[Coursera] Advanced Python Scripting for Cybersecurity Specialization - 3 course series

Creation TimeTotal SizeTotal FilesInfo Hash
2025-09-15 18:54:27903.80 MB97013660360A03D8D8BF4442309B7327B694E08036
Download
Magnet LinkTorrent DownloadSave Instantly without TorrentingReport Abuse
To download this file, you need a free bitTorrent client such as qBittorrent.
Related Torrents
Files
  1. defensive-python/01_defensive-python onehack.us/01_defensive-python/01_04_detecting-ssh-brute-force-with-scapy.mp447.37 MB
  2. defensive-python/01_defensive-python onehack.us/01_defensive-python/01_01_introduction-to-defensive-python.en.srt15.98 KB
  3. defensive-python/01_defensive-python onehack.us/01_defensive-python/01_01_introduction-to-defensive-python.en.txt10.21 KB
  4. defensive-python/01_defensive-python onehack.us/01_defensive-python/01_01_introduction-to-defensive-python.mp419.38 MB
  5. defensive-python/01_defensive-python onehack.us/01_defensive-python/01_02_brute-force-detection-with-windows-events.en.srt24.65 KB
  6. defensive-python/01_defensive-python onehack.us/01_defensive-python/01_02_brute-force-detection-with-windows-events.en.txt12.90 KB
  7. defensive-python/01_defensive-python onehack.us/01_defensive-python/01_02_brute-force-detection-with-windows-events.mp436.96 MB
  8. defensive-python/01_defensive-python onehack.us/01_defensive-python/01_03_detecting-ftp-brute-force-with-scapy.en.srt20.13 KB
  9. defensive-python/01_defensive-python onehack.us/01_defensive-python/01_03_detecting-ftp-brute-force-with-scapy.en.txt10.57 KB
  10. defensive-python/01_defensive-python onehack.us/01_defensive-python/01_03_detecting-ftp-brute-force-with-scapy.mp433.50 MB
  11. defensive-python/01_defensive-python onehack.us/01_defensive-python/01_04_detecting-ssh-brute-force-with-scapy.en.srt25.40 KB
  12. defensive-python/01_defensive-python onehack.us/01_defensive-python/01_04_detecting-ssh-brute-force-with-scapy.en.txt13.40 KB
  13. 0. Join Our Discord for More Awesome Stuff!.txt156 B
  14. defensive-python/01_defensive-python onehack.us/01_defensive-python/01_05_feature-selection-for-traffic-analysis.en.srt23.20 KB
  15. defensive-python/01_defensive-python onehack.us/01_defensive-python/01_05_feature-selection-for-traffic-analysis.en.txt11.99 KB
  16. defensive-python/01_defensive-python onehack.us/01_defensive-python/01_05_feature-selection-for-traffic-analysis.mp443.14 MB
  17. defensive-python/01_defensive-python onehack.us/01_defensive-python/01_06_detecting-anomalous-network-traffic-with-scapy.en.srt14.57 KB
  18. defensive-python/01_defensive-python onehack.us/01_defensive-python/01_06_detecting-anomalous-network-traffic-with-scapy.en.txt7.60 KB
  19. defensive-python/01_defensive-python onehack.us/01_defensive-python/01_06_detecting-anomalous-network-traffic-with-scapy.mp427.48 MB
  20. defensive-python/01_defensive-python onehack.us/01_defensive-python/01_07_connection-hijacking-with-scapy.en.srt28.17 KB
  21. defensive-python/01_defensive-python onehack.us/01_defensive-python/01_07_connection-hijacking-with-scapy.en.txt17.79 KB
  22. defensive-python/01_defensive-python onehack.us/01_defensive-python/01_07_connection-hijacking-with-scapy.mp446.12 MB
  23. defensive-python/01_defensive-python onehack.us/01_defensive-python/01_08_defensive-python_exam.html5.08 KB
  24. establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_01_introduction-to-command-and-control.en.srt16.93 KB
  25. establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_01_introduction-to-command-and-control.en.txt10.68 KB
  26. establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_01_introduction-to-command-and-control.mp420.34 MB
  27. establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_02_traffic-analysis-with-python.en.srt26.89 KB
  28. establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_02_traffic-analysis-with-python.en.txt14.01 KB
  29. establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_02_traffic-analysis-with-python.mp441.69 MB
  30. establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_03_calculating-entropy-with-python.en.srt13.96 KB
  31. establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_03_calculating-entropy-with-python.en.txt7.33 KB
  32. establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_03_calculating-entropy-with-python.mp418.78 MB
  33. establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_04_detecting-encodings-with-python.en.srt14.44 KB
  34. establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_04_detecting-encodings-with-python.en.txt9.11 KB
  35. establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_04_detecting-encodings-with-python.mp423.01 MB
  36. establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_05_building-c2-packets-with-python.en.srt19.01 KB
  37. establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_05_building-c2-packets-with-python.en.txt9.82 KB
  38. establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_05_building-c2-packets-with-python.mp425.88 MB
  39. establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_01_introduction-to-credential-access.en.srt16.22 KB
  40. establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_01_introduction-to-credential-access.en.txt10.24 KB
  41. establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_01_introduction-to-credential-access.mp419.31 MB
  42. establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_02_dumping-chrome-credentials-with-python.en.srt17.24 KB
  43. establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_02_dumping-chrome-credentials-with-python.en.txt8.91 KB
  44. establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_02_dumping-chrome-credentials-with-python.mp433.15 MB
  45. establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_03_searching-the-registry-with-python.en.srt23.00 KB
  46. establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_03_searching-the-registry-with-python.en.txt14.25 KB
  47. establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_03_searching-the-registry-with-python.mp443.10 MB
