elhacker.INFO Downloads

[ índice de contenido ]

Copyright issues contact webmaster@elhacker.info
Icon  Name                                                                                 Size  
[Volver] Parent Directory - [TXT] 77. Deceiving File System Using Timestomp.srt 6.0K [VID] 77. Deceiving File System Using Timestomp.mp4 56M [TXT] 76. Cleaning Events and Security Management Logs.srt 3.9K [VID] 76. Cleaning Events and Security Management Logs.mp4 36M [TXT] 75. Using Custom Payload Generators.srt 9.4K [VID] 75. Using Custom Payload Generators.mp4 76M [TXT] 74. MSFVenom Using Custom Executable Template.srt 5.8K [VID] 74. MSFVenom Using Custom Executable Template.mp4 49M [TXT] 73. MSFVenom Using Encoders.srt 4.2K [VID] 73. MSFVenom Using Encoders.mp4 37M [TXT] 72. MSFvenom.srt 6.8K [VID] 72. MSFvenom.mp4 66M [TXT] 71. Antivirus Evasion and Cleaning.srt 3.1K [VID] 71. Antivirus Evasion and Cleaning.mp4 18M [TXT] 70. Keylogging.srt 6.8K [VID] 70. Keylogging.mp4 55M [TXT] 69. Interacting with the Registry.srt 6.3K [VID] 69. Interacting with the Registry.mp4 52M [TXT] 68. Maintaining Access.srt 2.2K [VID] 68. Maintaining Access.mp4 13M [TXT] 67. Port Forwarding.srt 7.9K [VID] 67. Port Forwarding.mp4 66M [TXT] 66. Pivoting.srt 11K [VID] 66. Pivoting.mp4 90M [TXT] 65. Packet Sniffing.srt 6.3K [VID] 65. Packet Sniffing.mp4 57M [TXT] 64. Searching for Critical Information.srt 5.9K [VID] 64. Searching for Critical Information.mp4 55M [TXT] 63. Enabling Remote Desktop.srt 5.3K [VID] 63. Enabling Remote Desktop.mp4 48M [TXT] 62. Visual Interaction with the Target.srt 3.6K [VID] 62. Visual Interaction with the Target.mp4 32M [TXT] 61. Extracting Cleartext Passwords.srt 10K [VID] 61. Extracting Cleartext Passwords.mp4 85M [TXT] 60. Token Impersonation.srt 6.4K [VID] 60. Token Impersonation.mp4 48M [TXT] 59. Pass The Hash with Metasploit.srt 6.4K [VID] 59. Pass The Hash with Metasploit.mp4 42M [TXT] 58. John the Ripper Module.srt 1.6K [VID] 58. John the Ripper Module.mp4 18M [TXT] 57. Extracting Password Hashes.srt 5.4K [VID] 57. Extracting Password Hashes.mp4 50M [TXT] 56. Privilege Escalation.srt 8.6K [VID] 56. Privilege Escalation.mp4 71M [TXT] 55. Using Resource Files.srt 6.4K [VID] 55. Using Resource Files.mp4 64M [TXT] 54. Using Allports Payload.srt 6.4K [VID] 54. Using Allports Payload.mp4 51M [TXT] 53. Axis2 SAP Business Objects Authenticated Code Execution via SOAP.srt 4.8K [VID] 53. Axis2 SAP Business Objects Authenticated Code Execution via SOAP.mp4 48M [TXT] 52. Exploiting Poorly Configured MySQL Service.srt 3.1K [VID] 52. Exploiting Poorly Configured MySQL Service.mp4 33M [TXT] 51. HTTP Writable Path PUTDELETE File Access (http_put).srt 4.8K [VID] 51. HTTP Writable Path PUTDELETE File Access (http_put).mp4 52M [TXT] 50. WinRM Script Exec Remote Code Execution (winrm_script_exec).srt 4.1K [VID] 50. WinRM Script Exec Remote Code Execution (winrm_script_exec).mp4 51M [TXT] 49. Jenkins-CI Script-Console Java Execution (jenkins_script_console).srt 5.9K [VID] 49. Jenkins-CI Script-Console Java Execution (jenkins_script_console).mp4 52M [VID] 48. SunOracle GlassFish Server Authenticated Code Execution (glassfish_deployer).mp4 70M [TXT] 47. Elastic Search Dynamic Script Arbitrary Java Execution (script_mvel_rce).srt 3.1K [VID] 47. Elastic Search Dynamic Script Arbitrary Java Execution (script_mvel_rce).mp4 35M [TXT] 46. Java JMX Server Insecure Configuration Java Code Execution (java_jmx_server).srt 2.9K [VID] 46. Java JMX Server Insecure Configuration Java Code Execution (java_jmx_server).mp4 39M [TXT] 45. MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption.srt 4.2K [VID] 45. MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption.mp4 50M [TXT] 44. PHP CGI Argument Injection (php_cgi_arg_injection).srt 2.9K [VID] 44. PHP CGI Argument