103.100.234.190 - /Tutorials/Udemy.Complete.Ethical.Hacking.and.Cybersecurity.Course.BOOKWARE-SOFTiMAGE/11 - PostExploitation Techniques/
[To Parent Directory]
12/9/2024 10:26 PM 160252733 100 - Privilege Escalation UAC Bypass.mp4
12/9/2024 10:25 PM 217486204 101 - Memory Dumping with Mimikatz.mp4
12/9/2024 10:26 PM 67798260 102 - Procdump and lsassexe.mp4
12/9/2024 10:26 PM 228295140 103 - Password Cracking John the Ripper and Hashcat.mp4
12/9/2024 10:26 PM 140085638 104 - Backdoors in Binaries.mp4
12/9/2024 10:25 PM 22821702 105 - Meterpreter Process Migration.mp4
12/9/2024 10:26 PM 245214220 106 - Evidence Wiping.mp4
12/9/2024 9:59 PM 1836 107 - Relevant Files to Delete.html
12/9/2024 10:21 PM 1486221 107 - SANS-Digital-Forensic-Poster.pdf
12/9/2024 10:26 PM 43561645 96 - Introduction to the PostExploitation Phase.mp4
12/9/2024 10:19 PM 64478 97 - Post-Exploitation-Slides.pdf
12/9/2024 10:25 PM 41442141 97 - PostExploitation Techniques.mp4
12/9/2024 10:26 PM 238405746 98 - Linux Meterpreter for PostExploitation.mp4
12/9/2024 10:26 PM 176517074 99 - Windows Meterpreter for PostExploitation.mp4