软考-国际参透ce试认证OSCP 2022 含资料
需要相关资料联系微信:vip15881588vip
课程介绍
考式必看,具体看目录.
课程目录
/13-096-软考-国际参透ce试认证OSCP 2022 含资料/
│├─1. O3CP 官方教材和视频
│├─2. O3CP 实战培训视频和靶机
│├─3. O3CP 域渗透(Active Directory)
│├─4. O3CP 报告模板
详细目录
1. O3CP 官方教材和视频/
│├─O3CP 中文参考教材
│├─O3CP 字幕(中文-中英对照-英文)
│├─O3CP 官方视频
│├─PWK O3CP(教材)【. 】.pdf 44.8MB
│O3CP 中文参考教材/
││├─PWK O3CP【. 】.docx 45.5MB
││├─PWK O3CP【. 】.pdf 32.2MB
│O3CP 字幕(中文-中英对照-英文)/
││├─10. Introduction To Buffer Overflows
││├─11. Windows Buffer Overflows
││├─12. linux Buffer Overflows
││├─13. Client Side Attacks
││├─14. Locating Public Exploits
││├─15. Fixing Exploits
││├─16. File Transfers
││├─17. Antivirus Evasion
││├─18. Privilage Escalation
││├─19. Password Attacks
││├─2. Getting Comfortable With Kali Linux
││├─20. Port Redirection and Tunneling
││├─21. Active Directory Attacks
││├─22. The Metasploit Framework
││├─23. Powershell Empire
││├─24. AssemblingThe Pieces
││├─3. Command Line Fun
││├─4. Practical Tools
││├─5. Bash Scripting
││├─6. Passive Information Gathering
││├─7. Active Information Gathering
││├─8. Vulnerability Scanning
││├─9. Web Application Attacks
││10. Introduction To Buffer Overflows/
│││├─BO-text_trans【. 】.srt 43.8KB
│││├─BO-text【. 】.srt 27.7KB
│││├─BO-trans【. 】.srt 24.4KB
││11. Windows Buffer Overflows/
│││├─WBO-text_trans【. 】.srt 65.1KB
│││├─WBO-text【. 】.srt 39.7KB
│││├─WBO-trans【. 】.srt 37.5KB
││12. Linux Buffer Overflows/
│││├─LBO-text_trans【. 】.srt 26.6KB
│││├─LBO-text【. 】.srt 16.1KB
│││├─LBO-trans【. 】.srt 15.6KB
││13. Client Side Attacks/
│││├─CSA-text_trans【. 】.srt 52.6KB
│││├─CSA-text【. 】.srt 31.9KB
│││├─CSA-trans【. 】.srt 30.1KB
││14. Locating Public Exploits/
│││├─LPE-text_trans【. 】.srt 28.1KB
│││├─LPE-text【. 】.srt 17.7KB
│││├─LPE-trans【. 】.srt 16.2KB
││15. Fixing Exploits/
│││├─FE-text_trans【. 】.srt 43.2KB
│││├─FE-text【. 】.srt 26.6KB
│││├─FE-trans【. 】.srt 24.9KB
││16. File Transfers/
│││├─FT-text_trans【. 】.srt 32.7KB
│││├─FT-text【. 】.srt 19.7KB
│││├─FT-trans【. 】.srt 19KB
││17. Antivirus Evasion/
│││├─AE-text_trans【. 】.srt 40.9KB
│││├─AE-text【. 】.srt 25.5KB
│││├─AE-trans【. 】.srt 23.7KB
││18. Privilage Escalation/
│││├─PE-text_trans【. 】.srt 31.5KB
│││├─PE-text【. 】.srt 19.4KB
│││├─PE-trans【. 】.srt 18KB
││19. Password Attacks/
│││├─PA-text_trans【. 】.srt 62KB
│││├─PA-text【. 】.srt 38.2KB
│││├─PA-trans【. 】.srt 35.3KB
││2. Getting Comfortable With Kali Linux/
│││├─GCLK-text_trans【. 】.srt 35.2KB
│││├─GCLK-text【. 】.srt 21.8KB
│││├─GCLK-trans【. 】.srt 19.9KB
││20. Port Redirection and Tunneling/
│││├─RPT-text_trans【. 】.srt 56.4KB
│││├─RPT-text【. 】.srt 34.4KB
