| Parent directory/ | - | - |
| 01 - Beginning Pen-200/ | - | 2026-Jan-02 21:37 |
| 02 - Pen Testing Lifecycle with Reconnaissance/ | - | 2026-Jan-02 21:37 |
| 03 - Exploit resources/ | - | 2026-Jan-02 21:37 |
| 04 - Metasploit fundamentals/ | - | 2026-Jan-02 21:37 |
| 05 - Matasploit Payloads/ | - | 2026-Jan-02 21:37 |
| 06 - Scanning with n Map/ | - | 2026-Jan-02 21:37 |
| 07 - Scanning with Nessus (Active)/ | - | 2026-Jan-02 21:37 |
| 08 - Detailed Active Scanning with Nessus/ | - | 2026-Jan-02 21:38 |
| 09 - Open VAS/ | - | 2026-Jan-02 21:38 |
| 10 - Passive Scanning for Vulnerabilities/ | - | 2026-Jan-02 21:38 |
| 11 - Deeper into Passive Scanning/ | - | 2026-Jan-02 21:38 |
| 12 - Web Application Assessment/ | - | 2026-Jan-02 21:38 |
| 13 - Web Application Assessment Tools/ | - | 2026-Jan-02 21:38 |
| 14 - Burpsuite/ | - | 2026-Jan-02 21:38 |
| 15 - Cross-Site Scripting XSS/ | - | 2026-Jan-02 21:38 |
| 16 - Directory Traversal/ | - | 2026-Jan-02 21:38 |
| 17 - File Inclusion Attack/ | - | 2026-Jan-02 21:38 |
| 18 - Command Injection/ | - | 2026-Jan-02 21:38 |
| 19 - SQL Theory and Exploration/ | - | 2026-Jan-02 21:38 |
| 20 - Exploiting Microsoft Office/ | - | 2026-Jan-02 21:38 |
| 21 - Windows Library Files/ | - | 2026-Jan-02 21:38 |
| 22 - Abusing Windows Library Files/ | - | 2026-Jan-02 21:38 |
| 23 - Advanced DLL Injection/ | - | 2026-Jan-02 21:38 |
| 24 - Post-Exploitation with Metasploit/ | - | 2026-Jan-02 21:38 |
| 25 - Password Attacks - Understanding/ | - | 2026-Jan-02 21:38 |
| 26 - Password Attacks - Methodology/ | - | 2026-Jan-02 21:38 |
| 27 - Password Attacks - Physical Attack/ | - | 2026-Jan-02 21:38 |
| 28 - Password Attacks - Tools/ | - | 2026-Jan-02 21:38 |
| 29 - Windows Enumeration/ | - | 2026-Jan-02 21:38 |
| 30 - Leveraging Windows Services/ | - | 2026-Jan-02 21:38 |
| 31 - Linux Enumeration/ | - | 2026-Jan-02 21:38 |
| 32 - Linux Insecurity/ | - | 2026-Jan-02 21:38 |
| 33 - Linux File Insecurity/ | - | 2026-Jan-02 21:38 |
| 34 - Port Forwarding and Tunneling/ | - | 2026-Jan-02 21:38 |
| 35 - Deep Packet Inspection/ | - | 2026-Jan-02 21:39 |
| 36 - Other Tunneling Tools/ | - | 2026-Jan-02 21:39 |
| 37 - Antivirus Evasion/ | - | 2026-Jan-02 21:39 |
| 38 - Automating Metasploit/ | - | 2026-Jan-02 21:39 |
| 39 - Memory Corruption Exploits/ | - | 2026-Jan-02 21:39 |
| 40 - Fixing Web Exploits/ | - | 2026-Jan-02 21:39 |
| 41 - Understanding Active Directory Authentication | - | 2026-Jan-02 21:39 |
| 42 - Active Directory Manual Enumeration/ | - | 2026-Jan-02 21:39 |
| 43 - Active Directory Automated Enumeration/ | - | 2026-Jan-02 21:39 |
| 44 - Attacks on Active Directory Authentication/ | - | 2026-Jan-02 21:39 |
| 45 - Active Directory Persistence/ | - | 2026-Jan-02 21:39 |
| 46 - Lateral Movements and Post-cleanup/ | - | 2026-Jan-02 21:39 |