d8:announce32:udp://62.138.0.158:6969/announce13:announce-listll32:udp://62.138.0.158:6969/announceel34:udp://87.233.192.220:6969/announceel31:udp://111.6.78.96:6969/announceel32:udp://90.179.64.91:1337/announceel30:udp://51.15.4.13:1337/announceel34:udp://151.80.120.113:2710/announceel33:udp://191.96.249.23:6969/announceel33:udp://35.187.36.248:1337/announceel32:udp://82.45.40.204:1337/announceel33:udp://123.249.16.65:2710/announceel29:udp://127.0.0.1:6969/announceel33:udp://210.244.71.25:6969/announceel32:udp://78.142.19.42:1337/announceel34:udp://173.254.219.72:6969/announceel32:udp://51.15.76.199:6969/announceel34:udp://91.212.150.191:3418/announceel35:udp://103.224.212.222:6969/announceel34:udp://92.241.171.245:6969/announceel30:udp://51.15.40.114:80/announceel31:udp://5.79.83.194:6969/announceee10:created by37:ruTorrent (PHP Class - Adrien Gibrat)13:creation datei1525631150e4:infod5:filesld6:lengthi37169789e4:pathl28:1. Virtual Network Lab Build18:1. Start here!.mp4eed6:lengthi18436867e4:pathl28:1. Virtual Network Lab Build70:2. Video and lab - Creating a Virtual install of Kali using VMWare.mp4eed6:lengthi183e4:pathl28:1. Virtual Network Lab Build62:2.1 Lab - Creating a Virtual install of Kali using VMWare.htmleed6:lengthi36861481e4:pathl28:1. Virtual Network Lab Build74:3. Video and lab - Creating a Virtual install of Kali using VirtualBox.mp4eed6:lengthi168e4:pathl28:1. Virtual Network Lab Build65:3.1 Lab -Creating a Virtual Install of Kali Using VirtualBox.htmleed6:lengthi24030886e4:pathl28:1. Virtual Network Lab Build80:4. Video and Lab - Creating an Unattended Virtual Install of XP Using VMWare.mp4eed6:lengthi196e4:pathl28:1. Virtual Network Lab Build73:4.1 Lab - Creating an Unattended Virtual Install of XP Using VMWare.htmleed6:lengthi26020330e4:pathl28:1. Virtual Network Lab Build84:5. Video and lab - Creating an Unattended Virtual Install of XP Using Virtualbox.mp4eed6:lengthi192e4:pathl28:1. Virtual Network Lab Build84:5.1 Lab - Creating an Unattended Virtual Install of Windows XP Using VirtualBox.htmleed6:lengthi32674516e4:pathl28:1. Virtual Network Lab Build60:6. Video - Troubleshooting Connectivity Issues With VMs.mp4eed6:lengthi25985059e4:pathl22:10. Social Engineering65:1. Video and Lab - Using the Social Engineering Toolkit (SET).mp4eed6:lengthi180e4:pathl22:10. Social Engineering60:1.1 Lab - Harvesting Credentials Using the SET Tool Kit.htmleed6:lengthi49775809e4:pathl33:11. BASH Scripting for Pentesters53:1. Video and Lab - Introduction to BASH Scripting.mp4eed6:lengthi159e4:pathl33:11. BASH Scripting for Pentesters45:1.1 Lab - Introduction to BASH Scripting.htmleed6:lengthi9e4:pathl33:11. BASH Scripting for Pentesters43:2. Lab - BASH Scripting for Pentesters.htmleed6:lengthi9e4:pathl33:11. BASH Scripting for Pentesters57:3. Lab -Linux BASH Shell Scripting -Task Scheduling.htmleed6:lengthi12281620e4:pathl21:12. Password Cracking55:1. Video and Lab – Password Cracking Using Medusa.mp4eed6:lengthi167e4:pathl21:12. Password Cracking45:1.1 Lab - Password Cracking Using Medusa.htmleed6:lengthi39703645e4:pathl21:12. Password Cracking56:2. Video and Lab - Passwords Cracking Using Mimikatz.mp4eed6:lengthi161e4:pathl21:12. Password Cracking48:2.1 Lab - Cracking Passwords Using Mimikatz.htmleed6:lengthi127693238e4:pathl33:13. Web Based Application Attacks59:1. Video and Lab - w3af - Installing w3af in Kali Linux.mp4eed6:lengthi160e4:pathl33:13. Web Based Application Attacks45:1.1 Lab - Installing w3af in Kali Linux.htmleed6:lengthi18260334e4:pathl33:13. Web Based Application Attacks83:2. Video and Lab – w3af - Conducting A Website Vulnerability Scan Using w3af.mp4eed6:lengthi193e4:pathl33:13. Web Based Application Attacks73:2.1 Lab – Conducting A Website Vulnerability Scan Using w3af.htmleed6:lengthi19400852e4:pathl33:13. Web Based Application Attacks57:3. Video and Lab - Vega Website Vulnerability Scanner.mp4eed6:lengthi159e4:pathl33:13. Web Based Application Attacks49:3.1 Lab - Vega Website Vulnerability Scanner.htmleed6:lengthi37691054e4:pathl33:13. Web Based Application Attacks59:4. Video and Lab – Performing a Browser Based Attack.mp4eed6:lengthi172e4:pathl33:13. Web Based Application Attacks47:4.1 Lab -Performing a Browser Based Attack.htmleed6:lengthi39030720e4:pathl33:13. Web Based Application Attacks56:5. Video and lab - SQL Injection Attack Using SQLmap.mp4eed6:lengthi167e4:pathl33:13. Web Based Application Attacks48:5.1 Lab - SQL Injection Attack Using SQLmap.htmleed6:lengthi198075498e4:pathl41:14. Browser Exploitation Framework (BeEF)46:1. Configure Kali for Exploitating the WAN.mp4eed6:lengthi257165286e4:pathl41:14. Browser Exploitation Framework (BeEF)48:2. The Browser Exploitation Framework (BeEF).mp4eed6:lengthi198e4:pathl41:14. Browser Exploitation Framework (BeEF)74:2.1 Lab - Browser Exploitation Framework (BeEF) - Client-Side Attacks.htmleed6:lengthi9e4:pathl21:15. Digital Forensics65:1. Lab - Introduction to Digital Forensics Using Kali Part I.htmleed6:lengthi9e4:pathl21:15. Digital Forensics66:2. Lab - Introduction to Digital Forensics Using Kali Part II.htmleed6:lengthi19962516e4:pathl18:2. Optimizing Kali62:1. Video and lab - Install Kali Linux Tools Using Katoolin.mp4eed6:lengthi172e4:pathl18:2. Optimizing Kali54:1.1 Lab - Install Kali Linux Tools Using Katoolin.htmleed6:lengthi30354100e4:pathl56:3. Anonymity - Remaining Anonymous While Hacking Online77:1. Video and Lab – Remaining Anonymous Online using TOR and Proxychains.mp4eed6:lengthi187e4:pathl56:3. Anonymity - Remaining Anonymous While Hacking Online73:1.1 Lab – Remaining Anonymous Online using TOR and Proxychains.htmleed6:lengthi141431491e4:pathl56:3. Anonymity - Remaining Anonymous While Hacking Online56:2. Video and Lab - Setup a free VPN Using Kali Linux.mp4eed6:lengthi168e4:pathl56:3. Anonymity - Remaining Anonymous While Hacking Online48:2.1 Lab - Setup a free VPN using Kali Linux.htmleed6:lengthi138933644e4:pathl56:3. Anonymity - Remaining Anonymous While Hacking Online69:3. Video and Lab - Using anonsurf on Kali Linux to Stay Anonymous.mp4eed6:lengthi183e4:pathl56:3. Anonymity - Remaining Anonymous While Hacking Online61:3.1 Lab - Using anonsurf on Kali Linux to Stay Anonymous.htmleed6:lengthi179317735e4:pathl35:4. Open-source intelligence (OSINT)58:1. Video and Lab - Information Gathering Using Maltego.mp4eed6:lengthi164e4:pathl35:4. Open-source intelligence (OSINT)50:1.1 Lab - Information Gathering Using Maltego.htmleed6:lengthi9e4:pathl24:5. Active Reconnaissance58:1. Lab - Introduction to Network Discovery Using Nmap.htmleed6:lengthi148e4:pathl24:5. Active Reconnaissance36:1.1 Lab - Introduction to NMAP.htmleed6:lengthi58149784e4:pathl24:5. Active Reconnaissance50:2. Video and lab - Nmap Scripting Engine (NSE).mp4eed6:lengthi174e4:pathl24:5. Active Reconnaissance52:2.1 Lab - Using the Nmap Scripting Engine (NSE).htmleed6:lengthi25478139e4:pathl24:5. Active Reconnaissance55:3. Video and lab - Scanning