最新公告
  • 欢迎您光临学IT那点事,本站秉承服务宗旨 履行“站长”责任,销售只是起点 服务永无止境!立即加入我们
  • 软考-国际参透ce试认证OSCP 2022 含资料

    软考-国际参透ce试认证OSCP 2022 含资料 最后编辑:2024-05-30
    会员服务: 网盘下载 自动提取 学习指导 环境配置二次开发BUG修复

    课程介绍

    考式必看,具体看目录.

    课程目录

    /13-096-软考-国际参透ce试认证OSCP 2022 含资料/
    │├─1. O3CP 官方教材和视频
    │├─2. O3CP 实战培训视频和靶机
    │├─3. O3CP 域渗透(Active Directory)
    │├─4. O3CP 报告模板

    详细目录

    1. O3CP 官方教材和视频/
    │├─O3CP 中文参考教材
    │├─O3CP 字幕(中文-中英对照-英文)
    │├─O3CP 官方视频
    │├─PWK O3CP(教材)【. 】.pdf 44.8MB
    │O3CP 中文参考教材/
    ││├─PWK O3CP【. 】.docx 45.5MB
    ││├─PWK O3CP【. 】.pdf 32.2MB
    │O3CP 字幕(中文-中英对照-英文)/
    ││├─10. Introduction To Buffer Overflows
    ││├─11. Windows Buffer Overflows
    ││├─12. Linux Buffer Overflows
    ││├─13. Client Side Attacks
    ││├─14. Locating Public Exploits
    ││├─15. Fixing Exploits
    ││├─16. File Transfers
    ││├─17. Antivirus Evasion
    ││├─18. Privilage Escalation
    ││├─19. Password Attacks
    ││├─2. Getting Comfortable With Kali Linux
    ││├─20. Port Redirection and Tunneling
    ││├─21. Active Directory Attacks
    ││├─22. The Metasploit Framework
    ││├─23. Powershell Empire
    ││├─24. AssemblingThe Pieces
    ││├─3. Command Line Fun
    ││├─4. Practical Tools
    ││├─5. Bash Scripting
    ││├─6. Passive Information Gathering
    ││├─7. Active Information Gathering
    ││├─8. Vulnerability Scanning
    ││├─9. Web Application Attacks
    ││10. Introduction To Buffer Overflows/
    │││├─BO-text_trans【. 】.srt 43.8KB
    │││├─BO-text【. 】.srt 27.7KB
    │││├─BO-trans【. 】.srt 24.4KB
    ││11. Windows Buffer Overflows/
    │││├─WBO-text_trans【. 】.srt 65.1KB
    │││├─WBO-text【. 】.srt 39.7KB
    │││├─WBO-trans【. 】.srt 37.5KB
    ││12. Linux Buffer Overflows/
    │││├─LBO-text_trans【. 】.srt 26.6KB
    │││├─LBO-text【. 】.srt 16.1KB
    │││├─LBO-trans【. 】.srt 15.6KB
    ││13. Client Side Attacks/
    │││├─CSA-text_trans【. 】.srt 52.6KB
    │││├─CSA-text【. 】.srt 31.9KB
    │││├─CSA-trans【. 】.srt 30.1KB
    ││14. Locating Public Exploits/
    │││├─LPE-text_trans【. 】.srt 28.1KB
    │││├─LPE-text【. 】.srt 17.7KB
    │││├─LPE-trans【. 】.srt 16.2KB
    ││15. Fixing Exploits/
    │││├─FE-text_trans【. 】.srt 43.2KB
    │││├─FE-text【. 】.srt 26.6KB
    │││├─FE-trans【. 】.srt 24.9KB
    ││16. File Transfers/
    │││├─FT-text_trans【. 】.srt 32.7KB
    │││├─FT-text【. 】.srt 19.7KB
    │││├─FT-trans【. 】.srt 19KB
    ││17. Antivirus Evasion/
    │││├─AE-text_trans【. 】.srt 40.9KB
    │││├─AE-text【. 】.srt 25.5KB
    │││├─AE-trans【. 】.srt 23.7KB
    ││18. Privilage Escalation/
    │││├─PE-text_trans【. 】.srt 31.5KB
    │││├─PE-text【. 】.srt 19.4KB
    │││├─PE-trans【. 】.srt 18KB
    ││19. Password Attacks/
    │││├─PA-text_trans【. 】.srt 62KB
    │││├─PA-text【. 】.srt 38.2KB
    │││├─PA-trans【. 】.srt 35.3KB
    ││2. Getting Comfortable With Kali Linux/
