elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
Module1 Introduction/ -
Module2 Basics and Environment setup/ -
Module3 Linux Refresher/ -
Module4 Networking Refresher/ -
Module5 Footprinting and Reconnaissance/ -
Module6 Scanning/ -
Module7 Enumeration/ -
Module9 Malwares/ -
Module10 Sniffing and Spoofing/ -
Module11 Social Engineering/ -
Module12 Denial of Service/ -
Module13 Session Hijacking/ -
Module14 Hacking Web Servers/ -
Module16 IDS, Firewalls and Honeypots/ -
Module17 Wireless Pentesting/ -
Module18 Mobile Platform Pentesting/ -
Module19 Cryptography/ -
Module20 Cloud Computing/ -
Module21 Digital Forensics/ -
Module22 Bug Hunting and Pentesting/ -
8.1 Introduction to System Hacking.mp4 14M
8.2 Goals of System Hacking.mp4 11M
8.3 Introduction to Password Cracking.m4v 9.0M
8.4 Password Complexity.m4v 7.9M
8.5 Types of Password Attacks.mp4 67M
8.6 Active Online Attack.mp4 8.3M
8.7 Password Guessing.mp4 5.3M
8.8 Default Passwords.mp4 14M
8.9 Online Malware Attack.mp4 9.7M
8.10 Hash Injection or Pass the Hash.mp4 18M
8.11 Meaning of Promiscous Mode.mp4 12M
8.12 Man in the Middle and Replay attacks.mp4 14M
8.13 Offline attacks, Rainbow Tables.mp4 13M
8.14 Offline Distributed Network Attacks.mp4 39M
8.15 Password Cracking with KeyLoggers.mp4 92M
8.16 Password List generation with crunch.mp4 236M
8.17 Password Cracking with hashcat.mp4 186M
8.18 Password Cracking with John the Ripper.mp4 186M
8.19 Password Cracking with Hydra.mp4 68M
8.20 Password Cracking with rainbowcrack.mp4 42M
8.21 Password Cracking with Cain and Winrtgen.mp4 49M
8.22 Password Extraction with passview.mp4 13M
8.23 Password Salting.mp4 27M
8.24 Microsoft Authentication.mp4 20M
8.25 How password are stored in SAM file.mp4 16M
8.26 Introduction to Domain Controller.mp4 29M
8.27 Introduction to Active Directory.mp4 25M
8.28 LAN Manager Hash.mp4 9.3M
8.29 NTLM Authentication.mp4 22M
8.30 Kerberos Authentication.mp4 40M
8.31 Active Directory Lab Build and Minimum Requirements.mp4 14M
8.32 Active Directory Downloading Necessary Files.mp4 19M
8.33 Active Directory Installing the Windows 10 Server.mp4 20M
8.34 Active Directory Installing and Setting up Domain Controller.mp4 22M
8.35 Active Directory Creating Users, Groups, Services and Shares.mp4 42M
8.36 Active Directory Installing and Setting up Windows 10 Enterprise.mp4 30M
8.37 Active Directory Update Windows 10.mp4 4.6M
8.38 Active Directory Joining Users to the Domain.mp4 25M
8.39 Active Directory Attacks LLMNR NBTNS Poisoning.mp4 74M
8.40 Active Directory Attacks Kerberoasting.mp4 16M
8.41 Active Directory Attacks Kerberoasting in action.mp4 66M
8.42 Introduction to Metasploit.mp4 66M
8.43 Metasploit Framework (msf) Walkthrough.mp4 93M
8.44 searchsploit.mp4 165M
8.45 Metasploit Exploiting Windows 7.mp4 141M
8.46 Metasploit Exploiting Linux Machine (Metasploitable).mp4 29M
8.47 DLL Hijacking.mp4 23M
8.48 DLL Hijacking in action.mp4 104M
8.49 Mimikatz.mp4 35M
8.50 Linux Authentication.m4v 27M
8.51 Introduction to Privilege Escalation.mp4 11M
8.52 Windows User Levels.mp4 52M
8.53 Linux User Levels.mp4 53M
8.54 Executing Applications.mp4 19M
8.55 Introduction to Keyloggers.mp4 4.5M
8.56 Types of Keyloggers.mp4 66M
8.57 Working of Remote Keyloggers.mp4 23M
8.58 Anti Keyloggers.mp4 40M
8.59 All in One keylogger.m4v 29M
8.60 Introduction to Spywares.mp4 50M
8.61 spyagent.ts 211M
8.62 Hiding files – Rootkits.mp4 22M
8.63 Types of Rootkits.mp4 14M
8.64 Working of Rootkits.mp4 14M
8.65 Detecting Rootkits.mp4 18M
8.66 Anti Rootkits.mp4 44M
8.67 NTFS Alternate Data Streams.mp4 16M
8.68 NTFS ADS in action.mp4 44M
8.69 Introduction to Steganography.mp4 65M
8.70 Image Steganography.mp4 86M
8.71 Text Steganography.mp4 17M
8.72 Audio Steganography.mp4 2.9M
8.73 Video Steganography.mp4 8.6M
8.74 Quickstego.mp4 48M
8.75 Deepsound.mp4 58M
8.76 Omnihide pro.mp4 42M
8.77 Detecting Steganography.mp4 21M
8.78 Steganalysis.mp4 42M
8.79 Covering Tracks.mp4 33M
8.80 Metasploit Windows Post Exploitation, Privilege Escalation.mp4 78M
8.81 Linux Privilege Escalation.mp4 67M
