Udemy - How Hackers Create Malware and Infiltrate Victim Machines

  • Category Other
  • Type Tutorials
  • Language English
  • Total size 165.6 MB
  • Uploaded By Fclab
  • Downloads 588
  • Last checked 2 months ago
  • Date uploaded 2 months ago
  • Seeders 11
  • Leechers 1

Infohash : 57A2B4882A2748E4CFED5A9652450DA0DF285556

Udemy - How Hackers Create Malware and Infiltrate Victim Machines

This course will teach you how hackers create malware and trojans.

For more Udemy Courses: http://freecourselab.com

Files:

[FreeCourseLab.com] Udemy - How Hackers Create Malware and Infiltrate Victim Machines 1. Introduction
  • 1. Introduction and Welcome.mp4 (13.2 MB)
  • 1. Introduction and Welcome.vtt (8.2 KB)
2. Initial Building Blocks
  • 1. Introduction to Malware and Trojans.mp4 (7.7 MB)
  • 1. Introduction to Malware and Trojans.vtt (5.1 KB)
  • 2. Installing C C++ Compiler.mp4 (14.2 MB)
  • 2. Installing C C++ Compiler.vtt (5.6 KB)
  • 3. Downloading Additional Applications.mp4 (14.4 MB)
  • 3. Downloading Additional Applications.vtt (5.5 KB)
3. Lets Create Malware!
  • 1. Creating a Malware Program with Codeblocks.mp4 (22.2 MB)
  • 1. Creating a Malware Program with Codeblocks.vtt (9.3 KB)
  • 2. Running Apache Server and Uploading Malware to Server.mp4 (29.8 MB)
  • 2. Running Apache Server and Uploading Malware to Server.vtt (9.7 KB)
  • 3. Using Reverse Shell on Victim's PC.mp4 (25.2 MB)
  • 3. Using Reverse Shell on Victim's PC.vtt (8.8 KB)
  • 4. Viewing Access Logs and Introduction to the Metasploit Framerwork.mp4 (22.1 MB)
  • 4. Viewing Access Logs and Introduction to the Metasploit Framerwork.vtt (8.4 KB)
  • 5. What to Do When Victim is on a Different Network.mp4 (8.4 MB)
  • 5. What to Do When Victim is on a Different Network.vtt (3.1 KB)
  • 6. Using Metasploit to Create an Exploit.mp4 (8.3 MB)
  • 6. Using Metasploit to Create an Exploit.vtt (3.6 KB)
  • [FreeCourseLab.com].url (0.1 KB)

Comments

Code:

  • http://0d.kebhana.mx:443/announce
  • udp://tw.opentracker.ga:36920/announce
  • udp://temp1.opentracker.gq:6969/announce
  • udp://temp2.opentracker.gq:6969/announce
  • udp://tracker.torrent.eu.org:451/announce
  • http://torrent.nwps.ws:80/announce
  • udp://explodie.org:6969/announce
  • http://opentracker.xyz:443/announce
  • http://t.quic.ws:443/announce
  • http://tracker.fastdownload.xyz:443/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://ipv4.tracker.harry.lu:80/announce
  • udp://tracker.coppersurfer.tk:6969/announce
  • udp://tracker.justseed.it:1337/announce
  • udp://open.demonii.si:1337/announce
SitemapThe Leader as a Strategist Report | adobe acrobat | Toshiba RZE-BT200H Foldable Wireless Headphones - Blue -38% KSh 2,499 KSh 3,999 (7) Buy now Statia 2019 | The Predator | In scadenza