Please Login To Continue

Post Exploitation Tools in Kali Linux (in Hindi)

Lesson 11 of 14 • 0 upvotes • 8:57mins

Avatar

Akshay Kishor Chauhan

In this lesson, Akshay has discussed Post Exploitation Tools in Kali Linux.

Continue on app
1

Introduction to Kali Linux (in Hindi)

5:34mins

2

Setting up Laboratory for Kali Linux (in Hindi)

10:18mins

3

Information Gathering in Kali Linux (in Hindi)

12:54mins

4

Vulnerability Analysis Tools in Kali Linux (in Hindi)

11:42mins

5

Web Application Analysis Tools in Kali Linux (in Hindi)

10:14mins

6

Password Attacks in Kali Linux (in Hindi)

13:06mins

7

Wireless Attacks in Kali Linux (in Hindi)

13:53mins

8

Reverse Engineering in Kali Linux (in Hindi)

8:46mins

9

Exploitation Tools in Kali Linux (in Hindi)

10:13mins

10

Sniffing And Spoofing Tools in Kali Linux (in Hindi)

9:47mins

11

Post Exploitation Tools in Kali Linux (in Hindi)

8:57mins

12

Forensic Tools in Kali Linux (in Hindi)

10:25mins

13

Reporting Tools in Kali Linux (in Hindi)

8:54mins

14

Social Engineering Tools in Kali Linux (in Hindi)

8:19mins

Crack Programming with Unacademy

Get subscription and access unlimited live and recorded courses from India's best educators
Structured syllabus
Structured syllabus
Daily live classes
Daily live classes
Ask doubts
Ask doubts
Tests & practice
Tests & practice

Similar Plus Courses

thumbnail
ENROLL
HinglishPolity, Governance & IR

Comprehensive Governance for UPSC CSE 2025 - 26

Dr Sidharth Arora

Unacademy is India’s largest online learning platform. Download our apps to start learning


Starting your preparation?

Call us and we will answer all your questions about learning on Unacademy

Call +91 8585858585
Company
About usShikshodayaCareersBlogsPrivacy PolicyTerms and Conditions
Products
Learner appLearner appEducator appEducator appParent appParent app