 - Scanning and vulnerability Assessment/expressInstall.swf 773 B
    Module 2 - Real World Information Intelligence Techniques/expressInstall.swf 773 B
    Module 1 - Solid Introduction to penetration testing/expressInstall.swf 773 B

Download Info

  • Tips

    “Codename Samurai Skills Course” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.

  • DMCA Notice and Takedown Procedure

    If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.