elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
Module1 Introduction/ -
Module2 Basics and Environment setup/ -
Module3 Linux Refresher/ -
Module4 Networking Refresher/ -
Module5 Footprinting and Reconnaissance/ -
Module6 Scanning/ -
Module7 Enumeration/ -
Module9 Malwares/ -
Module10 Sniffing and Spoofing/ -
Module11 Social Engineering/ -
Module12 Denial of Service/ -
Module13 Session Hijacking/ -
Module14 Hacking Web Servers/ -
Module16 IDS, Firewalls and Honeypots/ -
Module17 Wireless Pentesting/ -
Module18 Mobile Platform Pentesting/ -
Module19 Cryptography/ -
Module20 Cloud Computing/ -
Module21 Digital Forensics/ -
Module22 Bug Hunting and Pentesting/ -
Module3.pdf 547K
Module7.pdf 762K
Module5.pdf 833K
Module11.pdf 865K
Module20.pdf 930K
Module22.pdf 1.1M
Module1.pdf 1.1M
Module6.pdf 1.2M
Module2.pdf 1.2M
Module12.pdf 1.3M
Module13.pdf 1.5M
Module18.pdf 1.8M
Module21.pdf 1.9M
Module4.pdf 2.0M
Module9.pdf 2.2M
Module16.pdf 2.2M
Module17.pdf 2.3M
Module14.pdf 2.5M
15_3_Web_Application_Attack_Methodology_Attacking_Web_Servers.mp4 2.6M
8.72 Audio Steganography.mp4 2.9M
Module10.pdf 2.9M
Module19.pdf 3.0M
Module8.pdf 3.1M
8.55 Introduction to Keyloggers.mp4 4.5M
8.37 Active Directory Update Windows 10.mp4 4.6M
15.14 Unvalidated Input.mp4 5.2M
8.7 Password Guessing.mp4 5.3M
8.4 Password Complexity.m4v 7.9M
8.6 Active Online Attack.mp4 8.3M
8.73 Video Steganography.mp4 8.6M
15_7_Web_Application_Attack_Methodology_Attacking_Web_Application.mp4 8.7M
8.86 NTFS ADS Countermeasures.mp4 8.8M
8.3 Introduction to Password Cracking.m4v 9.0M
8.28 LAN Manager Hash.mp4 9.3M
8.9 Online Malware Attack.mp4 9.7M
8.2 Goals of System Hacking.mp4 11M
8.51 Introduction to Privilege Escalation.mp4 11M
8.11 Meaning of Promiscous Mode.mp4 12M
8.13 Offline attacks, Rainbow Tables.mp4 13M
8.22 Password Extraction with passview.mp4 13M
8.31 Active Directory Lab Build and Minimum Requirements.mp4 14M
8.63 Types of Rootkits.mp4 14M
8.1 Introduction to System Hacking.mp4 14M
Study Materials 8.zip 14M
8.8 Default Passwords.mp4 14M
8.64 Working of Rootkits.mp4 14M
8.12 Man in the Middle and Replay attacks.mp4 14M
8.25 How password are stored in SAM file.mp4 16M
8.40 Active Directory Attacks Kerberoasting.mp4 16M
8.67 NTFS Alternate Data Streams.mp4 16M
8.71 Text Steganography.mp4 17M
8.10 Hash Injection or Pass the Hash.mp4 18M
8.87 Spyware Countermeasures.mp4 18M
8.65 Detecting Rootkits.mp4 18M
15_6_Web_Application_Attack_Methodology_Performing_Various_Attacks.mp4 19M
8.83 Privilege Escalation Countermeasures.ts 19M
8.54 Executing Applications.mp4 19M
8.32 Active Directory Downloading Necessary Files.mp4 19M
15_4_Web_Application_Attack_Methodology_Analyzing_Web_Application.mp4 20M
8.24 Microsoft Authentication.mp4 20M
8.33 Active Directory Installing the Windows 10 Server.mp4 20M
8.85 Rootkit Countemeasures.ts 21M
8.77 Detecting Steganography.mp4 21M
Study Materials 15.zip 21M
15_2_Web_Application_Attack_Methodology_Footprinting_Infrastructure.mp4 21M
8.29 NTLM Authentication.mp4 22M
8.62 Hiding files – Rootkits.mp4 22M
15_5_Web_Application_Attack_Methodology_Attacking_Authentication.mp4 22M
8.34 Active Directory Installing and Setting up Domain Controller.mp4 22M
8.57 Working of Remote Keyloggers.mp4 23M
8.47 DLL Hijacking.mp4 23M
15.11 BurpSuite Sequencer and Scanner Modules.mp4 24M
8.27 Introduction to Active Directory.mp4 25M
8.38 Active Directory Joining Users to the Domain.mp4 25M
8.50 Linux Authentication.m4v 27M
8.23 Password Salting.mp4 27M
8.46 Metasploit Exploiting Linux Machine (Metasploitable).mp4 29M
8.26 Introduction to Domain Controller.mp4 29M
8.59 All in One keylogger.m4v 29M
8.84 Keylogger Countermeasures.ts 29M
8.36 Active Directory Installing and Setting up Windows 10 Enterprise.mp4 30M
8.79 Covering Tracks.mp4 33M
15.1 Introduction to Web Applications.mp4 33M
15.16 OWASP Top 10 Security Misconfiguration.mp4 35M
8.82 Password Cracking Countermeasures.mp4 35M
8.49 Mimikatz.mp4 35M
15.9 BurpSuite Basics, Working and Setup.mp4 36M
15.13 BurpSuite Intruder and Comparer Modules.mp4 39M