  48. establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_04_searching-the-system-with-python.en.srt23.70 KB
  49. establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_04_searching-the-system-with-python.en.txt12.39 KB
  50. establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_04_searching-the-system-with-python.mp433.30 MB
  51. establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_05_cracking-the-linux-passwords-with-python.en.srt15.42 KB
  52. establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_05_cracking-the-linux-passwords-with-python.en.txt9.86 KB
  53. establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_05_cracking-the-linux-passwords-with-python.mp423.27 MB
  54. establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_06_analyzing-passwords-with-python.en.srt22.37 KB
  55. establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_06_analyzing-passwords-with-python.en.txt11.68 KB
  56. establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_06_analyzing-passwords-with-python.mp432.86 MB
  57. establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_07_establishing-command-and-control-and-finding-credentials_exam.html10.50 KB
  58. python-in-recon/01_introduction onehack.us/01_introduction-to-advanced-python-for-cybersecurity/01_01_welcome-to-advanced-python-for-cybersecurity.en.srt1.87 KB
  59. python-in-recon/01_introduction onehack.us/01_introduction-to-advanced-python-for-cybersecurity/01_01_welcome-to-advanced-python-for-cybersecurity.en.txt1009 B
  60. python-in-recon/01_introduction onehack.us/01_introduction-to-advanced-python-for-cybersecurity/01_01_welcome-to-advanced-python-for-cybersecurity.mp48.16 MB
  61. python-in-recon/01_introduction onehack.us/01_introduction-to-advanced-python-for-cybersecurity/01_02_introduction-to-python.en.srt11.14 KB
  62. python-in-recon/01_introduction onehack.us/01_introduction-to-advanced-python-for-cybersecurity/01_02_introduction-to-python.en.txt5.84 KB
  63. python-in-recon/01_introduction onehack.us/01_introduction-to-advanced-python-for-cybersecurity/01_02_introduction-to-python.mp410.63 MB
  64. python-in-recon/01_introduction onehack.us/01_introduction-to-advanced-python-for-cybersecurity/01_03_introduction-to-mitre-att-ck-and-shield.en.srt16.54 KB
  65. python-in-recon/01_introduction onehack.us/01_introduction-to-advanced-python-for-cybersecurity/01_03_introduction-to-mitre-att-ck-and-shield.en.txt8.58 KB
  66. python-in-recon/01_introduction onehack.us/01_introduction-to-advanced-python-for-cybersecurity/01_03_introduction-to-mitre-att-ck-and-shield.mp420.62 MB
  67. python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_01_introduction-to-reconnaissance.en.srt18.00 KB
  68. python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_01_introduction-to-reconnaissance.en.txt11.41 KB
  69. python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_01_introduction-to-reconnaissance.mp422.03 MB
  70. python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_02_querying-shodan-with-python.en.srt20.29 KB
  71. python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_02_querying-shodan-with-python.en.txt10.55 KB
  72. python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_02_querying-shodan-with-python.mp441.92 MB
  73. python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_03_dns-queries-with-python.en.srt18.59 KB
  74. python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_03_dns-queries-with-python.en.txt11.65 KB
  75. python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_03_dns-queries-with-python.mp429.44 MB
  76. python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_04_network-scanning-with-scapy.en.srt25.12 KB
  77. python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_04_network-scanning-with-scapy.en.txt13.02 KB
  78. python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_04_network-scanning-with-scapy.mp436.97 MB
  79. python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_05_service-detection-with-python.en.srt31.75 KB
  80. python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_05_service-detection-with-python.en.txt16.37 KB
  81. python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_05_service-detection-with-python.mp443.52 MB
  82. python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_06_cve-lookups-with-python.en.srt7.89 KB
  83. python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_06_cve-lookups-with-python.en.txt4.98 KB
  84. python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_06_cve-lookups-with-python.mp412.63 MB
  85. python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_01_introduction-to-initial-access.en.srt20.51 KB
  86. python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_01_introduction-to-initial-access.en.txt10.78 KB
  87. python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_01_introduction-to-initial-access.mp421.31 MB
  88. python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_02_generating-password-variations-with-python.en.srt19.73 KB
  89. python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_02_generating-password-variations-with-python.en.txt10.30 KB
  90. python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_02_generating-password-variations-with-python.mp444.38 MB
  91. python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_03_generating-three-random-words-with-python.en.srt14.91 KB
  92. python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_03_generating-three-random-words-with-python.en.txt7.77 KB
  93. python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_03_generating-three-random-words-with-python.mp417.89 MB
  94. python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_04_automating-brute-force.en.srt14.56 KB
  95. python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_04_automating-brute-force.en.txt9.30 KB
  96. python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_04_automating-brute-force.mp424.73 MB
  97. python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_05_advanced-python-reconnaissance_exam.html11.34 KB
Copyright © 2025 DHTMan | All Rights Reserved
ContactDMCASitemap