    │││├─GCLK-text_trans【. 】.srt 35.2KB
    │││├─GCLK-text【. 】.srt 21.8KB
    │││├─GCLK-trans【. 】.srt 19.9KB
    ││20. Port Redirection and Tunneling/
    │││├─RPT-text_trans【. 】.srt 56.4KB
    │││├─RPT-text【. 】.srt 34.4KB
    │││├─RPT-trans【. 】.srt 32.5KB
    ││21. Active Directory Attacks/
    │││├─AD-text_trans【. 】.srt 125.9KB
    │││├─AD-text【. 】.srt 78.9KB
    │││├─AD-trans【. 】.srt 73KB
    ││22. The Metasploit Framework/
    │││├─MF-text_trans【. 】.srt 86.2KB
    │││├─MF-text【. 】.srt 53.1KB
    │││├─MF-trans【. 】.srt 50.5KB
    ││23. Powershell Empire/
    │││├─PX-text_trans【. 】.srt 111.6KB
    │││├─PX-text【. 】.srt 69.5KB
    │││├─PX-trans【. 】.srt 65KB
    ││24. AssemblingThe Pieces/
    │││├─ATP-text_trans【. 】.srt 134.9KB
    │││├─ATP-text【. 】.srt 83.7KB
    │││├─ATP-trans【. 】.srt 80.3KB
    ││3. Command Line Fun/
    │││├─CLF-text【. 】.srt 40.1KB
    │││├─CLF-trans【. 】.srt 36.9KB
    │││├─CLF_trans【. 】.srt 64.9KB
    ││4. Practical Tools/
    │││├─PT-text_trans【. 】.srt 64KB
    │││├─PT-text【. 】.srt 38.9KB
    │││├─PT-trans【. 】.srt 37.3KB
    ││5. Bash Scripting/
    │││├─BS-text_trans【. 】.srt 66.7KB
    │││├─BS-text【. 】.srt 40.5KB
    │││├─BS-trans【. 】.srt 38.2KB
    ││6. Passive Information Gathering/
    │││├─PIG-text_trans【. 】.srt 51.9KB
    │││├─PIG-text【. 】.srt 31.7KB
    │││├─PIG-trans【. 】.srt 29.8KB
    ││7. Active Information Gathering/
    │││├─AIG-text_trans【. 】.srt 76.9KB
    │││├─AIG-text【. 】.srt 47.3KB
    │││├─AIG-trans【. 】.srt 44.4KB
    ││8. Vulnerability Scanning/
    │││├─VS-text_trans【. 】.srt 34.7KB
    │││├─VS-text【. 】.srt 21.5KB
    │││├─VS-trans【. 】.srt 19.7KB
    ││9. Web Application Attacks/
    │││├─WAT-text-trans【. 】.srt 189.3KB
    │││├─WAT-text【. 】.srt 140KB
    │││├─WAT-trans【. 】.srt 123.9KB
    │O3CP 官方视频/
    ││├─1.官方视频是从第2章开始的, 第一章和最后一章官方就没有视频【. 】.txt
    ││├─10. Introduction To Buffer Overflows【. 】.avi 113.3MB
    ││├─10. Introduction To Buffer Overflows【. 】.srt 31.9KB
    ││├─11. Windows Buffer Overflows【. 】.avi 289.9MB
    ││├─11. Windows Buffer Overflows【. 】.srt 64.4KB
    ││├─12. Linux Buffer Overflows【. 】.avi 124.9MB
    ││├─12. Linux Buffer Overflows【. 】.srt 23.9KB
    ││├─13. Client Side Attacks【. 】.avi 121.8MB
    ││├─13. Client Side Attacks【. 】.srt 47.7KB
    ││├─14. Locating Public Exploits【. 】.avi 69.9MB
    ││├─14. Locating Public Exploits【. 】.srt 25.3KB
    ││├─15. Fixing Exploits【. 】.avi 139.7MB
    ││├─15. Fixing Exploits【. 】.srt 43.1KB
    ││├─16. File Transfers【. 】.avi 75.2MB
    ││├─16. File Transfers【. 】.srt 28.7KB
    ││├─17. Antivirus Evasion【. 】.avi 98.2MB
    ││├─17. Antivirus Evasion【. 】.srt 37.3KB
    ││├─18. Privilage Escalation【. 】.avi 290.2MB
    ││├─18. Privilage Escalation【. 】.srt 99.7KB
    ││├─19. Password Attacks【. 】.avi 124.8MB
    ││├─19. Password Attacks【. 】.srt 56.2KB
