[Udemy] Этический взлом с Go (2020)
Torrent Information
DetailsGlobal Parameters
Identification Hash
9B5187CF0330C73FDBBB8D96DAF5A9C30BCE3CF7
Community Trust & Feedback
Files (235)
[Udemy] Этический взлом с Go (2020)
235 files • 3.4 GB
18. Protection - How to protect yourself when online
2 files • 137.21 MB
1. Protection.mp4
[Udemy] Этический взлом с Go (2020)/18. Protection - How to protect yourself when online/1. Protection.mp4
1. Protection.srt
[Udemy] Этический взлом с Go (2020)/18. Protection - How to protect yourself when online/1. Protection.srt
1. Introduction to course
6 files • 67.96 MB
1. Welcome to this course.srt
[Udemy] Этический взлом с Go (2020)/1. Introduction to course/1. Welcome to this course.srt
2. Note announcement.mp4
[Udemy] Этический взлом с Go (2020)/1. Introduction to course/2. Note announcement.mp4
2. Note announcement.srt
[Udemy] Этический взлом с Go (2020)/1. Introduction to course/2. Note announcement.srt
3. Introduction to Networking.mp4
[Udemy] Этический взлом с Go (2020)/1. Introduction to course/3. Introduction to Networking.mp4
3. Introduction to Networking.srt
[Udemy] Этический взлом с Go (2020)/1. Introduction to course/3. Introduction to Networking.srt
1. Welcome to this course.mp4
[Udemy] Этический взлом с Go (2020)/1. Introduction to course/1. Welcome to this course.mp4
2. What is Hacking
2 files • 42.69 MB
1. Hacking Introduction.mp4
[Udemy] Этический взлом с Go (2020)/2. What is Hacking/1. Hacking Introduction.mp4
1. Hacking Introduction.srt
[Udemy] Этический взлом с Go (2020)/2. What is Hacking/1. Hacking Introduction.srt
3. Installation
14 files • 103.51 MB
1. Tools required.mp4
[Udemy] Этический взлом с Go (2020)/3. Installation/1. Tools required.mp4
1. Tools required.srt
[Udemy] Этический взлом с Go (2020)/3. Installation/1. Tools required.srt
1.1 kali linux.html
[Udemy] Этический взлом с Go (2020)/3. Installation/1.1 kali linux.html
1.1 Windows 10.html
[Udemy] Этический взлом с Go (2020)/3. Installation/1.1 Windows 10.html
1.2 kali linux.html
[Udemy] Этический взлом с Go (2020)/3. Installation/1.2 kali linux.html
1.2 Windows 10.html
[Udemy] Этический взлом с Go (2020)/3. Installation/1.2 Windows 10.html
2. Installing go in windows.mp4
[Udemy] Этический взлом с Go (2020)/3. Installation/2. Installing go in windows.mp4
2. Installing go in windows.srt
[Udemy] Этический взлом с Go (2020)/3. Installation/2. Installing go in windows.srt
3. IDE to use.mp4
[Udemy] Этический взлом с Go (2020)/3. Installation/3. IDE to use.mp4
3. IDE to use.srt
[Udemy] Этический взлом с Go (2020)/3. Installation/3. IDE to use.srt
4. Linux Installation.mp4
[Udemy] Этический взлом с Go (2020)/3. Installation/4. Linux Installation.mp4
4. Linux Installation.srt
[Udemy] Этический взлом с Go (2020)/3. Installation/4. Linux Installation.srt
5. Setting up golang.mp4
[Udemy] Этический взлом с Go (2020)/3. Installation/5. Setting up golang.mp4
5. Setting up golang.srt
[Udemy] Этический взлом с Go (2020)/3. Installation/5. Setting up golang.srt
4. Executing System Commands
4 files • 59.75 MB
1. How to execute commands.mp4
[Udemy] Этический взлом с Go (2020)/4. Executing System Commands/1. How to execute commands.mp4
1. How to execute commands.srt
[Udemy] Этический взлом с Go (2020)/4. Executing System Commands/1. How to execute commands.srt
2. Refactoring code.mp4
[Udemy] Этический взлом с Go (2020)/4. Executing System Commands/2. Refactoring code.mp4
2. Refactoring code.srt
[Udemy] Этический взлом с Go (2020)/4. Executing System Commands/2. Refactoring code.srt
5. Changing MAC
8 files • 115.03 MB
1. Running ifconfig command on PC.mp4
[Udemy] Этический взлом с Go (2020)/5. Changing MAC/1. Running ifconfig command on PC.mp4
1. Running ifconfig command on PC.srt
[Udemy] Этический взлом с Go (2020)/5. Changing MAC/1. Running ifconfig command on PC.srt
2. Changing MAC using ifconfig.mp4
[Udemy] Этический взлом с Go (2020)/5. Changing MAC/2. Changing MAC using ifconfig.mp4
2. Changing MAC using ifconfig.srt
[Udemy] Этический взлом с Go (2020)/5. Changing MAC/2. Changing MAC using ifconfig.srt
3. Creating a program to automatically change MAC.mp4
[Udemy] Этический взлом с Go (2020)/5. Changing MAC/3. Creating a program to automatically change MAC.mp4
