Computação Forense/Forensic Discovery/tct-blockhash/patchlevel
5B
Computação Forense/Forensic Discovery/tct-blockhash/extras/findkey/.indent.pro
7B
Computação Forense/Forensic Discovery/tct-blockhash/src/misc/.indent.pro
7B
Computação Forense/Forensic Discovery/tct-blockhash/src/pcat/.indent.pro
33B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/floppy.raw
65B
Phyton para hackers/Sessao 2/Saida de Dados.py
70B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/arc
71B
Phyton para hackers/Sessao 2/Modulos.py
77B
Phyton para hackers/Sessao 3/my-math.py
81B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/bsdi
86B
Phyton para hackers/Sessao 2/teste (3).py
87B
Computação Forense/Forensic Discovery/tct-blockhash/src/fstools/.indent.pro
99B
Computação Forense/Forensic Discovery/tct-blockhash/conf/mac_file.headers
107B
Computação Forense/Forensic Discovery/tct-blockhash/lazarus/post-processing/README
114B
Phyton para hackers/Sessao 2/Recursao.py
117B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/mmdf
165B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/pjl
167B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/sc
168B
Phyton para hackers/Sessao 2/Loops.py
168B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/magic
174B
Computação Forense/Forensic Discovery/macjournal/make-redhat73
183B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/convex
186B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/ditroff
190B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/mips
194B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/pdf
196B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/mirage
201B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/pbm
204B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/pkgadd
206B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/Header
212B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/psdbms
220B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/lif
221B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/apl
222B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/java
227B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/typeset
228B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/karma
232B
Phyton para hackers/Sessao 2/Manipulando Arquivos.py
232B
Phyton para hackers/Sessao 2/threading.py
233B
Phyton para hackers/Sessao 3/pyhex.py
236B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/sunraster
238B
Phyton para hackers/Sessao 3/flags.py
250B
Computação Forense/Forensic Discovery/tct-blockhash/exp/tct-net/makedefs
251B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/filesystems
254B
Phyton para hackers/Sessao 3/tcpscan.py
260B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/mkid
263B
Computação Forense/Forensic Discovery/memdecay/doit
265B
Phyton para hackers/Sessao 2/teste (4).py
269B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/interleaf
272B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/terminfo
276B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/chi
286B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/x11
287B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/diff
292B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/sendmail
309B
Computação Forense/Forensic Discovery/tct-blockhash/exp/tct-net/Makefile
309B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/Localstuff
318B
Computação Forense/Forensic Discovery/tct-blockhash/README_BLOCKHASH
348B
Computação Forense/Forensic Discovery/tct-blockhash/lib/dig-sig.pl
357B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/rpm
368B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/rtf
388B
Computação Forense/Forensic Discovery/tct-blockhash/extras/realpath
388B
Computação Forense/Forensic Discovery/tct-blockhash/src/des/rkeys.format
394B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/zilog
395B
Computação Forense/Forensic Discovery/tct-blockhash/lib/rawdev.pl
411B
Computação Forense/Forensic Discovery/tct-blockhash/lib/file_mode.pl
414B
Computação Forense/Forensic Discovery/tct-blockhash/OS-NOTES
415B
Phyton para hackers/Sessao 3/simplesocket.py
418B
Computação Forense/Forensic Discovery/memdump-1.0/convert_size.h
419B
Computação Forense/Forensic Discovery/memdecay/convert_size.h
421B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/lisp
422B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/apple
426B
Computação Forense/Forensic Discovery/memdecay/make_template.h
434B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/cvsimport.sh
438B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/diamond
451B
Computação Forense/Forensic Discovery/tct-blockhash/src/des/misc.c
472B
Phyton para hackers/Sessao 2/thread.py
472B
Computação Forense/Forensic Discovery/tct-blockhash/src/!aux/mymalloc.h
472B
Computação Forense/Forensic Discovery/memdump-1.0/mymalloc.h
472B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/c-lang
473B
Computação Forense/Forensic Discovery/tct-blockhash/TODO.before-next-release
484B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/plus5
494B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/news
500B
Computação Forense/Forensic Discovery/tct-blockhash/lib/print_table.pl
511B
Phyton para hackers/Sessao 3/shellback.py
520B
Computação Forense/Forensic Discovery/tct-blockhash/src/!aux/split_at.h
545B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/varied.out
547B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/zyxel
557B
Computação Forense/Forensic Discovery/tct-blockhash/src/!aux/error.h
563B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/postscript
565B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/ibm6000
580B
Computação Forense/Forensic Discovery/macjournal/README
580B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/bzip
580B