Injection (php_cgi_arg_injection).mp4 41M [TXT] 43. Distributed Ruby Remote Code Execution (drb_remote_codeexec).srt 3.1K [VID] 43. Distributed Ruby Remote Code Execution (drb_remote_codeexec).mp4 36M [TXT] 42. Metasploit as Exploitation Tool.srt 2.2K [VID] 42. Metasploit as Exploitation Tool.mp4 13M [TXT] 41. Integrating Nessus into MSF.srt 4.9K [VID] 41. Integrating Nessus into MSF.mp4 48M [TXT] 40. Vulnerability Scanning with Nessus Home.srt 7.0K [VID] 40. Vulnerability Scanning with Nessus Home.mp4 37M [TXT] 39. Downloading and Installing Nessus Home.srt 5.8K [VID] 39. Downloading and Installing Nessus Home.mp4 44M [TXT] 38. Intro to Vulnerability Scanning.srt 4.2K [VID] 38. Intro to Vulnerability Scanning.mp4 21M [TXT] 37. Using Shodan with MSF.srt 4.9K [VID] 37. Using Shodan with MSF.mp4 51M [TXT] 36. MTP Enumeration.srt 3.5K [VID] 36. MTP Enumeration.mp4 35M [TXT] 35. SNMP Enumeration.srt 3.7K [VID] 35. SNMP Enumeration.mp4 35M [VID] 34. HTTP Enumeration.mp4 65M [TXT] 33. SSH Enumeration.srt 2.6K [VID] 33. SSH Enumeration.mp4 31M [TXT] 32. FTP Enumeration.srt 4.4K [VID] 32. FTP Enumeration.mp4 47M [TXT] 31. MySQL Enumeration.srt 3.8K [VID] 31. MySQL Enumeration.mp4 43M [TXT] 30. SMB and Samba Enumeration.srt 6.2K [VID] 30. SMB and Samba Enumeration.mp4 55M [TXT] 29. Nmap Integration and Port Scanning.srt 7.0K [VID] 29. Nmap Integration and Port Scanning.mp4 59M [TXT] 28. What is Enumeration.srt 2.3K [VID] 28. What is Enumeration.mp4 15M [TXT] 27. More on Exploits in MSF.srt 3.4K [VID] 27. More on Exploits in MSF.mp4 25M [TXT] 26. Using Databases in MSF 2.srt 3.5K [VID] 26. Using Databases in MSF 2.mp4 27M [TXT] 25. Using Databases in MSF 1.srt 5.6K [VID] 25. Using Databases in MSF 1.mp4 32M [TXT] 24. MSFConsole Basic Commands 3.srt 3.5K [VID] 24. MSFConsole Basic Commands 3.mp4 21M [TXT] 23. MSFConsole Basic Commands 2.srt 8.4K [VID] 23. MSFConsole Basic Commands 2.mp4 47M [TXT] 22. MSFConsole Basic Commands 1.srt 7.3K [VID] 22. MSFConsole Basic Commands 1.mp4 44M [TXT] 21. MSFconsole.srt 5.2K [VID] 21. MSFconsole.mp4 60M [TXT] 20. Armitage.srt 3.7K [VID] 20. Armitage.mp4 22M [TXT] 19. Metasploit Interfaces.srt 5.1K [VID] 19. Metasploit Interfaces.mp4 45M [TXT] 18. Metasploit Community.srt 3.5K [VID] 18. Metasploit Community.mp4 26M [TXT] 17. Metasploit Editions.srt 4.5K [VID] 17. Metasploit Editions.mp4 29M [TXT] 16. Post Modules.srt 3.7K [VID] 16. Post Modules.mp4 54M [TXT] 15. Encoder Modules.srt 2.6K [VID] 15. Encoder Modules.mp4 40M [TXT] 14. Exploit Modules.srt 3.8K [VID] 14. Exploit Modules.mp4 57M [TXT] 13. Payload Modules.srt 6.2K [VID] 13. Payload Modules.mp4 86M [TXT] 12. Auxiliary Modules.srt 4.6K [VID] 12. Auxiliary Modules.mp4 69M [TXT] 11. The Architecture of MSF.srt 1.8K [VID] 11. The Architecture of MSF.mp4 15M [TXT] 10. Metasploit Filesystem and Libraries.srt 4.8K [VID] 10. Metasploit Filesystem and Libraries.mp4 80M [TXT] 9. Evolution of Metasploit.srt 4.6K [VID] 9. Evolution of Metasploit.mp4 25M [TXT] 8. Lab Connectivity and Taking Snapshots.srt 2.2K [VID] 8. Lab Connectivity and Taking Snapshots.mp4 15M [TXT] 7. Requirements ( Like Storage. Processor ).srt 3.4K [VID] 7. Requirements ( Like Storage. Processor ).mp4 26M [TXT] 6. Penetration Testing Execution Standard.srt 6.5K [VID] 6. Penetration Testing Execution Standard.mp4 31M [VID] 5. Types of Penetration Testing.mp4 22M [VID] 4. Basics of Penetration Testing.mp4 17M [TXT] 3. Importance of Penetration Testing.srt 3.9K [VID] 3. Importance of Penetration Testing.mp4 26M [TXT] 2. Why Metasploit Framework AKA MSF.srt 6.2K [VID] 2. Why Metasploit Framework AKA MSF.mp4 51M [TXT] 1. What is a Penetration Test.srt 4.0K [VID] 1. What is a Penetration Test.mp4 34M

Recent Courses

CEHv13
HackTricks - AWS Red Team Expert (ARTE)
Certified Exploit Development Professional [CEDP]
