elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Last modified Size
Parent Directory -
1.1 Introduction to Advanced Incident Response and Threat Hunting/ 2025-01-27 00:01 -
1.2 Incident Response & Threat Hunting/ 2025-01-27 00:01 -
1.3 Threat Intelligence/ 2025-01-27 00:01 -
1.4 Malware-ology/ 2025-01-27 00:01 -
1.5 Malware Persistence/ 2025-01-27 00:01 -
1.6 Incident Response Hunting Across the Enterprise/ 2025-01-27 00:01 -
1.7 Credential theft/ 2025-01-27 00:01 -
2.1 Advanced Evidence of Execution/ 2025-01-27 00:01 -
2.2 Event Log Analysis for Responders and Hunters/ 2025-01-27 00:01 -
2.3 Lateral Movement Adversary Tactics/ 2025-01-27 00:01 -
2.4 Command Line, PowerShell, and WMI Analysis/ 2025-01-27 00:01 -
3.1 Why Memory Forensics/ 2025-01-27 00:01 -
3.2 Acquiring Memory/ 2025-01-27 00:01 -
3.3 Introduction to Memory Analysis/ 2025-01-27 00:01 -
3.4 Code Injection, Rootkits, and Extraction/ 2025-06-12 15:52 -
4.1 Malware Discovery/ 2025-06-12 15:52 -
4.2 Timeline Analysis Overview/ 2025-06-12 15:52 -
4.3 Filesystem Timeline Creation and Analysis/ 2025-06-12 15:52 -
4.4 Introducing the Super Timeline/ 2025-06-12 15:52 -
4.5 Targeted Super Timeline Creation/ 2025-06-12 15:52 -
4.6 Filtering the Super Timeline/ 2025-06-12 15:52 -
4.7 Super Timeline Analysis/ 2025-06-12 15:52 -
5.1 Anti-Forensics Overview/ 2025-06-12 15:52 -
5.2 Recovery of Deleted Files via VSS/ 2025-06-12 15:52 -
5.3 Advanced NTFS Filesystem Tactics/ 2025-06-12 15:52 -
5.4 Advanced Evidence Recovery/ 2025-06-12 15:52 -
5.5 Defensive Countermeasures/ 2025-06-12 15:52 -
6.1 Introduction to the Stark Research Labs Intrusion/ 2025-06-12 15:52 -
6.2 Findings Report/ 2025-06-12 15:52 -
FOR508 I01_01 2023 hide01.ir.pdf 2025-02-13 17:22 88M