Computação Forense/Forensic Discovery/ncc.pl
621B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/imagen
631B
Computação Forense/Forensic Discovery/tct-blockhash/lib/hostname.pl
641B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/pgp
644B
Computação Forense/Forensic Discovery/tct-blockhash/src/des/benchmark.c
655B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/encore
670B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/ibm370
671B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/gzip
675B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/pdp
694B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/mail.news
698B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/alliant
702B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/timezone
720B
Computação Forense/Forensic Discovery/tct-blockhash/man/man1/md5.1
723B
Computação Forense/Forensic Discovery/tct-blockhash/lib/body_init.pl
729B
Computação Forense/Forensic Discovery/tct-blockhash/src/blocksum/rprobe.c
749B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/motorola
755B
Computação Forense/Forensic Discovery/tct-blockhash/conf/look@first
761B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/sccs
781B
Computação Forense/Forensic Discovery/memdump-1.0/error.h
786B
Computação Forense/Forensic Discovery/memdecay/error.h
786B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/cpio
788B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/rle
794B
Computação Forense/Forensic Discovery/tct-blockhash/lazarus/BUGS
819B
Computação Forense/Forensic Discovery/tct-blockhash/src/!aux/Makefile
824B
Computação Forense/Forensic Discovery/tct-blockhash/src/major_minor/makedefs
827B
Computação Forense/Forensic Discovery/macjournal/macjournal.pl
828B
Computação Forense/Forensic Discovery/tct-blockhash/exp/tct-cron-diff
828B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/blit
829B
Computação Forense/Forensic Discovery/tct-blockhash/src/!aux/global.h
837B
Computação Forense/Forensic Discovery/memdecay/global.h
837B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/sgml
842B
Computação Forense/Forensic Discovery/tct-blockhash/man/man1/timeout.1
849B
Computação Forense/Forensic Discovery/tct-blockhash/lib/savecore.pl
849B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/troff
851B
Computação Forense/Forensic Discovery/tct-blockhash/src/major_minor/Makefile
867B
Computação Forense/Forensic Discovery/tct-blockhash/src/pcat/Makefile
880B
Computação Forense/Forensic Discovery/tct-blockhash/src/des/descert.c
887B
Computação Forense/Forensic Discovery/tct-blockhash/lib/getopts.pl
902B
Computação Forense/Forensic Discovery/tct-blockhash/src/!aux/strerror.c
902B
Computação Forense/Forensic Discovery/tct-blockhash/src/des/Makefile.generic
902B
Computação Forense/Forensic Discovery/tct-blockhash/lib/save_the_files.pl
905B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/vax
914B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/visx
917B
Computação Forense/Forensic Discovery/tct-blockhash/exp/Makefile
924B
Computação Forense/Forensic Discovery/tct-blockhash/src/des/descycle.c
949B
Computação Forense/Forensic Discovery/tct-blockhash/extras/findkey/Makefile
952B
Computação Forense/Forensic Discovery/tct-blockhash/COPYRIGHT
955B
Computação Forense/Forensic Discovery/tct-blockhash/extras/entropy/Makefile
956B
Computação Forense/Forensic Discovery/tct-blockhash/src/des/getpass.c
973B
Computação Forense/Forensic Discovery/tct-blockhash/src/lastcomm/makedefs
977B
Computação Forense/Forensic Discovery/tct-blockhash/lib/tm_misc.pl
982B
Computação Forense/Forensic Discovery/tct-blockhash/src/misc/makedefs
982B
Computação Forense/Forensic Discovery/dump-mem.pl
983B
Computação Forense/Forensic Discovery/memdecay/README
988B
Computação Forense/Forensic Discovery/tct-blockhash/src/pcat/makedefs
990B
Computação Forense/Forensic Discovery/tct-blockhash/lib/system_stubs.pl
991B
Computação Forense/Forensic Discovery/tct-blockhash/src/fstools/makedefs
994B
Computação Forense/Forensic Discovery/tct-blockhash/src/!aux/makedefs
994B
Computação Forense/Forensic Discovery/tct-blockhash/src/blocksum/makedefs
994B
Computação Forense/Forensic Discovery/tct-blockhash/extras/README
1005B
Computação Forense/Forensic Discovery/tct-blockhash/exp/README
1008B
Computação Forense/Forensic Discovery/memdump-1.0/makedefs
1014B
Computação Forense/Forensic Discovery/tct-blockhash/man/man1/major_minor.1
1014B
Computação Forense/Forensic Discovery/memdump-1.0/Makefile
1016B
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/fonts
1019B
Computação Forense/Forensic Discovery/tct-blockhash/src/des/uuencode.c
1020B
Computação Forense/Forensic Discovery/tct-blockhash/src/misc/Makefile
1021B
Computação Forense/Forensic Discovery/tct-blockhash/conf/mac_file.lst
1021B
Computação Forense/Forensic Discovery/tct-blockhash/src/des/Makefile
1KB
Computação Forense/Forensic Discovery/tct-blockhash/lib/date.pl
1.02KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/iff
1.03KB
Computação Forense/Forensic Discovery/tct-blockhash/lazarus/lazarus.damn-the-torpedos
1.05KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/softquad
1.05KB
Computação Forense/Forensic Discovery/README
1.06KB
Computação Forense/Forensic Discovery/tct-blockhash/Beware
1.06KB
Computação Forense/Forensic Discovery/memdecay/Makefile
1.11KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/database
1.12KB
Computação Forense/Forensic Discovery/tct-blockhash/src/fstools/mylseek.c
1.13KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/frame
1.17KB
Computação Forense/Forensic Discovery/tct-blockhash/lib/ostype.pl
1.2KB
Computação Forense/Forensic Discovery/tct-blockhash/lazarus/manifest
1.21KB
Computação Forense/Forensic Discovery/tct-blockhash/additional-resources
1.22KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/unknown