│││├─RPT-trans【. 】.srt 32.5KB
││21. Active Directory Attacks/
│││├─AD-text_trans【. 】.srt 125.9KB
│││├─AD-text【. 】.srt 78.9KB
│││├─AD-trans【. 】.srt 73KB
││22. The Metasploit Framework/
│││├─MF-text_trans【. 】.srt 86.2KB
│││├─MF-text【. 】.srt 53.1KB
│││├─MF-trans【. 】.srt 50.5KB
││23. Powershell Empire/
│││├─PX-text_trans【. 】.srt 111.6KB
│││├─PX-text【. 】.srt 69.5KB
│││├─PX-trans【. 】.srt 65KB
││24. AssemblingThe Pieces/
│││├─ATP-text_trans【. 】.srt 134.9KB
│││├─ATP-text【. 】.srt 83.7KB
│││├─ATP-trans【. 】.srt 80.3KB
││3. Command Line Fun/
│││├─CLF-text【. 】.srt 40.1KB
│││├─CLF-trans【. 】.srt 36.9KB
│││├─CLF_trans【. 】.srt 64.9KB
││4. Practical Tools/
│││├─PT-text_trans【. 】.srt 64KB
│││├─PT-text【. 】.srt 38.9KB
│││├─PT-trans【. 】.srt 37.3KB
││5. Bash Scripting/
│││├─BS-text_trans【. 】.srt 66.7KB
│││├─BS-text【. 】.srt 40.5KB
│││├─BS-trans【. 】.srt 38.2KB
││6. Passive Information Gathering/
│││├─PIG-text_trans【. 】.srt 51.9KB
│││├─PIG-text【. 】.srt 31.7KB
│││├─PIG-trans【. 】.srt 29.8KB
││7. Active Information Gathering/
│││├─AIG-text_trans【. 】.srt 76.9KB
│││├─AIG-text【. 】.srt 47.3KB
│││├─AIG-trans【. 】.srt 44.4KB
││8. Vulnerability Scanning/
│││├─VS-text_trans【. 】.srt 34.7KB
│││├─VS-text【. 】.srt 21.5KB
│││├─VS-trans【. 】.srt 19.7KB
││9. Web Application Attacks/
│││├─WAT-text-trans【. 】.srt 189.3KB
│││├─WAT-text【. 】.srt 140KB
│││├─WAT-trans【. 】.srt 123.9KB
│O3CP 官方视频/
││├─1.官方视频是从第2章开始的, 第一章和最后一章官方就没有视频【. 】.txt
││├─10. Introduction To Buffer Overflows【. 】.avi 113.3MB
││├─10. Introduction To Buffer Overflows【. 】.srt 31.9KB
││├─11. Windows Buffer Overflows【. 】.avi 289.9MB
││├─11. Windows Buffer Overflows【. 】.srt 64.4KB
││├─12. Linux Buffer Overflows【. 】.avi 124.9MB
││├─12. Linux Buffer Overflows【. 】.srt 23.9KB
││├─13. Client Side Attacks【. 】.avi 121.8MB
││├─13. Client Side Attacks【. 】.srt 47.7KB
││├─14. Locating Public Exploits【. 】.avi 69.9MB
││├─14. Locating Public Exploits【. 】.srt 25.3KB
││├─15. Fixing Exploits【. 】.avi 139.7MB
││├─15. Fixing Exploits【. 】.srt 43.1KB
││├─16. File Transfers【. 】.avi 75.2MB
││├─16. File Transfers【. 】.srt 28.7KB
││├─17. Antivirus Evasion【. 】.avi 98.2MB
││├─17. Antivirus Evasion【. 】.srt 37.3KB
││├─18. Privilage Escalation【. 】.avi 290.2MB
││├─18. Privilage Escalation【. 】.srt 99.7KB
││├─19. Password Attacks【. 】.avi 124.8MB
││├─19. Password Attacks【. 】.srt 56.2KB
││├─2. Getting Comfortable With Kali Linux【. 】.avi 63.8MB
││├─2. Getting Comfortable With Kali Linux【. 】.srt 31.7KB
││├─20. Port Redirection and Tunneling【. 】.avi 150.3MB
││├─20. Port Redirection and Tunneling【. 】.srt 50.6KB
