[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/03_alternative-protocol.mp4
58.97MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/04_network-scanning.en.srt
29.66KB
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity.en.txt
1.77KB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/05_network-sniffing.mp4
40.04MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/03_alternative-protocol.en.srt
38.97KB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/05_network-sniffing.en.srt
31.71KB
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/04_python-for-cybersecurity-resources_Python_for_Cybersecurity_Handout.pdf
25.04KB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/03_user-account-discovery.en.srt
22.18KB
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/03_alternative-protocol.en.txt
20.48KB
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/03_encrypted-channel.en.srt
20.01KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/05_protocol-decoding.en.srt
19.93KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/07_behavioral-analytics.en.srt
19.81KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/05_system-activity-monitoring.en.srt
19.7KB
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/06_dns-exploration.en.srt
19.6KB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/03_logon-scripts.en.srt
19.05KB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/05_hijacked-execution-flow.en.srt
18.06KB
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_mitre-att-ck-exfiltration.en.txt
2.68KB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/03_registry-autorun.en.srt
17.92KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/03_pcap-collection.en.srt
17.68KB
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/02_introduction-to-exfiltration-over-alternative-protocols.en.txt
2.37KB
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/05_autorun-scripts.en.srt
17.44KB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/05_network-sniffing.en.txt
16.57KB
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/03_default-account-discovery.en.srt
16.53KB
[TGx]Downloaded from torrentgalaxy.to .txt
585B
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/05_alternate-data-streams.en.srt
16.07KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/07_decoy-credentials.en.srt
15.94KB
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/04_network-scanning.en.txt
15.48KB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/05_scheduled-execution.en.srt
14.84KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/07_burn-in.en.srt
14.66KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/03_decoy-processes.en.srt
14.17KB
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/06_dns-exploration.en.txt
12.56KB
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_mitre-att-ck-impact.en.txt
2.63KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/03_network-monitoring.en.srt
13.92KB
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/05_protocol-tunneling.en.srt
13.84KB
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/02_introduction-to-data-encrypted-for-impact.en.txt
2.68KB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/05_file-and-directory-discovery.en.srt
13.4KB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/03_impair-avs.en.srt
13.27KB
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/03_data-encryption.en.srt
12.87KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/05_protocol-decoding.en.txt
12.72KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/07_behavioral-analytics.en.txt
12.46KB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/05_web-session-cookie.en.srt
12.1KB
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/03_introduction-to-scapy.en.srt
11.72KB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/03_user-account-discovery.en.txt
11.63KB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/05_hijacked-execution-flow.en.txt
11.53KB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/05_python-library-injection.en.srt
11.4KB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/03_registry-autorun.en.txt
11.29KB
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/05_account-access-removal.en.srt
11.29KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/03_pcap-collection.en.txt
11.16KB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/03_credentials-from-web-browsers.en.srt
10.93KB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/03_malicious-links.en.srt
10.88KB
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/03_encrypted-channel.en.txt
10.52KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/05_system-activity-monitoring.en.txt
10.34KB
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/03_introduction-to-mitre-att-ck-and-shield.en.srt
10.27KB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/03_logon-scripts.en.txt
10.03KB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/03_clipboard-data.en.srt
9.76KB
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/05_autorun-scripts.en.txt
9.24KB
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/03_default-account-discovery.en.txt
8.78KB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/03_impair-avs.en.txt
8.49KB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/05_alternate-data-streams.en.txt
8.42KB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/04_introduction-to-process-injection.en.srt
8.41KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/07_decoy-credentials.en.txt
8.39KB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_mitre-att-ck-discovery.en.txt
2.88KB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/03_smb-windows-admin-shares.en.srt
8.32KB
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/03_data-encryption.en.txt
8.26KB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/04_introduction-to-hide-artifacts.en.srt
7.81KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/05_decoy-content.en.srt
7.8KB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/05_scheduled-execution.en.txt
7.74KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/07_burn-in.en.txt
7.66KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/03_decoy-processes.en.txt
7.47KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/03_network-monitoring.en.txt
7.36KB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/04_introduction-to-file-and-directory-discovery.en.txt
2.76KB
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/05_protocol-tunneling.en.txt
7.31KB
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_mitre-pre-att-ck.en.srt
7.27KB
