elhacker.INFO Downloads

[ índice de contenido ]

Copyright issues contact webmaster@elhacker.info
Icon  Name                                                                             Size  
[Volver] Parent Directory - [TXT] 234 - Cross Site Request Forgery CSRF English.srt 6.4K [VID] 234 - Cross Site Request Forgery CSRF.mp4 60M [TXT] 233 - Session Fixation Demo English.srt 5.4K [VID] 233 - Session Fixation Demo.mp4 27M [TXT] 232 - Session Management English.srt 4.0K [VID] 232 - Session Management.mp4 6.9M [TXT] 231 - Path Traversal Attack Demo English.srt 4.8K [VID] 231 - Path Traversal Attack Demo.mp4 25M [TXT] 230 - Authorization Flaws English.srt 6.8K [VID] 230 - Authorization Flaws.mp4 12M [TXT] 229 - Hydra Cracking the Password of a Web App English.srt 11K [VID] 229 - Hydra Cracking the Password of a Web App.mp4 113M [TXT] 228 - Authentication Attacks English.srt 6.4K [VID] 228 - Authentication Attacks.mp4 28M [TXT] 227 - Authentication English.srt 7.2K [VID] 227 - Authentication.mp4 18M [TXT] 226 - SQL Injection Part III English.srt 5.7K [VID] 226 - SQL Injection Part III.mp4 61M [TXT] 225 - SQL Injection Part II English.srt 5.1K [VID] 225 - SQL Injection Part II.mp4 28M [TXT] 224 - SQL Injection Part I English.srt 5.0K [VID] 224 - SQL Injection Part I.mp4 13M [TXT] 223 - BeEF The Browser Exploitation Framework English.srt 6.5K [VID] 223 - BeEF The Browser Exploitation Framework.mp4 89M [TXT] 222 - XSS Cross Site Scripting Stored and DOM Based XSS English.srt 8.4K [VID] 222 - XSS Cross Site Scripting Stored and DOM Based XSS.mp4 33M [TXT] 221 - XSS Cross Site Scripting Reflected XSS English.srt 4.8K [VID] 221 - XSS Cross Site Scripting Reflected XSS.mp4 25M [TXT] 220 - Input Output Manipulation English.srt 9.2K [VID] 220 - Input Output Manipulation.mp4 35M [TXT] 219 - Information Gathering and Configuration Flaws II English.srt 5.3K [VID] 219 - Information Gathering and Configuration Flaws II.mp4 20M [TXT] 218 - Information Gathering and Configuration Flaws I English.srt 6.6K [VID] 218 - Information Gathering and Configuration Flaws I.mp4 52M [TXT] 217 - ZAP An Advanced Scan Scanning a Website that Requires to Login English.srt 19K [VID] 217 - ZAP An Advanced Scan Scanning a Website that Requires to Login.mp4 193M [TXT] 216 - ZAP Intercepting the HTTPS Traffic English.srt 2.9K [VID] 216 - ZAP Intercepting the HTTPS Traffic.mp4 22M [TXT] 215 - ZAP As a Personal Proxy English.srt 6.0K [VID] 215 - ZAP As a Personal Proxy.mp4 71M [TXT] 214 - ZAP Installation Quick Scan English.srt 7.3K [VID] 214 - ZAP Installation Quick Scan.mp4 114M [TXT] 213 - Zed Attack Proxy ZAP A Web App Vulnerability Scanner English.srt 4.0K [VID] 213 - Zed Attack Proxy ZAP A Web App Vulnerability Scanner.mp4 7.5M [TXT] 212 - Classification of Web Attacks English.srt 2.1K [VID] 212 - Classification of Web Attacks.mp4 4.0M [TXT] 211 - Intercepting HTTPS Traffic with Burp Suite English.srt 3.1K [VID] 211 - Intercepting HTTPS Traffic with Burp Suite.mp4 19M [TXT] 210 - Intercepting HTTP Traffic with Burp Suite English.srt 4.4K [VID] 210 - Intercepting HTTP Traffic with Burp Suite.mp4 53M [TXT] 209 - Basic Terminologies II English.srt 9.2K [VID] 209 - Basic Terminologies II.mp4 28M [TXT] 208 - Basic Terminologies I English.srt 7.0K [VID] 208 - Basic Terminologies I.mp4 23M [TXT] 207 - Content of the Penetration Testing English.srt 1.6K [VID] 207 - Content of the Penetration Testing.mp4 4.7M

