- 资源介绍
- 更新记录
课程介绍
考式必看,具体看目录.
课程目录
/13-096-软考-国际参透ce试认证OSCP 2022 含资料/
│├─1. O3CP 官方教材和视频
│├─2. O3CP 实战培训视频和靶机
│├─3. O3CP 域渗透(Active Directory)
│├─4. O3CP 报告模板
详细目录
1. O3CP 官方教材和视频/
│├─O3CP 中文参考教材
│├─O3CP 字幕(中文-中英对照-英文)
│├─O3CP 官方视频
│├─PWK O3CP(教材)【. 】.pdf 44.8MB
│O3CP 中文参考教材/
││├─PWK O3CP【. 】.docx 45.5MB
││├─PWK O3CP【. 】.pdf 32.2MB
│O3CP 字幕(中文-中英对照-英文)/
││├─10. Introduction To Buffer Overflows
││├─11. Windows Buffer Overflows
││├─12. Linux Buffer Overflows
││├─13. Client Side Attacks
││├─14. Locating Public Exploits
││├─15. Fixing Exploits
││├─16. File Transfers
││├─17. Antivirus Evasion
││├─18. Privilage Escalation
││├─19. Password Attacks
││├─2. Getting Comfortable With Kali Linux
││├─20. Port Redirection and Tunneling
││├─21. Active Directory Attacks
││├─22. The Metasploit Framework
││├─23. Powershell Empire
││├─24. AssemblingThe Pieces
││├─3. Command Line Fun
││├─4. Practical Tools
││├─5. Bash Scripting
││├─6. Passive Information Gathering
││├─7. Active Information Gathering
││├─8. Vulnerability Scanning
││├─9. Web Application Attacks
││10. Introduction To Buffer Overflows/
│││├─BO-text_trans【. 】.srt 43.8KB
│││├─BO-text【. 】.srt 27.7KB
│││├─BO-trans【. 】.srt 24.4KB
││11. Windows Buffer Overflows/
│││├─WBO-text_trans【. 】.srt 65.1KB
│││├─WBO-text【. 】.srt 39.7KB
│││├─WBO-trans【. 】.srt 37.5KB
││12. Linux Buffer Overflows/
│││├─LBO-text_trans【. 】.srt 26.6KB
│││├─LBO-text【. 】.srt 16.1KB
│││├─LBO-trans【. 】.srt 15.6KB
││13. Client Side Attacks/
│││├─CSA-text_trans【. 】.srt 52.6KB
│││├─CSA-text【. 】.srt 31.9KB
│││├─CSA-trans【. 】.srt 30.1KB
││14. Locating Public Exploits/
│││├─LPE-text_trans【. 】.srt 28.1KB
│││├─LPE-text【. 】.srt 17.7KB
│││├─LPE-trans【. 】.srt 16.2KB
││15. Fixing Exploits/
│││├─FE-text_trans【. 】.srt 43.2KB
│││├─FE-text【. 】.srt 26.6KB
│││├─FE-trans【. 】.srt 24.9KB
││16. File Transfers/
│││├─FT-text_trans【. 】.srt 32.7KB
│││├─FT-text【. 】.srt 19.7KB
│││├─FT-trans【. 】.srt 19KB
││17. Antivirus Evasion/
│││├─AE-text_trans【. 】.srt 40.9KB
│││├─AE-text【. 】.srt 25.5KB
│││├─AE-trans【. 】.srt 23.7KB
││18. Privilage Escalation/
│││├─PE-text_trans【. 】.srt 31.5KB
│││├─PE-text【. 】.srt 19.4KB
│││├─PE-trans【. 】.srt 18KB
││19. Password Attacks/
│││├─PA-text_trans【. 】.srt 62KB
│││├─PA-text【. 】.srt 38.2KB
│││├─PA-trans【. 】.srt 35.3KB
││2. Getting Comfortable With Kali Linux/
│││├─GCLK-text_trans【. 】.srt 35.2KB
│││├─GCLK-text【. 】.srt 21.8KB