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/04_introduction-to-replication-through-removable-media.en.srt
7.25KB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/05_python-library-injection.en.txt
7.2KB
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/05_account-access-removal.en.txt
7.12KB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_mitre-att-ck-lateral-movement.en.txt
2.25KB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/05_file-and-directory-discovery.en.txt
7.11KB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/04_introduction-to-email-collection.en.srt
7.11KB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/02_introduction-to-remote-services.en.txt
2.66KB
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/02_introduction-to-network-scanning.en.srt
7.07KB
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/02_introduction-to-valid-accounts.en.srt
7.04KB
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/02_introduction-to-encrypted-channels.en.srt
6.95KB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/03_malicious-links.en.txt
6.92KB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/02_introduction-to-impair-defenses.en.srt
6.91KB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/02_introduction-to-account-discovery.en.srt
6.85KB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/03_credentials-from-web-browsers.en.txt
6.83KB
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/04_introduction-to-account-access-removal.en.srt
6.74KB
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/02_introduction-to-python.en.srt
6.72KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/02_decoy-processes-for-active-defense.en.srt
6.67KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/02_pcap-collection-for-active-defense.en.srt
5.61KB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_mitre-att-ck-collection.en.txt
2.33KB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/04_introduction-to-network-sniffing.en.srt
6.65KB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/05_local-email-collection.en.srt
6.61KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/06_behavioral-analytics-for-active-defense.en.srt
6.61KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_introduction-to-decoys.en.srt
6.45KB
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/03_introduction-to-mitre-att-ck-and-shield.en.txt
6.45KB
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/05_non-application-layer-protocol.en.srt
6.41KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/06_decoy-credentials-for-active-defense.en.srt
6.38KB
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/05_introduction-to-open-technical-databases.en.srt
6.37KB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/05_web-session-cookie.en.txt
6.36KB
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/04_introduction-to-protocol-tunneling.en.srt
6.33KB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/04_introduction-to-use-alternative-authentication-material.en.srt
6.32KB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/02_introduction-to-clipboard-data.en.srt
6.26KB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/03_clipboard-data.en.txt
6.24KB
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/03_introduction-to-scapy.en.txt
6.15KB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_mitre-att-ck-execution.en.txt
2.71KB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/04_introduction-to-scheduled-tasks-and-jobs.en.srt
6.02KB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/04_introduction-to-hijack-execution-flow.en.srt
6KB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/02_introduction-to-user-execution.en.txt
2.28KB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/02_introduction-to-boot-or-logon-autostart-execution.en.srt
5.98KB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/02_introduction-to-credentials-from-password-stores.en.srt
5.94KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/04_system-activity-monitoring-for-active-defense.en.srt
5.91KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/06_burn-in-for-active-defense.en.srt
5.89KB
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_mitre-att-ck-command-and-control.en.srt
5.84KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/04_protocol-decoding-for-active-defense.en.srt
5.81KB
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_mitre-att-ck-initial-access.en.srt
5.61KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/04_decoy-content-for-active-defense.en.srt
5.52KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/02_network-monitoring-for-active-defense.en.srt
5.46KB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/03_smb-windows-admin-shares.en.txt
5.28KB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_mitre-att-ck-credential-access.en.srt
5.21KB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_mitre-att-ck-persistence.en.txt
2.7KB
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/02_introduction-to-data-encrypted-for-impact.en.srt
5.06KB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_mitre-att-ck-execution.en.srt
5.06KB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/02_introduction-to-boot-or-logon-autostart-execution.en.txt
2.58KB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_mitre-att-ck-persistence.en.srt
5.04KB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/02_introduction-to-remote-services.en.srt
5.04KB
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/04_introduction-to-non-application-layer-protocol.en.srt
5.02KB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/02_introduction-to-boot-or-logon-autostart-execution.en.srt
4.83KB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_mitre-att-ck-privilege-escalation.en.srt
4.82KB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_mitre-att-ck-defense-evasion.en.srt
4.53KB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_mitre-att-ck-discovery.en.srt
4.5KB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/04_introduction-to-process-injection.en.txt
4.48KB
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/02_introduction-to-exfiltration-over-alternative-protocols.en.srt
4.45KB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/04_introduction-to-file-and-directory-discovery.en.srt
4.41KB
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/06_python-for-initial-access_exam.html
4.35KB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_mitre-att-ck-privilege-escalation.en.txt
2.54KB
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/02_introduction-to-python.en.txt
4.27KB
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_mitre-att-ck-exfiltration.en.srt