3. Creating a program to automatically change MAC.srt
[Udemy] Этический взлом с Go (2020)/5. Changing MAC/3. Creating a program to automatically change MAC.srt
4. Creating executable and parsing flags.mp4
[Udemy] Этический взлом с Go (2020)/5. Changing MAC/4. Creating executable and parsing flags.mp4
4. Creating executable and parsing flags.srt
[Udemy] Этический взлом с Go (2020)/5. Changing MAC/4. Creating executable and parsing flags.srt
6. Creating Network Scanner
15 files • 335.53 MB
1. Creating a TCP scanner basic.mp4
[Udemy] Этический взлом с Go (2020)/6. Creating Network Scanner/1. Creating a TCP scanner basic.mp4
1. Creating a TCP scanner basic.srt
[Udemy] Этический взлом с Go (2020)/6. Creating Network Scanner/1. Creating a TCP scanner basic.srt
2. Scanning Multiple ports.mp4
[Udemy] Этический взлом с Go (2020)/6. Creating Network Scanner/2. Scanning Multiple ports.mp4
2. Scanning Multiple ports.srt
[Udemy] Этический взлом с Go (2020)/6. Creating Network Scanner/2. Scanning Multiple ports.srt
3. Scanning Multiple ports continued.mp4
[Udemy] Этический взлом с Go (2020)/6. Creating Network Scanner/3. Scanning Multiple ports continued.mp4
3. Scanning Multiple ports continued.srt
[Udemy] Этический взлом с Go (2020)/6. Creating Network Scanner/3. Scanning Multiple ports continued.srt
4. TCP scanner Concurrent.mp4
[Udemy] Этический взлом с Go (2020)/6. Creating Network Scanner/4. TCP scanner Concurrent.mp4
4. TCP scanner Concurrent.srt
[Udemy] Этический взлом с Go (2020)/6. Creating Network Scanner/4. TCP scanner Concurrent.srt
5. TCP scanner Concurrent continued.mp4
[Udemy] Этический взлом с Go (2020)/6. Creating Network Scanner/5. TCP scanner Concurrent continued.mp4
6. Network Mapper Introduction - NMAP.mp4
[Udemy] Этический взлом с Go (2020)/6. Creating Network Scanner/6. Network Mapper Introduction - NMAP.mp4
6. Network Mapper Introduction - NMAP.srt
[Udemy] Этический взлом с Go (2020)/6. Creating Network Scanner/6. Network Mapper Introduction - NMAP.srt
7. Nmap in golang.mp4
[Udemy] Этический взлом с Go (2020)/6. Creating Network Scanner/7. Nmap in golang.mp4
7. Nmap in golang.srt
[Udemy] Этический взлом с Go (2020)/6. Creating Network Scanner/7. Nmap in golang.srt
8. Creating an nmap program in golang.mp4
[Udemy] Этический взлом с Go (2020)/6. Creating Network Scanner/8. Creating an nmap program in golang.mp4
8. Creating an nmap program in golang.srt
[Udemy] Этический взлом с Go (2020)/6. Creating Network Scanner/8. Creating an nmap program in golang.srt
7. Source Code
1 files • 257 Bytes
1. Source code.html
[Udemy] Этический взлом с Go (2020)/7. Source Code/1. Source code.html
8. Man in the Middle Attack - MITM with ARP
12 files • 304.87 MB
1. Address Resolution Protocol - ARP.mp4
[Udemy] Этический взлом с Go (2020)/8. Man in the Middle Attack - MITM with ARP/1. Address Resolution Protocol - ARP.mp4
1. Address Resolution Protocol - ARP.srt
[Udemy] Этический взлом с Go (2020)/8. Man in the Middle Attack - MITM with ARP/1. Address Resolution Protocol - ARP.srt
2. ARP spoofing.mp4
[Udemy] Этический взлом с Go (2020)/8. Man in the Middle Attack - MITM with ARP/2. ARP spoofing.mp4
2. ARP spoofing.srt
[Udemy] Этический взлом с Go (2020)/8. Man in the Middle Attack - MITM with ARP/2. ARP spoofing.srt
3. Installing ARP spoof Program.mp4
[Udemy] Этический взлом с Go (2020)/8. Man in the Middle Attack - MITM with ARP/3. Installing ARP spoof Program.mp4
3. Installing ARP spoof Program.srt
[Udemy] Этический взлом с Go (2020)/8. Man in the Middle Attack - MITM with ARP/3. Installing ARP spoof Program.srt
4. Enabling IP packet forwarding.mp4
[Udemy] Этический взлом с Go (2020)/8. Man in the Middle Attack - MITM with ARP/4. Enabling IP packet forwarding.mp4
4. Enabling IP packet forwarding.srt
[Udemy] Этический взлом с Go (2020)/8. Man in the Middle Attack - MITM with ARP/4. Enabling IP packet forwarding.srt
5. Performing MITM attack.mp4
[Udemy] Этический взлом с Go (2020)/8. Man in the Middle Attack - MITM with ARP/5. Performing MITM attack.mp4
5. Performing MITM attack.srt
[Udemy] Этический взлом с Go (2020)/8. Man in the Middle Attack - MITM with ARP/5. Performing MITM attack.srt
6. Capturing Intercepted Packets.mp4
[Udemy] Этический взлом с Go (2020)/8. Man in the Middle Attack - MITM with ARP/6. Capturing Intercepted Packets.mp4
