Search Torrents

Codename Samurai Skills Course...


Codename Samurai Skills Course Torrent content (File list)
books/Module 5- Windows & Unix Attacking Techniques.pdf 1.8 MB
books/Module 2- Real World Information Intelligence Techniques .pdf 1.6 MB
books/Module 3- Scanning and Assessment.pdf 1.5 MB
books/Module 6- Windows &Unix Post-Exploitation Techniques.pdf 1.3 MB
books/Module 7- Web Exploitation Techniques .pdf 640.9 KB
books/Module 4- Network Attacking Techniques.pdf 569.9 KB
books/Module 1- Solid Introduction to Penetration Testing .pdf 425.2 KB
books/Module 8- Windows_exploit_development.pdf 337.5 KB
books/Thumbs.db 33.5 KB
Module 1 - Solid Introduction to penetration testing/Module 1 - Solid Introduction to penetration testing.mp4 82.8 MB
Module 1 - Solid Introduction to penetration testing/Module 1 - Solid Introduction to penetration testing_controller.swf 439.9 KB
Module 1 - Solid Introduction to penetration testing/Thumbs.db 12.5 KB
Module 1 - Solid Introduction to penetration testing/swfobject.js 9.5 KB
Module 1 - Solid Introduction to penetration testing/Module 1 - Solid Introduction to penetration testing_config.xml 5.3 KB
Module 1 - Solid Introduction to penetration testing/Module 1 - Solid Introduction to penetration testing.html 3.4 KB
Module 1 - Solid Introduction to penetration testing/expressInstall.swf 0.8 KB
Module 2 - Real World Information Intelligence Techniques/Module 2 - Real World Information Intelligence Techniques.mp4 385.8 MB
Module 2 - Real World Information Intelligence Techniques/Module 2 - Real World Information Intelligence Techniques_controller.swf 439.9 KB
Module 2 - Real World Information Intelligence Techniques/swfobject.js 9.5 KB
Module 2 - Real World Information Intelligence Techniques/Module 2 - Real World Information Intelligence Techniques_config.xml 6.8 KB
Module 2 - Real World Information Intelligence Techniques/Module 2 - Real World Information Intelligence Techniques.html 3.5 KB
Module 2 - Real World Information Intelligence Techniques/expressInstall.swf 0.8 KB
Module 3 - Scanning and vulnerability Assessment/Module 3 - Scanning and vulnerability Assessment.mp4 306.6 MB
Module 3 - Scanning and vulnerability Assessment/Module 3 - Scanning and vulnerability Assessment_controller.swf 439.9 KB
Module 3 - Scanning and vulnerability Assessment/swfobject.js 9.5 KB
Module 3 - Scanning and vulnerability Assessment/Module 3 - Scanning and vulnerability Assessment_config.xml 7.3 KB
Module 3 - Scanning and vulnerability Assessment/Module 3 - Scanning and vulnerability Assessment.html 3.4 KB
Module 3 - Scanning and vulnerability Assessment/expressInstall.swf 0.8 KB
Module 4 - Network Attacking Techniques/Module 4 - Network Attacking Techniques.mp4 119.4 MB
Module 4 - Network Attacking Techniques/Module 4 - Network Attacking Techniques_controller.swf 439.9 KB
Module 4 - Network Attacking Techniques/Thumbs.db 12.0 KB
Module 4 - Network Attacking Techniques/swfobject.js 9.5 KB
Module 4 - Network Attacking Techniques/Module 4 - Network Attacking Techniques_config.xml 5.2 KB
Module 4 - Network Attacking Techniques/Module 4 - Network Attacking Techniques.html 3.3 KB
Module 4 - Network Attacking Techniques/expressInstall.swf 0.8 KB
Module 5 - Windows and Unix Attacking Techniques/Module 5 - Windows and Unix Attacking Techniques.mp4 328.1 MB
Module 5 - Windows and Unix Attacking Techniques/Module 5 - Windows and Unix Attacking Techniques_controller.swf 439.9 KB
Module 5 - Windows and Unix Attacking Techniques/Module 5 - Windows and Unix Attacking Techniques_config.xml 11.3 KB
Module 5 - Windows and Unix Attacking Techniques/swfobject.js 9.5 KB
Module 5 - Windows and Unix Attacking Techniques/Module 5 - Windows and Unix Attacking Techniques.html 3.4 KB
Module 5 - Windows and Unix Attacking Techniques/expressInstall.swf 0.8 KB
Module 6 - Windows and Unix Post Exploitation Techniques/Module 6 - Windows and Unix Post Exploitation Techniques.mp4 285.7 MB
Module 6 - Windows and Unix Post Exploitation Techniques/Module 6 - Windows and Unix Post Exploitation Techniques_controller.swf 439.9 KB
Module 6 - Windows and Unix Post Exploitation Techniques/swfobject.js 9.5 KB
Module 6 - Windows and Unix Post Exploitation Techniques/Module 6 - Windows and Unix Post Exploitation Techniques_config.xml 8.2 KB
Module 6 - Windows and Unix Post Exploitation Techniques/Module 6 - Windows and Unix Post Exploitation Techniques.html 3.5 KB
Module 6 - Windows and Unix Post Exploitation Techniques/expressInstall.swf 0.8 KB
Module 7 - Web Exploitation Techniques/Module 7 - Web Exploitation Techniques.mp4 746.7 MB
Module 7 - Web Exploitation Techniques/Module 7 - Web Exploitation Techniques_controller.swf 439.9 KB
Module 7 - Web Exploitation Techniques/swfobject.js 9.5 KB
Module 7 - Web Exploitation Techniques/Module 7 - Web Exploitation Techniques_config.xml 4.9 KB
Module 7 - Web Exploitation Techniques/Module 7 - Web Exploitation Techniques.html 3.3 KB
Module 7 - Web Exploitation Techniques/expressInstall.swf 0.8 KB
Module 8 - Windows exploit development/Module 8 - Windows exploit development.mp4 367.5 MB
Module 8 - Windows exploit development/Module 8 - Windows exploit development_controller.swf 439.9 KB
Module 8 - Windows exploit development/swfobject.js 9.5 KB
Module 8 - Windows exploit development/Module 8 - Windows exploit development_config.xml 4.8 KB
Module 8 - Windows exploit development/Module 8 - Windows exploit development.html 3.3 KB
Module 8 - Windows exploit development/expressInstall.swf 0.8 KB



  • Torrent indexed: 10 years

  • Torrent updated: Monday 28th of July 2014 05:45:01 AM
  • Torrent hash: B76F6DE41E71DA39FFA1A13A0ABA8C8DF32138EE

  • Torrent size: 2.6 GB

  • Torrent category: other




Comments



Report suspicious or fake torrent



Community - Add torrent to search results - Stats - DMCA - Removal Request - TOR - Contact
BTC: 13uHKcvKFUuJvkmX2XbDuxFHueDoqaeBSi