[Coursera] Advanced Python Scripting for Cybersecurity Specialization - 3 course series
| Creation Time | Total Size | Total Files | Info Hash |
|---|---|---|---|
| 2025-09-15 18:54:27 | 903.80 MB | 97 | 013660360A03D8D8BF4442309B7327B694E08036 |
Download
To download this file, you need a free bitTorrent client such as qBittorrent.
Related Torrents
Files
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_04_detecting-ssh-brute-force-with-scapy.mp447.37 MB
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_01_introduction-to-defensive-python.en.srt15.98 KB
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_01_introduction-to-defensive-python.en.txt10.21 KB
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_01_introduction-to-defensive-python.mp419.38 MB
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_02_brute-force-detection-with-windows-events.en.srt24.65 KB
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_02_brute-force-detection-with-windows-events.en.txt12.90 KB
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_02_brute-force-detection-with-windows-events.mp436.96 MB
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_03_detecting-ftp-brute-force-with-scapy.en.srt20.13 KB
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_03_detecting-ftp-brute-force-with-scapy.en.txt10.57 KB
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_03_detecting-ftp-brute-force-with-scapy.mp433.50 MB
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_04_detecting-ssh-brute-force-with-scapy.en.srt25.40 KB
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_04_detecting-ssh-brute-force-with-scapy.en.txt13.40 KB
- 0. Join Our Discord for More Awesome Stuff!.txt156 B
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_05_feature-selection-for-traffic-analysis.en.srt23.20 KB
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_05_feature-selection-for-traffic-analysis.en.txt11.99 KB
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_05_feature-selection-for-traffic-analysis.mp443.14 MB
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_06_detecting-anomalous-network-traffic-with-scapy.en.srt14.57 KB
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_06_detecting-anomalous-network-traffic-with-scapy.en.txt7.60 KB
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_06_detecting-anomalous-network-traffic-with-scapy.mp427.48 MB
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_07_connection-hijacking-with-scapy.en.srt28.17 KB
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_07_connection-hijacking-with-scapy.en.txt17.79 KB
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_07_connection-hijacking-with-scapy.mp446.12 MB
- defensive-python/01_defensive-python onehack.us/01_defensive-python/01_08_defensive-python_exam.html5.08 KB
- establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_01_introduction-to-command-and-control.en.srt16.93 KB
- establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_01_introduction-to-command-and-control.en.txt10.68 KB
- establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_01_introduction-to-command-and-control.mp420.34 MB
- establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_02_traffic-analysis-with-python.en.srt26.89 KB
- establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_02_traffic-analysis-with-python.en.txt14.01 KB
- establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_02_traffic-analysis-with-python.mp441.69 MB
- establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_03_calculating-entropy-with-python.en.srt13.96 KB
- establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_03_calculating-entropy-with-python.en.txt7.33 KB
- establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_03_calculating-entropy-with-python.mp418.78 MB
- establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_04_detecting-encodings-with-python.en.srt14.44 KB
- establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_04_detecting-encodings-with-python.en.txt9.11 KB
- establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_04_detecting-encodings-with-python.mp423.01 MB
- establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_05_building-c2-packets-with-python.en.srt19.01 KB
- establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_05_building-c2-packets-with-python.en.txt9.82 KB
- establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_05_building-c2-packets-with-python.mp425.88 MB
- establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_01_introduction-to-credential-access.en.srt16.22 KB
- establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_01_introduction-to-credential-access.en.txt10.24 KB
- establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_01_introduction-to-credential-access.mp419.31 MB
- establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_02_dumping-chrome-credentials-with-python.en.srt17.24 KB
- establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_02_dumping-chrome-credentials-with-python.en.txt8.91 KB
- establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_02_dumping-chrome-credentials-with-python.mp433.15 MB
- establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_03_searching-the-registry-with-python.en.srt23.00 KB
- establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_03_searching-the-registry-with-python.en.txt14.25 KB
- establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_03_searching-the-registry-with-python.mp443.10 MB
- establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_04_searching-the-system-with-python.en.srt23.70 KB
- establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_04_searching-the-system-with-python.en.txt12.39 KB
- establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_04_searching-the-system-with-python.mp433.30 MB
- establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_05_cracking-the-linux-passwords-with-python.en.srt15.42 KB
- establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_05_cracking-the-linux-passwords-with-python.en.txt9.86 KB
- establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_05_cracking-the-linux-passwords-with-python.mp423.27 MB
- establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_06_analyzing-passwords-with-python.en.srt22.37 KB
- establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_06_analyzing-passwords-with-python.en.txt11.68 KB
- establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_06_analyzing-passwords-with-python.mp432.86 MB
- establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_07_establishing-command-and-control-and-finding-credentials_exam.html10.50 KB
- python-in-recon/01_introduction onehack.us/01_introduction-to-advanced-python-for-cybersecurity/01_01_welcome-to-advanced-python-for-cybersecurity.en.srt1.87 KB
- python-in-recon/01_introduction onehack.us/01_introduction-to-advanced-python-for-cybersecurity/01_01_welcome-to-advanced-python-for-cybersecurity.en.txt1009 B
- python-in-recon/01_introduction onehack.us/01_introduction-to-advanced-python-for-cybersecurity/01_01_welcome-to-advanced-python-for-cybersecurity.mp48.16 MB
- python-in-recon/01_introduction onehack.us/01_introduction-to-advanced-python-for-cybersecurity/01_02_introduction-to-python.en.srt11.14 KB
- python-in-recon/01_introduction onehack.us/01_introduction-to-advanced-python-for-cybersecurity/01_02_introduction-to-python.en.txt5.84 KB
- python-in-recon/01_introduction onehack.us/01_introduction-to-advanced-python-for-cybersecurity/01_02_introduction-to-python.mp410.63 MB
- python-in-recon/01_introduction onehack.us/01_introduction-to-advanced-python-for-cybersecurity/01_03_introduction-to-mitre-att-ck-and-shield.en.srt16.54 KB
- python-in-recon/01_introduction onehack.us/01_introduction-to-advanced-python-for-cybersecurity/01_03_introduction-to-mitre-att-ck-and-shield.en.txt8.58 KB
- python-in-recon/01_introduction onehack.us/01_introduction-to-advanced-python-for-cybersecurity/01_03_introduction-to-mitre-att-ck-and-shield.mp420.62 MB
- python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_01_introduction-to-reconnaissance.en.srt18.00 KB
- python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_01_introduction-to-reconnaissance.en.txt11.41 KB
- python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_01_introduction-to-reconnaissance.mp422.03 MB
- python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_02_querying-shodan-with-python.en.srt20.29 KB
- python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_02_querying-shodan-with-python.en.txt10.55 KB
- python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_02_querying-shodan-with-python.mp441.92 MB
- python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_03_dns-queries-with-python.en.srt18.59 KB
- python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_03_dns-queries-with-python.en.txt11.65 KB
- python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_03_dns-queries-with-python.mp429.44 MB
- python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_04_network-scanning-with-scapy.en.srt25.12 KB
- python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_04_network-scanning-with-scapy.en.txt13.02 KB
- python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_04_network-scanning-with-scapy.mp436.97 MB
- python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_05_service-detection-with-python.en.srt31.75 KB
- python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_05_service-detection-with-python.en.txt16.37 KB
- python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_05_service-detection-with-python.mp443.52 MB
- python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_06_cve-lookups-with-python.en.srt7.89 KB
- python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_06_cve-lookups-with-python.en.txt4.98 KB
- python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_06_cve-lookups-with-python.mp412.63 MB
- python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_01_introduction-to-initial-access.en.srt20.51 KB
- python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_01_introduction-to-initial-access.en.txt10.78 KB
- python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_01_introduction-to-initial-access.mp421.31 MB
- python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_02_generating-password-variations-with-python.en.srt19.73 KB
- python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_02_generating-password-variations-with-python.en.txt10.30 KB
- python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_02_generating-password-variations-with-python.mp444.38 MB
- python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_03_generating-three-random-words-with-python.en.srt14.91 KB
- python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_03_generating-three-random-words-with-python.en.txt7.77 KB
- python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_03_generating-three-random-words-with-python.mp417.89 MB
- python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_04_automating-brute-force.en.srt14.56 KB
- python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_04_automating-brute-force.en.txt9.30 KB
- python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_04_automating-brute-force.mp424.73 MB
- python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_05_advanced-python-reconnaissance_exam.html11.34 KB