│││├─GCLK-trans【. 】.srt 19.9KB
││20. Port Redirection and Tunneling/
│││├─RPT-text_trans【. 】.srt 56.4KB
│││├─RPT-text【. 】.srt 34.4KB
│││├─RPT-trans【. 】.srt 32.5KB
││21. Active Directory Attacks/
│││├─AD-text_trans【. 】.srt 125.9KB
│││├─AD-text【. 】.srt 78.9KB
│││├─AD-trans【. 】.srt 73KB
││22. The Metasploit Framework/
│││├─MF-text_trans【. 】.srt 86.2KB
│││├─MF-text【. 】.srt 53.1KB
│││├─MF-trans【. 】.srt 50.5KB
││23. Powershell Empire/
│││├─PX-text_trans【. 】.srt 111.6KB
│││├─PX-text【. 】.srt 69.5KB
│││├─PX-trans【. 】.srt 65KB
││24. AssemblingThe Pieces/
│││├─ATP-text_trans【. 】.srt 134.9KB
│││├─ATP-text【. 】.srt 83.7KB
│││├─ATP-trans【. 】.srt 80.3KB
││3. Command Line Fun/
│││├─CLF-text【. 】.srt 40.1KB
│││├─CLF-trans【. 】.srt 36.9KB
│││├─CLF_trans【. 】.srt 64.9KB
││4. Practical Tools/
│││├─PT-text_trans【. 】.srt 64KB
│││├─PT-text【. 】.srt 38.9KB
│││├─PT-trans【. 】.srt 37.3KB
││5. Bash Scripting/
│││├─BS-text_trans【. 】.srt 66.7KB
│││├─BS-text【. 】.srt 40.5KB
│││├─BS-trans【. 】.srt 38.2KB
││6. Passive Information Gathering/
│││├─PIG-text_trans【. 】.srt 51.9KB
│││├─PIG-text【. 】.srt 31.7KB
│││├─PIG-trans【. 】.srt 29.8KB
││7. Active Information Gathering/
│││├─AIG-text_trans【. 】.srt 76.9KB
│││├─AIG-text【. 】.srt 47.3KB
│││├─AIG-trans【. 】.srt 44.4KB
││8. Vulnerability Scanning/
│││├─VS-text_trans【. 】.srt 34.7KB
│││├─VS-text【. 】.srt 21.5KB
│││├─VS-trans【. 】.srt 19.7KB
││9. Web Application Attacks/
│││├─WAT-text-trans【. 】.srt 189.3KB
│││├─WAT-text【. 】.srt 140KB
│││├─WAT-trans【. 】.srt 123.9KB
│O3CP 官方视频/
││├─1.官方视频是从第2章开始的, 第一章和最后一章官方就没有视频【. 】.txt
││├─10. Introduction To Buffer Overflows【. 】.avi 113.3MB
││├─10. Introduction To Buffer Overflows【. 】.srt 31.9KB
││├─11. Windows Buffer Overflows【. 】.avi 289.9MB
││├─11. Windows Buffer Overflows【. 】.srt 64.4KB
││├─12. Linux Buffer Overflows【. 】.avi 124.9MB
││├─12. Linux Buffer Overflows【. 】.srt 23.9KB
││├─13. Client Side Attacks【. 】.avi 121.8MB
││├─13. Client Side Attacks【. 】.srt 47.7KB
││├─14. Locating Public Exploits【. 】.avi 69.9MB
││├─14. Locating Public Exploits【. 】.srt 25.3KB
││├─15. Fixing Exploits【. 】.avi 139.7MB
││├─15. Fixing Exploits【. 】.srt 43.1KB
││├─16. File Transfers【. 】.avi 75.2MB
││├─16. File Transfers【. 】.srt 28.7KB
││├─17. Antivirus Evasion【. 】.avi 98.2MB
││├─17. Antivirus Evasion【. 】.srt 37.3KB
││├─18. Privilage Escalation【. 】.avi 290.2MB
││├─18. Privilage Escalation【. 】.srt 99.7KB