    ││├─2. Getting Comfortable With Kali Linux【. 】.avi 63.8MB
    ││├─2. Getting Comfortable With Kali Linux【. 】.srt 31.7KB
    ││├─20. Port Redirection and Tunneling【. 】.avi 150.3MB
    ││├─20. Port Redirection and Tunneling【. 】.srt 50.6KB
    ││├─21. Active Directory Attacks【. 】.mp4 290.4MB
    ││├─21. Active Directory Attacks【. 】.srt 112.5KB
    ││├─22. The Metasploit Framework【. 】.avi 217.8MB
    ││├─22. The Metasploit Framework【. 】.srt 76.7KB
    ││├─23. Powershell Empire【. 】.avi 88.8MB
    ││├─23. Powershell Empire【. 】.srt 28.6KB
    ││├─24. AssemblingThe Pieces【. 】.avi 362.3MB
    ││├─24. AssemblingThe Pieces【. 】.srt 83.7KB
    ││├─3. Command Line Fun【. 】.avi 112.7MB
    ││├─3. Command Line Fun【. 】.srt 58KB
    ││├─4. Practical Tools【. 】.avi 176.1MB
    ││├─4. Practical Tools【. 】.srt 56.1KB
    ││├─5. Bash Scripting【. 】.avi 111.9MB
    ││├─5. Bash Scripting【. 】.srt 59.2KB
    ││├─6. Passive Information Gathering【. 】.avi 139.9MB
    ││├─6. Passive Information Gathering【. 】.srt 46.4KB
    ││├─7. Active Information Gathering【. 】.avi 158.7MB
    ││├─7. Active Information Gathering【. 】.srt 75.5KB
    ││├─8. Vulnerability Scanning【. 】.avi 73.8MB
    ││├─8. Vulnerability Scanning【. 】.srt 31.4KB
    ││├─9. Web Application Attacks【. 】.avi 386.1MB
    ││├─9. Web Application Attacks【. 】.srt 140KB
    2. O3CP 实战培训视频和靶机/
    │├─O3CP实战培训 (核心篇)
    │├─O3CP实战视频 (基础-提高-扩展)
    │├─实时翻译播放器【. 】.txt 327byte
    │O3CP实战培训 (核心篇)/
    ││├─实战培训视频
    ││├─文本
    ││├─靶机
    ││实战培训视频/
    │││├─001 Introduction-en【. 】.srt 3.1KB
    │││├─001 Introduction【. 】.mp4 16.3MB
    │││├─002 Download and Configure Kali Linux VM on VirtualBox-en【. 】.srt 11.3KB
    │││├─002 Download and Configure Kali Linux VM on VirtualBox【. 】.mp4 100.1MB
    │││├─003 Download and Config Vulnerable Attack Target VMs-en【. 】.srt 2.5KB
    │││├─003 Download and Config Vulnerable Attack Target VMs【. 】.mp4 13.8MB
    │││├─004 Tr0ll 3 Enumeration and Exploitation-en【. 】.srt 28.8KB
    │││├─004 Tr0ll 3 Enumeration and Exploitation【. 】.mp4 166.1MB
    │││├─005 Matrix 3 Enumeration and Exploitation-en【. 】.srt 31KB
    │││├─005 Matrix 3 Enumeration and Exploitation【. 】.mp4 223.2MB
    │││├─006 Broken Gallery Enumeration and Exploitation-en【. 】.srt 16.8KB
    │││├─006 Broken Gallery Enumeration and Exploitation【. 】.mp4 111.3MB
    │││├─007 DumbUser (Windows 10) Enumeration and Exploitation-en【. 】.srt 20.2KB
    │││├─007 DumbUser (Windows 10) Enumeration and Exploitation【. 】.mp4 158.5MB
    │││├─008 Symfonos 1 Enumeration and Exploitation-en【. 】.srt 22.6KB
    │││├─008 Symfonos 1 Enumeration and Exploitation【. 】.mp4 199MB
    │││├─009 Symfonos 2 Enumeration and Exploitation-en【. 】.srt 17.3KB
    │││├─009 Symfonos 2 Enumeration and Exploitation【. 】.mp4 164.9MB
    │││├─010 Symfonos 3 Enumeration and Exploitation-en【. 】.srt 12.8KB
