23 - Understanding Version Control System GIT (Bonus Section)/009 Importance of Branching in GIT.mp4 233.4 MB
08 - Real time Ecommerce App- End to end Practise Exercises/007 TestCase- Validating Total amount generated functionality.mp4 225.9 MB
20 - Framework Part 5- Setting up Global Configuration variables & generating Reports/003 Introduction to Extent reports - Quick 20min tutorial.mp4 201.8 MB
02 - Appium Installation Instructions for Windows & Mac/004 Set Environment variable Paths of all Softwares in MAC.mp4 173.2 MB
06 - Advanced Gestures Automation with Key Events Handling using Appium/001 Introduction to Appium Mobile Gestures and how it works.mp4 172.3 MB
19 - Framework Part 4- Data Driven testing with Parameterization for Appium Tests/004 Data utility which reads json and parse it for TestNG Dataprovider input.mp4 150.7 MB
18 - Framework Part 3- Implementing Test Strategy & Building Reusable Util methods/002 Implement Test Strategy on deciding how to run tests in a file.mp4 150.3 MB
09 - Hybrid App Automation with Appium to switch from Apps to Web browser/002 How to handle objects when rendered in Web view.mp4 148.8 MB
15 - IOS Real device Automation Testing guidelines with example/004 Bundle Id generation and running the Tests.mp4 144.1 MB
23 - Understanding Version Control System GIT (Bonus Section)/007 End to end working example on Git commands -1.mp4 143.8 MB
08 - Real time Ecommerce App- End to end Practise Exercises/004 Testcase-Scrolling in product list example with Appium Android scroll.mp4 140.6 MB
14 - Automate InBuilt IOS Apps with Appium/003 Automate Swiping functionality on IOS devices using Appium.mp4 136.8 MB
08 - Real time Ecommerce App- End to end Practise Exercises/002 Test Case in Filling the form details for shopping.mp4 136.6 MB
07 - Appium Miscellaneous Topics for Android Automation/003 Automate Miscellaneous Activities like orientation & KeyEvents using Appium.mp4 133.6 MB
21 - Framework Part 6- Screenshots , TestNG Listeners, Maven Integration with Jenkins/001 How to take automatic screenshots o Test failures & attach to report.mp4 130.0 MB
16 - Framework Part 1- Code Design patterns in writing Android & IOS Automation Tests/003 Introduction to Page object Factory and design Implementation idea.mp4 128.0 MB
08 - Real time Ecommerce App- End to end Practise Exercises/005 Testcase-Dynamically selecting Product by scanning list based on text.mp4 125.0 MB
17 - Framework Part 2- Code Design patterns in writing Android & IOS Automation Tests/001 Part 1 - Implement Page object file for Product Catalogue page with actions.mp4 124.9 MB
16 - Framework Part 1- Code Design patterns in writing Android & IOS Automation Tests/005 Inherit Android Actions class to page object classes for reusable methods.mp4 122.4 MB
[TutsNode.net] - Learn Ethical Hacking From Scratch/11 - Network Hacking Post Connection Attacks MITM Attacks/53 - Wireshark Capturing Passwords Anything Sent By Any Device In The Network.mp4 177.9 MB
[TutsNode.net] - Learn Ethical Hacking From Scratch/11 - Network Hacking Post Connection Attacks MITM Attacks/44 - Bypassing HSTS.mp4 175.5 MB
[TutsNode.net] - Learn Ethical Hacking From Scratch/16 - Gaining Access Client Side Attacks Social Engineering/91 - BeEF Overview Basic Hook Method.mp4 172.2 MB