││├─19. Password Attacks【. 】.avi 124.8MB
││├─19. Password Attacks【. 】.srt 56.2KB
││├─2. Getting Comfortable With Kali Linux【. 】.avi 63.8MB
││├─2. Getting Comfortable With Kali Linux【. 】.srt 31.7KB
││├─20. Port Redirection and Tunneling【. 】.avi 150.3MB
││├─20. Port Redirection and Tunneling【. 】.srt 50.6KB
││├─21. Active Directory Attacks【. 】.mp4 290.4MB
││├─21. Active Directory Attacks【. 】.srt 112.5KB
││├─22. The Metasploit Framework【. 】.avi 217.8MB
││├─22. The Metasploit Framework【. 】.srt 76.7KB
││├─23. Powershell Empire【. 】.avi 88.8MB
││├─23. Powershell Empire【. 】.srt 28.6KB
││├─24. AssemblingThe Pieces【. 】.avi 362.3MB
││├─24. AssemblingThe Pieces【. 】.srt 83.7KB
││├─3. Command Line Fun【. 】.avi 112.7MB
││├─3. Command Line Fun【. 】.srt 58KB
││├─4. Practical Tools【. 】.avi 176.1MB
││├─4. Practical Tools【. 】.srt 56.1KB
││├─5. Bash Scripting【. 】.avi 111.9MB
││├─5. Bash Scripting【. 】.srt 59.2KB
││├─6. Passive Information Gathering【. 】.avi 139.9MB
││├─6. Passive Information Gathering【. 】.srt 46.4KB
││├─7. Active Information Gathering【. 】.avi 158.7MB
││├─7. Active Information Gathering【. 】.srt 75.5KB
││├─8. Vulnerability Scanning【. 】.avi 73.8MB
││├─8. Vulnerability Scanning【. 】.srt 31.4KB
││├─9. Web Application Attacks【. 】.avi 386.1MB
││├─9. Web Application Attacks【. 】.srt 140KB
2. O3CP 实战培训视频和靶机/
│├─O3CP实战培训 (核心篇)
│├─O3CP实战视频 (基础-提高-扩展)
│├─实时翻译播放器【. 】.txt 327byte
│O3CP实战培训 (核心篇)/
││├─实战培训视频
││├─文本
││├─靶机
││实战培训视频/
│││├─001 Introduction-en【. 】.srt 3.1KB
│││├─001 Introduction【. 】.mp4 16.3MB
│││├─002 Download and Configure Kali Linux VM on VirtualBox-en【. 】.srt 11.3KB
│││├─002 Download and Configure Kali Linux VM on VirtualBox【. 】.mp4 100.1MB
│││├─003 Download and Config Vulnerable Attack Target VMs-en【. 】.srt 2.5KB
│││├─003 Download and Config Vulnerable Attack Target VMs【. 】.mp4 13.8MB
│││├─004 Tr0ll 3 Enumeration and Exploitation-en【. 】.srt 28.8KB
│││├─004 Tr0ll 3 Enumeration and Exploitation【. 】.mp4 166.1MB
│││├─005 Matrix 3 Enumeration and Exploitation-en【. 】.srt 31KB
│││├─005 Matrix 3 Enumeration and Exploitation【. 】.mp4 223.2MB
│││├─006 Broken Gallery Enumeration and Exploitation-en【. 】.srt 16.8KB
│││├─006 Broken Gallery Enumeration and Exploitation【. 】.mp4 111.3MB
│││├─007 DumbUser (Windows 10) Enumeration and Exploitation-en【. 】.srt 20.2KB
│││├─007 DumbUser (Windows 10) Enumeration and Exploitation【. 】.mp4 158.5MB
