There is no glory in what used to be the 'scene' - download for fun, don't fuck with it. ―krazy8
  • U: Anonymous
  • D: 2022-03-09 10:19:19
  • C: Unknown

RELEASE >

ReScene version pyReScene Auto 0.7 UDUMMY File size CRC
Download
11,517
Stored files
2,710 9B5DA491
828 1CF444C6
RAR-files
udemy.arp.spoofing.andman.in.the.middle.attacks.execution.anddetection-udummy.rar 400,000,000 0CB704CA
udemy.arp.spoofing.andman.in.the.middle.attacks.execution.anddetection-udummy.r00 400,000,000 E8F846ED
udemy.arp.spoofing.andman.in.the.middle.attacks.execution.anddetection-udummy.r01 400,000,000 20C2BAF4
udemy.arp.spoofing.andman.in.the.middle.attacks.execution.anddetection-udummy.r02 400,000,000 EB228FA4
udemy.arp.spoofing.andman.in.the.middle.attacks.execution.anddetection-udummy.r03 400,000,000 9E0ABF65
udemy.arp.spoofing.andman.in.the.middle.attacks.execution.anddetection-udummy.r04 400,000,000 C62D892C
udemy.arp.spoofing.andman.in.the.middle.attacks.execution.anddetection-udummy.r05 400,000,000 F83CF003
udemy.arp.spoofing.andman.in.the.middle.attacks.execution.anddetection-udummy.r06 400,000,000 FC54B16E
udemy.arp.spoofing.andman.in.the.middle.attacks.execution.anddetection-udummy.r07 375,883,788 F60315BD

Total size: 3,575,883,788
Archived files
36-Creating_a_Fake_Update_and_Hacking_Any_Device_In_The_Network.mkv [5e8ab1a640cefb37] 92,664,540 C3E4F1CE
38-Detecting_Suspicious_Activities_using_Wireshark.mkv [b29595676c5ae0f0] 43,802,335 AC861D95
37-Detecting_ARP_Poisoning_Attacks.mkv [35ba9db47c7cc09e] 49,460,951 43C972F4
35-Using_A_Basic_Delivery_Method_To_Test_The_Backdoor_and_Hack_Windows_10.mkv [65d2067f430c62e0] 45,792,121 8BD6A15F
33-Creating_An_Undetectable_Backdoor.mkv [2cc41da32f8bf669] 133,554,589 30978D6E
34-Listening_For_Incoming_Connections.mkv [c17e45c08254aa8b] 19,564,180 16691B4E
31-Capturing_Passwords_and_Anything_Sent_By_Any_Device_In_The_Network.mkv [94c3025448f37b6a] 177,722,631 1CA850A2
32-Installing_Veil_Framework.mkv [c0b4501ccea99e7] 89,602,273 68D510BF
30-Using_Filters_Tracing_and_Dissecting_Packets.mkv [47bf63b62c20eb4d] 89,697,728 42AC01C7
29-Sniffing_and_Analysing_Data.mkv [c3830e7ef293f50e] 92,091,882 3A3B2105
28-Basic_Overview_and_How_To_Use_It_With_MITM_Attacks.mkv [7cf125ae78be3695] 135,003,450 828C241B
27-Doing_All_of_The_Above_Using_a_Graphical_Interface.mkv [6d39a5aa1c5c97d1] 140,562,828 0A6603A0
23-Bypassing_HTTPS.mkv [eb8bd81553cc8053] 264,083,248 F37100BF
25-DNS_Spoofing.mkv [1353205697e27297] 133,974,146 AC4BFA20
26-Injecting_Javascript_Code.mkv [fa7f6ca7ab28ff31] 73,759,995 223B9059
24-Bypassing_HSTS.mkv [da7d5373a8f415fb] 175,691,496 D3D2917D
22-Creating_Custom_Spoofing_Script.mkv [b5507a3670743ee] 151,393,095 B0D4379A
21-Spying_on_Network_Devices_(Capturing_Passwords_Visited_Websites__etc).mkv [2b48f17b56292410] 97,061,182 FB50FEE7
17-ARP_Poisoning_Theory.mkv [ca69f434c3be562c] 252,437,034 2CAD4F51
20-ARP_Poisonning_Using_Bettercap.mkv [aee6a9a878304706] 50,787,915 F2CB7E40
19-Bettercap_Basics.mkv [fcfd0fca90c338ae] 88,811,247 381FA715
18-ARP_Poisonning_Using_arpspoof.mkv [4efcfd93554bc2c1] 36,755,032 1B63F4FC
16-Gathering_Even_More_Information_Using_Zenmap.mkv [5a250128500cb57a] 111,628,848 BD9126D5
15-Gathering_More_Information_Using_Zenmap.mkv [a3c4e28669b8ab0] 25,094,009 BF95FF5C
14-Discovering_Connected_Clients_using_netdiscover.mkv [ec57fe746e82bf3b] 42,741,445 9F3663B8
12-What_is_MAC_Address_and_How_To_Change_It.mkv [caf396f4873b2623] 108,005,538 2CE8C97C
13-Installing_Windows_As_a_Virtual_Machine.mkv [7f37e566ccedb777] 44,896,484 86E35D58
09-Linux_Terminal_and_Basic_Commands.mkv [648b4bc895aba94c] 224,743,739 205CDEF5
11-Connecting_a_Wireless_Adapter_To_Kali.mkv [2e3f35d15acba723] 29,105,500 A5FCAA4E
10-Network_Basics.mkv [1161407a3e212fd7] 24,705,337 95DCB103
07-Installing_Kali_Linux_as_a_VM_on_Linux.mkv [328f99268d2db040] 104,545,051 6260D2DC
08-Kali_Linux_Overview.mkv [74086e624c3ce58d] 31,102,767 6BC6CC35
06-Installing_Kali_Linux_as_a_VM_on_Apple_M1_Computers.mkv [3a759c48e73e7773] 70,173,548 25330329
04-Installing_Kali_Linux_as_a_VM_on_Windows.mkv [e161d85199e4b8be] 62,652,090 B1A588DC
03-Initial_Preparation.mkv [4b80e4e718b87e66] 162,149,865 E823CFB8
05-Installing_Kali_Linux_as_a_VM_on_Apple_Mac_OS.mkv [b812aeedb66d978a] 51,599,519 12D2FB19
02-Lab_Overview_and_Needed_Software.mkv [250e7248cdc229f1] 30,490,726 3BBFC7FB
01-Introduction_and_Course_Outline.mkv [75a6a0cbae9af81] 16,008,267 90F71EC2
supplemental_assets\evilgrade-installation-commands-updated.txt 859 DB109055
supplemental_assets\hstshijack-v3.zip 14,226 928B3334
supplemental_assets\Post+Connection+Attacks (1).pdf 1,947,700 DD8D14E8
supplemental_assets 0 00000000

Total size: 3,575,879,416
RAR Recovery
Not Present
Labels UNKNOWN