[TutsNode.net] - Learn Ethical Hacking From Scratch/15 - Gaining Access Client Side Attacks/77 - Backdooring Downloads on The Fly to Hack Windows 10.mp4 162.2 MB
[TutsNode.net] - Learn Ethical Hacking From Scratch/2 - Setting up a Hacking Lab/5 - Initial Preparation.mp4 162.0 MB
[TutsNode.net] - Learn Ethical Hacking From Scratch/14 - Gaining Access Server Side Attacks/63 - Basic Information Gathering Exploitation.mp4 150.6 MB
[TutsNode.net] - Learn Ethical Hacking From Scratch/4 - Network Hacking/14 - What is MAC Address How To Change It.mp4 149.6 MB
[TutsNode.net] - Learn Ethical Hacking From Scratch/11 - Network Hacking Post Connection Attacks MITM Attacks/43 - Bypassing HTTPS.mp4 148.5 MB
[TutsNode.net] - Learn Ethical Hacking From Scratch/11 - Network Hacking Post Connection Attacks MITM Attacks/49 - Doing All of The Above Using a Graphical Interface.mp4 140.5 MB
[TutsNode.net] - Learn Ethical Hacking From Scratch/20 - Website Hacking Information Gathering/114 - Gathering Comprehensive DNS Information.mp4 136.0 MB
16. Gaining Access - Client Side Attacks/8. Backdooring Downloads on The Fly to Hack Windows 10.mp4 143.8 MB
16. Gaining Access - Client Side Attacks/7. Hacking Windows 10 Using Fake Update.mp4 140.4 MB
12. Network Hacking - Post Connection Attacks - MITM Attacks/16. Creating a Fake Access Point (Honeypot) - Theory.mp4 133.7 MB
12. Network Hacking - Post Connection Attacks - MITM Attacks/10. DNS Spoofing - Controlling DNS Requests on The Network.mp4 132.8 MB
15. Gaining Access - Server Side Attacks/6. Nexpose - Installing Nexpose.mp4 125.9 MB
12. Network Hacking - Post Connection Attacks - MITM Attacks/15. Wireshark - Capturing Passwords & Anything Sent By Any Device In The Network.mp4 114.9 MB
12. Network Hacking - Post Connection Attacks - MITM Attacks/12. Wireshark - Basic Overview & How To Use It With MITM Attacks.mp4 114.5 MB
19. Post Exploitation/7. Pivoting - Theory (What is Pivoting).mp4 114.3 MB
3. Linux Basics/1. Basic Overview of Kali Linux.mp4 112.7 MB
2. Setting up a Hacking Lab/1. Lab Overview & Needed Software.mp4 111.7 MB
21. Website Hacking - Information Gathering/3. Gathering Comprehensive DNS Information.mp4 111.7 MB
2. Setting up a Hacking Lab/2. Installing Kali 2019 As a Virtual Machine.mp4 140.3 MB
12. Network Hacking - Post Connection Attacks - MITM Attacks/10. DNS Spoofing - Controlling DNS Requests on The Network.mp4 132.8 MB
15. Gaining Access - Server Side Attacks/6. Nexpose - Installing Nexpose.mp4 125.9 MB
12. Network Hacking - Post Connection Attacks - MITM Attacks/15. Wireshark - Capturing Passwords & Anything Sent By Any Device In The Network.mp4 114.9 MB
12. Network Hacking - Post Connection Attacks - MITM Attacks/12. Wireshark - Basic Overview & How To Use It With MITM Attacks.mp4 114.5 MB
19. Post Exploitation/7. Pivoting - Theory (What is Pivoting).mp4 114.3 MB
3. Linux Basics/1. Basic Overview of Kali Linux.mp4 112.7 MB
2. Setting up a Hacking Lab/1. Lab Overview & Needed Software.mp4 111.7 MB
21. Website Hacking - Information Gathering/3. Gathering Comprehensive DNS Information.mp4 111.7 MB
16. Gaining Access - Client Side Attacks/8. Backdooring Downloads on The Fly to Hack Windows 10.mp4 143.8 MB
16. Gaining Access - Client Side Attacks/7. Hacking Windows 10 Using Fake Update.mp4 140.4 MB
12. Network Hacking - Post Connection Attacks - MITM Attacks/16. Creating a Fake Access Point (Honeypot) - Theory.mp4 133.7 MB