6. Capturing Intercepted Packets.srt
[Udemy] Этический взлом с Go (2020)/8. Man in the Middle Attack - MITM with ARP/6. Capturing Intercepted Packets.srt
9. Intercepting Packets
18 files • 225.47 MB
1. Installing gopacket package in golang.mp4
[Udemy] Этический взлом с Go (2020)/9. Intercepting Packets/1. Installing gopacket package in golang.mp4
1. Installing gopacket package in golang.srt
[Udemy] Этический взлом с Go (2020)/9. Intercepting Packets/1. Installing gopacket package in golang.srt
2. Finding devices.mp4
[Udemy] Этический взлом с Go (2020)/9. Intercepting Packets/2. Finding devices.mp4
2. Finding devices.srt
[Udemy] Этический взлом с Go (2020)/9. Intercepting Packets/2. Finding devices.srt
3. searching for devices over a machine.mp4
[Udemy] Этический взлом с Go (2020)/9. Intercepting Packets/3. searching for devices over a machine.mp4
3. searching for devices over a machine.srt
[Udemy] Этический взлом с Go (2020)/9. Intercepting Packets/3. searching for devices over a machine.srt
4. Capturing Packets.mp4
[Udemy] Этический взлом с Go (2020)/9. Intercepting Packets/4. Capturing Packets.mp4
4. Capturing Packets.srt
[Udemy] Этический взлом с Go (2020)/9. Intercepting Packets/4. Capturing Packets.srt
5. intercepting live traffic.mp4
[Udemy] Этический взлом с Go (2020)/9. Intercepting Packets/5. intercepting live traffic.mp4
5. intercepting live traffic.srt
[Udemy] Этический взлом с Go (2020)/9. Intercepting Packets/5. intercepting live traffic.srt
6. Intercepting traffic from source.mp4
[Udemy] Этический взлом с Go (2020)/9. Intercepting Packets/6. Intercepting traffic from source.mp4
6. Intercepting traffic from source.srt
[Udemy] Этический взлом с Go (2020)/9. Intercepting Packets/6. Intercepting traffic from source.srt
7. Spoofed packets.mp4
[Udemy] Этический взлом с Go (2020)/9. Intercepting Packets/7. Spoofed packets.mp4
7. Spoofed packets.srt
[Udemy] Этический взлом с Go (2020)/9. Intercepting Packets/7. Spoofed packets.srt
8. Stealing Credentials.mp4
[Udemy] Этический взлом с Go (2020)/9. Intercepting Packets/8. Stealing Credentials.mp4
8. Stealing Credentials.srt
[Udemy] Этический взлом с Go (2020)/9. Intercepting Packets/8. Stealing Credentials.srt
9. Stealing Logins over HTTP.mp4
[Udemy] Этический взлом с Go (2020)/9. Intercepting Packets/9. Stealing Logins over HTTP.mp4
9. Stealing Logins over HTTP.srt
[Udemy] Этический взлом с Go (2020)/9. Intercepting Packets/9. Stealing Logins over HTTP.srt
10. Malware - Creating your own Malware Backdoor RAT
38 files • 784.13 MB
1. Introduction to malware.mp4
[Udemy] Этический взлом с Go (2020)/10. Malware - Creating your own Malware Backdoor RAT/1. Introduction to malware.mp4
1. Introduction to malware.srt
[Udemy] Этический взлом с Go (2020)/10. Malware - Creating your own Malware Backdoor RAT/1. Introduction to malware.srt
2. Creating Hacker Server.mp4
[Udemy] Этический взлом с Go (2020)/10. Malware - Creating your own Malware Backdoor RAT/2. Creating Hacker Server.mp4
2. Creating Hacker Server.srt
[Udemy] Этический взлом с Go (2020)/10. Malware - Creating your own Malware Backdoor RAT/2. Creating Hacker Server.srt
3. Writing Victim Program.mp4
[Udemy] Этический взлом с Go (2020)/10. Malware - Creating your own Malware Backdoor RAT/3. Writing Victim Program.mp4
3. Writing Victim Program.srt
[Udemy] Этический взлом с Go (2020)/10. Malware - Creating your own Malware Backdoor RAT/3. Writing Victim Program.srt
4. Running Server and Victim Programs.mp4
[Udemy] Этический взлом с Go (2020)/10. Malware - Creating your own Malware Backdoor RAT/4. Running Server and Victim Programs.mp4
4. Running Server and Victim Programs.srt
[Udemy] Этический взлом с Go (2020)/10. Malware - Creating your own Malware Backdoor RAT/4. Running Server and Victim Programs.srt
5. Clean up server program.mp4
[Udemy] Этический взлом с Go (2020)/10. Malware - Creating your own Malware Backdoor RAT/5. Clean up server program.mp4
5. Clean up server program.srt
[Udemy] Этический взлом с Go (2020)/10. Malware - Creating your own Malware Backdoor RAT/5. Clean up server program.srt
6. Clean up victim program.mp4
[Udemy] Этический взлом с Go (2020)/10. Malware - Creating your own Malware Backdoor RAT/6. Clean up victim program.mp4