for WannaCry Ransomware.mp4eed6:lengthi157e4:pathl24:5. Active Reconnaissance46:3.1 Lab- Scanning for WannaCry Ransomware.htmleed6:lengthi29187943e4:pathl31:6. Scanning for Vulnerabilities65:1. Video and lab - Scanning for Vulnerabilities Using Nessus.mp4eed6:lengthi172e4:pathl31:6. Scanning for Vulnerabilities56:1.1 Lab - Scanning for Vulnerabilities Using Nessus.htmleed6:lengthi46980079e4:pathl31:6. Scanning for Vulnerabilities45:2. Video - Using Your Nessus Scan Results.mp4eed6:lengthi9e4:pathl31:6. Scanning for Vulnerabilities59:3. Lab - Scanning for Vulnerabilities Using OpenVAS 8.htmleed6:lengthi169e4:pathl31:6. Scanning for Vulnerabilities60:3.1 Lab - Scanning for Vulnerabilities Using OpenVAS 8.htmleed6:lengthi9e4:pathl24:7. Exploiting Windows XP54:1. Lab - Using Meterpreter to backdoor Windows XP.htmleed6:lengthi173e4:pathl24:7. Exploiting Windows XP55:1.1 Lab - Using Meterpreter to backdoor Windows XP.htmleed6:lengthi9e4:pathl24:7. Exploiting Windows XP52:2. Lab - Using Metasploit to Exploit Windows XP.htmleed6:lengthi9e4:pathl24:7. Exploiting Windows XP66:3. Lab - Exploiting Vulnerable Applications on Windows XP SP2.htmleed6:lengthi9e4:pathl24:7. Exploiting Windows XP79:4. Lab - Hacking Windows XP via MS11-006 Windows Shell Graphics Processing.htmleed6:lengthi56191066e4:pathl25:8. Exploiting Server 200857:1. Video and lab - Server 2008 Buffer Overflow Attack.mp4eed6:lengthi157e4:pathl25:8. Exploiting Server 200839:1.1 Lab – Exploiting Server 2008.htmleed6:lengthi29428772e4:pathl19:9. Exploiting Linux66:1. Video and lab - Installing Metasploitable2 Using VirtualBox.mp4eed6:lengthi175e4:pathl19:9. Exploiting Linux58:1.1 lab - Installing Metasploitable2 Using VirtualBox.htmleed6:lengthi18835081e4:pathl19:9. Exploiting Linux62:2. Video and lab - Installing Metasploitable2 Using VMWare.mp4eed6:lengthi177e4:pathl19:9. Exploiting Linux54:2.1 lab - Installing Metasploitable2 Using VMWare.htmleed6:lengthi9e4:pathl19:9. Exploiting Linux58:3. Lab - Learning to Hack Linux Using Metasploitable2.htmleed6:lengthi9e4:pathl19:9. Exploiting Linux40:4. Lab - Exploring Endpoint Attacks.htmleed6:lengthi55154240e4:pathl19:9. Exploiting Linux38:5. Video and lab - This is SPARTA!.mp4eed6:lengthi144e4:pathl19:9. Exploiting Linux30:5.1 Lab - This is SPARTA!.htmleed6:lengthi1203e4:pathl20:[CourseClub.NET].txteed6:lengthi123e4:pathl20:[CourseClub.NET].urleed6:lengthi1098e4:pathl24:[FreeCourseSite.com].txteed6:lengthi127e4:pathl24:[FreeCourseSite.com].urleee4:name85:[FreeCourseSite.com] Udemy - Ethical Hacking - A Hands-On Approach to Ethical Hacking12:piece lengthi1048576e6:pieces34900:Ɂy>Zp*ZtOcY3Q@NB ,mkhWkzqkD1jH.Ђ1Ps /+)\騎6Rt%%,vrC@ r,(E!ԕI:a [NYAּe3[܅ux[~hHb*H*<> 7@pWʋe3tfK{0a"ym3c,Vx@֤`\s=W4i֡^}4Q5!1DQ׀fda m.!&aJ]yf,`lt-3]JOe3t^x1 JHV5( ʶtu6͏n֫Ug[VOb ʨO3٬Ku4TG)KIv$q~MX9,\x5ePf:l"dtV4Aho#ht #! A&mPNI=}Yr'w;-I\2C$%X6k?bClO ǦQ `_ ϗdTH>Gm̅zYTJ>~ܕ,Tݙi%_d<Ȁ-2٣:뇸;qd49E θ㎏3+\q˟PrS 9ԍ/eѩbPp<痩>) «niZ&@~nF6S)tcR6`)1é`Jat5L$Ӄ)釫CՂ}8I.fp/)0KӢ řϺ)bgI4Jy>MY"?878HimNDx/[hk5NKƺ#c^J.r^1w 0.Կh'3hbm&3q%+D7 qn&VD&S+*5kdWҬUO/4jøZTK:LƄR-R(}`%??lACj1l`|8W6 o1Gɑʜ|.Vb-+,~@&[m)vMmQOOWT̺P!~סW:tЬG%UeO& .צ?cO" z=QCeG*6Ggħ[̊s)AHBn?mcol;I3́?0vR5AtB7Wԃjf.ׅ{,̍x?ǯ<ΰ@[VB&MUQ0(wV,7q@F\vokBw^͞ev`C6 X&Bk[w{;'S|i KHQH8'W}Y, 2Z YTԄR:B-HX%^M/}T˱H!T46kX4qp+:tU0FN%RAY!b mwZY#A(֏ĵ'_x) ֧gcĉך"1.27mZc~dKeѾi{̜/6ZHITYXctǜlvTtn%`c4n@_2Fwf9m_"KaG?yn-9Ȏot-U|Y6*L0oGoC 4 4eg??]ԻdR3AqX-62MtB,SFi5q 7UJBuSZydb*,ʰ9#6u= >A7`CF2MNjTɟ)b]2NgBunխ9jCSܬ{hИFג,0zX>qBG.Q!l9&5ux'