• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.
Resource icon

eCPPT v2 15 GB - 2024

No permission to download

eCPPT.png

eCPPT Certification​

Certified Professional Penetration Tester​

eCPPT is a 100% practical and highly respected Ethical Hacking and Penetration Testing Professional certification counting certified professionals in all seven continents.



More info:
This link is hidden for visitors. Please Log in or register now.

Code:
[4.0K]  .
├── [4.0K]  1. System Security
│   ├── [4.0K]  Files
│   │   ├── [ 465]  Assembler Debuggers Tools.zip
│   │   ├── [  26]  Assembler Debuggers Tools.zip:Zone.Identifier
│   │   ├── [588K]  Buffer Overflow.zip
│   │   ├── [  26]  Buffer Overflow.zip:Zone.Identifier
│   │   ├── [ 18K]  Malware.zip
│   │   ├── [  26]  Malware.zip:Zone.Identifier
│   │   ├── [7.7K]  Shellcoding.zip
│   │   └── [  26]  Shellcoding.zip:Zone.Identifier
│   ├── [4.0K]  PDF
│   │   ├── [3.8M]  INE Cyber Security - User Guide_2.pdf
│   │   ├── [  26]  INE Cyber Security - User Guide_2.pdf:Zone.Identifier
│   │   ├── [ 74M]  System Security.pdf
│   │   └── [  26]  System Security.pdf:Zone.Identifier
│   └── [4.0K]  Videos
│       ├── [591M]  Debugging Buffer Overflows Goodpassword.mp4
│       ├── [  26]  Debugging Buffer Overflows Goodpassword.mp4:Zone.Identifier
│       ├── [461M]  Exploiting Buffer Overflows 32bit FTP.mp4
│       ├── [  26]  Exploiting Buffer Overflows 32bit FTP.mp4:Zone.Identifier
│       ├── [375M]  Immunity Debugger.mp4
│       ├── [  26]  Immunity Debugger.mp4:Zone.Identifier
│       ├── [518M]  Stack Frames.mp4
│       ├── [  26]  Stack Frames.mp4:Zone.Identifier
│       ├── [ 31K]  Thumbs.db
│       └── [  26]  Thumbs.db:Zone.Identifier
├── [4.0K]  2. Network Security
│   ├── [4.0K]  FILES
│   │   ├── [ 53K]  Thumbs.db
│   │   ├── [  26]  Thumbs.db:Zone.Identifier
│   │   ├── [390K]  letter.png
│   │   └── [  26]  letter.png:Zone.Identifier
│   ├── [4.0K]  PDF
│   │   ├── [3.8M]  INE Cyber Security - User Guide_2.pdf
│   │   ├── [  26]  INE Cyber Security - User Guide_2.pdf:Zone.Identifier
│   │   ├── [131M]  Network Security.pdf
│   │   ├── [  26]  Network Security.pdf:Zone.Identifier
│   │   ├── [660K]  eLearnSecurity Handling Information.pdf
│   │   └── [  26]  eLearnSecurity Handling Information.pdf:Zone.Identifier
│   └── [4.0K]  VIDEOS
│       ├── [338M]  Advanced Port Scanning.mp4
│       ├── [  26]  Advanced Port Scanning.mp4:Zone.Identifier
│       ├── [439M]  Authentication Bruteforcing.mp4
│       ├── [  26]  Authentication Bruteforcing.mp4:Zone.Identifier
│       ├── [287M]  Bypassing Firewalls and Data Exfiltration with DNS Tunneling_1.mp4
│       ├── [  26]  Bypassing Firewalls and Data Exfiltration with DNS Tunneling_1.mp4:Zone.Identifier
│       ├── [192M]  Client Side Exploitation.mp4
│       ├── [  26]  Client Side Exploitation.mp4:Zone.Identifier
│       ├── [791M]  DLL Hijacking.mp4
│       ├── [  26]  DLL Hijacking.mp4:Zone.Identifier
│       ├── [140M]  EternalBlue & Metasploit.mp4
│       ├── [  26]  EternalBlue & Metasploit.mp4:Zone.Identifier
│       ├── [497M]  Exploiting Unquoted Service Paths.mp4
│       ├── [  26]  Exploiting Unquoted Service Paths.mp4:Zone.Identifier
│       ├── [224M]  Exploiting via Pivoting.mp4
│       ├── [  26]  Exploiting via Pivoting.mp4:Zone.Identifier
│       ├── [234M]  Foca Shodan.mp4
│       ├── [  26]  Foca Shodan.mp4:Zone.Identifier
│       ├── [437M]  Host Discovery with Fping Hping Nmap_1.mp4
│       ├── [  26]  Host Discovery with Fping Hping Nmap_1.mp4:Zone.Identifier
│       ├── [213M]  Hping Basics.mp4
│       ├── [  26]  Hping Basics.mp4:Zone.Identifier