Advance Exploitation Course By Umar Sabil
CompTIA Security+ (SY0-701 & SY0-601) Full Training Guide
ITProTV - LPIC-2 Linux Engineer (202-450)_
OffSec - PEN-210 - Foundational Wireless Network Attacks
OffSec EXP-301
FOR508 Videos 2023
Introduction Windows Malware Development
Red-Teaming-Exploit-Development-with-Assembly-and-C-MSAC
SEC450 Videos 2020
AWS Cloud Red Team Specialist [CARTS]
SEC670 MP3 2025.4
Zero Point Security - Red Team Ops 2025.2
Certified Red Team Analyst [CCRTA] 2022
EC Council - DroneWorkshop
HTB - AI Red Teamer 2025.3 Path
SEC670 Red Teaming Tools - Developing Windows Implants, Shellcode, Command and Control
Maltrak - Threat Hunting In Microsoft Sentinel and Defender
Hybrid Multi-Cloud Red Team Specialist [CHMRTS]
Stealth Cyber Operator [CSCO]
Process Injection Analyst [CPIA]
Red Team Specialist [CRTS V1]
Practical Hardware Hacking
Red Team Infra Dev [CRT-ID]
Purple Team Analyst [CPTA V1]
Assembly 101
EC-Council Certified Cloud Security Engineer (CCSE)
Udemy - Web Security & Bug Bounty Learn Penetration Testing 2025
INE - Advanced Web Application Penetration Testing (New)_
Windows Red Team Lab (CRTE) 2025.2
Mandiant - Malware Analysis 2025
13Cubed - Investigating Linux Devices
Zero Point Security - DevOps for Pentesters 2025.3
Offensive Development w Greg Hatcher & John Stigerwalt
Pluralsight - Windows Server 2022 Administration
BittenTech - TechHacker Ethical Hacking and Cyber Security
Kaspersky - Hunting APTs like a Ninja with YARA
A-Windows_Process_Injection_For_Red-Blue_Team
QURE Academy - Advanced Attacks Against Active Directory
EC-Council - Certified Network Defender v3 2024.11
EC-Council - Cyber Security Technician
PEN-200 - Penetration Testing with Kali Linux Videos
EDRPv3 EC-Council Disaster Recovery Professional
OffSec - PEN-200 2024.11
Practical Analysis with Security Onion
SANS ON DEMAND COURSE
Top 5 Tools & Techniques for Penetration Testing
CVE's for Bug Bounties & Penetration Testing
Creating Batch Scripts For Android
Oreilly - Mastering Cybersecurity with Python - From Basics to Advanced Defense
Recon For Bug Bounties & Penetration Testing
Bug Bounty Hunting and Penetration Testing v2
Bug Bounty Hunting and Penetration Testing v1
Bootcamp de Backend Avanzado_ Microservicios
Sketchup desde Cero para Arquitectos
Creación y consulta de bases de datos con ChatGPT y SQL
Storytelling Audiovisual para redes sociales
Introducción a Frameworks de Frontend con Vue 3"
Trafficker Expert
2. Digital Marketing Course ( English )
Creación de videojuegos
Master en Creación de Videojuegos
Photoshop 2020 para fotógrafos. Conoce el Retoque nivel PRO!
Soporte Técnico a Computadoras en Entornos Corporativos
13 CURSO DE REPARACION DE IMPRESORAS
18. Copywriting como escribir para vender mas
Master en Reparación de iPhone
Crea Aplicaciones Java Web
Curso de creación de bots [CodigoFacilito]
Maestría en CSS3 Flexbox, Grid, SASS, Bootstrap 5
Robótica con Matlab Cinemática directa y Simulación
COMMUNITY AND CONTENT MANAGER
Aprende Android con Ejemplos
Adobe Premiere desde Cero
ELECTRICIDAD
Invertir en Criptomonedas - Blockchain - Trading - DeFi - UDEMY
Angular - De cero a experto
Electrónica desde cero
Creación de videojuegos
Universidad del dropshipping
Cursos PhotoShop
reparacion de ps2
Curso de Linux s4vitar
rofesional en Reparacion de Laptops
Curso Marketing PRO Masterclass - John Dani
Curso de Reparación de Discos Duros y Recuperación de Datos
CURSO WORD, POWERPOINT
EXCEL DE PRINCIPIANTE A EXPERTO
CURSO SOLIDWORKS
Seguridad Informática desde Cero
Master Unreal Engine 4 Para Arquitectura en Español
Aprende.realidad.aumentada.con.ARKit
COMO VENDER POR FB e IG ADS - FELIPE VERGARA
AUTOCAD 2019 DE PRINCIPIANTE A AVANZADO
Curso Word
Curso Adobe Illustrator Sé un experto en ilustración digital
Universidad Python 2021 - POO, Django, Flask y Postgresql