1.24KB
Computação Forense/Forensic Discovery/tct-blockhash/conf/coroner.cf
1.24KB
Computação Forense/Forensic Discovery/memdump-1.0/README
1.24KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/MAINT
1.26KB
Computação Forense/Forensic Discovery/tct-blockhash/src/fstools/fs_buf.c
1.26KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/vms
1.26KB
Computação Forense/Forensic Discovery/tct-blockhash/src/lastcomm/Makefile
1.26KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/uuencode
1.27KB
Computação Forense/Forensic Discovery/tct-blockhash/bin/strip_tct_home
1.28KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/intel
1.29KB
Computação Forense/Forensic Discovery/tct-blockhash/lib/process_dirs.pl
1.3KB
Computação Forense/Forensic Discovery/memdecay/convert_size.c
1.3KB
Computação Forense/Forensic Discovery/memdecay/md5.h
1.31KB
Computação Forense/Forensic Discovery/tct-blockhash/src/!aux/md5.h
1.31KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/sequent
1.32KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/tex
1.35KB
Computação Forense/Forensic Discovery/memdump-1.0/convert_size.c
1.37KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/LEGAL.NOTICE
1.39KB
Computação Forense/Forensic Discovery/tct-blockhash/src/blocksum/Makefile
1.4KB
Computação Forense/Forensic Discovery/tct-blockhash/src/des/getopt.c
1.4KB
Computação Forense/Forensic Discovery/tct-blockhash/lazarus/TODO
1.42KB
Computação Forense/Forensic Discovery/tct-blockhash/src/!aux/split_at.c
1.44KB
Computação Forense/Forensic Discovery/tct-blockhash/conf/save_these_files
1.45KB
Computação Forense/Forensic Discovery/macjournal/ripdebugfs.pl
1.49KB
Computação Forense/Forensic Discovery/tct-blockhash/src/des/descalc.c
1.5KB
Computação Forense/Forensic Discovery/tct-blockhash/src/des/des.1
1.5KB
Computação Forense/Forensic Discovery/tct-blockhash/man/man1/des.1
1.5KB
Computação Forense/Forensic Discovery/tct-blockhash/quick-start
1.53KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/iris
1.53KB
Computação Forense/Forensic Discovery/tct-blockhash/src/des/uudecode.c
1.61KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/ncr
1.65KB
Computação Forense/Forensic Discovery/tct-blockhash/man/man1/icat.1
1.65KB
Computação Forense/Forensic Discovery/memdecay/plot-average100.pl
1.65KB
Computação Forense/Forensic Discovery/tct-blockhash/src/major_minor/major_minor.c
1.67KB
Computação Forense/Forensic Discovery/tct-blockhash/src/des/testdata
1.69KB
Computação Forense/Forensic Discovery/tct-blockhash/bibliography
1.7KB
Computação Forense/Forensic Discovery/tct-blockhash/lib/misc.pl
1.71KB
Computação Forense/Forensic Discovery/memdump-1.0/mymalloc.c
1.72KB
Computação Forense/Forensic Discovery/tct-blockhash/src/!aux/mymalloc.c
1.73KB
Computação Forense/Forensic Discovery/tct-blockhash/src/misc/md5.c
1.74KB
Computação Forense/Forensic Discovery/tct-blockhash/man/man1/blocksum.1
1.74KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Makefile.freebsd
1.77KB
Computação Forense/Forensic Discovery/tct-blockhash/lib/suck_table.pl
1.8KB
Computação Forense/Forensic Discovery/memdecay/plot-multi100.pl
1.81KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/elf
1.82KB
Computação Forense/Forensic Discovery/macdns.pl
1.83KB
Computação Forense/Forensic Discovery/tct-blockhash/man/man1/ramhash.1
1.85KB
Computação Forense/Forensic Discovery/tct-blockhash/man/man5/tm-format.5
1.86KB
Computação Forense/Forensic Discovery/memdecay/make_template.c
1.86KB
Computação Forense/Forensic Discovery/tct-blockhash/extras/entropy/entropy.1
1.87KB
Computação Forense/Forensic Discovery/checkpid.pl
1.91KB
Computação Forense/Forensic Discovery/tct-blockhash/src/des/des.3
1.91KB
Computação Forense/Forensic Discovery/tct-blockhash/conf/paths.pl
1.91KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/animation
1.97KB
Computação Forense/Forensic Discovery/tct-blockhash/man/man1/unrm.1
1.98KB
Computação Forense/Forensic Discovery/tct-blockhash/src/des/README
2KB
Computação Forense/Forensic Discovery/tct-blockhash/src/lastcomm/sys_defs.h
2.01KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/clipper
2.04KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/international.c
2.06KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/international.c.freebsd
2.06KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/printer
2.1KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/microsoft
2.11KB
Computação Forense/Forensic Discovery/tct-blockhash/src/fstools/fs_inode.c
2.11KB
Computação Forense/Forensic Discovery/tct-blockhash/lazarus/post-processing/rip-mail.README
2.12KB
Computação Forense/Forensic Discovery/tct-blockhash/conf/lazarus.cf
2.17KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/linux
2.18KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/is_tar.c
2.21KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/names.h
2.25KB
Computação Forense/Forensic Discovery/tct-blockhash/src/lastcomm/struct.h
2.25KB
Computação Forense/Forensic Discovery/tct-blockhash/src/fstools/Makefile
2.25KB
Computação Forense/Forensic Discovery/tct-blockhash/exp/tct-net/tct-send.c
2.27KB
Computação Forense/Forensic Discovery/tct-blockhash/lib/logger.pl
2.31KB
Computação Forense/Forensic Discovery/tct-blockhash/lib/datez.pl
2.31KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/ispell
2.36KB
Computação Forense/Forensic Discovery/tct-blockhash/Makefile
2.43KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/dump
2.52KB
Computação Forense/Forensic Discovery/tct-blockhash/README.FIRST
2.53KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Makefile
2.53KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/audio
2.54KB
Computação Forense/Forensic Discovery/tct-blockhash/src/misc/timeout.c
2.54KB
Computação Forense/Forensic Discovery/tct-blockhash/lib/proc.pl