││├─21. Active Directory Attacks【. 】.mp4 290.4MB
││├─21. Active Directory Attacks【. 】.srt 112.5KB
││├─22. The Metasploit Framework【. 】.avi 217.8MB
││├─22. The Metasploit Framework【. 】.srt 76.7KB
││├─23. Powershell Empire【. 】.avi 88.8MB
││├─23. Powershell Empire【. 】.srt 28.6KB
││├─24. AssemblingThe Pieces【. 】.avi 362.3MB
││├─24. AssemblingThe Pieces【. 】.srt 83.7KB
││├─3. Command Line Fun【. 】.avi 112.7MB
││├─3. Command Line Fun【. 】.srt 58KB
││├─4. Practical Tools【. 】.avi 176.1MB
││├─4. Practical Tools【. 】.srt 56.1KB
││├─5. Bash Scripting【. 】.avi 111.9MB
││├─5. Bash Scripting【. 】.srt 59.2KB
││├─6. Passive Information Gathering【. 】.avi 139.9MB
││├─6. Passive Information Gathering【. 】.srt 46.4KB
││├─7. Active Information Gathering【. 】.avi 158.7MB
││├─7. Active Information Gathering【. 】.srt 75.5KB
││├─8. Vulnerability Scanning【. 】.avi 73.8MB
││├─8. Vulnerability Scanning【. 】.srt 31.4KB
││├─9. Web Application Attacks【. 】.avi 386.1MB
││├─9. Web Application Attacks【. 】.srt 140KB
2. O3CP 实战培训视频和靶机/
│├─O3CP实战培训 (核心篇)
│├─O3CP实战视频 (基础-提高-扩展)
│├─实时翻译播放器【. 】.txt 327byte
│O3CP实战培训 (核心篇)/
││├─实战培训视频
││├─文本
││├─靶机
││实战培训视频/
│││├─001 Introduction-en【. 】.srt 3.1KB
│││├─001 Introduction【. 】.mp4 16.3MB
│││├─002 Download and Configure Kali Linux VM on VirtualBox-en【. 】.srt 11.3KB
│││├─002 Download and Configure Kali Linux VM on VirtualBox【. 】.mp4 100.1MB
│││├─003 Download and Config Vulnerable Attack Target VMs-en【. 】.srt 2.5KB
│││├─003 Download and Config Vulnerable Attack Target VMs【. 】.mp4 13.8MB
│││├─004 Tr0ll 3 Enumeration and Exploitation-en【. 】.srt 28.8KB
│││├─004 Tr0ll 3 Enumeration and Exploitation【. 】.mp4 166.1MB
│││├─005 Matrix 3 Enumeration and Exploitation-en【. 】.srt 31KB
│││├─005 Matrix 3 Enumeration and Exploitation【. 】.mp4 223.2MB
│││├─006 Broken Gallery Enumeration and Exploitation-en【. 】.srt 16.8KB
│││├─006 Broken Gallery Enumeration and Exploitation【. 】.mp4 111.3MB
│││├─007 DumbUser (Windows 10) Enumeration and Exploitation-en【. 】.srt 20.2KB
│││├─007 DumbUser (Windows 10) Enumeration and Exploitation【. 】.mp4 158.5MB
│││├─008 Symfonos 1 Enumeration and Exploitation-en【. 】.srt 22.6KB
│││├─008 Symfonos 1 Enumeration and Exploitation【. 】.mp4 199MB
│││├─009 Symfonos 2 Enumeration and Exploitation-en【. 】.srt 17.3KB
│││├─009 Symfonos 2 Enumeration and Exploitation【. 】.mp4 164.9MB
│││├─010 Symfonos 3 Enumeration and Exploitation-en【. 】.srt 12.8KB
│││├─010 Symfonos 3 Enumeration and Exploitation【. 】.mp4 101.1MB
│││├─011 Symfonos 4 Enumeration and Exploitation-en【. 】.srt 27KB
│││├─011 Symfonos 4 Enumeration and Exploitation【. 】.mp4 200.5MB
