Ethical Hacking Book Series Video 35, Pivoting and Privilege Escalation, Video 1
59:41
Ethical Hacking Book Series Video 34, XSS video 2
1:00:50
Ethical Hacking Book Series Video 36, Pivoting and Privilege Escalation, Video 2
1:21:28
Kali Linux hacking tools basic to intermediate book Video 9, Password Cracking Tools
43:10
Kali Linux Penetration Testing Bible, Video 1
1:12:00
Ethical Hacking Book Series Video 37, Moving Through The Corporate Windows Network, Video 1
1:20:31
Linux Basics for Hackers Book Video 6, Process Management
1:08:51
Shadow Initiation Sequence Protocol (SISP) Creation by Michael Lopez
36:14