2.55KB
Computação Forense/Forensic Discovery/tct-blockhash/lib/suck_free_inodes.pl
2.55KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/ms-dos
2.65KB
Computação Forense/Forensic Discovery/tct-blockhash/man/man1/fshash.1
2.72KB
Computação Forense/Forensic Discovery/tct-blockhash/man/man1/pcat.1
2.73KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/compress.c
2.75KB
Computação Forense/Forensic Discovery/tct-blockhash/lib/is_able.pl
2.77KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/sun
2.78KB
Computação Forense/Forensic Discovery/tct-blockhash/src/fstools/icat.c
2.79KB
Computação Forense/Forensic Discovery/tct-blockhash/src/fstools/fs_io.c
2.82KB
Computação Forense/Forensic Discovery/tct-blockhash/man/man1/mactime.1
2.83KB
Computação Forense/Forensic Discovery/tct-blockhash/man/man1/swaphash.1
2.84KB
Computação Forense/Forensic Discovery/macjournal/logdump.c.diff
2.85KB
Computação Forense/Forensic Discovery/tct-blockhash/exp/tct-cron
2.87KB
Computação Forense/Forensic Discovery/tct-blockhash/docs/mac.README
2.95KB
Computação Forense/Forensic Discovery/tct-blockhash/man/man1/fssum.1
2.97KB
Computação Forense/Forensic Discovery/tct-blockhash/extras/findkey/findkey.1
3KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/freebsd
3KB
Computação Forense/Forensic Discovery/tct-blockhash/MANIFEST
3KB
Computação Forense/Forensic Discovery/tct-blockhash/exp/tct-cron-mem-128-4k
3KB
Computação Forense/Forensic Discovery/memdecay/memdecay.1
3.03KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/compress
3.04KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/ar
3.06KB
Computação Forense/Forensic Discovery/tct-blockhash/exp/tct-net/tct-receive.c
3.09KB
Computação Forense/Forensic Discovery/tct-blockhash/lib/vault_cp.pl
3.12KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/commands
3.19KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/PORTING
3.21KB
Computação Forense/Forensic Discovery/memdump-1.0/memdump.1
3.21KB
Computação Forense/Forensic Discovery/tct-blockhash/exp/tct-cron-block-128
3.24KB
Computação Forense/Forensic Discovery/tct-blockhash/conf/grave-robber.cf
3.26KB
Computação Forense/Forensic Discovery/tct-blockhash/lib/maj_min_walk.pl
3.28KB
Computação Forense/Forensic Discovery/tct-blockhash/lib/realpath.pl
3.34KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/ascmagic.c
3.39KB
Computação Forense/Forensic Discovery/tct-blockhash/INSTALL
3.4KB
Computação Forense/Forensic Discovery/tct-blockhash/extras/ils2mac
3.46KB
Computação Forense/Forensic Discovery/memdump-1.0/error.c
3.57KB
Computação Forense/Forensic Discovery/memdecay/error.c
3.59KB
Computação Forense/Forensic Discovery/tct-blockhash/src/!aux/error.c
3.59KB
Computação Forense/Forensic Discovery/tct-blockhash/src/des/radlogin.c
3.59KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/patchlevel.h
3.62KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/README
3.68KB
Computação Forense/Forensic Discovery/tct-blockhash/man/man1/ils.1
3.68KB
Computação Forense/Forensic Discovery/tct-blockhash/src/fstools/fs_copy_file.c
3.74KB
Computação Forense/Forensic Discovery/tct-blockhash/src/des/main.c
3.84KB
Computação Forense/Forensic Discovery/tct-blockhash/lib/trust.pl
3.88KB
Computação Forense/Forensic Discovery/tct-blockhash/src/fstools/fs_open.c
3.98KB
Computação Forense/Forensic Discovery/tct-blockhash/src/lastcomm/lastcomm.1.freebsd
4.28KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/sgi
4.3KB
Computação Forense/Forensic Discovery/tct-blockhash/src/fstools/unrm.c
4.31KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/print.c
4.33KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/file.h
4.34KB
Computação Forense/Forensic Discovery/tct-blockhash/TODO
4.39KB
Computação Forense/Forensic Discovery/tct-blockhash/man/man1/lazarus.1
4.5KB
Computação Forense/Forensic Discovery/tct-blockhash/lib/capture.pl
4.68KB
Computação Forense/Forensic Discovery/tct-blockhash/lib/command.pl
4.84KB
Computação Forense/Forensic Discovery/tct-blockhash/exp/ramhash
4.99KB
Computação Forense/Forensic Discovery/tct-blockhash/lib/crunch.pl
5.03KB
Computação Forense/Forensic Discovery/tct-blockhash/extras/entropy/entropy.c
5.08KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/tar.h
5.13KB
Computação Forense/Forensic Discovery/tct-blockhash/src/blocksum/blocksum.c
5.21KB
Computação Forense/Forensic Discovery/tct-blockhash/src/lastcomm/lastcomm.1
5.24KB
Computação Forense/Forensic Discovery/tct-blockhash/man/man1/lastcomm.1
5.24KB
Computação Forense/Forensic Discovery/tct-blockhash/lib/chk_binaries.pl
5.32KB
Computação Forense/Forensic Discovery/tct-blockhash/reconfig
5.58KB
Computação Forense/Forensic Discovery/tct-blockhash/lib/tree.pl
5.74KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/magic.5
5.88KB
Computação Forense/Forensic Discovery/tct-blockhash/man/man5/magic.5
5.88KB
Computação Forense/Forensic Discovery/tct-blockhash/docs/grave-robber.README
6.12KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/netbsd
6.26KB
Computação Forense/Forensic Discovery/tct-blockhash/lazarus/post-processing/rip-mail
6.33KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/hp
6.41KB
Computação Forense/Forensic Discovery/tct-blockhash/src/lastcomm/lastcomm.1.diff
6.43KB
Computação Forense/Forensic Discovery/tct-blockhash/exp/fshash
6.44KB
Computação Forense/Forensic Discovery/tct-blockhash/man/man1/grave-robber.1
6.53KB
Computação Forense/Forensic Discovery/tct-blockhash/lib/linux.pl
6.77KB
Computação Forense/Forensic Discovery/tct-blockhash/docs/design-notes
6.82KB
Computação Forense/Forensic Discovery/tct-blockhash/src/lastcomm/lastcomm.c.freebsd
7.02KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/Magdir/archive
7.41KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/file.c
7.57KB