4.2KB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/02_introduction-to-user-execution.en.srt
4.19KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/06_behavioral-analytics-for-active-defense.en.txt
4.16KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/05_decoy-content.en.txt
4.11KB
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_mitre-att-ck-impact.en.srt
4.11KB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/04_introduction-to-hide-artifacts.en.txt
4.09KB
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/04_introduction-to-protocol-tunneling.en.txt
4.04KB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/04_introduction-to-use-alternative-authentication-material.en.txt
4KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/06_decoy-credentials-for-active-defense.en.txt
4KB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/02_introduction-to-clipboard-data.en.txt
3.95KB
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_mitre-pre-att-ck.en.txt
3.93KB
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/07_python-for-pre-att-ck_quiz.html
3.9KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/01_active-defense-on-the-network.en.srt
3.9KB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_mitre-att-ck-defense-evasion.en.txt
2.42KB
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/04_introduction-to-replication-through-removable-media.en.txt
3.87KB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/04_introduction-to-email-collection.en.txt
3.83KB
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/02_introduction-to-valid-accounts.en.txt
3.76KB
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/02_introduction-to-network-scanning.en.txt
3.73KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/04_system-activity-monitoring-for-active-defense.en.txt
3.72KB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_mitre-att-ck-collection.en.srt
3.71KB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/02_introduction-to-account-discovery.en.txt
3.68KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/02_decoy-processes-for-active-defense.en.txt
3.66KB
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/02_introduction-to-encrypted-channels.en.txt
3.64KB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/04_introduction-to-network-sniffing.en.txt
3.63KB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/05_local-email-collection.en.txt
3.63KB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/02_introduction-to-impair-defenses.en.txt
3.63KB
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/04_introduction-to-account-access-removal.en.txt
3.63KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/04_decoy-content-for-active-defense.en.txt
3.57KB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_mitre-att-ck-lateral-movement.en.srt
3.5KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_introduction-to-decoys.en.txt
3.47KB
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/05_non-application-layer-protocol.en.txt
3.43KB
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/05_python-for-cybersecurity_quiz.html
3.42KB
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/05_introduction-to-open-technical-databases.en.txt
3.4KB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_mitre-att-ck-credential-access.en.txt
3.29KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_monitoring-for-active-defense.en.srt
3.26KB
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/04_introduction-to-non-application-layer-protocol.en.txt
3.23KB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/02_introduction-to-boot-or-logon-autostart-execution.en.txt
3.23KB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/04_introduction-to-hijack-execution-flow.en.txt
3.22KB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/04_introduction-to-scheduled-tasks-and-jobs.en.txt
3.18KB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/02_introduction-to-credentials-from-password-stores.en.txt
3.16KB
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_mitre-att-ck-command-and-control.en.txt
3.12KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/06_burn-in-for-active-defense.en.txt
3.11KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/04_protocol-decoding-for-active-defense.en.txt
3.1KB
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_mitre-att-ck-initial-access.en.txt
2.99KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/02_pcap-collection-for-active-defense.en.txt
2.97KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/02_network-monitoring-for-active-defense.en.txt
2.95KB
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity.en.srt
2.79KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/01_active-defense-on-the-network.en.txt
2.11KB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_monitoring-for-active-defense.en.txt
2.04KB
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/04_python-for-cybersecurity-resources_instructions.html
1.05KB
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/04_network-scanning.mp4
31.04MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/05_protocol-decoding.mp4
30.03MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/07_behavioral-analytics.mp4
27.87MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/03_registry-autorun.mp4
27.61MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/05_hijacked-execution-flow.mp4
26.22MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/06_dns-exploration.mp4
26.07MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/05_system-activity-monitoring.mp4
25.34MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/03_pcap-collection.mp4
24.78MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/03_encrypted-channel.mp4
24.62MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/05_scheduled-execution.mp4
24.61MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/03_user-account-discovery.mp4
24.22MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/03_logon-scripts.mp4
23.44MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/03_data-encryption.mp4
22.52MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/05_alternate-data-streams.mp4
21.33MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/03_default-account-discovery.mp4
20.73MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/05_autorun-scripts.mp4
20.21MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/03_impair-avs.mp4
19.8MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/03_credentials-from-web-browsers.mp4
19.74MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/07_decoy-credentials.mp4
18.83MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/03_decoy-processes.mp4