│││├─012 Symfonos 5 Enumeration and Exploitation-en【. 】.srt 12.8KB
│││├─012 Symfonos 5 Enumeration and Exploitation【. 】.mp4 111.6MB
│││├─013 digialworld.local JOY Enumeration and Exploitation-en【. 】.srt 16.5KB
│││├─013 digialworld.local JOY Enumeration and Exploitation【. 】.mp4 153.8MB
│││├─014 digitalworld.local Torment Enumeration and Exploitation-en【. 】.srt 19.9KB
│││├─014 digitalworld.local Torment Enumeration and Exploitation【. 】.mp4 181.6MB
││文本/
│││├─003 Download-and-Configure-Vulnerable-Attack-Targets【. 】.txt 572byte
│││├─004 Tr0ll-3【. 】.txt 950byte
│││├─005 Matrix-3【. 】.txt 776byte
│││├─006 Broken-Gallery【. 】.txt 621byte
│││├─007 DumbUser-Windows-10【. 】.txt 1.2KB
│││├─008 Symfonos-1【. 】.txt 1.5KB
│││├─009 Symfonos-2【. 】.txt 836byte
│││├─010 Symfonos-3【. 】.txt 877byte
│││├─011 SQLi-payloads【. 】.txt 114byte
│││├─011 Symfonos-4【. 】.txt 1.1KB
│││├─011 lfi-wordlist【. 】.txt 39.8KB
│││├─012 Symfonos-5【. 】.txt 619byte
││靶机/
│││├─Broken Vbox【. 】.7z 2.1GB
│││├─DumbUser Win10【. 】.ova 8.3GB
│││├─JOY-005【. 】.7z 3.2GB
│││├─Machine_Matrix_v3【. 】.ova 553.5MB
│││├─TORMENT-004【. 】.7z 2.5GB
│││├─Tr0ll3【. 】.ova 4GB
│││├─symfonos1【. 】.7z 738.7MB
│││├─symfonos2【. 】.7z 1GB
│││├─symfonos3【. 】.7z 861.3MB
│││├─symfonos4【. 】.7z 846.6MB
│││├─symfonos5【. 】.7z 1.5GB
│O3CP实战视频 (基础-提高-扩展)/
││├─基础篇
││├─实战培训视频(文本)
││├─扩展篇
││├─提高篇
││├─靶机
││基础篇/
│││├─1. Overview of Lab Commands and Tools【. 】.mp4 115.5MB
│││├─1. Overview of Lab Commands and Tools【. 】.srt 9.3KB
│││├─10. Tr0ll 2 – Enumeration and Exploitation Technet24【. 】.mp4 229.9MB
│││├─10. Tr0ll 2 – Enumeration and Exploitation Technet24【. 】.srt 25.7KB
│││├─11. Bonus Lab 1 Security Onion Lab Setup with VirtualBox【. 】.mp4 180.5MB
│││├─12. Bonus Lab 1 Security Onion Lab Setup with VirtualBox【. 】.srt 19.7KB
│││├─12. Bonus Lab 2 Windows 7 Eternalblue Vulnerable VM VirtualBox Setup【. 】.mp4 11MB
│││├─12. Bonus Lab 2 Windows 7 Eternalblue Vulnerable VM VirtualBox Setup【. 】.srt 2.7KB
│││├─13. Bonus Lab 3 Windows 7 Eternalblue Exploitation and SnortPCAP Analysis【. 】.mp4 59.7MB
│││├─13. Bonus Lab 3 Windows 7 Eternalblue Exploitation and SnortPCAP Analysis【. 】.srt 17.8KB
│││├─14. Bonus Lab 4 Ubuntu Server 12.04 Vulnerable VM VirtualBox Setup【. 】.mp4 27.3MB
│││├─14. Bonus Lab 4 Ubuntu Server 12.04 Vulnerable VM VirtualBox Setup【. 】.srt 6.4KB
│││├─15. Bonus Lab 5 Ubuntu Server 12.04 Heartbleed Exploitation and SnortPCAP Analysis【. 】.mp4 47.7MB
│││├─15. Bonus Lab 5 Ubuntu Server 12.04 Heartbleed Exploitation and SnortPCAP Analysis【. 】.srt 10.8KB