│       ├── [265M]  Idle Scan Hping Nmap.mp4
│       ├── [  26]  Idle Scan Hping Nmap.mp4:Zone.Identifier
│       ├── [166M]  Information Gathering DNS.mp4
│       ├── [  26]  Information Gathering DNS.mp4:Zone.Identifier
│       ├── [142M]  LM NTLM Cracking_1.mp4
│       ├── [  26]  LM NTLM Cracking_1.mp4:Zone.Identifier
│       ├── [242M]  Maintaing Access.mp4
│       ├── [  26]  Maintaing Access.mp4:Zone.Identifier
│       ├── [276M]  Maltego.mp4
│       ├── [  26]  Maltego.mp4:Zone.Identifier
│       ├── [223M]  Man in the Middle.mp4
│       ├── [  26]  Man in the Middle.mp4:Zone.Identifier
│       ├── [275M]  Mapping the Network.mp4
│       ├── [  26]  Mapping the Network.mp4:Zone.Identifier
│       ├── [345M]  Metasploit Basic Usage_1.mp4
│       ├── [  26]  Metasploit Basic Usage_1.mp4:Zone.Identifier
│       ├── [278M]  Metasploit Usage.mp4
│       ├── [  26]  Metasploit Usage.mp4:Zone.Identifier
│       ├── [521M]  Meterpreter SSL Certificate Impersonation and Detection Evasion.mp4
│       ├── [  26]  Meterpreter SSL Certificate Impersonation and Detection Evasion.mp4:Zone.Identifier
│       ├── [133M]  Nessus.mp4
│       ├── [  26]  Nessus.mp4:Zone.Identifier
│       ├── [279M]  NetBIOS and Null Session_1.mp4
│       ├── [  26]  NetBIOS and Null Session_1.mp4:Zone.Identifier
│       ├── [191M]  Nmap Basics.mp4
│       ├── [  26]  Nmap Basics.mp4:Zone.Identifier
│       ├── [163M]  Nmap NSE.mp4
│       ├── [  26]  Nmap NSE.mp4:Zone.Identifier
│       ├── [206M]  Obtaining Stored Credentials with SessionGopher.mp4
│       ├── [  26]  Obtaining Stored Credentials with SessionGopher.mp4:Zone.Identifier
│       ├── [468M]  Pillaging.mp4
│       ├── [  26]  Pillaging.mp4:Zone.Identifier
│       ├── [457M]  Privilege Escalation.mp4
│       ├── [  26]  Privilege Escalation.mp4:Zone.Identifier
│       ├── [ 97M]  Remote Exploitation.mp4
│       ├── [  26]  Remote Exploitation.mp4:Zone.Identifier
│       ├── [346M]  Responder & Multirelay.mp4
│       ├── [  26]  Responder & Multirelay.mp4:Zone.Identifier
│       ├── [131M]  SNMP Enumeration.mp4
│       ├── [  26]  SNMP Enumeration.mp4:Zone.Identifier
│       ├── [805M]  Social Engineering Linux Targets.mp4
│       ├── [  26]  Social Engineering Linux Targets.mp4:Zone.Identifier
│       ├── [194K]  Thumbs.db
│       ├── [  26]  Thumbs.db:Zone.Identifier
│       ├── [235M]  Traffic Sniffing with TCPdump.mp4
│       ├── [  26]  Traffic Sniffing with TCPdump.mp4:Zone.Identifier
│       ├── [101M]  Whois Lookup.mp4
│       ├── [  26]  Whois Lookup.mp4:Zone.Identifier
│       ├── [302M]  Wireshark Introduction.mp4
│       └── [  26]  Wireshark Introduction.mp4:Zone.Identifier
├── [4.0K]  3. PowerShell for Pentesters
│   ├── [4.0K]  PDF
│   │   ├── [3.8M]  INE Cyber Security - User Guide_2.pdf
│   │   ├── [  26]  INE Cyber Security - User Guide_2.pdf:Zone.Identifier
│   │   ├── [ 26M]  PowerShell for Pentesters.pdf
│   │   └── [  26]  PowerShell for Pentesters.pdf:Zone.Identifier
│   └── [4.0K]  VIDEOS
│       ├── [638M]  Empire Overview.mp4
│       ├── [  26]  Empire Overview.mp4:Zone.Identifier
│       ├── [1.2G]  Introduction to Leveraging WMI and Methods for Persistence.mp4
│       ├── [  26]  Introduction to Leveraging WMI and Methods for Persistence.mp4:Zone.Identifier
│       ├── [ 27K]  Thumbs.db
│       ├── [  26]  Thumbs.db:Zone.Identifier
│       ├── [1.0G]  UAC Bypass PowerShell Exploit Script Walkthrough.mp4
│       └── [  26]  UAC Bypass PowerShell Exploit Script Walkthrough.mp4:Zone.Identifier
└── [   0]  list.txt

11 directories, 117 files


DOWNLOAD
Download free to users
PRIV8

Password:
htdark.com
Back
Top