17.6MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/05_protocol-tunneling.mp4
17.36MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/07_burn-in.mp4
16.43MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/05_file-and-directory-discovery.mp4
15.95MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/03_network-monitoring.mp4
15.72MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/03_introduction-to-mitre-att-ck-and-shield.mp4
15.63MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/05_account-access-removal.mp4
14.4MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/05_web-session-cookie.mp4
14.31MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/05_python-library-injection.mp4
13.62MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/03_introduction-to-scapy.mp4
13.52MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/03_malicious-links.mp4
13.13MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/03_clipboard-data.mp4
12.65MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/03_smb-windows-admin-shares.mp4
11.6MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/04_introduction-to-process-injection.mp4
9.64MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/05_decoy-content.mp4
9.52MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_mitre-pre-att-ck.mp4
9.32MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/06_behavioral-analytics-for-active-defense.mp4
9MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/02_introduction-to-python.mp4
8.83MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/04_introduction-to-use-alternative-authentication-material.mp4
8.56MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/02_introduction-to-impair-defenses.mp4
8.42MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/04_introduction-to-hide-artifacts.mp4
8.38MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/04_system-activity-monitoring-for-active-defense.mp4
8.37MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/02_decoy-processes-for-active-defense.mp4
8.23MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/02_introduction-to-valid-accounts.mp4
8.22MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/04_introduction-to-replication-through-removable-media.mp4
8.13MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_introduction-to-decoys.mp4
8.09MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/02_introduction-to-clipboard-data.mp4
8.05MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/02_introduction-to-network-scanning.mp4
8.01MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/04_decoy-content-for-active-defense.mp4
7.84MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/02_introduction-to-encrypted-channels.mp4
7.82MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/06_decoy-credentials-for-active-defense.mp4
7.75MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/05_introduction-to-open-technical-databases.mp4
7.7MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/04_introduction-to-hijack-execution-flow.mp4
7.7MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/04_introduction-to-network-sniffing.mp4
7.58MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/04_introduction-to-email-collection.mp4
7.53MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/04_introduction-to-protocol-tunneling.mp4
7.45MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/04_introduction-to-account-access-removal.mp4
7.41MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_mitre-att-ck-credential-access.mp4
7.38MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/02_introduction-to-account-discovery.mp4
7.37MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/05_local-email-collection.mp4
7.3MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_mitre-att-ck-command-and-control.mp4
7.28MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/02_introduction-to-boot-or-logon-autostart-execution.mp4
7.13MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/06_burn-in-for-active-defense.mp4
7.09MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/02_network-monitoring-for-active-defense.mp4
6.89MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/04_protocol-decoding-for-active-defense.mp4
6.85MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/05_non-application-layer-protocol.mp4
6.8MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_mitre-att-ck-initial-access.mp4
6.65MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/02_introduction-to-credentials-from-password-stores.mp4
6.63MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/04_introduction-to-non-application-layer-protocol.mp4
6.53MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_mitre-att-ck-defense-evasion.mp4
6.45MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_mitre-att-ck-discovery.mp4
6.28MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/04_introduction-to-scheduled-tasks-and-jobs.mp4
6.28MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/02_pcap-collection-for-active-defense.mp4
6.27MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_mitre-att-ck-persistence.mp4
6.21MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/02_introduction-to-boot-or-logon-autostart-execution.mp4
6.19MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_mitre-att-ck-execution.mp4
6.1MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/02_introduction-to-remote-services.mp4
6.09MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_mitre-att-ck-exfiltration.mp4
5.98MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/02_introduction-to-data-encrypted-for-impact.mp4
5.95MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_mitre-att-ck-privilege-escalation.mp4
5.84MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/02_introduction-to-exfiltration-over-alternative-protocols.mp4
5.81MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/04_introduction-to-file-and-directory-discovery.mp4
5.79MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_mitre-att-ck-impact.mp4
5.75MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_mitre-att-ck-lateral-movement.mp4
5.15MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_mitre-att-ck-collection.mp4
5MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/01_active-defense-on-the-network.mp4
4.87MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/02_introduction-to-user-execution.mp4
4.77MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_monitoring-for-active-defense.mp4
4.36MB
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
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity.mp4
3.87MB
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