    │││├─010 Symfonos 3 Enumeration and Exploitation【. 】.mp4 101.1MB
    │││├─011 Symfonos 4 Enumeration and Exploitation-en【. 】.srt 27KB
    │││├─011 Symfonos 4 Enumeration and Exploitation【. 】.mp4 200.5MB
    │││├─012 Symfonos 5 Enumeration and Exploitation-en【. 】.srt 12.8KB
    │││├─012 Symfonos 5 Enumeration and Exploitation【. 】.mp4 111.6MB
    │││├─013 digialworld.local JOY Enumeration and Exploitation-en【. 】.srt 16.5KB
    │││├─013 digialworld.local JOY Enumeration and Exploitation【. 】.mp4 153.8MB
    │││├─014 digitalworld.local Torment Enumeration and Exploitation-en【. 】.srt 19.9KB
    │││├─014 digitalworld.local Torment Enumeration and Exploitation【. 】.mp4 181.6MB
    ││文本/
    │││├─003 Download-and-Configure-Vulnerable-Attack-Targets【. 】.txt 572byte
    │││├─004 Tr0ll-3【. 】.txt 950byte
    │││├─005 Matrix-3【. 】.txt 776byte
    │││├─006 Broken-Gallery【. 】.txt 621byte
    │││├─007 DumbUser-Windows-10【. 】.txt 1.2KB
    │││├─008 Symfonos-1【. 】.txt 1.5KB
    │││├─009 Symfonos-2【. 】.txt 836byte
    │││├─010 Symfonos-3【. 】.txt 877byte
    │││├─011 SQLi-payloads【. 】.txt 114byte
    │││├─011 Symfonos-4【. 】.txt 1.1KB
    │││├─011 lfi-wordlist【. 】.txt 39.8KB
    │││├─012 Symfonos-5【. 】.txt 619byte
    ││靶机/
    │││├─Broken Vbox【. 】.7z 2.1GB
    │││├─DumbUser Win10【. 】.ova 8.3GB
    │││├─JOY-005【. 】.7z 3.2GB
    │││├─Machine_Matrix_v3【. 】.ova 553.5MB
    │││├─TORMENT-004【. 】.7z 2.5GB
    │││├─Tr0ll3【. 】.ova 4GB
    │││├─symfonos1【. 】.7z 738.7MB
    │││├─symfonos2【. 】.7z 1GB
    │││├─symfonos3【. 】.7z 861.3MB
    │││├─symfonos4【. 】.7z 846.6MB
    │││├─symfonos5【. 】.7z 1.5GB
    │O3CP实战视频 (基础-提高-扩展)/
    ││├─基础篇
    ││├─实战培训视频(文本)
    ││├─扩展篇
    ││├─提高篇
    ││├─靶机
    ││基础篇/
    │││├─1. Overview of Lab Commands and Tools【. 】.mp4 115.5MB
    │││├─1. Overview of Lab Commands and Tools【. 】.srt 9.3KB
    │││├─10. Tr0ll 2 – Enumeration and Exploitation Technet24【. 】.mp4 229.9MB
    │││├─10. Tr0ll 2 – Enumeration and Exploitation Technet24【. 】.srt 25.7KB
    │││├─11. Bonus Lab 1 Security Onion Lab Setup with VirtualBox【. 】.mp4 180.5MB
    │││├─12. Bonus Lab 1 Security Onion Lab Setup with VirtualBox【. 】.srt 19.7KB
    │││├─12. Bonus Lab 2 Windows 7 Eternalblue Vulnerable VM VirtualBox Setup【. 】.mp4 11MB
    │││├─12. Bonus Lab 2 Windows 7 Eternalblue Vulnerable VM VirtualBox Setup【. 】.srt 2.7KB
    │││├─13. Bonus Lab 3 Windows 7 Eternalblue Exploitation and SnortPCAP Analysis【. 】.mp4 59.7MB
    │││├─13. Bonus Lab 3 Windows 7 Eternalblue Exploitation and SnortPCAP Analysis【. 】.srt 17.8KB
    │││├─14. Bonus Lab 4 Ubuntu Server 12.04 Vulnerable VM VirtualBox Setup【. 】.mp4 27.3MB
    │││├─14. Bonus Lab 4 Ubuntu Server 12.04 Vulnerable VM VirtualBox Setup【. 】.srt 6.4KB
    │││├─15. Bonus Lab 5 Ubuntu Server 12.04 Heartbleed Exploitation and SnortPCAP Analysis【. 】.mp4 47.7MB