6. Clean up victim program.srt
[Udemy] Этический взлом с Go (2020)/10. Malware - Creating your own Malware Backdoor RAT/6. Clean up victim program.srt
7. Sending Data from server to victim.mp4
[Udemy] Этический взлом с Go (2020)/10. Malware - Creating your own Malware Backdoor RAT/7. Sending Data from server to victim.mp4
7. Sending Data from server to victim.srt
[Udemy] Этический взлом с Go (2020)/10. Malware - Creating your own Malware Backdoor RAT/7. Sending Data from server to victim.srt
8. Receiving data from hacker server.mp4
[Udemy] Этический взлом с Go (2020)/10. Malware - Creating your own Malware Backdoor RAT/8. Receiving data from hacker server.mp4
8. Receiving data from hacker server.srt
[Udemy] Этический взлом с Go (2020)/10. Malware - Creating your own Malware Backdoor RAT/8. Receiving data from hacker server.srt
9. Sending gob structs to victim.mp4
[Udemy] Этический взлом с Go (2020)/10. Malware - Creating your own Malware Backdoor RAT/9. Sending gob structs to victim.mp4
9. Sending gob structs to victim.srt
[Udemy] Этический взлом с Go (2020)/10. Malware - Creating your own Malware Backdoor RAT/9. Sending gob structs to victim.srt
10. Receiving gob structs at victim machine.mp4
[Udemy] Этический взлом с Go (2020)/10. Malware - Creating your own Malware Backdoor RAT/10. Receiving gob structs at victim machine.mp4
10. Receiving gob structs at victim machine.srt
[Udemy] Этический взлом с Go (2020)/10. Malware - Creating your own Malware Backdoor RAT/10. Receiving gob structs at victim machine.srt
11. Running the program to send and receive gobs.mp4
[Udemy] Этический взлом с Go (2020)/10. Malware - Creating your own Malware Backdoor RAT/11. Running the program to send and receive gobs.mp4
11. Running the program to send and receive gobs.srt
[Udemy] Этический взлом с Go (2020)/10. Malware - Creating your own Malware Backdoor RAT/11. Running the program to send and receive gobs.srt
12. Executing command server side.mp4
[Udemy] Этический взлом с Go (2020)/10. Malware - Creating your own Malware Backdoor RAT/12. Executing command server side.mp4
12. Executing command server side.srt
[Udemy] Этический взлом с Go (2020)/10. Malware - Creating your own Malware Backdoor RAT/12. Executing command server side.srt
13. Exit condition.mp4
[Udemy] Этический взлом с Go (2020)/10. Malware - Creating your own Malware Backdoor RAT/13. Exit condition.mp4
13. Exit condition.srt
[Udemy] Этический взлом с Go (2020)/10. Malware - Creating your own Malware Backdoor RAT/13. Exit condition.srt
14. Victim Side main function.mp4
[Udemy] Этический взлом с Go (2020)/10. Malware - Creating your own Malware Backdoor RAT/14. Victim Side main function.mp4
14. Victim Side main function.srt
[Udemy] Этический взлом с Go (2020)/10. Malware - Creating your own Malware Backdoor RAT/14. Victim Side main function.srt
15. Server logic command execution.mp4
[Udemy] Этический взлом с Go (2020)/10. Malware - Creating your own Malware Backdoor RAT/15. Server logic command execution.mp4
15. Server logic command execution.srt
[Udemy] Этический взлом с Go (2020)/10. Malware - Creating your own Malware Backdoor RAT/15. Server logic command execution.srt
16. Victim Logic command execution.mp4
[Udemy] Этический взлом с Go (2020)/10. Malware - Creating your own Malware Backdoor RAT/16. Victim Logic command execution.mp4
16. Victim Logic command execution.srt
[Udemy] Этический взлом с Go (2020)/10. Malware - Creating your own Malware Backdoor RAT/16. Victim Logic command execution.srt
17. Victim Logic command execution Part 2.mp4
[Udemy] Этический взлом с Go (2020)/10. Malware - Creating your own Malware Backdoor RAT/17. Victim Logic command execution Part 2.mp4
17. Victim Logic command execution Part 2.srt
[Udemy] Этический взлом с Go (2020)/10. Malware - Creating your own Malware Backdoor RAT/17. Victim Logic command execution Part 2.srt
18. Minor Error.mp4
[Udemy] Этический взлом с Go (2020)/10. Malware - Creating your own Malware Backdoor RAT/18. Minor Error.mp4
18. Minor Error.srt
[Udemy] Этический взлом с Go (2020)/10. Malware - Creating your own Malware Backdoor RAT/18. Minor Error.srt
19. Executing Commands Complete program.mp4
[Udemy] Этический взлом с Go (2020)/10. Malware - Creating your own Malware Backdoor RAT/19. Executing Commands Complete program.mp4