│││├─008 Symfonos 1 Enumeration and Exploitation-en【. 】.srt 22.6KB
│││├─008 Symfonos 1 Enumeration and Exploitation【. 】.mp4 199MB
│││├─009 Symfonos 2 Enumeration and Exploitation-en【. 】.srt 17.3KB
│││├─009 Symfonos 2 Enumeration and Exploitation【. 】.mp4 164.9MB
│││├─010 Symfonos 3 Enumeration and Exploitation-en【. 】.srt 12.8KB
│││├─010 Symfonos 3 Enumeration and Exploitation【. 】.mp4 101.1MB
│││├─011 Symfonos 4 Enumeration and Exploitation-en【. 】.srt 27KB
│││├─011 Symfonos 4 Enumeration and Exploitation【. 】.mp4 200.5MB
│││├─012 Symfonos 5 Enumeration and Exploitation-en【. 】.srt 12.8KB
│││├─012 Symfonos 5 Enumeration and Exploitation【. 】.mp4 111.6MB
│││├─013 digialworld.local JOY Enumeration and Exploitation-en【. 】.srt 16.5KB
│││├─013 digialworld.local JOY Enumeration and Exploitation【. 】.mp4 153.8MB
│││├─014 digitalworld.local Torment Enumeration and Exploitation-en【. 】.srt 19.9KB
│││├─014 digitalworld.local Torment Enumeration and Exploitation【. 】.mp4 181.6MB
││文本/
│││├─003 Download-and-Configure-Vulnerable-Attack-Targets【. 】.txt 572byte
│││├─004 Tr0ll-3【. 】.txt 950byte
│││├─005 Matrix-3【. 】.txt 776byte
│││├─006 Broken-Gallery【. 】.txt 621byte
│││├─007 DumbUser-Windows-10【. 】.txt 1.2KB
│││├─008 Symfonos-1【. 】.txt 1.5KB
│││├─009 Symfonos-2【. 】.txt 836byte
│││├─010 Symfonos-3【. 】.txt 877byte
│││├─011 SQLi-payloads【. 】.txt 114byte
│││├─011 Symfonos-4【. 】.txt 1.1KB
│││├─011 lfi-wordlist【. 】.txt 39.8KB
│││├─012 Symfonos-5【. 】.txt 619byte
││靶机/
│││├─Broken Vbox【. 】.7z 2.1GB
│││├─DumbUser Win10【. 】.ova 8.3GB
│││├─JOY-005【. 】.7z 3.2GB
│││├─Machine_Matrix_v3【. 】.ova 553.5MB
│││├─TORMENT-004【. 】.7z 2.5GB
│││├─Tr0ll3【. 】.ova 4GB
│││├─symfonos1【. 】.7z 738.7MB
│││├─symfonos2【. 】.7z 1GB
│││├─symfonos3【. 】.7z 861.3MB
│││├─symfonos4【. 】.7z 846.6MB
│││├─symfonos5【. 】.7z 1.5GB
│O3CP实战视频 (基础-提高-扩展)/
││├─基础篇
││├─实战培训视频(文本)
││├─扩展篇
││├─提高篇
││├─靶机
││基础篇/
│││├─1. Overview of Lab Commands and Tools【. 】.mp4 115.5MB
│││├─1. Overview of Lab Commands and Tools【. 】.srt 9.3KB
│││├─10. Tr0ll 2 – Enumeration and Exploitation Technet24【. 】.mp4 229.9MB
│││├─10. Tr0ll 2 – Enumeration and Exploitation Technet24【. 】.srt 25.7KB
│││├─11. Bonus Lab 1 Security Onion Lab Setup with VirtualBox【. 】.mp4 180.5MB
│││├─12. Bonus Lab 1 Security Onion Lab Setup with VirtualBox【. 】.srt 19.7KB
│││├─12. Bonus Lab 2 Windows 7 Eternalblue Vulnerable VM VirtualBox Setup【. 】.mp4 11MB