    │││├─15. Bonus Lab 5 Ubuntu Server 12.04 Heartbleed Exploitation and SnortPCAP Analysis【. 】.srt 10.8KB
    │││├─16. Bonus Lab 6 SLMail Buffer Overflow Development【. 】.mp4 89MB
    │││├─16. Bonus Lab 6 SLMail Buffer Overflow Development【. 】.srt 24.2KB
    │││├─2. Download and Configure Kali Linux【. 】.mp4 100.1MB
    │││├─2. Download and Configure Kali Linux【. 】.srt 6.8KB
    │││├─3. Download Vulnerable Lab VMs【. 】.mp4 11.9MB
    │││├─3. Download Vulnerable Lab VMs【. 】.srt 2.4KB
    │││├─4. Kioptrix Level 1 – Enumeration and Exploitation【. 】.mp4 75.4MB
    │││├─4. Kioptrix Level 1 – Enumeration and Exploitation【. 】.srt 9.8KB
    │││├─5. Kioptrix Level 2 – Enumeration and Exploitation【. 】.mp4 206.8MB
    │││├─5. Kioptrix Level 2 – Enumeration and Exploitation【. 】.srt 22KB
    │││├─6. Kioptrix Level 3 – Enumeration and Exploitation【. 】.mp4 226.9MB
    │││├─6. Kioptrix Level 3 – Enumeration and Exploitation【. 】.srt 21.7KB
    │││├─7. Kioptrix Level 4 – Enumeration and Exploitation【. 】.mp4 153.8MB
    │││├─7. Kioptrix Level 4 – Enumeration and Exploitation【. 】.srt 16KB
    │││├─8. Kioptrix Level 5 – Enumeration and Exploitation【. 】.mp4 196.3MB
    │││├─8. Kioptrix Level 5 – Enumeration and Exploitation【. 】.srt 17.3KB
    │││├─9. Tr0ll 1 – Enumeration and Exploitation【. 】.mp4 117.1MB
    │││├─9. Tr0ll 1 – Enumeration and Exploitation【. 】.srt 12.4KB
    ││实战培训视频(文本)/
    │││├─基础
    │││├─扩展
    │││├─提高
    │││基础/
    ││││├─10.1 Lecture 10.txt【. 】.txt 730byte
    ││││├─11.1 Lecture 11.txt【. 】.txt 1.3KB
    ││││├─12.1 Secuirty Onion Lab.txt【. 】.txt 473byte
    ││││├─13.1 Windows 7 EternalBlue VM Setup.txt【. 】.txt 227byte
    ││││├─14.1 Windows 7 Eternalblue Resources.txt【. 】.txt 761byte
    ││││├─15.1 Heartbleed Lab Setup.txt【. 】.txt 519byte
    ││││├─16.1 Heartbleed Lab Resources.txt【. 】.txt 840byte
    ││││├─17.1 Bonus Lab 7.txt【. 】.txt 691byte
    ││││├─2.1 Lecture 2.txt【. 】.txt 2.1KB
    ││││├─3.1 Lecture 3.txt【. 】.txt 195byte
    ││││├─4.1 Lecture 4.txt【. 】.txt 75byte
    ││││├─5.1 Lecture 5.txt【. 】.txt 262byte
    ││││├─6.1 Lecture 6.txt【. 】.txt 1.7KB
    ││││├─7.1 Lecture 7.txt【. 】.txt 880byte
    ││││├─8.1 Lecture 8.txt【. 】.txt 1.7KB
    ││││├─9.1 Lecture 9.txt【. 】.txt 6.9KB
    │││扩展/
    ││││├─002 Lecture-2【. 】.txt 2.1KB
    ││││├─003 Download-and-Configure-Kali-Linux-2020【. 】.txt 97byte
    ││││├─004 Lecture-3【. 】.txt 200byte
    ││││├─005 Lecture-4【. 】.txt 355byte
    ││││├─006 Lecture-5【. 】.txt 95byte
    ││││├─007 Lecture-6【. 】.txt 935byte
    ││││├─007 lfipayloads.txt【. 】.txt 1012byte
    ││││├─008 Lecture-7【. 】.txt 3.1KB
    ││││├─009 Lecture-8【. 】.txt 727byte
    ││││├─010 Lecture-9【. 】.txt 765byte
    ││││├─011 Lecture-10【. 】.txt 627byte
    ││││├─012 Lecture-11【. 】.txt 191byte
    ││││├─013 Lecture-12【. 】.txt 667byte
