elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
Module1 Introduction/ -
Module2 Basics and Environment setup/ -
Module3 Linux Refresher/ -
Module4 Networking Refresher/ -
Module5 Footprinting and Reconnaissance/ -
Module6 Scanning/ -
Module7 Enumeration/ -
Module9 Malwares/ -
Module10 Sniffing and Spoofing/ -
Module11 Social Engineering/ -
Module12 Denial of Service/ -
Module13 Session Hijacking/ -
Module14 Hacking Web Servers/ -
Module16 IDS, Firewalls and Honeypots/ -
Module17 Wireless Pentesting/ -
Module18 Mobile Platform Pentesting/ -
Module19 Cryptography/ -
Module20 Cloud Computing/ -
Module21 Digital Forensics/ -
Module22 Bug Hunting and Pentesting/ -
8.1 Introduction to System Hacking.mp4 14M
8.2 Goals of System Hacking.mp4 11M
8.3 Introduction to Password Cracking.m4v 9.0M
8.4 Password Complexity.m4v 7.9M
8.5 Types of Password Attacks.mp4 67M
8.6 Active Online Attack.mp4 8.3M
8.7 Password Guessing.mp4 5.3M
8.8 Default Passwords.mp4 14M
8.9 Online Malware Attack.mp4 9.7M
8.10 Hash Injection or Pass the Hash.mp4 18M
8.11 Meaning of Promiscous Mode.mp4 12M
8.12 Man in the Middle and Replay attacks.mp4 14M
8.13 Offline attacks, Rainbow Tables.mp4 13M
8.14 Offline Distributed Network Attacks.mp4 39M
8.15 Password Cracking with KeyLoggers.mp4 92M
8.16 Password List generation with crunch.mp4 236M
8.17 Password Cracking with hashcat.mp4 186M
8.18 Password Cracking with John the Ripper.mp4 186M
8.19 Password Cracking with Hydra.mp4 68M
8.20 Password Cracking with rainbowcrack.mp4 42M
8.21 Password Cracking with Cain and Winrtgen.mp4 49M
8.22 Password Extraction with passview.mp4 13M
8.23 Password Salting.mp4 27M
8.24 Microsoft Authentication.mp4 20M
8.25 How password are stored in SAM file.mp4 16M
8.26 Introduction to Domain Controller.mp4 29M
8.27 Introduction to Active Directory.mp4 25M
8.28 LAN Manager Hash.mp4 9.3M
8.29 NTLM Authentication.mp4 22M
8.30 Kerberos Authentication.mp4 40M
8.31 Active Directory Lab Build and Minimum Requirements.mp4 14M
8.32 Active Directory Downloading Necessary Files.mp4 19M
8.33 Active Directory Installing the Windows 10 Server.mp4 20M
8.34 Active Directory Installing and Setting up Domain Controller.mp4 22M
8.35 Active Directory Creating Users, Groups, Services and Shares.mp4 42M
8.36 Active Directory Installing and Setting up Windows 10 Enterprise.mp4 30M
8.37 Active Directory Update Windows 10.mp4 4.6M
8.38 Active Directory Joining Users to the Domain.mp4 25M
8.39 Active Directory Attacks LLMNR NBTNS Poisoning.mp4 74M
8.40 Active Directory Attacks Kerberoasting.mp4 16M
8.41 Active Directory Attacks Kerberoasting in action.mp4 66M
8.42 Introduction to Metasploit.mp4 66M
8.43 Metasploit Framework (msf) Walkthrough.mp4 93M
8.44 searchsploit.mp4 165M
8.45 Metasploit Exploiting Windows 7.mp4 141M
8.46 Metasploit Exploiting Linux Machine (Metasploitable).mp4 29M
8.47 DLL Hijacking.mp4 23M
8.48 DLL Hijacking in action.mp4 104M
8.49 Mimikatz.mp4 35M
8.50 Linux Authentication.m4v 27M
8.51 Introduction to Privilege Escalation.mp4 11M
8.52 Windows User Levels.mp4 52M
8.53 Linux User Levels.mp4 53M
8.54 Executing Applications.mp4 19M
8.55 Introduction to Keyloggers.mp4 4.5M