│││├─12. Bonus Lab 2 Windows 7 Eternalblue Vulnerable VM VirtualBox Setup【. 】.srt 2.7KB
│││├─13. Bonus Lab 3 Windows 7 Eternalblue Exploitation and SnortPCAP Analysis【. 】.mp4 59.7MB
│││├─13. Bonus Lab 3 Windows 7 Eternalblue Exploitation and SnortPCAP Analysis【. 】.srt 17.8KB
│││├─14. Bonus Lab 4 Ubuntu Server 12.04 Vulnerable VM VirtualBox Setup【. 】.mp4 27.3MB
│││├─14. Bonus Lab 4 Ubuntu Server 12.04 Vulnerable VM VirtualBox Setup【. 】.srt 6.4KB
│││├─15. Bonus Lab 5 Ubuntu Server 12.04 Heartbleed Exploitation and SnortPCAP Analysis【. 】.mp4 47.7MB
│││├─15. Bonus Lab 5 Ubuntu Server 12.04 Heartbleed Exploitation and SnortPCAP Analysis【. 】.srt 10.8KB
│││├─16. Bonus Lab 6 SLMail Buffer Overflow Development【. 】.mp4 89MB
│││├─16. Bonus Lab 6 SLMail Buffer Overflow Development【. 】.srt 24.2KB
│││├─2. Download and Configure Kali Linux【. 】.mp4 100.1MB
│││├─2. Download and Configure Kali Linux【. 】.srt 6.8KB
│││├─3. Download Vulnerable Lab VMs【. 】.mp4 11.9MB
│││├─3. Download Vulnerable Lab VMs【. 】.srt 2.4KB
│││├─4. Kioptrix Level 1 – Enumeration and Exploitation【. 】.mp4 75.4MB
│││├─4. Kioptrix Level 1 – Enumeration and Exploitation【. 】.srt 9.8KB
│││├─5. Kioptrix Level 2 – Enumeration and Exploitation【. 】.mp4 206.8MB
│││├─5. Kioptrix Level 2 – Enumeration and Exploitation【. 】.srt 22KB
│││├─6. Kioptrix Level 3 – Enumeration and Exploitation【. 】.mp4 226.9MB
│││├─6. Kioptrix Level 3 – Enumeration and Exploitation【. 】.srt 21.7KB
│││├─7. Kioptrix Level 4 – Enumeration and Exploitation【. 】.mp4 153.8MB
│││├─7. Kioptrix Level 4 – Enumeration and Exploitation【. 】.srt 16KB
│││├─8. Kioptrix Level 5 – Enumeration and Exploitation【. 】.mp4 196.3MB
│││├─8. Kioptrix Level 5 – Enumeration and Exploitation【. 】.srt 17.3KB
│││├─9. Tr0ll 1 – Enumeration and Exploitation【. 】.mp4 117.1MB
│││├─9. Tr0ll 1 – Enumeration and Exploitation【. 】.srt 12.4KB
││实战培训视频(文本)/
│││├─基础
│││├─扩展
│││├─提高
│││基础/
││││├─10.1 Lecture 10.txt【. 】.txt 730byte
││││├─11.1 Lecture 11.txt【. 】.txt 1.3KB
││││├─12.1 Secuirty Onion Lab.txt【. 】.txt 473byte
││││├─13.1 Windows 7 EternalBlue VM Setup.txt【. 】.txt 227byte
││││├─14.1 Windows 7 Eternalblue Resources.txt【. 】.txt 761byte
││││├─15.1 Heartbleed Lab Setup.txt【. 】.txt 519byte
││││├─16.1 Heartbleed Lab Resources.txt【. 】.txt 840byte
││││├─17.1 Bonus Lab 7.txt【. 】.txt 691byte
││││├─2.1 Lecture 2.txt【. 】.txt 2.1KB
││││├─3.1 Lecture 3.txt【. 】.txt 195byte