    ││││├─014 Lecture-13【. 】.txt 1.2KB
    ││││├─015 Lecture-14【. 】.txt 575byte
    ││││├─016 Lecture-15【. 】.txt 75byte
    ││││├─017 Lecture-16【. 】.txt 458byte
    │││提高/
    ││││├─002 Lecture-2【. 】.txt 2.1KB
    ││││├─003 Download-and-Configure-Kali-Linux-2020【. 】.txt 97byte
    ││││├─004 Lecture-3【. 】.txt 195byte
    ││││├─005 Lecture-4【. 】.txt 103byte
    ││││├─006 Lecture-5【. 】.txt 1.2KB
    ││││├─007 Lecture-6【. 】.txt 483byte
    ││││├─008 Lecture-7【. 】.txt 978byte
    ││││├─009 Lecture-8【. 】.txt 485byte
    ││││├─010 Lecture-9【. 】.txt 855byte
    ││││├─011 Lecture-10【. 】.txt 1.5KB
    ││││├─012 Lecture-11【. 】.txt 480byte
    ││││├─013 Lecture-12【. 】.txt 1.4KB
    ││││├─014 Lecture-13【. 】.txt 2.7KB
    ││││├─015 Lecture-14【. 】.txt 747byte
    ││扩展篇/
    │││├─1.Overview of Lab Commands and Tools-en【. 】.srt 9.7KB
    │││├─1.Overview of Lab Commands and Tools【. 】.mp4 115.6MB
    │││├─10.Introduction to Hackthebox-en【. 】.srt 8.1KB
    │││├─10.Introduction to Hackthebox【. 】.mp4 117.4MB
    │││├─11.Active VM Enumeration and Exploitation-en【. 】.srt 8.7KB
    │││├─11.Active VM Enumeration and Exploitation【. 】.mp4 106.8MB
    │││├─12.Windows 2008 Setup, Enumeration and Exploitation (Metasploitable 3)-en【. 】.srt 12.8KB
    │││├─12.Windows 2008 Setup, Enumeration and Exploitation (Metasploitable 3)【. 】.mp4 136.7MB
    │││├─13.Apache Struts Setup and Exploitation-en【. 】.srt 4KB
    │││├─13.Apache Struts Setup and Exploitation【. 】.mp4 40.5MB
    │││├─14.Introduction to Hack.me-en【. 】.srt 2.3KB
    │││├─14.Introduction to Hack.me【. 】.mp4 19.3MB
    │││├─15.Wordpress Enumeration and Exploitation-en【. 】.srt 6.3KB
    │││├─15.Wordpress Enumeration and Exploitation【. 】.mp4 74.4MB
    │││├─2.Download and Configure Kali Linux VM on VirtualBox-en【. 】.srt 9.2KB
    │││├─2.Download and Configure Kali Linux VM on VirtualBox【. 】.mp4 78.2MB
    │││├─3.Download and Configure Window 7 Analysis VM-en【. 】.srt 6.8KB
    │││├─3.Download and Configure Window 7 Analysis VM【. 】.mp4 93.6MB
    │││├─4.Download Vulnerable Lab VMs-en【. 】.srt 1.1KB
    │││├─4.Download Vulnerable Lab VMs【. 】.mp4 3.6MB
    │││├─5.PwnLab VM Enumeration and Exploitation-en【. 】.srt 23KB
    │││├─5.PwnLab VM Enumeration and Exploitation【. 】.mp4 260.2MB
    │││├─6.Brainpan 1 VM Enumeration and Exploitation-en【. 】.srt 36.4KB
    │││├─6.Brainpan 1 VM Enumeration and Exploitation【. 】.mp4 338.5MB
    │││├─7.Mr Robot 1 VM Enumeration and Exploiotation-en【. 】.srt 18.6KB
    │││├─7.Mr Robot 1 VM Enumeration and Exploiotation【. 】.mp4 203.8MB
    │││├─8.SickOS VM Enumeration and Exploitation-en【. 】.srt 7KB
    │││├─8.SickOS VM Enumeration and Exploitation【. 】.mp4 86.7MB
    │││├─9.SkyTower 1 VM Enumeration and Exploitation-en【. 】.srt 11KB
    │││├─9.SkyTower 1 VM Enumeration and Exploitation【. 】.mp4 127.2MB
    ││提高篇/