│││├─16. Bonus Lab 6 SLMail Buffer Overflow Development【. 】.mp4 89MB
│││├─16. Bonus Lab 6 SLMail Buffer Overflow Development【. 】.srt 24.2KB
│││├─2. Download and Configure Kali Linux【. 】.mp4 100.1MB
│││├─2. Download and Configure Kali Linux【. 】.srt 6.8KB
│││├─3. Download Vulnerable Lab VMs【. 】.mp4 11.9MB
│││├─3. Download Vulnerable Lab VMs【. 】.srt 2.4KB
│││├─4. Kioptrix Level 1 – Enumeration and Exploitation【. 】.mp4 75.4MB
│││├─4. Kioptrix Level 1 – Enumeration and Exploitation【. 】.srt 9.8KB
│││├─5. Kioptrix Level 2 – Enumeration and Exploitation【. 】.mp4 206.8MB
│││├─5. Kioptrix Level 2 – Enumeration and Exploitation【. 】.srt 22KB
│││├─6. Kioptrix Level 3 – Enumeration and Exploitation【. 】.mp4 226.9MB
│││├─6. Kioptrix Level 3 – Enumeration and Exploitation【. 】.srt 21.7KB
│││├─7. Kioptrix Level 4 – Enumeration and Exploitation【. 】.mp4 153.8MB
│││├─7. Kioptrix Level 4 – Enumeration and Exploitation【. 】.srt 16KB
│││├─8. Kioptrix Level 5 – Enumeration and Exploitation【. 】.mp4 196.3MB
│││├─8. Kioptrix Level 5 – Enumeration and Exploitation【. 】.srt 17.3KB
│││├─9. Tr0ll 1 – Enumeration and Exploitation【. 】.mp4 117.1MB
│││├─9. Tr0ll 1 – Enumeration and Exploitation【. 】.srt 12.4KB
││实战培训视频(文本)/
│││├─基础
│││├─扩展
│││├─提高
│││基础/
││││├─10.1 Lecture 10.txt【. 】.txt 730byte
││││├─11.1 Lecture 11.txt【. 】.txt 1.3KB
││││├─12.1 Secuirty Onion Lab.txt【. 】.txt 473byte
││││├─13.1 Windows 7 EternalBlue VM Setup.txt【. 】.txt 227byte
││││├─14.1 Windows 7 Eternalblue Resources.txt【. 】.txt 761byte
││││├─15.1 Heartbleed Lab Setup.txt【. 】.txt 519byte
││││├─16.1 Heartbleed Lab Resources.txt【. 】.txt 840byte
││││├─17.1 Bonus Lab 7.txt【. 】.txt 691byte
││││├─2.1 Lecture 2.txt【. 】.txt 2.1KB
││││├─3.1 Lecture 3.txt【. 】.txt 195byte
││││├─4.1 Lecture 4.txt【. 】.txt 75byte
││││├─5.1 Lecture 5.txt【. 】.txt 262byte
││││├─6.1 Lecture 6.txt【. 】.txt 1.7KB
││││├─7.1 Lecture 7.txt【. 】.txt 880byte
││││├─8.1 Lecture 8.txt【. 】.txt 1.7KB
││││├─9.1 Lecture 9.txt【. 】.txt 6.9KB
│││扩展/
││││├─002 Lecture-2【. 】.txt 2.1KB
││││├─003 Download-and-Configure-Kali-Linux-2020【. 】.txt 97byte
││││├─004 Lecture-3【. 】.txt 200byte
││││├─005 Lecture-4【. 】.txt 355byte
││││├─006 Lecture-5【. 】.txt 95byte
││││├─007 Lecture-6【. 】.txt 935byte
││││├─007 lfipayloads.txt【. 】.txt 1012byte
││││├─008 Lecture-7【. 】.txt 3.1KB
││││├─009 Lecture-8【. 】.txt 727byte
││││├─010 Lecture-9【. 】.txt 765byte
││││├─011 Lecture-10【. 】.txt 627byte
││││├─012 Lecture-11【. 】.txt 191byte
││││├─013 Lecture-12【. 】.txt 667byte
││││├─014 Lecture-13【. 】.txt 1.2KB
││││├─015 Lecture-14【. 】.txt 575byte