Computação Forense/Forensic Discovery/tct-blockhash/src/blocksum/fssum.c
7.62KB
Computação Forense/Forensic Discovery/tct-blockhash/src/fstools/fs_tools.h
7.87KB
Computação Forense/Forensic Discovery/tct-blockhash/exp/swaphash
8.29KB
Computação Forense/Forensic Discovery/tct-blockhash/lib/bsd.pl
8.29KB
Computação Forense/Forensic Discovery/tct-blockhash/src/fstools/ils.c
8.51KB
Computação Forense/Forensic Discovery/tct-blockhash/extras/findkey/findkey.c
8.74KB
Computação Forense/Forensic Discovery/tct-blockhash/extras/bdf
8.77KB
Computação Forense/Forensic Discovery/tct-blockhash/lib/solaris.pl
9.1KB
Computação Forense/Forensic Discovery/tct-blockhash/docs/README
9.36KB
Computação Forense/Forensic Discovery/tct-blockhash/lib/sunos.pl
9.61KB
Computação Forense/Forensic Discovery/tct-blockhash/src/!aux/md5c.c
10.18KB
Computação Forense/Forensic Discovery/memdecay/md5c.c
10.18KB
Computação Forense/Forensic Discovery/tct-blockhash/help-recovering-file
10.23KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/softmagic.c
10.36KB
Computação Forense/Forensic Discovery/tct-blockhash/lib/pass.cache.pl
10.83KB
Computação Forense/Forensic Discovery/tct-blockhash/man/man1/file.1
11.52KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/file.1
11.52KB
Computação Forense/Forensic Discovery/memdump-1.0/memdump.c
11.58KB
Computação Forense/Forensic Discovery/memdecay/LICENSE
11.67KB
Computação Forense/Forensic Discovery/tct-blockhash/LICENSE
11.67KB
Computação Forense/Forensic Discovery/memdump-1.0/LICENSE
11.67KB
Computação Forense/Forensic Discovery/tct-blockhash/src/file/apprentice.c
11.81KB
Computação Forense/Forensic Discovery/tct-blockhash/src/fstools/ffs.c
12.48KB
Computação Forense/Forensic Discovery/tct-blockhash/src/des/des.c
13.07KB
Computação Forense/Forensic Discovery/tct-blockhash/help-when-broken-into
14.79KB
Computação Forense/Forensic Discovery/tct-blockhash/src/fstools/ext2fs.c
15.01KB
Computação Forense/Forensic Discovery/tct-blockhash/docs/lazarus.README
15.71KB
Computação Forense/Forensic Discovery/memdecay/memdecay.c
15.89KB
Computação Forense/Forensic Discovery/tct-blockhash/lib/ps_spy.pl
17.19KB
Computação Forense/Forensic Discovery/tct-blockhash/bin/mactime
21.1KB
Computação Forense/Computer Forensics and Data Recovery FAQ.pdf
25.1KB
Computação Forense/Forensic Discovery/tct-blockhash/CHANGES
25.63KB
Computação Forense/Computer Forensics.pdf
27.99KB
Computação Forense/Forensic Discovery/tct-blockhash/src/pcat/pcat.c
28.04KB
Computação Forense/file.pdf
28.37KB
Computação Forense/Perícia Forense Aplicada a Informática.pdf
28.37KB
Perícia Forense Aplicada a Informática.pdf
28.37KB
Computação Forense/Forensic Discovery/tct-blockhash/lazarus/lazarus
30.64KB
Computação Forense/2001-WSeg-flavio.oliveira-marcelo.reis-forense.pdf
56.26KB
Computação Forense/Forense Computacional - Aspectos Legais e Padronização.pdf
56.26KB
Conceitos para Perícia Forense Computacional.pdf
70.27KB
Computação Forense/Conceitos para Perícia Forense Computacional.pdf
70.27KB
Phyton para hackers/Sessao 1/Apresenta-o.pdf
80.79KB
Computação Forense/Computer Forensics - Past Present Future.pdf
107.65KB
Computação Forense/Computer Forensics - Technical Procedure Manual.pdf
109.52KB
Best Practices for Computer Forensics.pdf
124.97KB
Computação Forense/Best Practices for Computer Forensics.pdf
124.97KB
Computação Forense/Curso_ Forense Digital Toolkit/FDTK - Slide 5 - Ferramentas Open Source.pdf
131.84KB
Computação Forense/Curso_ Forense Digital Toolkit/FDTK - Slide 7 - Caso I.pdf
143.98KB
Computação Forense/Ciência Forense das Origens à Ciência Forense Computacional.pdf
145.91KB
Ciência Forense das Origens à Ciência Forense Computacional.pdf
145.91KB
Computação Forense/Common Phases of Computer Forensics Investigation Models.pdf
155.46KB
Ensino forense.pdf
171.59KB
ensino-forense.pdf
171.59KB
Computação Forense/ensino-forense.pdf
171.59KB
Computação Forense/Ensino forense.pdf
171.59KB
Computação Forense/Curso_ Forense Digital Toolkit/FDTK - Slide 3 - Laboratório Forense & Investigação Forense.pdf
193.04KB
Computação Forense/Forensic Discovery/tct-blockhash/Date/Manip.pm
194.52KB
Computação Forense/Introduction to Computer Forensics.pdf
200.44KB
Computação Forense/Computer Forensics - The Need for Standardization and Certification.pdf
249.73KB
Computação Forense/Cross-examination of the Computer Forensics Expert.pdf
251.75KB
Perícia Forense Aplicada à Informática.pdf
273.67KB
Computação Forense/Perícia Forense Aplicada à Informática.pdf
273.67KB
Computação Forense/monografia_forense.pdf
274.24KB
Desvendando a Computação Forense.pdf
290.89KB
Computação Forense/Desvendando a Computação Forense.pdf
290.89KB
Computação Forense/Utilização de Técnicas Anti-Forenses para Garantir a Confidencialidade.pdf
296.4KB
Utilização de Técnicas Anti-Forenses para Garantir a Confidencialidade.pdf
296.4KB
Computação Forense/Curso_ Forense Digital Toolkit/FDTK - Slide 2 - Conceitos & Legislação.pdf
313.24KB
Computação Forense/Basic Computer Forensic Concept.pdf
321.09KB
Computação Forense/Multimedia Forensics Is Not Computer Forensics.pdf
333.49KB
Phyton para hackers/Sessao 1/1. Instrutor Weidsom Nascimento.mp4
387.63KB
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
Pericia_Forense_Computacional_ataques.pdf
415.36KB
Computação Forense/Pericia_Forense_Computacional_ataques.pdf
415.36KB
Computação Forense/Forense Computacional Meditas Preventivas.pdf
415.36KB
Computação Forense/Computer Forensics In Forensis.pdf
431.58KB
Computação Forense/Auditoria em Informatica.pdf
431.68KB
Auditoria em Informatica.pdf
431.68KB
Computação Forense/Computer Forensics - Collection Analysis and Case Management using ProDiscover.pdf
438.08KB
Computação Forense/Computer Forensics - Analysis in a Virtual Environment.pdf
447.31KB