    │││├─1.Overview of Lab Commands and Tools-en【. 】.srt 9.7KB
    │││├─1.Overview of Lab Commands and Tools【. 】.mp4 115.5MB
    │││├─10.VulnOS 2 Enumeration and Exploitation-en【. 】.srt 12.6KB
    │││├─10.VulnOS 2 Enumeration and Exploitation【. 】.mp4 131.1MB
    │││├─11.Windows 7 Enumeration and Exploitation-en【. 】.srt 15.3KB
    │││├─11.Windows 7 Enumeration and Exploitation【. 】.mp4 116.4MB
    │││├─12.IMF Enumeration and Exploitation-en【. 】.srt 42.3KB
    │││├─12.IMF Enumeration and Exploitation【. 】.mp4 391.9MB
    │││├─13.XSS Firing Range Enumeration and Exploitation-en【. 】.srt 22.5KB
    │││├─13.XSS Firing Range Enumeration and Exploitation【. 】.mp4 191.6MB
    │││├─2.Download and Configure Kali Linux VM on VirtualBox-en【. 】.srt 11.3KB
    │││├─2.Download and Configure Kali Linux VM on VirtualBox【. 】.mp4 100.1MB
    │││├─3.Download Vulnerable Lab VMs-en【. 】.srt 1023byte
    │││├─3.Download Vulnerable Lab VMs【. 】.mp4 3.3MB
    │││├─4.Goldeneye Enumeration and Exploitation-en【. 】.srt 31.7KB
    │││├─4.Goldeneye Enumeration and Exploitation【. 】.mp4 258.2MB
    │││├─5.Raven 1 Enumeration and Exploitation-en【. 】.srt 9.3KB
    │││├─5.Raven 1 Enumeration and Exploitation【. 】.mp4 88.8MB
    │││├─6.Raven 2 Enumeration and Exploitation-en【. 】.srt 15.9KB
    │││├─6.Raven 2 Enumeration and Exploitation【. 】.mp4 136.9MB
    │││├─7.Lampiao Enumeration and Exploitation-en【. 】.srt 8.9KB
    │││├─7.Lampiao Enumeration and Exploitation【. 】.mp4 91.4MB
    │││├─8.DerpnStink Enumeration and Exploitation-en【. 】.srt 24.7KB
    │││├─8.DerpnStink Enumeration and Exploitation【. 】.mp4 224.5MB
    │││├─9.Stapler Enumeration and Exploitation-en【. 】.srt 19.8KB
    │││├─9.Stapler Enumeration and Exploitation【. 】.mp4 164.5MB
    ││靶机/
    │││├─基础篇靶机
    │││├─扩展篇靶机
    │││├─提高篇靶机
    │││基础篇靶机/
    ││││├─Kioptrix Level 1【. 】.ova 249.5MB
    ││││├─Kioptrix Level 2【. 】.ova 558.5MB
    ││││├─Kioptrix Level 3【. 】.ova 585.9MB
    ││││├─Kioptrix Level 4【. 】.ova 286.3MB
    ││││├─Kioptrix Level 5【. 】.ova 961MB
    ││││├─Tr0ll 1【. 】.ova 597.3MB
    ││││├─Tr0ll2_vbox【. 】.7z 493.2MB
    │││扩展篇靶机/
    ││││├─SkyTower【. 】.zip 289.6MB
    ││││├─brainpan【. 】.ova 822.9MB
    ││││├─mrRobot【. 】.ova 703.4MB
    ││││├─pwnlab_init【. 】.ova 784.8MB
    ││││├─sick0s1.1【. 】.7z 622.3MB
    │││提高篇靶机/
    ││││├─GoldenEye-v1【. 】.ova 805MB
    ││││├─IMF【. 】.ova 1.5GB
    ││││├─Lampiao【. 】.zip 668.3MB
    ││││├─Raven2【. 】.ova 764.9MB
    ││││├─Raven【. 】.ova 1.4GB
    ││││├─Stapler【. 】.zip 706.9MB
    ││││├─VulnHub2018_DeRPnStiNK【. 】.ova 1.7GB
    ││││├─VulnOSv2【. 】.7z 762.9MB
    ││││├─Vulnerable Win7【. 】.ova 5.6GB
    3. O3CP 域渗透(Active Directory)/
    │├─Pentesting_Active_directory【. 】.xmind 577.7KB
    │├─关于域渗透AD的备考策略【. 】.pdf 74KB
    4. O3CP 报告模板/
    │├─OSCP-Exam-Report-Template-master【. 】.rar 358.1KB

