Udemy - Complete Ethical Hacking Bundle - 5 Courses in 1

  • Category Other
  • Type Tutorials
  • Language English
  • Total size 3.1 GB
  • Uploaded By freecoursewb
  • Downloads 89
  • Last checked 1 hour ago
  • Date uploaded 7 hours ago
  • Seeders 30
  • Leechers 12

Infohash : 550EEF147C7341C25C4A348CF23FB9AB095E2CF0



Complete Ethical Hacking Bundle: 5 Courses in 1

https://WebToolTip.com

Published 1/2026
Created by Juravlea Nicolae
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz, 2 Ch
Level: All | Genre: eLearning | Language: English | Duration: 100 Lectures ( 4h 20m ) | Size: 3.1 GB

Learn and understand hacking and cyber threats with one complete course bundle.

What you'll learn
✓ Master Essential Linux Commands.
✓ Learn Disk Partitioning and Encryption.
✓ Write Basic Shell Scripts.
✓ Learn How to Exploit and Secure Websites.
✓ Understand XSS and CSRF vulnerabilities.
✓ Perform SQL Injection Attacks.
✓ How to Exploit Browsers with BeEF Framework.
✓ Perform a Denial of Service Attack and Find Hidden Wireless Networks.
✓ Crack WiFi Passwords with WPA2 encryption.
✓ Create Evil Twin Access Points.
✓ Create a Fake Captive Portal and use it to Capture Login Information.
✓ Detect and Secure Your System from Evil Twin Attacks.
✓ Create Evil Files that look and function like normal files.
✓ Launch Phishing Attacks.
✓ Perform Attacks Outside the Local Network.
✓ Learn Different Techniques to Protect Yourself.

Requirements
● No prior experience is required. Everything is explained step by step.
● A basic understanding of how to use a computer.
● An interest in cybersecurity and ethical hacking.

Files:

[ WebToolTip.com ] Udemy - Complete Ethical Hacking Bundle - 5 Courses in 1
  • Get Bonus Downloads Here.url (0.2 KB)
  • ~Get Your Files Here ! 1 - Course 1 Fedora Linux from Scratch
    • 1. Introduction.mp4 (9.9 MB)
    • 10. How to Change File Permissions in Linux.mp4 (13.8 MB)
    • 11. How to easily Encrypt Decrypt a File with Gpg.mp4 (9.2 MB)
    • 2. Introduction to Linux.mp4 (11.2 MB)
    • 3. Setting Up Fedora in Virtualbox.mp4 (45.8 MB)
    • 4. Basic Linux Commands Part 1.mp4 (49.1 MB)
    • 5. Basic Linux Commands Part 2.mp4 (14.1 MB)
    • 6. How to add new user in Linux.mp4 (16.5 MB)
    • 7. Using the DNF Package Manager.mp4 (16.2 MB)
    • 8. Useful Networking Commands.mp4 (19.8 MB)
    • 9. Useful Networking Tools.mp4 (35.8 MB)
    10 - Evil Twin Attacks
    • 63. How to Sniff Login Credentials from the Captive Portal.mp4 (22.4 MB)
    • 64. Capture the Login Information using a PhP Script.mp4 (24.7 MB)
    • 65. Setting up an Access Point with a Fake Captive Portal.mp4 (50.4 MB)
    • 66. Stealing Credentials with the Social Engineering Toolkit.mp4 (32.5 MB)
    • 67. How to use BeEF with the Captive Portal.mp4 (37.3 MB)
    • 68. How to Set up an Access Point with Internet Access.mp4 (32.5 MB)
    • capture.txt (0.0 KB)
    • post.php (0.2 KB)
    11 - WiFi Hacking Tools
    • 69. How to use Wireshark Filters to Inspect Packets.mp4 (33.2 MB)
    • 70. Evil Twin Attack with Airgeddon.mp4 (48.3 MB)
    • 71. Customizing the Captive Portal Page.mp4 (18.5 MB)
    • 72. Stealing Login Credentials from a WPA Enterprise Network.mp4 (41.8 MB)
    • 73. Stealing Social Media Accounts using a Captive Portal.mp4 (61.6 MB)
    • 74. How to use Dns Spoofing and BeEF using WiFi Pumpkin.mp4 (35.0 MB)
    12 - Security
    • 75. Detect WiFi Attacks using Wireshark.mp4 (28.4 MB)
    • 76. How to Detect Evil Twin Attacks using EvilAP Defender.mp4 (20.4 MB)
    • 76. Protect from Evil Twin.pdf (324.6 KB)
    • 77. Protect your Home Network using Guest WiFi.mp4 (21.6 MB)
    13 - Course 5 Social Engineering
    • 78. Course Introduction.mp4 (23.5 MB)
    • 79. Social Engineering Defined.mp4 (12.8 MB)
    14 - Evil Files
    • 80. Create a Malicious File with MSFvenom.mp4 (48.6 MB)
    • 81. How to Create an Undetectable Payload with FatRat.mp4 (61.7 MB)
    • 82. Inject Payload in exe file using Shellter.mp4 (32.5 MB)
    • 83. Make A Malicious Microsoft Word Document.mp4 (25.9 MB)
    15 - Exploitation
    • 84. Meterpreter Basics.mp4 (25.2 MB)
    • 85. Extract Saved Passwords with LaZagne.mp4 (11.9 MB)
    • 86. Capture VNC Session.mp4 (9.6 MB)
    • 87. How to view saved WiFi passwords.mp4 (22.3 MB)
    • 88. How to perform a Man in the middle (MITM) Attack.mp4 (25.7 MB)
    16 - Social Engineering Tools
    • 89. How To Create a Fake Login Page Using Setoolkit.mp4 (26.9 MB)
    • 90. Blackeye Phishing Tool.mp4 (18.8 MB)
    17 - Browser Exploitation
    • 91. How to Exploit Web Browsers with BeEF.mp4 (38.3 MB)
    • 92. Hook Web Browsers with MITMf and BeEF.mp4 (12.8 MB)
    • 93. Gain Full Control over the Target Machine using BeEF.mp4 (27.5 MB)
    18 - Attacking Outside The Local Network
    • 94. Hacking Over the Internet Without Port Forwarding.mp4 (31.9 MB)
    • 95. How To Use Setoolkit Outside The Local Network.mp4 (23.4 MB)
    • 96. BeEF Attack Outside the Local Network.mp4 (24.2 MB)
    • 97. Phishing Email Attack.mp4 (29.3 MB)
    19 - Security
    • 100. How to Avoid Phishing Attacks.mp4 (16.6 MB)
    • 98. How to Detect Meterpreter in Your PC.mp4 (16.9 MB)
    • 99. Protect Yourself from Browser Exploits.mp4 (17.4 MB)
    2 - Advanced
    • 12. Linux Commands.pdf (338.5 KB)
    • 12. Middle Level Linux Commands.mp4 (17.6 MB)
    • 13. Compress and Extract Files in Linux.mp4 (12.1 MB)
    • 14. Partitioning with Gparted.mp4 (15.7 MB)
    • 15. Understand Linux Shell Scripting.mp4 (15.3 MB)
    • 16. How to use Systemctl to Manage Services.mp4 (18.2 MB)
    • 17. Automating Tasks with Crontab.mp4 (29.4 MB)
