~Get Your Files Here !/1 - Introduction/1 - About the author.mp430.66MB
~Get Your Files Here !/1 - Introduction/2 - Disclaimer.mp412.94MB
~Get Your Files Here !/2 - Section 1. Going undercover/3 - How to secure yourself from adversaries.mp496.93MB
~Get Your Files Here !/2 - Section 1. Going undercover/4 - Neutralizing Betrayers.mp4142.2MB
~Get Your Files Here !/2 - Section 1. Going undercover/5 - Choosing a Browser James Bond Would Appreciate.mp4114.19MB
~Get Your Files Here !/2 - Section 1. Going undercover/6 - Going for Search Engines that don't Track You.mp454.16MB
~Get Your Files Here !/3 - Section 2. Recruiting Intelligence Sources/10 - Where Phone Numbers May Come.mp478.77MB
~Get Your Files Here !/3 - Section 2. Recruiting Intelligence Sources/11 - How to Get Invisible Information from an Image. Part 1. Reverse Search.mp4160.36MB
~Get Your Files Here !/3 - Section 2. Recruiting Intelligence Sources/12 - How to Get Invisible Information from an Image. Part 2. Forensic Analysis.mp495.57MB
~Get Your Files Here !/3 - Section 2. Recruiting Intelligence Sources/13 - What's in a Name.mp4187.66MB
~Get Your Files Here !/3 - Section 2. Recruiting Intelligence Sources/14 - Practical Case - Vehicle Scammers Get Caught.mp483.43MB
~Get Your Files Here !/3 - Section 2. Recruiting Intelligence Sources/7 - Understanding the OSINT Chain.mp472.55MB
~Get Your Files Here !/3 - Section 2. Recruiting Intelligence Sources/8 - How to Trace an IP Address.mp4128.78MB
~Get Your Files Here !/3 - Section 2. Recruiting Intelligence Sources/9 - How to Extract Hidden Data from an Email.mp496.86MB
~Get Your Files Here !/4 - Section 3. How to Make Search Engines Talk/15 - Do You Speak Google (begining).mp4116.8MB
~Get Your Files Here !/4 - Section 3. How to Make Search Engines Talk/16 - Do You Speak Google Getting to know with Google advanced operators (continued)).mp493.19MB
~Get Your Files Here !/4 - Section 3. How to Make Search Engines Talk/17 - Seducing Duck.mp4117.6MB
~Get Your Files Here !/4 - Section 3. How to Make Search Engines Talk/18 - Time Travel by Wayback Machine.mp490.43MB
~Get Your Files Here !/4 - Section 3. How to Make Search Engines Talk/19 - Practical Cases - Spotting a Bully and Two-Tongued Politician.mp465.05MB
~Get Your Files Here !/5 - Section 4. How to Interrogate Social Networks/20 - Entering the Battlefield.mp455.97MB
~Get Your Files Here !/5 - Section 4. How to Interrogate Social Networks/21 - Digging into Twitter.mp481.87MB
~Get Your Files Here !/5 - Section 4. How to Interrogate Social Networks/22 - Digging into Twitter (continued).mp476.6MB
~Get Your Files Here !/5 - Section 4. How to Interrogate Social Networks/23 - Digging into Twitter (continued) - Filters.mp4120.16MB
~Get Your Files Here !/5 - Section 4. How to Interrogate Social Networks/24 - Infiltrating LinkedIn.mp4142.27MB
~Get Your Files Here !/5 - Section 4. How to Interrogate Social Networks/25 - How to Spot a Person under a Nickname.mp493.41MB
~Get Your Files Here !/5 - Section 4. How to Interrogate Social Networks/26 - What about Facebook and Instagram.mp456.72MB
~Get Your Files Here !/5 - Section 4. How to Interrogate Social Networks/27 - Practical Cases - How to Spot Trolls in Twitter.mp454.08MB
~Get Your Files Here !/6 - Section 5. Loading Heavy Guns/28 - Getting to Know with Maltego.mp4111.54MB
~Get Your Files Here !/6 - Section 5. Loading Heavy Guns/29 - Extracting Domain Names and IP Addresses Connections.mp465.01MB
~Get Your Files Here !/6 - Section 5. Loading Heavy Guns/30 - Playing with Names, Emails and Phone Numbers.mp4102.07MB
~Get Your Files Here !/6 - Section 5. Loading Heavy Guns/31 - How to Track a Bitcoin Transaction.mp4114.91MB
~Get Your Files Here !/6 - Section 5. Loading Heavy Guns/32 - Efficient Tips&Tricks for your OSINT Investigations.mp4101.41MB
~Get Your Files Here !/6 - Section 5. Loading Heavy Guns/33 - BONUS! How to Make People Share Their Darkest Secret.mp4156.48MB