8.82 Password Cracking Countermeasures.mp4 35M
8.83 Privilege Escalation Countermeasures.ts 19M
8.84 Keylogger Countermeasures.ts 29M
8.85 Rootkit Countemeasures.ts 21M
8.86 NTFS ADS Countermeasures.mp4 8.8M
8.87 Spyware Countermeasures.mp4 18M
15.1 Introduction to Web Applications.mp4 33M
15.8 Introduction to BurpSuite.mp4 50M
15.9 BurpSuite Basics, Working and Setup.mp4 36M
15.10 BurpSuite Target and Spider Modules.mp4 46M
15.11 BurpSuite Sequencer and Scanner Modules.mp4 24M
15.12 BurpSuite Repeater Module.mp4 41M
15.13 BurpSuite Intruder and Comparer Modules.mp4 39M
15.14 Unvalidated Input.mp4 5.2M
15.15 Parameter Tampering and Hidden field Manipulation.mp4 45M
15.16 OWASP Top 10 Security Misconfiguration.mp4 35M
15_2_Web_Application_Attack_Methodology_Footprinting_Infrastructure.mp4 21M
15_3_Web_Application_Attack_Methodology_Attacking_Web_Servers.mp4 2.6M
15_4_Web_Application_Attack_Methodology_Analyzing_Web_Application.mp4 20M
15_5_Web_Application_Attack_Methodology_Attacking_Authentication.mp4 22M
15_6_Web_Application_Attack_Methodology_Performing_Various_Attacks.mp4 19M
15_7_Web_Application_Attack_Methodology_Attacking_Web_Application.mp4 8.7M
Module1.pdf 1.1M
Module2.pdf 1.2M
Module3.pdf 547K
Module4.pdf 2.0M
Module5.pdf 833K
Module6.pdf 1.2M
Module7.pdf 762K
Module8.pdf 3.1M
Module9.pdf 2.2M
Module10.pdf 2.9M
Module11.pdf 865K
Module12.pdf 1.3M
Module13.pdf 1.5M
Module14.pdf 2.5M
Module16.pdf 2.2M
Module17.pdf 2.3M
Module18.pdf 1.8M
Module19.pdf 3.0M
Module20.pdf 930K
Module21.pdf 1.9M
Module22.pdf 1.1M
Study Materials 8.zip 14M
Study Materials 15.zip 21M
Recent Courses
CEHv13
BittenTech - TechHacker Ethical Hacking and Cyber Security
Kaspersky - Hunting APTs like a Ninja with YARA
A-Windows_Process_Injection_For_Red-Blue_Team
QURE Academy - Advanced Attacks Against Active Directory
EC-Council - Certified Network Defender v3 2024.11
EC-Council - Cyber Security Technician
PEN-200 - Penetration Testing with Kali Linux Videos
EDRPv3 EC-Council Disaster Recovery Professional
OffSec - PEN-200 2024.11
Practical Analysis with Security Onion
SANS ON DEMAND COURSE
Top 5 Tools & Techniques for Penetration Testing
CVE's for Bug Bounties & Penetration Testing
Creating Batch Scripts For Android
Oreilly - Mastering Cybersecurity with Python - From Basics to Advanced Defense
Recon For Bug Bounties & Penetration Testing
Bug Bounty Hunting and Penetration Testing v2
Bug Bounty Hunting and Penetration Testing v1
Bootcamp de Backend Avanzado_ Microservicios
Sketchup desde Cero para Arquitectos
Creación y consulta de bases de datos con ChatGPT y SQL
Storytelling Audiovisual para redes sociales
Introducción a Frameworks de Frontend con Vue 3"
Trafficker Expert
2. Digital Marketing Course ( English )
Creación de videojuegos
Master en Creación de Videojuegos
Photoshop 2020 para fotógrafos. Conoce el Retoque nivel PRO!
Soporte Técnico a Computadoras en Entornos Corporativos
13 CURSO DE REPARACION DE IMPRESORAS
18. Copywriting como escribir para vender mas
Master en Reparación de iPhone
Crea Aplicaciones Java Web
Curso de creación de bots [CodigoFacilito]
Maestría en CSS3 Flexbox, Grid, SASS, Bootstrap 5
Robótica con Matlab Cinemática directa y Simulación
COMMUNITY AND CONTENT MANAGER
Aprende Android con Ejemplos
Adobe Premiere desde Cero
ELECTRICIDAD
Invertir en Criptomonedas - Blockchain - Trading - DeFi - UDEMY
Angular - De cero a experto
Electrónica desde cero
Creación de videojuegos
Universidad del dropshipping
Cursos PhotoShop
reparacion de ps2
Curso de Linux s4vitar
rofesional en Reparacion de Laptops
Curso Marketing PRO Masterclass - John Dani
Curso de Reparación de Discos Duros y Recuperación de Datos
CURSO WORD, POWERPOINT
EXCEL DE PRINCIPIANTE A EXPERTO
CURSO SOLIDWORKS
Seguridad Informática desde Cero
Master Unreal Engine 4 Para Arquitectura en Español
Aprende.realidad.aumentada.con.ARKit
COMO VENDER POR FB e IG ADS - FELIPE VERGARA
AUTOCAD 2019 DE PRINCIPIANTE A AVANZADO
Curso Word
Curso Adobe Illustrator Sé un experto en ilustración digital
Universidad Python 2021 - POO, Django, Flask y Postgresql