Golang Hacking
Focused View
7:56:32
175 View
1. Welcome to this course.mp4
08:18
2. Note announcement.mp4
00:21
3. Introduction to Networking.mp4
11:21
1. Hacking Introduction.mp4
13:16
1.1 Windows 10.html
1.1 kali linux.html
1.2 Windows 10.html
1.2 kali linux.html
1. Tools required.mp4
04:21
2. Installing go in windows.mp4
01:43
3. IDE to use.mp4
03:21
4. Linux Installation.mp4
05:02
5. Setting up golang.mp4
03:18
1. How to execute commands.mp4
09:26
2. Refactoring code.mp4
04:01
1. Running ifconfig command on PC.mp4
06:21
2. Changing MAC using ifconfig.mp4
02:01
3. Creating a program to automatically change MAC.mp4
03:27
4. Creating executable and parsing flags.mp4
08:01
1. Creating a TCP scanner basic.mp4
06:05
2. Scanning Multiple ports.mp4
04:20
3. Scanning Multiple ports continued.mp4
01:00
4. TCP scanner Concurrent.mp4
06:18
5. TCP scanner Concurrent continued.mp4
01:51
6. Network Mapper Introduction - NMAP.mp4
10:54
7. Nmap in golang.mp4
13:43
8. Creating an nmap program in golang.mp4
03:37
1. Source code.html
1. Address Resolution Protocol - ARP.mp4
06:24
2. ARP spoofing.mp4
04:55
3. Installing ARP spoof Program.mp4
01:45
4. Enabling IP packet forwarding.mp4
02:08
5. Performing MITM attack.mp4
04:53
6. Capturing Intercepted Packets.mp4
05:09
1. Installing gopacket package in golang.mp4
01:33
2. Finding devices.mp4
05:54
3. searching for devices over a machine.mp4
01:23
4. Capturing Packets.mp4
03:38
5. intercepting live traffic.mp4
05:36
6. Intercepting traffic from source.mp4
05:11
7. Spoofed packets.mp4
02:21
8. Stealing Credentials.mp4
07:51
9. Stealing Logins over HTTP.mp4
02:02
1. Introduction to malware.mp4
05:52
2. Creating Hacker Server.mp4
07:10
3. Writing Victim Program.mp4
03:35
4. Running Server and Victim Programs.mp4
02:17
5. Clean up server program.mp4
06:35
6. Clean up victim program.mp4
05:07
7. Sending Data from server to victim.mp4
04:28
8. Receiving data from hacker server.mp4
07:42
9. Sending gob structs to victim.mp4
08:47
10. Receiving gob structs at victim machine.mp4
02:47
11. Running the program to send and receive gobs.mp4
01:42
12. Executing command server side.mp4
12:04
13. Exit condition.mp4
01:17
14. Victim Side main function.mp4
06:36
15. Server logic command execution.mp4
08:23
16. Victim Logic command execution.mp4
06:51
17. Victim Logic command execution Part 2.mp4
05:15
18. Minor Error.mp4
00:19
19. Executing Commands Complete program.mp4
03:37
1. Introduction.mp4
00:39
2. setting up victim machine_s main program.mp4
02:26
3. Sending initial current directory to Hacker.mp4
02:39
4. Receiving initial pwd in server.mp4
04:22
5. Getting user input.mp4
02:27
6. Reading User Command.mp4
07:07
7. Getting Back results.mp4
02:51
8. Loop Navigation on server side.mp4
02:17
9. Exit Condition on server.mp4
01:27
10. Loop navigation on victim side.mp4
01:50
11. Running the program.mp4
02:21
1. Introduction how to transfer files.mp4
02:40
2. Setting main function.mp4
03:37
3. Check File_s existence.mp4
02:20
4. Reading file contents.mp4
04:21
5. Creating buffer.mp4
02:40
6. Sending File to victim machine.mp4
04:03
7. Setting up main function in victim.mp4
02:02
8. Saving file on victim_s disk.mp4
06:23
9. Getting back write status.mp4
01:43
10. Uploading a file.mp4
01:45
1. Setting up main function in victim machine.mp4
01:25
2. Getting the list of files in current directory.mp4
05:19
3. Sending list to hacker.mp4
02:14
4. Receiving list at hacker.mp4
02:34
5. Getting user input.mp4
03:19
6. Converting user input to integer.mp4
01:02
7. Sending file names to victim.mp4
01:36
8. Reading file content from victim.mp4
04:32
9. Writing File content hacker.mp4
03:05
10. Downloading the file to hacker machine.mp4
02:20
1. Downloading folder from victim.mp4
02:21
2. Setting main function.mp4
02:22
3. getting folders.mp4
03:21
4. sending folder list to hacker.mp4
01:04
5. Getting folder list and selecting folder.mp4
02:29
6. getting folder name on victim.mp4
01:32
7. Creating Zip file.mp4
05:37
8. Zip file continued.mp4
07:26
9. Connection.mp4
00:28
10. Running Program.mp4
04:16
1. Introduction to trojan.mp4
05:11
2. Packaging.mp4
03:11
3. Running executables.mp4
03:27
4. Running our malware.mp4
02:20
5. Hiding console on victim.mp4
03:48
6. Batch file.mp4
04:44
7. Batch to exe.mp4
02:31
8. Adding icon to executable.mp4
04:28
9. Running exe.mp4
01:26
10. How to perform attack over public internet.mp4
02:36
1. Creating a keylogger using go-keylogger package.mp4
10:05
2. Starting keylogger.mp4
01:05
1. Stegnography Introduction.mp4
02:16
2. Installing Package.mp4
01:25
3. Encoding Data.mp4
04:55
4. Decoding Data.mp4
02:15
1. Protection.mp4
07:14
More details
User Reviews
Rating
average 0
Focused display
Category

Udemy
View courses UdemyStudents take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
- language english
- Training sessions 115
- duration 7:56:32
- English subtitles has
- Release Date 2023/04/03