19. Executing Commands Complete program.srt
[Udemy] Этический взлом с Go (2020)/10. Malware - Creating your own Malware Backdoor RAT/19. Executing Commands Complete program.srt
11. Malware - File System Navigation
22 files • 218.81 MB
1. Introduction.mp4
[Udemy] Этический взлом с Go (2020)/11. Malware - File System Navigation/1. Introduction.mp4
1. Introduction.srt
[Udemy] Этический взлом с Go (2020)/11. Malware - File System Navigation/1. Introduction.srt
2. setting up victim machine's main program.mp4
[Udemy] Этический взлом с Go (2020)/11. Malware - File System Navigation/2. setting up victim machine's main program.mp4
2. setting up victim machine's main program.srt
[Udemy] Этический взлом с Go (2020)/11. Malware - File System Navigation/2. setting up victim machine's main program.srt
3. Sending initial current directory to Hacker.mp4
[Udemy] Этический взлом с Go (2020)/11. Malware - File System Navigation/3. Sending initial current directory to Hacker.mp4
3. Sending initial current directory to Hacker.srt
[Udemy] Этический взлом с Go (2020)/11. Malware - File System Navigation/3. Sending initial current directory to Hacker.srt
4. Receiving initial pwd in server.mp4
[Udemy] Этический взлом с Go (2020)/11. Malware - File System Navigation/4. Receiving initial pwd in server.mp4
4. Receiving initial pwd in server.srt
[Udemy] Этический взлом с Go (2020)/11. Malware - File System Navigation/4. Receiving initial pwd in server.srt
5. Getting user input.mp4
[Udemy] Этический взлом с Go (2020)/11. Malware - File System Navigation/5. Getting user input.mp4
5. Getting user input.srt
[Udemy] Этический взлом с Go (2020)/11. Malware - File System Navigation/5. Getting user input.srt
6. Reading User Command.mp4
[Udemy] Этический взлом с Go (2020)/11. Malware - File System Navigation/6. Reading User Command.mp4
6. Reading User Command.srt
[Udemy] Этический взлом с Go (2020)/11. Malware - File System Navigation/6. Reading User Command.srt
7. Getting Back results.mp4
[Udemy] Этический взлом с Go (2020)/11. Malware - File System Navigation/7. Getting Back results.mp4
7. Getting Back results.srt
[Udemy] Этический взлом с Go (2020)/11. Malware - File System Navigation/7. Getting Back results.srt
8. Loop Navigation on server side.mp4
[Udemy] Этический взлом с Go (2020)/11. Malware - File System Navigation/8. Loop Navigation on server side.mp4
8. Loop Navigation on server side.srt
[Udemy] Этический взлом с Go (2020)/11. Malware - File System Navigation/8. Loop Navigation on server side.srt
9. Exit Condition on server.mp4
[Udemy] Этический взлом с Go (2020)/11. Malware - File System Navigation/9. Exit Condition on server.mp4
9. Exit Condition on server.srt
[Udemy] Этический взлом с Go (2020)/11. Malware - File System Navigation/9. Exit Condition on server.srt
10. Loop navigation on victim side.mp4
[Udemy] Этический взлом с Go (2020)/11. Malware - File System Navigation/10. Loop navigation on victim side.mp4
10. Loop navigation on victim side.srt
[Udemy] Этический взлом с Go (2020)/11. Malware - File System Navigation/10. Loop navigation on victim side.srt
11. Running the program.mp4
[Udemy] Этический взлом с Go (2020)/11. Malware - File System Navigation/11. Running the program.mp4
11. Running the program.srt
[Udemy] Этический взлом с Go (2020)/11. Malware - File System Navigation/11. Running the program.srt
12. Malware - Uploading Viruses to victim
20 files • 274.74 MB
1. Introduction how to transfer files.mp4
[Udemy] Этический взлом с Go (2020)/12. Malware - Uploading Viruses to victim/1. Introduction how to transfer files.mp4
1. Introduction how to transfer files.srt
[Udemy] Этический взлом с Go (2020)/12. Malware - Uploading Viruses to victim/1. Introduction how to transfer files.srt
2. Setting main function.mp4
[Udemy] Этический взлом с Go (2020)/12. Malware - Uploading Viruses to victim/2. Setting main function.mp4
2. Setting main function.srt
[Udemy] Этический взлом с Go (2020)/12. Malware - Uploading Viruses to victim/2. Setting main function.srt
3. Check File's existence.mp4
[Udemy] Этический взлом с Go (2020)/12. Malware - Uploading Viruses to victim/3. Check File's existence.mp4
3. Check File's existence.srt