││││├─4.1 Lecture 4.txt【. 】.txt 75byte
││││├─5.1 Lecture 5.txt【. 】.txt 262byte
││││├─6.1 Lecture 6.txt【. 】.txt 1.7KB
││││├─7.1 Lecture 7.txt【. 】.txt 880byte
││││├─8.1 Lecture 8.txt【. 】.txt 1.7KB
││││├─9.1 Lecture 9.txt【. 】.txt 6.9KB
│││扩展/
││││├─002 Lecture-2【. 】.txt 2.1KB
││││├─003 Download-and-Configure-Kali-Linux-2020【. 】.txt 97byte
││││├─004 Lecture-3【. 】.txt 200byte
││││├─005 Lecture-4【. 】.txt 355byte
││││├─006 Lecture-5【. 】.txt 95byte
││││├─007 Lecture-6【. 】.txt 935byte
││││├─007 lfipayloads.txt【. 】.txt 1012byte
││││├─008 Lecture-7【. 】.txt 3.1KB
││││├─009 Lecture-8【. 】.txt 727byte
││││├─010 Lecture-9【. 】.txt 765byte
││││├─011 Lecture-10【. 】.txt 627byte
││││├─012 Lecture-11【. 】.txt 191byte
││││├─013 Lecture-12【. 】.txt 667byte
││││├─014 Lecture-13【. 】.txt 1.2KB
││││├─015 Lecture-14【. 】.txt 575byte
││││├─016 Lecture-15【. 】.txt 75byte
││││├─017 Lecture-16【. 】.txt 458byte
│││提高/
││││├─002 Lecture-2【. 】.txt 2.1KB
││││├─003 Download-and-Configure-Kali-Linux-2020【. 】.txt 97byte
││││├─004 Lecture-3【. 】.txt 195byte
││││├─005 Lecture-4【. 】.txt 103byte
││││├─006 Lecture-5【. 】.txt 1.2KB
││││├─007 Lecture-6【. 】.txt 483byte
││││├─008 Lecture-7【. 】.txt 978byte
││││├─009 Lecture-8【. 】.txt 485byte
││││├─010 Lecture-9【. 】.txt 855byte
││││├─011 Lecture-10【. 】.txt 1.5KB
││││├─012 Lecture-11【. 】.txt 480byte
││││├─013 Lecture-12【. 】.txt 1.4KB
││││├─014 Lecture-13【. 】.txt 2.7KB
││││├─015 Lecture-14【. 】.txt 747byte
││扩展篇/
│││├─1.Overview of Lab Commands and Tools-en【. 】.srt 9.7KB
│││├─1.Overview of Lab Commands and Tools【. 】.mp4 115.6MB
│││├─10.Introduction to Hackthebox-en【. 】.srt 8.1KB
│││├─10.Introduction to Hackthebox【. 】.mp4 117.4MB
│││├─11.Active VM Enumeration and Exploitation-en【. 】.srt 8.7KB
│││├─11.Active VM Enumeration and Exploitation【. 】.mp4 106.8MB
│││├─12.Windows 2008 Setup, Enumeration and Exploitation (Metasploitable 3)-en【. 】.srt 12.8KB
│││├─12.Windows 2008 Setup, Enumeration and Exploitation (Metasploitable 3)【. 】.mp4 136.7MB
│││├─13.Apache Struts Setup and Exploitation-en【. 】.srt 4KB
│││├─13.Apache Struts Setup and Exploitation【. 】.mp4 40.5MB
│││├─14.Introduction to Hack.me-en【. 】.srt 2.3KB
│││├─14.Introduction to Hack.me【. 】.mp4 19.3MB
│││├─15.Wordpress Enumeration and Exploitation-en【. 】.srt 6.3KB
│││├─15.Wordpress Enumeration and Exploitation【. 】.mp4 74.4MB
│││├─2.Download and Configure Kali Linux VM on VirtualBox-en【. 】.srt 9.2KB
