elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
013 SkyTower.rtfd/ -
014 pwnlab-explanation.rtfd/ -
017 Metasploit-TakeControlOfPC.rtfd/ -
001 Introduction.en.srt 136
001 Introduction.mp4 4.5M
002 Virtualbox (Installation and Configuration).en.srt 13K
002 Virtualbox (Installation and Configuration).mp4 98M
003 Kali Linux (Installation and Configuration).en.srt 11K
003 Kali Linux (Installation and Configuration).mp4 142M
004 The concept of Enumeration.en.srt 5.6K
004 The concept of Enumeration.mp4 38M
005 NetBios Enumeration.en.srt 26K
005 NetBios Enumeration.mp4 319M
006 Simple Mail Transfer Protocol - SMTP Enumeration.en.srt 21K
006 Simple Mail Transfer Protocol - SMTP Enumeration.mp4 237M
007 Simple Network Management Protocol - SNMP Enumeration.en.srt 20K
007 Simple Network Management Protocol - SNMP Enumeration.mp4 254M
008 Lightweight Directory Access Protocol - LDAP Enumeration.en.srt 20K
008 Lightweight Directory Access Protocol - LDAP Enumeration.mp4 297M
009 Some Vulnerable Labs (VM) to Download for this Course.en.srt 2.6K
009 Some Vulnerable Labs (VM) to Download for this Course.mp4 33M
009 Vulnerable-Labs-Links.rtf 1.4K
010 BrainPan VM Enumeration and Exploitation.en.srt 50K
010 BrainPan VM Enumeration and Exploitation.mp4 658M
010 brainPan-commands.txt 3.2K
010 brainfuzzer.py 1.0K
010 brainpan1.py 1.4K
010 brainpan2.py 589
010 brainpan3.py 1.6K
010 brainpan4.py 2.5K
010 brainpan5.py 1.5K
011 Turnkey-wordpress.rtf 3.6K
011 Turnkey VM Enumeration and Exploitation.en.srt 24K
011 Turnkey VM Enumeration and Exploitation.mp4 283M
012 DerpnStink VM Enumeration and Exploitation.en.srt 31K
012 DerpnStink VM Enumeration and Exploitation.mp4 369M
012 VulnHubE8-DeRPnStiNK-ubuntu14.rtf 11K
013 SkyTower VM Enumeration and Exploitation.en.srt 20K
013 SkyTower VM Enumeration and Exploitation.mp4 222M
014 PwnLab VM Enumeration and Exploitation.en.srt 64K
014 PwnLab VM Enumeration and Exploitation.mp4 719M
015 GoldenEye-OS.rtf 17K
015 GoldenEye VM Enumeration and Exploitation.en.srt 36K
015 GoldenEye VM Enumeration and Exploitation.mp4 397M
016 ShellShock Enumeration and Exploitation (Common Vulnerabilities and Exposures-CVE).en.srt 25K
016 ShellShock Enumeration and Exploitation (Common Vulnerabilities and Exposures-CVE).mp4 359M
016 Shellshock.rtf 2.8K
017 Lab_Practice - Using Metasploit on Kali Linux To Take Control Of A User's PC.en.srt 46K
017 Lab_Practice - Using Metasploit on Kali Linux To Take Control Of A User's PC.mp4 616M
018 Wordpress Enumeration and Exploitation.en.srt 6.8K
018 Wordpress Enumeration and Exploitation.mp4 96M
019 Stapler-os.rtf 11K
019 Stapler VM Enumeration and Exploitation.en.srt 31K
019 Stapler VM Enumeration and Exploitation.mp4 301M
020 Sick-OS.rtf 3.8K
020 SickOS VM Enumeration and Exploitation.en.srt 29K
020 SickOS VM Enumeration and Exploitation.mp4 384M
021 IMF (Impossible Mission Force) VM Enumeration and Exploitation.en.srt 55K
021 IMF (Impossible Mission Force) VM Enumeration and Exploitation.mp4 542M
021 IMF-ImpossibleMissionForce.rtf 19K
022 Exploitation of Apache Struts (CVE 2017).en.srt 14K
022 Exploitation of Apache Struts (CVE 2017).mp4 228M
022 Lecture-20ApacheStruts.txt 625
023 Lampiao-os.rtf 4.1K
023 Lampiao VM Enumeration and Exploitation.en.srt 21K
023 Lampiao VM Enumeration and Exploitation.mp4 216M
024 Remote-File-Inclusion-Attack.pdf 106K
024 Remote File Inclusion Attack (RFI).en.srt 17K
024 Remote File Inclusion Attack (RFI).mp4 118M
025 Last_but_not_least.en.srt 1.5K
025 Last_but_not_least.mp4 26M