[Udemy] Этический взлом с Go (2020)/12. Malware - Uploading Viruses to victim/3. Check File's existence.srt
4. Reading file contents.mp4
[Udemy] Этический взлом с Go (2020)/12. Malware - Uploading Viruses to victim/4. Reading file contents.mp4
4. Reading file contents.srt
[Udemy] Этический взлом с Go (2020)/12. Malware - Uploading Viruses to victim/4. Reading file contents.srt
5. Creating buffer.mp4
[Udemy] Этический взлом с Go (2020)/12. Malware - Uploading Viruses to victim/5. Creating buffer.mp4
5. Creating buffer.srt
[Udemy] Этический взлом с Go (2020)/12. Malware - Uploading Viruses to victim/5. Creating buffer.srt
6. Sending File to victim machine.mp4
[Udemy] Этический взлом с Go (2020)/12. Malware - Uploading Viruses to victim/6. Sending File to victim machine.mp4
6. Sending File to victim machine.srt
[Udemy] Этический взлом с Go (2020)/12. Malware - Uploading Viruses to victim/6. Sending File to victim machine.srt
7. Setting up main function in victim.mp4
[Udemy] Этический взлом с Go (2020)/12. Malware - Uploading Viruses to victim/7. Setting up main function in victim.mp4
7. Setting up main function in victim.srt
[Udemy] Этический взлом с Go (2020)/12. Malware - Uploading Viruses to victim/7. Setting up main function in victim.srt
8. Saving file on victim's disk.mp4
[Udemy] Этический взлом с Go (2020)/12. Malware - Uploading Viruses to victim/8. Saving file on victim's disk.mp4
8. Saving file on victim's disk.srt
[Udemy] Этический взлом с Go (2020)/12. Malware - Uploading Viruses to victim/8. Saving file on victim's disk.srt
9. Getting back write status.mp4
[Udemy] Этический взлом с Go (2020)/12. Malware - Uploading Viruses to victim/9. Getting back write status.mp4
9. Getting back write status.srt
[Udemy] Этический взлом с Go (2020)/12. Malware - Uploading Viruses to victim/9. Getting back write status.srt
10. Uploading a file.mp4
[Udemy] Этический взлом с Go (2020)/12. Malware - Uploading Viruses to victim/10. Uploading a file.mp4
10. Uploading a file.srt
[Udemy] Этический взлом с Go (2020)/12. Malware - Uploading Viruses to victim/10. Uploading a file.srt
13. Malware - Downloading Files from Victim
20 files • 184.27 MB
1. Setting up main function in victim machine.mp4
[Udemy] Этический взлом с Go (2020)/13. Malware - Downloading Files from Victim/1. Setting up main function in victim machine.mp4
1. Setting up main function in victim machine.srt
[Udemy] Этический взлом с Go (2020)/13. Malware - Downloading Files from Victim/1. Setting up main function in victim machine.srt
2. Getting the list of files in current directory.mp4
[Udemy] Этический взлом с Go (2020)/13. Malware - Downloading Files from Victim/2. Getting the list of files in current directory.mp4
2. Getting the list of files in current directory.srt
[Udemy] Этический взлом с Go (2020)/13. Malware - Downloading Files from Victim/2. Getting the list of files in current directory.srt
3. Sending list to hacker.mp4
[Udemy] Этический взлом с Go (2020)/13. Malware - Downloading Files from Victim/3. Sending list to hacker.mp4
3. Sending list to hacker.srt
[Udemy] Этический взлом с Go (2020)/13. Malware - Downloading Files from Victim/3. Sending list to hacker.srt
4. Receiving list at hacker.mp4
[Udemy] Этический взлом с Go (2020)/13. Malware - Downloading Files from Victim/4. Receiving list at hacker.mp4
4. Receiving list at hacker.srt
[Udemy] Этический взлом с Go (2020)/13. Malware - Downloading Files from Victim/4. Receiving list at hacker.srt
5. Getting user input.mp4
[Udemy] Этический взлом с Go (2020)/13. Malware - Downloading Files from Victim/5. Getting user input.mp4
5. Getting user input.srt
[Udemy] Этический взлом с Go (2020)/13. Malware - Downloading Files from Victim/5. Getting user input.srt
6. Converting user input to integer.mp4
[Udemy] Этический взлом с Go (2020)/13. Malware - Downloading Files from Victim/6. Converting user input to integer.mp4
6. Converting user input to integer.srt
[Udemy] Этический взлом с Go (2020)/13. Malware - Downloading Files from Victim/6. Converting user input to integer.srt
7. Sending file names to victim.mp4
[Udemy] Этический взлом с Go (2020)/13. Malware - Downloading Files from Victim/7. Sending file names to victim.mp4
7. Sending file names to victim.srt