8.14 Offline Distributed Network Attacks.mp4 39M
8.30 Kerberos Authentication.mp4 40M
8.58 Anti Keyloggers.mp4 40M
15.12 BurpSuite Repeater Module.mp4 41M
8.35 Active Directory Creating Users, Groups, Services and Shares.mp4 42M
8.20 Password Cracking with rainbowcrack.mp4 42M
8.76 Omnihide pro.mp4 42M
8.78 Steganalysis.mp4 42M
8.66 Anti Rootkits.mp4 44M
8.68 NTFS ADS in action.mp4 44M
15.15 Parameter Tampering and Hidden field Manipulation.mp4 45M
15.10 BurpSuite Target and Spider Modules.mp4 46M
8.74 Quickstego.mp4 48M
8.21 Password Cracking with Cain and Winrtgen.mp4 49M
8.60 Introduction to Spywares.mp4 50M
15.8 Introduction to BurpSuite.mp4 50M
8.52 Windows User Levels.mp4 52M
8.53 Linux User Levels.mp4 53M
8.75 Deepsound.mp4 58M
8.69 Introduction to Steganography.mp4 65M
8.56 Types of Keyloggers.mp4 66M
8.41 Active Directory Attacks Kerberoasting in action.mp4 66M
8.42 Introduction to Metasploit.mp4 66M
8.81 Linux Privilege Escalation.mp4 67M
8.5 Types of Password Attacks.mp4 67M
8.19 Password Cracking with Hydra.mp4 68M
8.39 Active Directory Attacks LLMNR NBTNS Poisoning.mp4 74M
8.80 Metasploit Windows Post Exploitation, Privilege Escalation.mp4 78M
8.70 Image Steganography.mp4 86M
8.15 Password Cracking with KeyLoggers.mp4 92M
8.43 Metasploit Framework (msf) Walkthrough.mp4 93M
8.48 DLL Hijacking in action.mp4 104M
8.45 Metasploit Exploiting Windows 7.mp4 141M
8.44 searchsploit.mp4 165M
8.18 Password Cracking with John the Ripper.mp4 186M
8.17 Password Cracking with hashcat.mp4 186M
8.61 spyagent.ts 211M
8.16 Password List generation with crunch.mp4 236M
Recent Courses
CEHv13
BittenTech - TechHacker Ethical Hacking and Cyber Security
Kaspersky - Hunting APTs like a Ninja with YARA
A-Windows_Process_Injection_For_Red-Blue_Team
QURE Academy - Advanced Attacks Against Active Directory
EC-Council - Certified Network Defender v3 2024.11
EC-Council - Cyber Security Technician
PEN-200 - Penetration Testing with Kali Linux Videos
EDRPv3 EC-Council Disaster Recovery Professional
OffSec - PEN-200 2024.11
Practical Analysis with Security Onion
SANS ON DEMAND COURSE
Top 5 Tools & Techniques for Penetration Testing
CVE's for Bug Bounties & Penetration Testing
Creating Batch Scripts For Android
Oreilly - Mastering Cybersecurity with Python - From Basics to Advanced Defense
Recon For Bug Bounties & Penetration Testing
Bug Bounty Hunting and Penetration Testing v2
Bug Bounty Hunting and Penetration Testing v1
Bootcamp de Backend Avanzado_ Microservicios
Sketchup desde Cero para Arquitectos
Creación y consulta de bases de datos con ChatGPT y SQL
Storytelling Audiovisual para redes sociales
Introducción a Frameworks de Frontend con Vue 3"
Trafficker Expert
2. Digital Marketing Course ( English )
Creación de videojuegos
Master en Creación de Videojuegos
Photoshop 2020 para fotógrafos. Conoce el Retoque nivel PRO!
Soporte Técnico a Computadoras en Entornos Corporativos
13 CURSO DE REPARACION DE IMPRESORAS
18. Copywriting como escribir para vender mas
Master en Reparación de iPhone
Crea Aplicaciones Java Web
Curso de creación de bots [CodigoFacilito]
Maestría en CSS3 Flexbox, Grid, SASS, Bootstrap 5
Robótica con Matlab Cinemática directa y Simulación
COMMUNITY AND CONTENT MANAGER
Aprende Android con Ejemplos
Adobe Premiere desde Cero
ELECTRICIDAD
Invertir en Criptomonedas - Blockchain - Trading - DeFi - UDEMY
Angular - De cero a experto
Electrónica desde cero
Creación de videojuegos
Universidad del dropshipping
Cursos PhotoShop
reparacion de ps2
Curso de Linux s4vitar
rofesional en Reparacion de Laptops
Curso Marketing PRO Masterclass - John Dani
Curso de Reparación de Discos Duros y Recuperación de Datos
CURSO WORD, POWERPOINT
EXCEL DE PRINCIPIANTE A EXPERTO
CURSO SOLIDWORKS
Seguridad Informática desde Cero
Master Unreal Engine 4 Para Arquitectura en Español
Aprende.realidad.aumentada.con.ARKit
COMO VENDER POR FB e IG ADS - FELIPE VERGARA
AUTOCAD 2019 DE PRINCIPIANTE A AVANZADO
Curso Word
Curso Adobe Illustrator Sé un experto en ilustración digital
Universidad Python 2021 - POO, Django, Flask y Postgresql