││││├─016 Lecture-15【. 】.txt 75byte
││││├─017 Lecture-16【. 】.txt 458byte
│││提高/
││││├─002 Lecture-2【. 】.txt 2.1KB
││││├─003 Download-and-Configure-Kali-Linux-2020【. 】.txt 97byte
││││├─004 Lecture-3【. 】.txt 195byte
││││├─005 Lecture-4【. 】.txt 103byte
││││├─006 Lecture-5【. 】.txt 1.2KB
││││├─007 Lecture-6【. 】.txt 483byte
││││├─008 Lecture-7【. 】.txt 978byte
││││├─009 Lecture-8【. 】.txt 485byte
││││├─010 Lecture-9【. 】.txt 855byte
││││├─011 Lecture-10【. 】.txt 1.5KB
││││├─012 Lecture-11【. 】.txt 480byte
││││├─013 Lecture-12【. 】.txt 1.4KB
││││├─014 Lecture-13【. 】.txt 2.7KB
││││├─015 Lecture-14【. 】.txt 747byte
││扩展篇/
│││├─1.Overview of Lab Commands and Tools-en【. 】.srt 9.7KB
│││├─1.Overview of Lab Commands and Tools【. 】.mp4 115.6MB
│││├─10.Introduction to Hackthebox-en【. 】.srt 8.1KB
│││├─10.Introduction to Hackthebox【. 】.mp4 117.4MB
│││├─11.Active VM Enumeration and Exploitation-en【. 】.srt 8.7KB
│││├─11.Active VM Enumeration and Exploitation【. 】.mp4 106.8MB
│││├─12.Windows 2008 Setup, Enumeration and Exploitation (Metasploitable 3)-en【. 】.srt 12.8KB
│││├─12.Windows 2008 Setup, Enumeration and Exploitation (Metasploitable 3)【. 】.mp4 136.7MB
│││├─13.Apache Struts Setup and Exploitation-en【. 】.srt 4KB
│││├─13.Apache Struts Setup and Exploitation【. 】.mp4 40.5MB
│││├─14.Introduction to Hack.me-en【. 】.srt 2.3KB
│││├─14.Introduction to Hack.me【. 】.mp4 19.3MB
│││├─15.WordPress Enumeration and Exploitation-en【. 】.srt 6.3KB
│││├─15.Wordpress Enumeration and Exploitation【. 】.mp4 74.4MB
│││├─2.Download and Configure Kali Linux VM on VirtualBox-en【. 】.srt 9.2KB
│││├─2.Download and Configure Kali Linux VM on VirtualBox【. 】.mp4 78.2MB
│││├─3.Download and Configure Window 7 Analysis VM-en【. 】.srt 6.8KB
│││├─3.Download and Configure Window 7 Analysis VM【. 】.mp4 93.6MB
│││├─4.Download Vulnerable Lab VMs-en【. 】.srt 1.1KB
│││├─4.Download Vulnerable Lab VMs【. 】.mp4 3.6MB
│││├─5.PwnLab VM Enumeration and Exploitation-en【. 】.srt 23KB
│││├─5.PwnLab VM Enumeration and Exploitation【. 】.mp4 260.2MB
│││├─6.Brainpan 1 VM Enumeration and Exploitation-en【. 】.srt 36.4KB
│││├─6.Brainpan 1 VM Enumeration and Exploitation【. 】.mp4 338.5MB
│││├─7.Mr Robot 1 VM Enumeration and Exploiotation-en【. 】.srt 18.6KB
│││├─7.Mr Robot 1 VM Enumeration and Exploiotation【. 】.mp4 203.8MB
│││├─8.SickOS VM Enumeration and Exploitation-en【. 】.srt 7KB
│││├─8.SickOS VM Enumeration and Exploitation【. 】.mp4 86.7MB
│││├─9.SkyTower 1 VM Enumeration and Exploitation-en【. 】.srt 11KB
│││├─9.SkyTower 1 VM Enumeration and Exploitation【. 】.mp4 127.2MB
││提高篇/