[Udemy] Этический взлом с Go (2020)/13. Malware - Downloading Files from Victim/7. Sending file names to victim.srt
8. Reading file content from victim.mp4
[Udemy] Этический взлом с Go (2020)/13. Malware - Downloading Files from Victim/8. Reading file content from victim.mp4
8. Reading file content from victim.srt
[Udemy] Этический взлом с Go (2020)/13. Malware - Downloading Files from Victim/8. Reading file content from victim.srt
9. Writing File content hacker.mp4
[Udemy] Этический взлом с Go (2020)/13. Malware - Downloading Files from Victim/9. Writing File content hacker.mp4
9. Writing File content hacker.srt
[Udemy] Этический взлом с Go (2020)/13. Malware - Downloading Files from Victim/9. Writing File content hacker.srt
10. Downloading the file to hacker machine.mp4
[Udemy] Этический взлом с Go (2020)/13. Malware - Downloading Files from Victim/10. Downloading the file to hacker machine.mp4
10. Downloading the file to hacker machine.srt
[Udemy] Этический взлом с Go (2020)/13. Malware - Downloading Files from Victim/10. Downloading the file to hacker machine.srt
14. Malware - Stealing Folders from victim
20 files • 212.17 MB
1. Downloading folder from victim.mp4
[Udemy] Этический взлом с Go (2020)/14. Malware - Stealing Folders from victim/1. Downloading folder from victim.mp4
1. Downloading folder from victim.srt
[Udemy] Этический взлом с Go (2020)/14. Malware - Stealing Folders from victim/1. Downloading folder from victim.srt
2. Setting main function.mp4
[Udemy] Этический взлом с Go (2020)/14. Malware - Stealing Folders from victim/2. Setting main function.mp4
2. Setting main function.srt
[Udemy] Этический взлом с Go (2020)/14. Malware - Stealing Folders from victim/2. Setting main function.srt
3. getting folders.mp4
[Udemy] Этический взлом с Go (2020)/14. Malware - Stealing Folders from victim/3. getting folders.mp4
3. getting folders.srt
[Udemy] Этический взлом с Go (2020)/14. Malware - Stealing Folders from victim/3. getting folders.srt
4. sending folder list to hacker.mp4
[Udemy] Этический взлом с Go (2020)/14. Malware - Stealing Folders from victim/4. sending folder list to hacker.mp4
4. sending folder list to hacker.srt
[Udemy] Этический взлом с Go (2020)/14. Malware - Stealing Folders from victim/4. sending folder list to hacker.srt
5. Getting folder list and selecting folder.mp4
[Udemy] Этический взлом с Go (2020)/14. Malware - Stealing Folders from victim/5. Getting folder list and selecting folder.mp4
5. Getting folder list and selecting folder.srt
[Udemy] Этический взлом с Go (2020)/14. Malware - Stealing Folders from victim/5. Getting folder list and selecting folder.srt
6. getting folder name on victim.mp4
[Udemy] Этический взлом с Go (2020)/14. Malware - Stealing Folders from victim/6. getting folder name on victim.mp4
6. getting folder name on victim.srt
[Udemy] Этический взлом с Go (2020)/14. Malware - Stealing Folders from victim/6. getting folder name on victim.srt
7. Creating Zip file.mp4
[Udemy] Этический взлом с Go (2020)/14. Malware - Stealing Folders from victim/7. Creating Zip file.mp4
7. Creating Zip file.srt
[Udemy] Этический взлом с Go (2020)/14. Malware - Stealing Folders from victim/7. Creating Zip file.srt
8. Zip file continued.mp4
[Udemy] Этический взлом с Go (2020)/14. Malware - Stealing Folders from victim/8. Zip file continued.mp4
8. Zip file continued.srt
[Udemy] Этический взлом с Go (2020)/14. Malware - Stealing Folders from victim/8. Zip file continued.srt
9. Connection.mp4
[Udemy] Этический взлом с Go (2020)/14. Malware - Stealing Folders from victim/9. Connection.mp4
9. Connection.srt
[Udemy] Этический взлом с Go (2020)/14. Malware - Stealing Folders from victim/9. Connection.srt
10. Running Program.mp4
[Udemy] Этический взлом с Go (2020)/14. Malware - Stealing Folders from victim/10. Running Program.mp4
10. Running Program.srt
[Udemy] Этический взлом с Go (2020)/14. Malware - Stealing Folders from victim/10. Running Program.srt
15. Trojan - packaging a malware
21 files • 287.14 MB
1. Introduction to trojan.mp4
[Udemy] Этический взлом с Go (2020)/15. Trojan - packaging a malware/1. Introduction to trojan.mp4
1. Introduction to trojan.srt
[Udemy] Этический взлом с Go (2020)/15. Trojan - packaging a malware/1. Introduction to trojan.srt
2. Packaging.mp4