│││├─2.Download and Configure Kali Linux VM on VirtualBox【. 】.mp4 78.2MB
│││├─3.Download and Configure Window 7 Analysis VM-en【. 】.srt 6.8KB
│││├─3.Download and Configure Window 7 Analysis VM【. 】.mp4 93.6MB
│││├─4.Download Vulnerable Lab VMs-en【. 】.srt 1.1KB
│││├─4.Download Vulnerable Lab VMs【. 】.mp4 3.6MB
│││├─5.PwnLab VM Enumeration and Exploitation-en【. 】.srt 23KB
│││├─5.PwnLab VM Enumeration and Exploitation【. 】.mp4 260.2MB
│││├─6.Brainpan 1 VM Enumeration and Exploitation-en【. 】.srt 36.4KB
│││├─6.Brainpan 1 VM Enumeration and Exploitation【. 】.mp4 338.5MB
│││├─7.Mr Robot 1 VM Enumeration and Exploiotation-en【. 】.srt 18.6KB
│││├─7.Mr Robot 1 VM Enumeration and Exploiotation【. 】.mp4 203.8MB
│││├─8.SickOS VM Enumeration and Exploitation-en【. 】.srt 7KB
│││├─8.SickOS VM Enumeration and Exploitation【. 】.mp4 86.7MB
│││├─9.SkyTower 1 VM Enumeration and Exploitation-en【. 】.srt 11KB
│││├─9.SkyTower 1 VM Enumeration and Exploitation【. 】.mp4 127.2MB
││提高篇/
│││├─1.Overview of Lab Commands and Tools-en【. 】.srt 9.7KB
│││├─1.Overview of Lab Commands and Tools【. 】.mp4 115.5MB
│││├─10.VulnOS 2 Enumeration and Exploitation-en【. 】.srt 12.6KB
│││├─10.VulnOS 2 Enumeration and Exploitation【. 】.mp4 131.1MB
│││├─11.Windows 7 Enumeration and Exploitation-en【. 】.srt 15.3KB
│││├─11.Windows 7 Enumeration and Exploitation【. 】.mp4 116.4MB
│││├─12.IMF Enumeration and Exploitation-en【. 】.srt 42.3KB
│││├─12.IMF Enumeration and Exploitation【. 】.mp4 391.9MB
│││├─13.XSS Firing Range Enumeration and Exploitation-en【. 】.srt 22.5KB
│││├─13.XSS Firing Range Enumeration and Exploitation【. 】.mp4 191.6MB
│││├─2.Download and Configure Kali Linux VM on VirtualBox-en【. 】.srt 11.3KB
│││├─2.Download and Configure Kali Linux VM on VirtualBox【. 】.mp4 100.1MB
│││├─3.Download Vulnerable Lab VMs-en【. 】.srt 1023byte
│││├─3.Download Vulnerable Lab VMs【. 】.mp4 3.3MB
│││├─4.Goldeneye Enumeration and Exploitation-en【. 】.srt 31.7KB
│││├─4.Goldeneye Enumeration and Exploitation【. 】.mp4 258.2MB
│││├─5.Raven 1 Enumeration and Exploitation-en【. 】.srt 9.3KB
│││├─5.Raven 1 Enumeration and Exploitation【. 】.mp4 88.8MB
│││├─6.Raven 2 Enumeration and Exploitation-en【. 】.srt 15.9KB
│││├─6.Raven 2 Enumeration and Exploitation【. 】.mp4 136.9MB
│││├─7.Lampiao Enumeration and Exploitation-en【. 】.srt 8.9KB
│││├─7.Lampiao Enumeration and Exploitation【. 】.mp4 91.4MB
