8 - Terminal Basics
9 - Commands I
10 - Commands II
11 - Commands III
12 - Commands IV
13 - Commands V
14 - Commands VI
15 - Commands VII
16 - Commands VIII
17 - Commands IX
18 - Commands X
19 - Commands XI
20 - Permissions I
21 - Permissions II
22 - Shortcuts
23 - Anonymity
24 - Proxy Theory
25 - Proxy Practical
26 - VPN I
27 - VPN II
28 - TOR I
29 - TOR II
30 - TOR III
31 - Proxychains
32 - Change IP
33 - Change MAC
34 - Macchanger
35 - Footprinting
36 - DNS Enumeration
37 - DNSenum
38 - Bruteforce
39 - Trace DNS
40 - Nmap I
41 - Nmap II
42 - Nmap III
43 - Searchexploit
44 - Website Footprinting
45 - Vulnerability Analysis
46 - Live Attack
47 - RedHawk
48 - Security Audit
49 - Database Assessment
50 - JSQL
51 - SQLsus
52 - Password Attack
53 - Plain Text to Hash
54 - Password Cracking
55 - Findmyhash
56 - Custom Wordlist
57 - Crunch
58 - Cracking Password Offline
59 - Hash Generator
60 - Password Protected Zip
61 - THC Hydra
62 - Medusa
63 - Sniffing
64 - Wireshark I
65 - Wireshark II
66 - Wireshark III
67 - Spoofing
68 - Ettercap I
69 - Ettercap II
70 - Imp Info
71 - WEP Hacking
72 - WPAWPA2
73 - Fern
74 - Metasploit
75 - Buffer Overflow
76 - Honeypots
77 - Pentbox
78 - Browser Exploitation Attack
79 - BeEF
80 - Win 10
81 - Win 7
82 - Completed.html