Recent Courses

AI Governance Professional (AIGP) Certification & AI Mastery
Dark Web Forensics (DWA)
ZeroToMastery - DevOps Bootcamp_ Learn Linux & Become a Linux Sysadmin
INE - Digital Forensics Professional (eCDFP)
Hacking Exposed
EC-Council Certified DevSecOps Engineer (ECDE)_Videos
PNPT Live Learn to Hack
DevOps for Developers
Building Your Cybersecurity Talent Pipeline
The Cybersecurity Threat Landscape
Security Tips - Metadata
iNE - Penetration Testing Student v2 (eJPTv2)
Udemy Course – Malware Development for Ethical Hackers & Pentesters
Udemy - The Ultimate Dark Web Anonymity Privacy Security Course 2025
iNE _ CCNA 200-301
CEHv13
HackTricks - AWS Red Team Expert (ARTE)
Certified Exploit Development Professional [CEDP]
Advance Exploitation Course By Umar Sabil
CompTIA Security+ (SY0-701 & SY0-601) Full Training Guide
ITProTV - LPIC-2 Linux Engineer (202-450)_
OffSec - PEN-210 - Foundational Wireless Network Attacks
OffSec EXP-301
FOR508 Videos 2023
Introduction Windows Malware Development
Red-Teaming-Exploit-Development-with-Assembly-and-C-MSAC
SEC450 Videos 2020
AWS Cloud Red Team Specialist [CARTS]
SEC670 MP3 2025.4
Zero Point Security - Red Team Ops 2025.2
Certified Red Team Analyst [CCRTA] 2022
EC Council - DroneWorkshop
HTB - AI Red Teamer 2025.3 Path
SEC670 Red Teaming Tools - Developing Windows Implants, Shellcode, Command and Control
Maltrak - Threat Hunting In Microsoft Sentinel and Defender
Hybrid Multi-Cloud Red Team Specialist [CHMRTS]
Stealth Cyber Operator [CSCO]
Process Injection Analyst [CPIA]
Red Team Specialist [CRTS V1]
Practical Hardware Hacking
Red Team Infra Dev [CRT-ID]
Purple Team Analyst [CPTA V1]
Assembly 101
EC-Council Certified Cloud Security Engineer (CCSE)
Udemy - Web Security & Bug Bounty Learn Penetration Testing 2025
INE - Advanced Web Application Penetration Testing (New)_
Windows Red Team Lab (CRTE) 2025.2
Mandiant - Malware Analysis 2025
13Cubed - Investigating Linux Devices
Zero Point Security - DevOps for Pentesters 2025.3
Offensive Development w Greg Hatcher & John Stigerwalt
Pluralsight - Windows Server 2022 Administration
BittenTech - TechHacker Ethical Hacking and Cyber Security
Kaspersky - Hunting APTs like a Ninja with YARA
A-Windows_Process_Injection_For_Red-Blue_Team
QURE Academy - Advanced Attacks Against Active Directory
EC-Council - Certified Network Defender v3 2024.11
EC-Council - Cyber Security Technician
PEN-200 - Penetration Testing with Kali Linux Videos
EDRPv3 EC-Council Disaster Recovery Professional
OffSec - PEN-200 2024.11
Practical Analysis with Security Onion
SANS ON DEMAND COURSE
Top 5 Tools & Techniques for Penetration Testing
CVE's for Bug Bounties & Penetration Testing
Creating Batch Scripts For Android
Oreilly - Mastering Cybersecurity with Python - From Basics to Advanced Defense
Recon For Bug Bounties & Penetration Testing
Bug Bounty Hunting and Penetration Testing v2
Bug Bounty Hunting and Penetration Testing v1
Bootcamp de Backend Avanzado_ Microservicios
Sketchup desde Cero para Arquitectos
Creación y consulta de bases de datos con ChatGPT y SQL
Storytelling Audiovisual para redes sociales
Introducción a Frameworks de Frontend con Vue 3"
Trafficker Expert
2. Digital Marketing Course ( English )
Creación de videojuegos
Master en Creación de Videojuegos
Photoshop 2020 para fotógrafos. Conoce el Retoque nivel PRO!
Soporte Técnico a Computadoras en Entornos Corporativos
13 CURSO DE REPARACION DE IMPRESORAS
18. Copywriting como escribir para vender mas
Master en Reparación de iPhone
Crea Aplicaciones Java Web
Curso de creación de bots [CodigoFacilito]
Maestría en CSS3 Flexbox, Grid, SASS, Bootstrap 5
Robótica con Matlab Cinemática directa y Simulación
COMMUNITY AND CONTENT MANAGER
Aprende Android con Ejemplos
Adobe Premiere desde Cero
ELECTRICIDAD
Invertir en Criptomonedas - Blockchain - Trading - DeFi - UDEMY
Angular - De cero a experto
Electrónica desde cero
Creación de videojuegos
Universidad del dropshipping
Cursos PhotoShop
reparacion de ps2
Curso de Linux s4vitar
rofesional en Reparacion de Laptops
Curso Marketing PRO Masterclass - John Dani
Curso de Reparación de Discos Duros y Recuperación de Datos
CURSO WORD, POWERPOINT
EXCEL DE PRINCIPIANTE A EXPERTO
CURSO SOLIDWORKS
Seguridad Informática desde Cero
Master Unreal Engine 4 Para Arquitectura en Español
Aprende.realidad.aumentada.con.ARKit
COMO VENDER POR FB e IG ADS - FELIPE VERGARA
AUTOCAD 2019 DE PRINCIPIANTE A AVANZADO
Curso Word
Curso Adobe Illustrator Sé un experto en ilustración digital
Universidad Python 2021 - POO, Django, Flask y Postgresql