    猜你在找

    1. 本站所有资源来源于用户上传和网络,如有侵权请邮件联系站长!
    2. 分享目的仅供大家学习和交流,您必须在下载后24小时内删除!
    3. 不得使用于非法商业用途,不得违反国家法律。否则后果自负!
    4. 本站提供的源码、模板、插件等等其他资源,都不包含技术服务请大家谅解!
    5. 如有链接无法下载、失效或广告,请联系管理员处理!
    6. 本站资源售价只是赞助,收取费用仅维持本站的日常运营所需!
    7. 如遇到加密压缩包,默认解压密码为"www.xitnds.com"或“xitnds.com”,如遇到无法解压的请联系管理员!
    学IT那点事 » 软考-国际参透ce试认证OSCP 2022 含资料

    常见问题FAQ

    免费下载或者VIP会员专享资源能否直接商用?
    本站所有资源版权均属于原作者所有,这里所提供资源均只能用于参考学习用,请勿直接商用。若由于商用引起版权纠纷,一切责任均由使用者承担。更多说明请参考 VIP介绍。
    提示下载完但解压或打开不了?
    最常见的情况是下载不完整: 可对比下载完压缩包的与网盘上的容量,若小于网盘提示的容量则是这个原因。这是浏览器下载的bug,建议用百度网盘软件或迅雷下载。若排除这种情况,可在对应资源底部留言,或 联络我们.。
    找不到素材资源介绍文章里的示例图片?
    本站所有资源会进行单独保存,如果下载链接失效可以联系管理员进行修正!!下载的文件打不开,也可百度或联系管理员,比如有些视频格式需要特殊的播放器待
    学IT那点事下载免费吗?
    本站原则上是免费下载的,但不是无条件开放,本站以分享币下进行分享下载,可以免费获取分享币,获取途径:1.每天进行签到;2.推广本站资源;3.发布高质量相关资源;4.当然你也可以直接扫码赞助购买,也可以一次性加入永久VIP!
    • 2024-05-30Hi,初次和大家见面了,请多关照!

    售后服务:

    • 下载须知 1、站内收录的教程与资源均是不加密的资源,收集整理进行分享,其版权归原作者及其网站所有。
      2、本站仅为资源分享的平台,站内资源仅供学习研究所用,不得用于商业用途,不对所造成的后果负责。
      3、本站教程仅供本站会员学习参考,不得传播及用于其他用途,学习完后请在24小时内自行删除。
      付费须知 1、本站原则上不收取任何费用,所有资源可免费获取,积分获取途径
      2、如自扫码等支付,纯属自愿支持本站建设,所有费用都用于网站服务器/域名/CDS加速等用途。
      3、开通终身VIP者,本站保证开通之日起五年以上(使用不到五年者,无条件按时间比例退还)。
      4、如本站如经营受阻,会提前告知用户,并退还剩于款项(已经用于本站建设的费用扣除后按比例退还)。
      售后服务时间 周一至周日(法定节假日除外) 9:00-23:00
      免责声明 本站所提供的资源(教程/项目/资料)等资源仅供学习交流,若使用商业用途,请购买正版授权,否则产生的一切后果将由下载用户自行承担,有部分资源为网上收集或仿制而来,若模板侵犯了您的合法权益,请来信通知我们(Email: 56928691@qq.com),我们会及时删除,给您带来的不便,我们深表歉意!

    Hi, 如果你对这资料有疑问,可以跟我联系哦!

    联系管理员
    • 14183会员总数(位)
    • 38171资源总数(个)
    • 0本周发布(个)
    • 0 今日发布(个)
    • 2074稳定运行(天)

    提供最优质的资源集合

    赞助本站svip 了解详情
  • © 2008 - 2023 Theme by - 学IT那点事 . All rights reserved 湘ICP备2022013417号

  • XML地图 | 站长导航
    升级SVIP尊享更多特权立即升级