elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
11.1 Simple PDF file to analyze its structure.html 128
12.1 Simple PDF file to analyze its structure.html 128
6.1 Download Office File samples for analysis. Password of the zip archive is infected.html 134
7.1 Download Office File samples for analysis. Password of the zip archive is infected.html 134
8.1 Download Office File samples for analysis. Password of the zip archive is infected.html 134
9.1 Download Office File samples for analysis. Password of the zip archive is infected.html 134
10.1 Download Office File samples for analysis. Password of the zip archive is infected.html 134
13.1 Download PDF File samples for analysis. Password of the zip archive is infected.html 134
14.1 Download PDF File samples for analysis. Password of the zip archive is infected.html 134
15.2 Download PDF File samples for analysis. Password of the zip archive is infected.html 134
4. Understanding Sender Policy Framework Protocol for Email Spam detection.srt 2.5K
12. Understanding PDF file structure - Part 2.srt 3.1K
8. Analyzing malicious OLE Files using Oletools - Part 1.srt 4.6K
10. Analyzing malicious OLE Files using Oletools - Part 3.srt 4.8K
6. Analyzing Malicious Office File Using Oledump - Part 1.srt 5.9K
14. Analyzing Malicious PDF files - Part 2.srt 6.5K
13. Analyzing Malicious PDF files - Part 1.srt 7.1K
15. Analyzing Malicious PDF file using PDF Stream Dumper.srt 7.4K
2. Spearphishing Emails as Delivery Mechanisms.srt 7.5K
9. Analyzing malicious OLE Files using Oletools - Part 2.srt 7.6K
7. Analyzing Malicious Office File Using Oledump - Part 2.srt 8.2K
1. Understanding Recon and Weaponization stages.srt 8.4K
5. Understanding Microsoft Office File Format Structure.srt 8.6K
11. Understanding PDF file structure - Part 1.srt 8.6K
3. Analyzing Spearphishing emails and its headers.srt 8.7K
15.1 pdf_example_samples.zip 77K
12. Understanding PDF file structure - Part 2.mp4 32M
4. Understanding Sender Policy Framework Protocol for Email Spam detection.mp4 39M
10. Analyzing malicious OLE Files using Oletools - Part 3.mp4 56M
6. Analyzing Malicious Office File Using Oledump - Part 1.mp4 65M
8. Analyzing malicious OLE Files using Oletools - Part 1.mp4 65M
2. Spearphishing Emails as Delivery Mechanisms.mp4 76M
14. Analyzing Malicious PDF files - Part 2.mp4 78M
1. Understanding Recon and Weaponization stages.mp4 78M
13. Analyzing Malicious PDF files - Part 1.mp4 81M
11. Understanding PDF file structure - Part 1.mp4 81M
5. Understanding Microsoft Office File Format Structure.mp4 82M
9. Analyzing malicious OLE Files using Oletools - Part 2.mp4 86M
15. Analyzing Malicious PDF file using PDF Stream Dumper.mp4 91M
7. Analyzing Malicious Office File Using Oledump - Part 2.mp4 109M
3. Analyzing Spearphishing emails and its headers.mp4 138M