Computação Forense/Técnicas e Ferramentas Utilizadas em Análise Forense.pdf
466.97KB
Técnicas e Ferramentas Utilizadas em Análise Forense.pdf
466.97KB
Computação Forense/Perícia Forense Computacional - GSEC.pdf
513.57KB
Perícia Forense Computacional - GSEC.pdf
513.57KB
Computação Forense/Pericia Forense Computacional.pdf
513.57KB
Pericia Forense Computacional.pdf
513.57KB
Computação Forense/Modern Anti Forensics - A Systems Disruption Approach.pdf
555.12KB
Computação Forense/Anti-Forensics - The Rootkit Connection.pdf
596.44KB
Técnicas Antiforenses em Desktops.pdf
612.2KB
Computação Forense/Técnicas Antiforenses em Desktops.pdf
612.2KB
Computação Forense/Curso_ Forense Digital Toolkit/FDTK - Slide 4 - Investigação Forense II.pdf
625.55KB
Computação Forense/Forense - Digital & Computacional.pdf
637.18KB
Computação Forense/Forense Computacional com Software Livre.pdf
670.39KB
Computação Forense/Forensic Examination of Digital Evidence - A Guide for Law Enforcement.pdf
678.25KB
Computação Forense/Anti-Análise Forense.pdf
719.34KB
Computação Forense/Footprinting and Scanning.pdf
801.54KB
Computação Forense/Forensic Analysis of VMware Hard Disks.pdf
819.47KB
Phyton para hackers/Sessao 3/43. Conclusão.mp4
874.06KB
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
Computação Forense/Análise Pericial.pdf
1001.17KB
Computação Forense/Curso_ Forense Digital Toolkit/FDTK - Slide 8 - Caso I.pdf
1021.32KB
Perícia em Informática.pdf
1MB
Computação Forense/Perícia em Informática.pdf
1MB
Análise de Ferramentas Forenses de Recuperação de Dados.pdf
1.05MB
Computação Forense/Análise de Ferramentas Forenses de Recuperação de Dados.pdf
1.05MB
Computação Forense/projetofinal_fred.pdf
1.06MB
projetofinal_fred.pdf
1.06MB
Computação Forense/Análise Forense de Intrusões em Sistemas Computacionais Técnicas, Procedimentos e Ferramentas.pdf
1.07MB
Análise Forense de Intrusões em Sistemas Computacionais Técnicas, Procedimentos e Ferramentas.pdf
1.07MB
Computação Forense/Forense Computacional.pdf
1.23MB
Computação Forense/Forense Computacional - PET.pdf
1.23MB
Computação Forense/Forense computacional e sua aplicção em segurança imunológica.pdf
1.38MB
Computação Forense/Forense Computacional e sua Aplicação em Segurança Imunológica.pdf
1.38MB
Phyton para hackers/Sessao 1/3. Segurança computacional.mp4
1.57MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
Computação Forense/Aspectos Gerais da Forense.pdf
1.63MB
Boas Práticas para Perícia Forense.pdf
1.63MB
Computação Forense/Boas Práticas para Perícia Forense.pdf
1.63MB
Computação Forense/Boas Práticas para a Perícia Forense.pdf
1.63MB
Boas Práticas para a Perícia Forense.pdf
1.63MB
Phyton para hackers/Sessao 3/27. Funções para criação de pacotes.mp4
1.67MB
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
Computação Forense/FOSS Digital Forensics.pdf
1.77MB
Computação Forense/An Exercise In Practical Computer Forensic Analysis.pdf
1.88MB
Phyton para hackers/Sessao 3/38. Introdução a sockets.mp4
1.94MB
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
csi-analise-forense-de-documentos-digitais-menor.pdf
1.94MB
Computação Forense/csi-analise-forense-de-documentos-digitais-menor.pdf
1.94MB
Computação Forense/Anti-Forensics - Techniques Detection and Countermeasures.pdf
2.26MB
Computação Forense/Curso_ Reasoning for Complex Data (RECOD)/14 - File Carving.pdf
2.38MB
Phyton para hackers/Sessao 3/29. Pacote TCP básico.mp4
2.39MB
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
Práticas Anti-Forense - Um Estudo de seus Impactos na Forense Computacional.pdf
2.43MB
Computação Forense/Práticas Anti-Forense - Um Estudo de seus Impactos na Forense Computacional.pdf
2.43MB
Computação Forense/Curso_ Reasoning for Complex Data (RECOD)/06 - Identificação de Scanners e Impressoras.pdf
2.51MB
Hacker Security Aula/Módulo 1/Módulo 01 - 04 Kali Linux Sucessor do Back Track.mp4
2.52MB
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
Computação Forense/Curso_ Reasoning for Complex Data (RECOD)/12 - Deteccao de Spoofing.pdf
2.55MB
Computação Forense/Forense Computacional - Fundamentos, Tecnologias e Desafios Atuais.pdf
2.59MB
Computação Forense/Forense Computacional - Fundamentos, Tecnologias e Desafios Atuais (1).pdf
2.59MB
Phyton para hackers/Sessao 3/26. Funções de alto nível do scapy.mp4
2.72MB
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
Jocildo Correia Neto - Decisões de Investimentos em Tecnologia Da Informação. Vencendo os Desafios Da Avaliação de Projetos em TI.pdf
2.91MB
Computação Forense/Computer Forensics Computer Crime Scene Investigation 2nd Ed.pdf
2.97MB
Computação Forense/Curso_ Forense Digital Toolkit/FDTK - Slide 6 - Ferramentas Open Source - Continuação.pdf
2.97MB
Hacker Security Aula/Módulo 1/Módulo 01 - 03 Devo Usar Kali Linux.mp4
3.28MB
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
Computação Forense/Computação Forense.pdf
3.34MB
Computação Forense/Computacao Forense.pdf
3.34MB
Computação Forense.pdf
3.34MB
Computacao Forense.pdf
3.34MB
Hacker Security Aula/Módulo 1/Módulo 01 - 05 Debian ou Kali Linux.mp4
3.38MB
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
Phyton para hackers/Sessao 3/42. Python http server.mp4
3.38MB
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
Phyton para hackers/Sessao 3/24. Instalação do scapy.mp4
3.56MB
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
Computação Forense/Curso_ Reasoning for Complex Data (RECOD)/03 - Conceitos Importantes.pdf
3.78MB
Hacker Security Aula/Módulo 02/Módulo 02 - 07 Virtualização.mp4
3.79MB
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
Phyton para hackers/Sessao 2/13. Tuplas.mp4
3.81MB
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
Computação Forense/Curso_ Forense Digital/1. Investigation Procedures and Response.pdf
3.84MB
Computação Forense/Non Classical Computer Forensics.pdf