    • 18. Set Up Your Own Web Server.mp4 (28.6 MB)
    • 19. How to Install WordPress on your Web Server.mp4 (29.3 MB)
    • 20. How to Set up an FTP Server.mp4 (28.5 MB)
    3 - Course 2 Web Hacking for Beginners
    • 21. Introduction to the Course.mp4 (36.5 MB)
    • 22. How the Web Works.mp4 (18.5 MB)
    • 23. How to capture HTTP packets with Wireshark.mp4 (48.7 MB)
    • 24. Set up your Web Testing Lab.mp4 (37.1 MB)
    • 25. How to use Vega Web Vulnerability Scanner.mp4 (35.1 MB)
    4 - SQL Injection
    • 26. SQL Introduction and Examples.mp4 (58.6 MB)
    • 27. Understanding How SQL Injection Attacks Work.mp4 (35.2 MB)
    • 28. How to Use SQLMAP.mp4 (61.1 MB)
    • 29. Preventing SQL Injection.mp4 (25.2 MB)
    5 - WordPress Exploitation
    • 30. Introduction to WPScan.mp4 (24.6 MB)
    • 31. How to Hack a WordPress Website with WPScan.mp4 (65.6 MB)
    • 32. How to Secure Your WordPress Website.mp4 (52.3 MB)
    6 - Cross Site Scripting (XSS)
    • 33. Understand Cross Site Scripting.mp4 (25.4 MB)
    • 34. Stored Cross Site Scripting.mp4 (36.3 MB)
    • 35. Preventing Cross Site Scripting Attacks.mp4 (23.9 MB)
    7 - Browser Exploitation
    • 36. How to Hack Web Browsers Using BeEF Framework.mp4 (47.9 MB)
    • 37. Gaining Full Control Using BeEF.mp4 (56.8 MB)
    • 38. How to Defeat BeEF using Vegan Extension.mp4 (22.2 MB)
    • 39. How to Use Weevely PHP Backdoor.mp4 (32.2 MB)
    • 40. CSRF example.pdf (325.4 KB)
    • 40. How to perform CSRF Attack.mp4 (31.5 MB)
    • 41. Phishing Attack.mp4 (34.4 MB)
    • 41. Phishing.pdf (333.6 KB)
    8 - Course 3 WiFi Hacking for Beginners
    • 42. Introduction.mp4 (8.5 MB)
    • 43. Introduction to Wireless Networks.mp4 (32.3 MB)
    • 44. How to Install Kali Linux in VMware Player.mp4 (61.4 MB)
    • 45. Packet Injection and Monitor Mode.mp4 (29.7 MB)
    • 46. How to Find Hidden Wireless Networks.mp4 (36.3 MB)
    • 47. How to Spoof your Mac Address.mp4 (30.2 MB)
    • 48. How to use Wireshark.mp4 (52.4 MB)
    • 49. How to Perform a Denial of Service Attack.mp4 (57.4 MB)
    • 50. Break WiFi Networks with WEP encryption.mp4 (55.5 MB)
    • 51. Break WiFi Networks with WPA WPA2 encryption.mp4 (41.5 MB)
    • 52. Create your own Wordlist using Crunch.mp4 (39.5 MB)
    • 53. Speeding up WPA2 Cracking.mp4 (45.6 MB)
    • 54. Break WiFi Networks using Pyrit.mp4 (42.8 MB)
    • 55. Break WiFi Networks with Reaver.mp4 (38.9 MB)
    • 56. Create an Evil Twin Access Point.mp4 (53.9 MB)
    • 56. Protect from Evil Twin.pdf (313.5 KB)
    • 56. Tips to secure wifi network.pdf (329.6 KB)
    9 - Course 4 WiFi Hacking using Evil Twin Attacks and Captive Portals
    • 57. Course Introduction.mp4 (30.6 MB)
    • 58. Intro to Evil Twin and Captive Portals.mp4 (23.8 MB)
    • 59. Choosing the Wireless Adapter.mp4 (33.6 MB)
    • 59. Wi Fi Card.pdf (329.8 KB)
    • 60. How to Sniff and Inject Packets into a Wireless Network.mp4 (33.1 MB)
    • 61. How to Set up an Access Point.mp4 (39.0 MB)
    • 62. Setting up a Captive Portal.mp4 (32.5 MB)
    • Basic-portal css
      • style.css (3.0 KB)
      • index.html (3.4 KB)
      • wifi.png (20.5 KB)
      • dnsmasq.conf (0.3 KB)
      • hostapd.conf (0.1 KB)
        • Bonus Resources.txt (0.1 KB)

There are currently no comments. Feel free to leave one :)

Code:

  • udp://tracker.torrent.eu.org:451/announce
  • udp://tracker.tiny-vps.com:6969/announce
  • http://tracker.foreverpirates.co:80/announce
  • udp://tracker.cyberia.is:6969/announce
  • udp://exodus.desync.com:6969/announce
  • udp://explodie.org:6969/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://9.rarbg.to:2780/announce
  • udp://tracker.internetwarriors.net:1337/announce
  • udp://ipv4.tracker.harry.lu:80/announce
  • udp://open.stealth.si:80/announce
  • udp://9.rarbg.to:2900/announce
  • udp://9.rarbg.me:2720/announce
  • udp://opentor.org:2710/announce
R2-CACHE ☁️ R2 (hit) | CDN: MISS (0s) 📄 torrent 🕐 06 Feb 2026, 02:58:22 am IST ⏰ 03 Mar 2026, 02:58:22 am IST ✅ Valid for 23d 4h 🔄 Refresh Cache