[Udemy] Этический взлом с Go (2020)/15. Trojan - packaging a malware/2. Packaging.mp4
2. Packaging.srt
[Udemy] Этический взлом с Go (2020)/15. Trojan - packaging a malware/2. Packaging.srt
3. Running executables.mp4
[Udemy] Этический взлом с Go (2020)/15. Trojan - packaging a malware/3. Running executables.mp4
3. Running executables.srt
[Udemy] Этический взлом с Go (2020)/15. Trojan - packaging a malware/3. Running executables.srt
4. Running our malware.mp4
[Udemy] Этический взлом с Go (2020)/15. Trojan - packaging a malware/4. Running our malware.mp4
4. Running our malware.srt
[Udemy] Этический взлом с Go (2020)/15. Trojan - packaging a malware/4. Running our malware.srt
5. Hiding console on victim.mp4
[Udemy] Этический взлом с Go (2020)/15. Trojan - packaging a malware/5. Hiding console on victim.mp4
5. Hiding console on victim.srt
[Udemy] Этический взлом с Go (2020)/15. Trojan - packaging a malware/5. Hiding console on victim.srt
6. Batch file.mp4
[Udemy] Этический взлом с Go (2020)/15. Trojan - packaging a malware/6. Batch file.mp4
6. Batch file.srt
[Udemy] Этический взлом с Go (2020)/15. Trojan - packaging a malware/6. Batch file.srt
6.1 batch file.txt
[Udemy] Этический взлом с Go (2020)/15. Trojan - packaging a malware/6.1 batch file.txt
7. Batch to exe.mp4
[Udemy] Этический взлом с Go (2020)/15. Trojan - packaging a malware/7. Batch to exe.mp4
7. Batch to exe.srt
[Udemy] Этический взлом с Go (2020)/15. Trojan - packaging a malware/7. Batch to exe.srt
8. Adding icon to executable.mp4
[Udemy] Этический взлом с Go (2020)/15. Trojan - packaging a malware/8. Adding icon to executable.mp4
8. Adding icon to executable.srt
[Udemy] Этический взлом с Go (2020)/15. Trojan - packaging a malware/8. Adding icon to executable.srt
9. Running exe.mp4
[Udemy] Этический взлом с Go (2020)/15. Trojan - packaging a malware/9. Running exe.mp4
9. Running exe.srt
[Udemy] Этический взлом с Go (2020)/15. Trojan - packaging a malware/9. Running exe.srt
10. How to perform attack over public internet.mp4
[Udemy] Этический взлом с Go (2020)/15. Trojan - packaging a malware/10. How to perform attack over public internet.mp4
10. How to perform attack over public internet.srt
[Udemy] Этический взлом с Go (2020)/15. Trojan - packaging a malware/10. How to perform attack over public internet.srt
16. Keylogger
4 files • 60.63 MB
1. Creating a keylogger using go-keylogger package.mp4
[Udemy] Этический взлом с Go (2020)/16. Keylogger/1. Creating a keylogger using go-keylogger package.mp4
1. Creating a keylogger using go-keylogger package.srt
[Udemy] Этический взлом с Go (2020)/16. Keylogger/1. Creating a keylogger using go-keylogger package.srt
2. Starting keylogger.mp4
[Udemy] Этический взлом с Go (2020)/16. Keylogger/2. Starting keylogger.mp4
2. Starting keylogger.srt
[Udemy] Этический взлом с Go (2020)/16. Keylogger/2. Starting keylogger.srt
17. Stegnography
8 files • 64.14 MB
1. Stegnography Introduction.mp4
[Udemy] Этический взлом с Go (2020)/17. Stegnography/1. Stegnography Introduction.mp4
1. Stegnography Introduction.srt
[Udemy] Этический взлом с Go (2020)/17. Stegnography/1. Stegnography Introduction.srt
2. Installing Package.mp4
[Udemy] Этический взлом с Go (2020)/17. Stegnography/2. Installing Package.mp4
2. Installing Package.srt
[Udemy] Этический взлом с Go (2020)/17. Stegnography/2. Installing Package.srt
3. Encoding Data.mp4
[Udemy] Этический взлом с Go (2020)/17. Stegnography/3. Encoding Data.mp4
3. Encoding Data.srt
[Udemy] Этический взлом с Go (2020)/17. Stegnography/3. Encoding Data.srt
4. Decoding Data.mp4
[Udemy] Этический взлом с Go (2020)/17. Stegnography/4. Decoding Data.mp4
4. Decoding Data.srt
[Udemy] Этический взлом с Go (2020)/17. Stegnography/4. Decoding Data.srt
Trackers (12)
udp://tracker.bitsearch.to:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.moeking.me:6969/announce
udp://tracker.torrent.eu.org:451/announce
udp://open.stealth.si:80/announce
udp://tracker.openbittorrent.com:80/announce
udp://tracker4.itzmx.com:2710/announce
udp://retracker.lanta-net.ru:2710/announce
udp://tracker.tiny-vps.com:6969/announce
udp://exodus.desync.com:6969/announce
udp://explodie.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
Similar Torrents 15
Based on tags and category