Pluralsight - Exploitation with PowerShell 2023-3
File List
- powershell-exploitation.zip 23.5 MB
- 3. Client-side Exploitation/6. Phishing with Hyperlinks and HTML Smuggling.mp4 15.1 MB
- 4. Bypassing Security/4. Attack Surface Reduction.mp4 12.3 MB
- 4. Bypassing Security/5. Anti-malware Scan Interface.mp4 11.9 MB
- 4. Bypassing Security/7. Office Trusted Locations.mp4 11.0 MB
- 2. Crafting Payloads/9. Custom Tools.mp4 10.7 MB
- 4. Bypassing Security/6. PowerShell Logging.mp4 10.2 MB
- 4. Bypassing Security/2. AppLocker.mp4 8.9 MB
- 2. Crafting Payloads/4. Demo - Meterpreter.mp4 7.7 MB
- 3. Client-side Exploitation/2. Microsoft Office Macros.mp4 7.3 MB
- 2. Crafting Payloads/8. Veil-Ordnance.mp4 7.1 MB
- 2. Crafting Payloads/7. DNSCat.mp4 6.8 MB
- 3. Client-side Exploitation/5. Office Macro Shellcode Injection.mp4 6.6 MB
- 5. Remote Exploitation/3. SMB and RPC.mp4 6.4 MB
- 2. Crafting Payloads/6. Demo - Nishang.mp4 5.6 MB
- 5. Remote Exploitation/5. WMI.mp4 5.5 MB
- 5. Remote Exploitation/2. WinRM.mp4 5.3 MB
- 2. Crafting Payloads/2. What Are Payloads and How Are They Delivered.mp4 5.0 MB
- 4. Bypassing Security/3. Constrained Language Mode.mp4 4.9 MB
- 5. Remote Exploitation/6. SSH.mp4 4.6 MB
- 2. Crafting Payloads/3. Meterpreter.mp4 4.4 MB
- 3. Client-side Exploitation/4. PowerShell Download Cradles in Office Macros.mp4 4.4 MB
- 5. Remote Exploitation/4. RDP.mp4 4.2 MB
- 1. Course Overview/1. Course Overview.mp4 4.1 MB
- 3. Client-side Exploitation/3. Weaponizing Office Documents.mp4 4.0 MB
- 4. Bypassing Security/1. Common Security Mitigations.mp4 3.0 MB
- 3. Client-side Exploitation/8. Summary.mp4 2.6 MB
- 6. Course Conclusion/2. Course Recap.mp4 2.3 MB
- 2. Crafting Payloads/1. Why Learn PowerShell Exploitation.mp4 2.2 MB
- 3. Client-side Exploitation/1. Introduction to Client-side Exploitation.mp4 2.1 MB
- 3. Client-side Exploitation/7. The Rubber Ducky.mp4 2.1 MB
- 5. Remote Exploitation/1. Introduction to Remote Exploitation.mp4 1.8 MB
- 5. Remote Exploitation/7. Getting a Reverse Shell on a Remote Target.mp4 1.6 MB
- 6. Course Conclusion/1. Course Conclusion.mp4 1.5 MB
- 2. Crafting Payloads/5. Nishang.mp4 1.1 MB
- 4. Bypassing Security/8. Summary.mp4 1.0 MB
- 3. Client-side Exploitation/6. Phishing with Hyperlinks and HTML Smuggling.vtt 11.8 KB
- 4. Bypassing Security/5. Anti-malware Scan Interface.vtt 8.2 KB
- 4. Bypassing Security/4. Attack Surface Reduction.vtt 6.3 KB
- 5. Remote Exploitation/2. WinRM.vtt 5.8 KB
- 4. Bypassing Security/2. AppLocker.vtt 5.8 KB
- 2. Crafting Payloads/9. Custom Tools.vtt 5.7 KB
- 3. Client-side Exploitation/2. Microsoft Office Macros.vtt 5.6 KB
- 2. Crafting Payloads/4. Demo - Meterpreter.vtt 5.5 KB
- 2. Crafting Payloads/2. What Are Payloads and How Are They Delivered.vtt 5.3 KB
- 2. Crafting Payloads/7. DNSCat.vtt 5.3 KB
- 3. Client-side Exploitation/5. Office Macro Shellcode Injection.vtt 5.2 KB
- 4. Bypassing Security/7. Office Trusted Locations.vtt 4.6 KB
- 4. Bypassing Security/3. Constrained Language Mode.vtt 4.6 KB
- 4. Bypassing Security/6. PowerShell Logging.vtt 4.5 KB
- 5. Remote Exploitation/3. SMB and RPC.vtt 4.4 KB
- 5. Remote Exploitation/5. WMI.vtt 4.3 KB
- 2. Crafting Payloads/8. Veil-Ordnance.vtt 4.2 KB
- 3. Client-side Exploitation/4. PowerShell Download Cradles in Office Macros.vtt 4.0 KB
- 2. Crafting Payloads/3. Meterpreter.vtt 4.0 KB
- 5. Remote Exploitation/6. SSH.vtt 3.6 KB
- 3. Client-side Exploitation/3. Weaponizing Office Documents.vtt 3.5 KB
- 4. Bypassing Security/1. Common Security Mitigations.vtt 3.5 KB
- 2. Crafting Payloads/6. Demo - Nishang.vtt 3.3 KB
- 5. Remote Exploitation/4. RDP.vtt 3.1 KB
- 1. Course Overview/1. Course Overview.vtt 2.7 KB
- 6. Course Conclusion/2. Course Recap.vtt 2.4 KB
- 3. Client-side Exploitation/8. Summary.vtt 2.3 KB
- 3. Client-side Exploitation/1. Introduction to Client-side Exploitation.vtt 2.0 KB
- 5. Remote Exploitation/1. Introduction to Remote Exploitation.vtt 1.8 KB
- 5. Remote Exploitation/7. Getting a Reverse Shell on a Remote Target.vtt 1.7 KB
- 2. Crafting Payloads/1. Why Learn PowerShell Exploitation.vtt 1.6 KB
- 2. Crafting Payloads/5. Nishang.vtt 1.3 KB
- 3. Client-side Exploitation/7. The Rubber Ducky.vtt 1.3 KB
- 6. Course Conclusion/1. Course Conclusion.vtt 1.3 KB
- 4. Bypassing Security/8. Summary.vtt 1019 bytes
- Read me.txt 121 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.