3.85MB
Phyton para hackers/Sessao 1/2. Instrutor Marcos Castro.mp4
3.92MB
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
Perícia Forense em Web Browsers.pdf
4.04MB
Computação Forense/Perícia Forense em Web Browsers.pdf
4.04MB
Computação Forense/Curso_ Reasoning for Complex Data (RECOD)/04 - Conceitos Importantes.pdf
4.13MB
Computação Forense/Computer Forensics - Procedures and Methods.pdf
4.14MB
Phyton para hackers/Sessao 3/30. Enviando um Payload TCP.mp4
4.32MB
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
Phyton para hackers/Sessao 2/16. Criando funções.mp4
4.45MB
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
Phyton para hackers/Sessao 3/33. Traceroute.mp4
4.51MB
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
Computação Forense/Incident Response Computer Forensics Toolkit.pdf
4.73MB
Computação Forense/Curso_ Reasoning for Complex Data (RECOD)/02 - Analise Forense de Documentos.pdf
4.75MB
Computação Forense/Anti-Forensics and Anti-Anti-Forensics.pdf
4.98MB
Computação Forense/Computer Forensics - A Pocket Guide.pdf
5.19MB
Computação Forense/Curso_ Forense Digital/5. Investigating Wireless Networks and Devices.pdf
5.34MB
Computação Forense/Curso_ Reasoning for Complex Data (RECOD)/10 - Info Hiding- Tpes and Applications.pdf
5.37MB
Phyton para hackers/Sessao 2/14. Dicionários.mp4
5.65MB
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
Phyton para hackers/Sessao 3/28. Criando o primeiro pacote.mp4
5.77MB
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
Computação Forense/Low Down and Diry - Anti-Forensic Rootkits.pdf
5.85MB
Phyton para hackers/Sessao 2/15. Conjuntos.mp4
5.86MB
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
Phyton para hackers/Sessao 2/6. Saída de dados.mp4
6.06MB
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
Computação Forense/Curso_ Reasoning for Complex Data (RECOD)/11 - Steganography Past Present and Future.pdf
6.08MB
Hacker Security Aula/Módulo 1/Módulo 01 - 02 O que é Kali Linux.mp4
6.25MB
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
Phyton para hackers/Sessao 2/8. Entrada de dados.mp4
6.3MB
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
Computação Forense/Curso_ Reasoning for Complex Data (RECOD)/07 - Deteccao de Copia e Colagem.pdf
6.37MB
Computação Forense/Visual Forensic Analysis and Reverse Engineering of Binary Data.pdf
6.62MB
Computação Forense/FDTK - Slide 1 - Introdução.pdf
6.9MB
FDTK - Slide 1 - Introdução.pdf
6.9MB
Computação Forense/Curso_ Forense Digital Toolkit/FDTK - Slide 1 - Introdução.pdf
6.9MB
Computação Forense/Curso_ Reasoning for Complex Data (RECOD)/08 - Inconsistências do Processo de Aquisição.pdf
7.17MB
Phyton para hackers/Sessao 3/36. Criando programa tcpscan.mp4
7.34MB
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
Phyton para hackers/Sessao 2/5. Utilizando variáveis.mp4
7.45MB
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
Phyton para hackers/Sessao 3/35. Criando programa flags.mp4
7.45MB
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
Phyton para hackers/Sessao 3/37. Criando programa pyhex.mp4
7.61MB
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
Computação Forense/First Responders - Guide to Computer Forensics.pdf
7.69MB
Phyton para hackers/Sessao 3/39. Criando shell-backdoor - Parte 1.mp4
7.95MB
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
Perícia Forense Computacional - SegInfo.pdf
8.09MB
Computação Forense/Perícia Forense Computacional - SegInfo.pdf
8.09MB
Computação Forense/Curso_ Reasoning for Complex Data (RECOD)/13 - Deteccao Splicing.pdf
8.18MB
Computação Forense/Curso_ Reasoning for Complex Data (RECOD)/05 - Analise Forense de Documentos.pdf
8.33MB
Phyton para hackers/Sessao 3/32. Escrevendo arquivos pcap.mp4
8.49MB
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
Phyton para hackers/Sessao 2/10. Tomando decisões.mp4
8.52MB
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
Phyton para hackers/Sessao 2/23. Funções anônimas.mp4
8.86MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
Hacker Security Aula/Módulo 1/Módulo 01 - 06 Porque Kali Linux.mp4
9.09MB
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
Phyton para hackers/Sessao 2/11. Loops.mp4
9.2MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
Computação Forense/Curso_ Reasoning for Complex Data (RECOD)/15 - Phylogeny.pdf
9.43MB
Phyton para hackers/Sessao 2/22. Threads - Módulo threading.mp4
10.1MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
Computação Forense/Curso_ Forense Digital/2. Investigating Hard Disks, File and Operating Systems.pdf
10.28MB
Phyton para hackers/Sessao 3/34. Traceroute mais avançado.mp4
10.49MB
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
Phyton para hackers/Sessao 3/41. Criando programa para enviar payload.mp4
11.4MB
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
Phyton para hackers/Sessao 2/9. Manipulando arquivos.mp4
11.45MB
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
Phyton para hackers/Sessao 2/4. Preparando o Ambiente.mp4
11.45MB
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
Computação Forense/Computer Forensics For Dummies.pdf
11.56MB
Computação Forense/Hacking Exposed - Computer Forensics Second Edition.pdf
11.62MB
Hacker Security Aula/Módulo 02/Módulo 02 - 08 Instalação Virtual Box.mp4
11.83MB
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
Phyton para hackers/Sessao 2/19. Recursão.mp4
12.17MB
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
Phyton para hackers/Sessao 2/12. Listas.mp4
12.17MB
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
Phyton para hackers/Sessao 2/7. Operadores.mp4
12.2MB
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
Teste de Invasão.pdf
12.26MB
Phyton para hackers/Sessao 3/40. Criando shell-backdoor - Parte 2.mp4
12.56MB