│││├─8.DerpnStink Enumeration and Exploitation-en【. 】.srt 24.7KB
│││├─8.DerpnStink Enumeration and Exploitation【. 】.mp4 224.5MB
│││├─9.Stapler Enumeration and Exploitation-en【. 】.srt 19.8KB
│││├─9.Stapler Enumeration and Exploitation【. 】.mp4 164.5MB
││靶机/
│││├─基础篇靶机
│││├─扩展篇靶机
│││├─提高篇靶机
│││基础篇靶机/
││││├─Kioptrix Level 1【. 】.ova 249.5MB
││││├─Kioptrix Level 2【. 】.ova 558.5MB
││││├─Kioptrix Level 3【. 】.ova 585.9MB
││││├─Kioptrix Level 4【. 】.ova 286.3MB
││││├─Kioptrix Level 5【. 】.ova 961MB
││││├─Tr0ll 1【. 】.ova 597.3MB
││││├─Tr0ll2_vbox【. 】.7z 493.2MB
│││扩展篇靶机/
││││├─SkyTower【. 】.zip 289.6MB
││││├─brainpan【. 】.ova 822.9MB
││││├─mrRobot【. 】.ova 703.4MB
││││├─pwnlab_init【. 】.ova 784.8MB
││││├─sick0s1.1【. 】.7z 622.3MB
│││提高篇靶机/
││││├─GoldenEye-v1【. 】.ova 805MB
││││├─IMF【. 】.ova 1.5GB
││││├─Lampiao【. 】.zip 668.3MB
││││├─Raven2【. 】.ova 764.9MB
││││├─Raven【. 】.ova 1.4GB
││││├─Stapler【. 】.zip 706.9MB
││││├─VulnHub2018_DeRPnStiNK【. 】.ova 1.7GB
││││├─VulnOSv2【. 】.7z 762.9MB
││││├─Vulnerable Win7【. 】.ova 5.6GB
3. O3CP 域渗透(Active Directory)/
│├─Pentesting_Active_directory【. 】.xmind 577.7KB
│├─关于域渗透AD的备考策略【. 】.pdf 74KB
4. O3CP 报告模板/
│├─OSCP-Exam-Report-Template-master【. 】.rar 358.1KB
猜你喜欢
-
2024年11月王勇软考系统架构设计师
2025-03-24 -
2023 腾科-华为认证HCIA-security和HCIP-security-价值4999元-完结无秘
2023-12-26 -
2025计算机408[有部分无法识别的sz格式视频,注意查看目录]
2025-03-09 -
深度之眼-全球AI大赛年度会员课程合集
2024-11-18 -
代码源信奥C++
2024-11-14 -
2024王道CPP
2025-01-08 -
软考-国际参透ce试认证OSCP 2022 含资料
2024-05-30 -
Oracle认证大师课程-OCM-Oracle-PL-SQL开发全套视频
2023-11-24 -
2023-网络工程师-软考中级历年真题+课件+视频教程+资料价值9800
2023-11-24 -
python考级竞赛资料
2024-10-28
-
oracle视频教程及OCP认证教程
2023-11-24 -
黑马-2024年C语言一套通关
2024-11-01 -
邹月平软考高级:系统架构设计师精品班
2024-11-24 -
HVV资料-华为(Huawei Validation Value)认证
2024-11-10 -
2024王道考研408计算机领学班
2024-11-07 -
2024最新软考网络工程师summer课堂
2024-11-10 -
【新盟教育-博雅】HCIA(93期)
2024-11-24 -
学这个(推荐红帽9)2023年最新红帽9版本rhcsa+rhce
2024-11-27 -
计算机软件资格考试官方教材(初级+中级+高级)
2024-10-19 -
2022-网络工程师-软考中级|历年真题+课件+视频教程+资料|价值7800
2023-11-24
猜你在找
2. 分享目的仅供大家学习和交流,您必须在下载后24小时内删除!
3. 不得使用于非法商业用途,不得违反国家法律。否则后果自负!
4. 本站提供的源码、模板、插件等等其他资源,都不包含技术服务请大家谅解!
5. 如有链接无法下载、失效或广告,请联系管理员处理!
6. 本站资源售价只是赞助,收取费用仅维持本站的日常运营所需!
7. 如遇到加密压缩包,默认解压密码为"www.xitnds.com"或“xitnds.com”,如遇到无法解压的请联系管理员!
学IT那点事 » 软考-国际参透ce试认证OSCP 2022 含资料
常见问题FAQ
- 免费下载或者VIP会员专享资源能否直接商用?
- 本站所有资源版权均属于原作者所有,这里所提供资源均只能用于参考学习用,请勿直接商用。若由于商用引起版权纠纷,一切责任均由使用者承担。更多说明请参考 VIP介绍。
- 提示下载完但解压或打开不了?
- 找不到素材资源介绍文章里的示例图片?
- 学IT那点事下载免费吗?