Udemy - Complete Ethical Hacking Bundle - 5 Courses in 1

  • CategoryOther
  • TypeTutorials
  • LanguageEnglish
  • Total size3.1 GB
  • Uploaded Byfreecoursewb
  • Downloads201
  • Last checkedFeb. 06th '26
  • Date uploadedFeb. 05th '26
  • Seeders 41
  • Leechers45

Infohash : 550EEF147C7341C25C4A348CF23FB9AB095E2CF0

Complete Ethical Hacking Bundle: 5 Courses in 1

https://WebToolTip.com

Published 1/2026
Created by Juravlea Nicolae
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz, 2 Ch
Level: All | Genre: eLearning | Language: English | Duration: 100 Lectures ( 4h 20m ) | Size: 3.1 GB

Learn and understand hacking and cyber threats with one complete course bundle.

What you'll learn
✓ Master Essential Linux Commands.
✓ Learn Disk Partitioning and Encryption.
✓ Write Basic Shell Scripts.
✓ Learn How to Exploit and Secure Websites.
✓ Understand XSS and CSRF vulnerabilities.
✓ Perform SQL Injection Attacks.
✓ How to Exploit Browsers with BeEF Framework.
✓ Perform a Denial of Service Attack and Find Hidden Wireless Networks.
✓ Crack WiFi Passwords with WPA2 encryption.
✓ Create Evil Twin Access Points.
✓ Create a Fake Captive Portal and use it to Capture Login Information.
✓ Detect and Secure Your System from Evil Twin Attacks.
✓ Create Evil Files that look and function like normal files.
✓ Launch Phishing Attacks.
✓ Perform Attacks Outside the Local Network.
✓ Learn Different Techniques to Protect Yourself.

Requirements
● No prior experience is required. Everything is explained step by step.
● A basic understanding of how to use a computer.
● An interest in cybersecurity and ethical hacking.

Files:

[ WebToolTip.com ] Udemy - Complete Ethical Hacking Bundle - 5 Courses in 1
  • Get Bonus Downloads Here.url (0.2 KB)
  • ~Get Your Files Here ! 1 - Course 1 Fedora Linux from Scratch
    • 1. Introduction.mp4 (9.9 MB)
    • 10. How to Change File Permissions in Linux.mp4 (13.8 MB)
    • 11. How to easily Encrypt Decrypt a File with Gpg.mp4 (9.2 MB)
    • 2. Introduction to Linux.mp4 (11.2 MB)
    • 3. Setting Up Fedora in Virtualbox.mp4 (45.8 MB)
    • 4. Basic Linux Commands Part 1.mp4 (49.1 MB)
    • 5. Basic Linux Commands Part 2.mp4 (14.1 MB)
    • 6. How to add new user in Linux.mp4 (16.5 MB)
    • 7. Using the DNF Package Manager.mp4 (16.2 MB)
    • 8. Useful Networking Commands.mp4 (19.8 MB)
    • 9. Useful Networking Tools.mp4 (35.8 MB)
    10 - Evil Twin Attacks
    • 63. How to Sniff Login Credentials from the Captive Portal.mp4 (22.4 MB)
    • 64. Capture the Login Information using a PhP Script.mp4 (24.7 MB)
    • 65. Setting up an Access Point with a Fake Captive Portal.mp4 (50.4 MB)
    • 66. Stealing Credentials with the Social Engineering Toolkit.mp4 (32.5 MB)
    • 67. How to use BeEF with the Captive Portal.mp4 (37.3 MB)
    • 68. How to Set up an Access Point with Internet Access.mp4 (32.5 MB)
    • capture.txt (0.0 KB)
    • post.php (0.2 KB)
    11 - WiFi Hacking Tools
    • 69. How to use Wireshark Filters to Inspect Packets.mp4 (33.2 MB)
    • 70. Evil Twin Attack with Airgeddon.mp4 (48.3 MB)
    • 71. Customizing the Captive Portal Page.mp4 (18.5 MB)
    • 72. Stealing Login Credentials from a WPA Enterprise Network.mp4 (41.8 MB)
    • 73. Stealing Social Media Accounts using a Captive Portal.mp4 (61.6 MB)
    • 74. How to use Dns Spoofing and BeEF using WiFi Pumpkin.mp4 (35.0 MB)
    12 - Security
    • 75. Detect WiFi Attacks using Wireshark.mp4 (28.4 MB)
    • 76. How to Detect Evil Twin Attacks using EvilAP Defender.mp4 (20.4 MB)
    • 76. Protect from Evil Twin.pdf (324.6 KB)
    • 77. Protect your Home Network using Guest WiFi.mp4 (21.6 MB)
    13 - Course 5 Social Engineering
    • 78. Course Introduction.mp4 (23.5 MB)
    • 79. Social Engineering Defined.mp4 (12.8 MB)
    14 - Evil Files
    • 80. Create a Malicious File with MSFvenom.mp4 (48.6 MB)
    • 81. How to Create an Undetectable Payload with FatRat.mp4 (61.7 MB)
    • 82. Inject Payload in exe file using Shellter.mp4 (32.5 MB)
    • 83. Make A Malicious Microsoft Word Document.mp4 (25.9 MB)
    15 - Exploitation
    • 84. Meterpreter Basics.mp4 (25.2 MB)
    • 85. Extract Saved Passwords with LaZagne.mp4 (11.9 MB)
    • 86. Capture VNC Session.mp4 (9.6 MB)
    • 87. How to view saved WiFi passwords.mp4 (22.3 MB)
    • 88. How to perform a Man in the middle (MITM) Attack.mp4 (25.7 MB)
    16 - Social Engineering Tools
    • 89. How To Create a Fake Login Page Using Setoolkit.mp4 (26.9 MB)
    • 90. Blackeye Phishing Tool.mp4 (18.8 MB)
    17 - Browser Exploitation
    • 91. How to Exploit Web Browsers with BeEF.mp4 (38.3 MB)
    • 92. Hook Web Browsers with MITMf and BeEF.mp4 (12.8 MB)
    • 93. Gain Full Control over the Target Machine using BeEF.mp4 (27.5 MB)
    18 - Attacking Outside The Local Network
    • 94. Hacking Over the Internet Without Port Forwarding.mp4 (31.9 MB)
    • 95. How To Use Setoolkit Outside The Local Network.mp4 (23.4 MB)
    • 96. BeEF Attack Outside the Local Network.mp4 (24.2 MB)
    • 97. Phishing Email Attack.mp4 (29.3 MB)
    19 - Security
    • 100. How to Avoid Phishing Attacks.mp4 (16.6 MB)
    • 98. How to Detect Meterpreter in Your PC.mp4 (16.9 MB)
    • 99. Protect Yourself from Browser Exploits.mp4 (17.4 MB)
    2 - Advanced
    • 12. Linux Commands.pdf (338.5 KB)
    • 12. Middle Level Linux Commands.mp4 (17.6 MB)
    • 13. Compress and Extract Files in Linux.mp4 (12.1 MB)
    • 14. Partitioning with Gparted.mp4 (15.7 MB)
    • 15. Understand Linux Shell Scripting.mp4 (15.3 MB)
    • 16. How to use Systemctl to Manage Services.mp4 (18.2 MB)
    • 17. Automating Tasks with Crontab.mp4 (29.4 MB)
    • 18. Set Up Your Own Web Server.mp4 (28.6 MB)
    • 19. How to Install WordPress on your Web Server.mp4 (29.3 MB)
    • 20. How to Set up an FTP Server.mp4 (28.5 MB)
    3 - Course 2 Web Hacking for Beginners
    • 21. Introduction to the Course.mp4 (36.5 MB)
    • 22. How the Web Works.mp4 (18.5 MB)
    • 23. How to capture HTTP packets with Wireshark.mp4 (48.7 MB)
    • 24. Set up your Web Testing Lab.mp4 (37.1 MB)
    • 25. How to use Vega Web Vulnerability Scanner.mp4 (35.1 MB)
    4 - SQL Injection
    • 26. SQL Introduction and Examples.mp4 (58.6 MB)
    • 27. Understanding How SQL Injection Attacks Work.mp4 (35.2 MB)
    • 28. How to Use SQLMAP.mp4 (61.1 MB)
    • 29. Preventing SQL Injection.mp4 (25.2 MB)
    5 - WordPress Exploitation
    • 30. Introduction to WPScan.mp4 (24.6 MB)
    • 31. How to Hack a WordPress Website with WPScan.mp4 (65.6 MB)
    • 32. How to Secure Your WordPress Website.mp4 (52.3 MB)
    6 - Cross Site Scripting (XSS)
    • 33. Understand Cross Site Scripting.mp4 (25.4 MB)
    • 34. Stored Cross Site Scripting.mp4 (36.3 MB)
    • 35. Preventing Cross Site Scripting Attacks.mp4 (23.9 MB)
    7 - Browser Exploitation
    • 36. How to Hack Web Browsers Using BeEF Framework.mp4 (47.9 MB)
    • 37. Gaining Full Control Using BeEF.mp4 (56.8 MB)
    • 38. How to Defeat BeEF using Vegan Extension.mp4 (22.2 MB)
    • 39. How to Use Weevely PHP Backdoor.mp4 (32.2 MB)
    • 40. CSRF example.pdf (325.4 KB)
    • 40. How to perform CSRF Attack.mp4 (31.5 MB)
    • 41. Phishing Attack.mp4 (34.4 MB)
    • 41. Phishing.pdf (333.6 KB)
    8 - Course 3 WiFi Hacking for Beginners
    • 42. Introduction.mp4 (8.5 MB)

Code:

  • udp://tracker.torrent.eu.org:451/announce
  • udp://tracker.tiny-vps.com:6969/announce
  • http://tracker.foreverpirates.co:80/announce
  • udp://tracker.cyberia.is:6969/announce
  • udp://exodus.desync.com:6969/announce
  • udp://explodie.org:6969/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://9.rarbg.to:2780/announce
  • udp://tracker.internetwarriors.net:1337/announce
  • udp://ipv4.tracker.harry.lu:80/announce
  • udp://open.stealth.si:80/announce
  • udp://9.rarbg.to:2900/announce
  • udp://9.rarbg.me:2720/announce
  • udp://opentor.org:2710/announce