│││├─1.Overview of Lab Commands and Tools-en【. 】.srt 9.7KB
│││├─1.Overview of Lab Commands and Tools【. 】.mp4 115.5MB
│││├─10.VulnOS 2 Enumeration and Exploitation-en【. 】.srt 12.6KB
│││├─10.VulnOS 2 Enumeration and Exploitation【. 】.mp4 131.1MB
│││├─11.Windows 7 Enumeration and Exploitation-en【. 】.srt 15.3KB
│││├─11.Windows 7 Enumeration and Exploitation【. 】.mp4 116.4MB
│││├─12.IMF Enumeration and Exploitation-en【. 】.srt 42.3KB
│││├─12.IMF Enumeration and Exploitation【. 】.mp4 391.9MB
│││├─13.XSS Firing Range Enumeration and Exploitation-en【. 】.srt 22.5KB
│││├─13.XSS Firing Range Enumeration and Exploitation【. 】.mp4 191.6MB
│││├─2.Download and Configure Kali Linux VM on VirtualBox-en【. 】.srt 11.3KB
│││├─2.Download and Configure Kali Linux VM on VirtualBox【. 】.mp4 100.1MB
│││├─3.Download Vulnerable Lab VMs-en【. 】.srt 1023byte
│││├─3.Download Vulnerable Lab VMs【. 】.mp4 3.3MB
│││├─4.Goldeneye Enumeration and Exploitation-en【. 】.srt 31.7KB
│││├─4.Goldeneye Enumeration and Exploitation【. 】.mp4 258.2MB
│││├─5.Raven 1 Enumeration and Exploitation-en【. 】.srt 9.3KB
│││├─5.Raven 1 Enumeration and Exploitation【. 】.mp4 88.8MB
│││├─6.Raven 2 Enumeration and Exploitation-en【. 】.srt 15.9KB
│││├─6.Raven 2 Enumeration and Exploitation【. 】.mp4 136.9MB
│││├─7.Lampiao Enumeration and Exploitation-en【. 】.srt 8.9KB
│││├─7.Lampiao Enumeration and Exploitation【. 】.mp4 91.4MB
│││├─8.DerpnStink Enumeration and Exploitation-en【. 】.srt 24.7KB
│││├─8.DerpnStink Enumeration and Exploitation【. 】.mp4 224.5MB
│││├─9.Stapler Enumeration and Exploitation-en【. 】.srt 19.8KB
│││├─9.Stapler Enumeration and Exploitation【. 】.mp4 164.5MB
││靶机/
│││├─基础篇靶机
│││├─扩展篇靶机
│││├─提高篇靶机
│││基础篇靶机/
││││├─Kioptrix Level 1【. 】.ova 249.5MB
││││├─Kioptrix Level 2【. 】.ova 558.5MB
││││├─Kioptrix Level 3【. 】.ova 585.9MB
││││├─Kioptrix Level 4【. 】.ova 286.3MB
││││├─Kioptrix Level 5【. 】.ova 961MB
││││├─Tr0ll 1【. 】.ova 597.3MB
││││├─Tr0ll2_vbox【. 】.7z 493.2MB
│││扩展篇靶机/
││││├─SkyTower【. 】.zip 289.6MB
││││├─brainpan【. 】.ova 822.9MB
││││├─mrRobot【. 】.ova 703.4MB
││││├─pwnlab_init【. 】.ova 784.8MB
││││├─sick0s1.1【. 】.7z 622.3MB
│││提高篇靶机/
││││├─GoldenEye-v1【. 】.ova 805MB
││││├─IMF【. 】.ova 1.5GB
││││├─Lampiao【. 】.zip 668.3MB
││││├─Raven2【. 】.ova 764.9MB
││││├─Raven【. 】.ova 1.4GB
││││├─Stapler【. 】.zip 706.9MB
││││├─VulnHub2018_DeRPnStiNK【. 】.ova 1.7GB
││││├─VulnOSv2【. 】.7z 762.9MB
││││├─Vulnerable Win7【. 】.ova 5.6GB
3. O3CP 域渗透(Active Directory)/
│├─Pentesting_Active_directory【. 】.xmind 577.7KB
│├─关于域渗透AD的备考策略【. 】.pdf 74KB
4. O3CP 报告模板/
│├─OSCP-Exam-Report-Template-master【. 】.rar 358.1KB