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
Hacker Security Aula/Módulo 06/Módulo 06 - 32 Instalando Mestasploitable.avi
13.48MB
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
Phyton para hackers/Sessao 2/21. Threads - Módulo _thread.mp4
14.18MB
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
Phyton para hackers/Sessao 2/18. Criando módulos.mp4
15.19MB
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
Hacker Security Aula/Módulo 07/Módulo 07 - 33 Iniciando com o Metasploit.avi
15.95MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
Hacker Security Aula/Módulo 04/Módulo 04 - 23 Dando Permissão aos Usuarios.avi
16.19MB
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
Criptografia e Segurança de Redes - 6ª Ed. 2014.pdf
16.22MB
Phyton para hackers/Sessao 2/20. Threads - Teoria.mp4
16.87MB
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
Hacker Security Aula/Módulo 04/Módulo 04 - 24 Diferença Entre su e sudo.avi
17.05MB
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
Hacker Security Aula/Módulo 05/Módulo 05 - 26 Permissões de Arquivos.avi
17.06MB
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
Computação Forense/Curso_ Forense Digital/3. Investigating Data and Image Files.pdf
17.4MB
Phyton para hackers/Sessao 2/17. Criando classes.mp4
17.42MB
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
Computação Forense/Curso_ Reasoning for Complex Data (RECOD)/16 - Pornografia e Violencia.pdf
17.61MB
Hacker Security Aula/Módulo 06/Módulo 06 - Instalando Windows XP.avi
17.98MB
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
Phyton para hackers/Sessao 3/25. Funções de baixo nível do scapy.mp4
19.72MB
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
Computação Forense/Curso_ Forense Digital/4. Investigating Network Intrusions and Cybercrime.pdf
23.99MB
Hacker Security Aula/Módulo 02/Módulo 02 - 12 Configurando Backup Kali Linux.avi
24.09MB
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
Hacker Security Aula/Módulo 02/Módulo 02 - 08 Instalação Virtual Box.avi
24.59MB
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
Hacker Security Aula/Módulo 04/Módulo 04 - 22 Criação de Usuarios.avi
25.32MB
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
Hacker Security Aula/Módulo 02/Módulo 02 - 10 - Configurando Virtualbox.avi
25.86MB
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
Phyton para hackers/Sessao 3/31. Lendo arquivos pcap.mp4
25.94MB
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
Computação Forense/Curso_ Reasoning for Complex Data (RECOD)/01 - Analise Forense de Documentos.pdf
27.4MB
Hacker Security Aula/Módulo 07/Módulo 07 - 41 Backdoor+Run Persistence.avi
29.81MB
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
Hacker Security Aula/Módulo 05/Módulo 05 - 27 Filtragem de String e Instalçao TOR.avi
30.1MB
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
Hacker Security Aula/Módulo 07/Módulo 07 - 42 Criando Backdoor Para Android.mp4
31.42MB
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
Hacker Security Aula/Módulo 06/Módulo 06 - 30 Instalando Windows 7.avi
32.06MB
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
Hacker Security Aula/Módulo 07/Módulo 07 - 40 Como Transformar um Backdoor em Trojan.avi
32.76MB
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
Hacker Security Aula/Módulo 05/Módulo 05 - 28 Serviços Linux.avi
33.85MB
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
Hacker Security Aula/Módulo 06/Módulo 06 - 31 Instalando Android.avi
33.92MB
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
Hacker Security Aula/Módulo 02/Módulo 02 - 13 Clonando VM.avi
35.83MB
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
Hacker Security Aula/Módulo 02/Módulo 02 - 15 Kali Linux pelo pendrive(prt1).avi
36.87MB
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
Hacker Security Aula/Módulo 05/Módulo 05 - 25 Criando arquivos e diretórios.avi
39.07MB
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
Hacker Security Aula/Módulo 07/Módulo 07 - 39 Criando Backdoor e burlando bypass.avi
40.99MB
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
Hacker Security Aula/Módulo 03/Módulo 03 - 18 Comandos Básicos Kali Linux.avi
42.75MB
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
Hacker Security Aula/Módulo 03/Módulo 03 - 21 FHS(Sistema de Arquivos) #Final.avi
44.59MB
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
Hacker Security Aula/Módulo 03/Módulo 03 - 20 Trabalhando com Pacotes.avi
47.66MB
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
Hacker Security Aula/Módulo 07/Módulo 07 - 36 Aprendendo sobre o NMAP.avi
49.14MB
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
Hacker Security Aula/Módulo 02/Módulo 02 - 14 Pasta Compartilhada e tela cheia.avi
49.17MB
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
Hacker Security Aula/Módulo 02/Módulo 02 - 17 Dando uma geral (final).avi
49.17MB
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
Hacker Security Aula/Módulo 07/Módulo 07 - 38 Nmap+Metasploit.avi
55.25MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
Hacker Security Aula/Módulo 03/Módulo 03 - 19 Editores de Texto.avi
58.57MB
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
Hacker Security Aula/Módulo 07/Módulo 07 - 34~35 Explorando Win XP.avi
60.38MB
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
Hacker Security Aula/Módulo 02/Módulo 02 - 09 Instalação Kali Linux.avi
76.43MB
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
Hacker Security Aula/Módulo 02/Módulo 02 - 11 Atualizando Sistema e Programa.avi
76.76MB
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
Hacker Security Aula/Módulo 07/Módulo 07 - 37 Aprendendo sobre NMAP prt2.avi
94.29MB
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
Segurança de Computadores e Teste de Invasão.pdf
114.32MB