elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
1 - Incident Response.mp4 9.1M
2 - Incident Handling Process.mp4 40M
3 - Preparing for the Incident.mp4 29M
4 - Event Detection.mp4 43M
5 - Eradicate and Recover.mp4 37M
6 - Write Everything Up.mp4 56M
7 - When is it a Legal Problem.mp4 38M
8 - Interfacing with Law Enforcement .mp4 40M
9 - Digital Investigations.mp4 20M
10 - Identify Digital Evidence.mp4 80M
11 - Understanding the Disc.mp4 49M
12 - Basics of Coding.mp4 47M
13 - Network Devices.mp4 41M
14 - Operating Systems.mp4 41M
15 - Reading Materials.mp4 28M
16 - Live Examination.mp4 8.1M
17 - Approaching the System.mp4 39M
18 - Working with FTK.mp4 50M
19 - Working with EnCase.mp4 24M
20 - Watching the System Talk.mp4 51M
21 - Cloning a System.mp4 60M
22 - Moving to the Next Step.mp4 34M
23 - Network Investigations.mp4 12M
24 - Session Monitoring.mp4 51M
25 - Too Many Connections.mp4 68M
26 - Knowing the Boundaries.mp4 31M
27 - Packet Reading Basics.mp4 67M
28 - Network Analysis with ssl-tls.mp4 44M
29 - Memory Investigations.mp4 15M
30 - How RAM Operates.mp4 45M
31 - Volatile Memory.mp4 57M
32 - Extracting the Memory.mp4 56M
33 - Volatility.mp4 57M
34 - Comparing to the System.mp4 29M
35 - Malware Investigations.mp4 4.5M
36 - Know the Enemy.mp4 30M
37 - Malware Alert.mp4 34M
38 - Finding the Malware.mp4 55M
39 - The Hunt Begins.mp4 48M
40 - Whats in the Payload.mp4 35M
41 - Find the Evidence on the Network.mp4 59M
42 - Report the Findings.mp4 17M
43 - Cloud Investigations.mp4 19M
44 - Identifying the Different Clouds.mp4 68M
45 - Specializing those Clouds.mp4 36M
46 - Where is the cloud.mp4 80M
47 - Where are we going.mp4 65M
48 - Understand the flow.mp4 48M
49 - Tool Usage.mp4 42M
50 - Federal Rules of Evidence.mp4 58M
51 - Daubert Standard.mp4 93M
52 - Rule 702.mp4 43M
53 - Rule 701.mp4 48M
54 - Rule 901.mp4 47M
55 - Rule 902.mp4 40M
56 - Tying it all together.mp4 40M
Recent Courses
CEHv13
HackTricks - AWS Red Team Expert (ARTE)
Certified Exploit Development Professional [CEDP]
Advance Exploitation Course By Umar Sabil
CompTIA Security+ (SY0-701 & SY0-601) Full Training Guide
ITProTV - LPIC-2 Linux Engineer (202-450)_
OffSec - PEN-210 - Foundational Wireless Network Attacks
OffSec EXP-301
FOR508 Videos 2023
Introduction Windows Malware Development
Red-Teaming-Exploit-Development-with-Assembly-and-C-MSAC
SEC450 Videos 2020
AWS Cloud Red Team Specialist [CARTS]
SEC670 MP3 2025.4
Zero Point Security - Red Team Ops 2025.2
Certified Red Team Analyst [CCRTA] 2022
EC Council - DroneWorkshop
HTB - AI Red Teamer 2025.3 Path
SEC670 Red Teaming Tools - Developing Windows Implants, Shellcode, Command and Control
Maltrak - Threat Hunting In Microsoft Sentinel and Defender
Hybrid Multi-Cloud Red Team Specialist [CHMRTS]
Stealth Cyber Operator [CSCO]
Process Injection Analyst [CPIA]
Red Team Specialist [CRTS V1]
Practical Hardware Hacking
Red Team Infra Dev [CRT-ID]
Purple Team Analyst [CPTA V1]
Assembly 101
EC-Council Certified Cloud Security Engineer (CCSE)
Udemy - Web Security & Bug Bounty Learn Penetration Testing 2025
INE - Advanced Web Application Penetration Testing (New)_
Windows Red Team Lab (CRTE) 2025.2
Mandiant - Malware Analysis 2025
13Cubed - Investigating Linux Devices
Zero Point Security - DevOps for Pentesters 2025.3
Offensive Development w Greg Hatcher & John Stigerwalt
Pluralsight - Windows Server 2022 Administration
BittenTech - TechHacker Ethical Hacking and Cyber Security
Kaspersky - Hunting APTs like a Ninja with YARA
A-Windows_Process_Injection_For_Red-Blue_Team
QURE Academy - Advanced Attacks Against Active Directory
EC-Council - Certified Network Defender v3 2024.11
EC-Council - Cyber Security Technician
PEN-200 - Penetration Testing with Kali Linux Videos
EDRPv3 EC-Council Disaster Recovery Professional
OffSec - PEN-200 2024.11
Practical Analysis with Security Onion
SANS ON DEMAND COURSE
Top 5 Tools & Techniques for Penetration Testing
CVE's for Bug Bounties & Penetration Testing
Creating Batch Scripts For Android
Oreilly - Mastering Cybersecurity with Python - From Basics to Advanced Defense
Recon For Bug Bounties & Penetration Testing
Bug Bounty Hunting and Penetration Testing v2
Bug Bounty Hunting and Penetration Testing v1
Bootcamp de Backend Avanzado_ Microservicios
Sketchup desde Cero para Arquitectos
Creación y consulta de bases de datos con ChatGPT y SQL
Storytelling Audiovisual para redes sociales
Introducción a Frameworks de Frontend con Vue 3"
Trafficker Expert
2. Digital Marketing Course ( English )
Creación de videojuegos
Master en Creación de Videojuegos
Photoshop 2020 para fotógrafos. Conoce el Retoque nivel PRO!
Soporte Técnico a Computadoras en Entornos Corporativos
13 CURSO DE REPARACION DE IMPRESORAS
18. Copywriting como escribir para vender mas
Master en Reparación de iPhone
Crea Aplicaciones Java Web
Curso de creación de bots [CodigoFacilito]
Maestría en CSS3 Flexbox, Grid, SASS, Bootstrap 5
Robótica con Matlab Cinemática directa y Simulación
COMMUNITY AND CONTENT MANAGER
Aprende Android con Ejemplos
Adobe Premiere desde Cero
ELECTRICIDAD
Invertir en Criptomonedas - Blockchain - Trading - DeFi - UDEMY
Angular - De cero a experto
Electrónica desde cero
Creación de videojuegos
Universidad del dropshipping
Cursos PhotoShop
reparacion de ps2
Curso de Linux s4vitar
rofesional en Reparacion de Laptops
Curso Marketing PRO Masterclass - John Dani
Curso de Reparación de Discos Duros y Recuperación de Datos
CURSO WORD, POWERPOINT
EXCEL DE PRINCIPIANTE A EXPERTO
CURSO SOLIDWORKS
Seguridad Informática desde Cero
Master Unreal Engine 4 Para Arquitectura en Español
Aprende.realidad.aumentada.con.ARKit
COMO VENDER POR FB e IG ADS - FELIPE VERGARA
AUTOCAD 2019 DE PRINCIPIANTE A AVANZADO
Curso Word
Curso Adobe Illustrator Sé un experto en ilustración digital
Universidad Python 2021 - POO, Django, Flask y Postgresql