12. Network Hacking - Post Connection Attacks - MITM Attacks/10. DNS Spoofing - Controlling DNS Requests on The Network.mp4 132.8 MB
15. Gaining Access - Server Side Attacks/6. Nexpose - Installing Nexpose.mp4 125.9 MB
12. Network Hacking - Post Connection Attacks - MITM Attacks/15. Wireshark - Capturing Passwords & Anything Sent By Any Device In The Network.mp4 114.9 MB
12. Network Hacking - Post Connection Attacks - MITM Attacks/12. Wireshark - Basic Overview & How To Use It With MITM Attacks.mp4 114.5 MB
19. Post Exploitation/7. Pivoting - Theory (What is Pivoting).mp4 114.3 MB
3. Linux Basics/1. Basic Overview of Kali Linux.mp4 112.7 MB
2. Setting up a Hacking Lab/1. Lab Overview & Needed Software.mp4 111.7 MB
21. Website Hacking - Information Gathering/3. Gathering Comprehensive DNS Information.mp4 111.7 MB
16. Gaining Access - Client Side Attacks/8. Backdooring Downloads on The Fly to Hack Windows 10.mp4 143.8 MB
16. Gaining Access - Client Side Attacks/7. Hacking Windows 10 Using Fake Update.mp4 140.4 MB
12. Network Hacking - Post Connection Attacks - MITM Attacks/16. Creating a Fake Access Point (Honeypot) - Theory.mp4 133.7 MB
12. Network Hacking - Post Connection Attacks - MITM Attacks/10. DNS Spoofing - Controlling DNS Requests on The Network.mp4 132.8 MB
15. Gaining Access - Server Side Attacks/6. Nexpose - Installing Nexpose.srt 125.9 MB
15. Gaining Access - Server Side Attacks/6. Nexpose - Installing Nexpose.mp4 125.9 MB
12. Network Hacking - Post Connection Attacks - MITM Attacks/15. Wireshark - Capturing Passwords & Anything Sent By Any Device In The Network.mp4 114.9 MB
12. Network Hacking - Post Connection Attacks - MITM Attacks/12. Wireshark - Basic Overview & How To Use It With MITM Attacks.mp4 114.5 MB
19. Post Exploitation/7. Pivoting - Theory (What is Pivoting).mp4 114.3 MB
3. Linux Basics/1. Basic Overview of Kali Linux.mp4 112.7 MB
2. Setting up a Hacking Lab/1. Lab Overview & Needed Software.mp4 111.7 MB
21. Website Hacking - Information Gathering/3. Gathering Comprehensive DNS Information.mp4 111.7 MB
16. Gaining Access - Client Side Attacks/8. Backdooring Downloads on The Fly to Hack Windows 10.mp4 143.8 MB
16. Gaining Access - Client Side Attacks/7. Hacking Windows 10 Using Fake Update.mp4 140.4 MB
12. Network Hacking - Post Connection Attacks - MITM Attacks/16. Creating a Fake Access Point (Honeypot) - Theory.mp4 133.7 MB
12. Network Hacking - Post Connection Attacks - MITM Attacks/10. DNS Spoofing - Controlling DNS Requests on The Network.mp4 132.8 MB
15. Gaining Access - Server Side Attacks/6. Nexpose - Installing Nexpose.srt 125.9 MB
15. Gaining Access - Server Side Attacks/6. Nexpose - Installing Nexpose.mp4 125.9 MB
12. Network Hacking - Post Connection Attacks - MITM Attacks/15. Wireshark - Capturing Passwords & Anything Sent By Any Device In The Network.mp4 114.9 MB
12. Network Hacking - Post Connection Attacks - MITM Attacks/12. Wireshark - Basic Overview & How To Use It With MITM Attacks.mp4 114.5 MB
19. Post Exploitation/7. Pivoting - Theory (What is Pivoting).mp4 114.3 MB
3. Linux Basics/1. Basic Overview of Kali Linux.mp4 112.7 MB
2. Setting up a Hacking Lab/1. Lab Overview & Needed Software.mp4 111.7 MB
21. Website Hacking - Information Gathering/3. Gathering Comprehensive DNS Information.mp4 111.7 MB