8.56 Types of Keyloggers.mp4 66M
8.57 Working of Remote Keyloggers.mp4 23M
8.58 Anti Keyloggers.mp4 40M
8.59 All in One keylogger.m4v 29M
8.60 Introduction to Spywares.mp4 50M
8.61 spyagent.ts 211M
8.62 Hiding files – Rootkits.mp4 22M
8.63 Types of Rootkits.mp4 14M
8.64 Working of Rootkits.mp4 14M
8.65 Detecting Rootkits.mp4 18M
8.66 Anti Rootkits.mp4 44M
8.67 NTFS Alternate Data Streams.mp4 16M
8.68 NTFS ADS in action.mp4 44M
8.69 Introduction to Steganography.mp4 65M
8.70 Image Steganography.mp4 86M
8.71 Text Steganography.mp4 17M
8.72 Audio Steganography.mp4 2.9M
8.73 Video Steganography.mp4 8.6M
8.74 Quickstego.mp4 48M
8.75 Deepsound.mp4 58M
8.76 Omnihide pro.mp4 42M
8.77 Detecting Steganography.mp4 21M
8.78 Steganalysis.mp4 42M
8.79 Covering Tracks.mp4 33M
8.80 Metasploit Windows Post Exploitation, Privilege Escalation.mp4 78M
8.81 Linux Privilege Escalation.mp4 67M
8.82 Password Cracking Countermeasures.mp4 35M
8.83 Privilege Escalation Countermeasures.ts 19M
8.84 Keylogger Countermeasures.ts 29M
8.85 Rootkit Countemeasures.ts 21M
8.86 NTFS ADS Countermeasures.mp4 8.8M
8.87 Spyware Countermeasures.mp4 18M
15.1 Introduction to Web Applications.mp4 33M
15.8 Introduction to BurpSuite.mp4 50M
15.9 BurpSuite Basics, Working and Setup.mp4 36M
15.10 BurpSuite Target and Spider Modules.mp4 46M
15.11 BurpSuite Sequencer and Scanner Modules.mp4 24M
15.12 BurpSuite Repeater Module.mp4 41M
15.13 BurpSuite Intruder and Comparer Modules.mp4 39M
15.14 Unvalidated Input.mp4 5.2M
15.15 Parameter Tampering and Hidden field Manipulation.mp4 45M
15.16 OWASP Top 10 Security Misconfiguration.mp4 35M
15_2_Web_Application_Attack_Methodology_Footprinting_Infrastructure.mp4 21M
15_3_Web_Application_Attack_Methodology_Attacking_Web_Servers.mp4 2.6M
15_4_Web_Application_Attack_Methodology_Analyzing_Web_Application.mp4 20M
15_5_Web_Application_Attack_Methodology_Attacking_Authentication.mp4 22M
15_6_Web_Application_Attack_Methodology_Performing_Various_Attacks.mp4 19M
15_7_Web_Application_Attack_Methodology_Attacking_Web_Application.mp4 8.7M
Module1.pdf 1.1M
Module2.pdf 1.2M
Module3.pdf 547K
Module4.pdf 2.0M
Module5.pdf 833K
Module6.pdf 1.2M
Module7.pdf 762K
Module8.pdf 3.1M
Module9.pdf 2.2M
Module10.pdf 2.9M
Module11.pdf 865K
Module12.pdf 1.3M
Module13.pdf 1.5M
Module14.pdf 2.5M
Module16.pdf 2.2M
Module17.pdf 2.3M
Module18.pdf 1.8M
Module19.pdf 3.0M
Module20.pdf 930K
Module21.pdf 1.9M
Module22.pdf 1.1M
Study Materials 8.zip 14M
Study Materials 15.zip 21M
Recent Courses
Complete Red Hat System Administration Boot Camp - RHCSA 9
CHFI v11 Evidence Files
AI Governance Professional (AIGP) Certification & AI Mastery
Dark Web Forensics (DWA)
ZeroToMastery - DevOps Bootcamp_ Learn Linux & Become a Linux Sysadmin
INE - Digital Forensics Professional (eCDFP)
Hacking Exposed
EC-Council Certified DevSecOps Engineer (ECDE)_Videos
PNPT Live Learn to Hack
DevOps for Developers
Building Your Cybersecurity Talent Pipeline
The Cybersecurity Threat Landscape
Security Tips - Metadata
iNE - Penetration Testing Student v2 (eJPTv2)
Udemy Course – Malware Development for Ethical Hackers & Pentesters
Udemy - The Ultimate Dark Web Anonymity Privacy Security Course 2025
iNE _ CCNA 200-301