elhacker.INFO Downloads

[ índice de contenido ]

Copyright issues contact webmaster@elhacker.info
Icon  Name                                                                                 Size  
[Volver] Parent Directory - [TXT] 58. John the Ripper Module.srt 1.6K [TXT] 11. The Architecture of MSF.srt 1.8K [TXT] 42. Metasploit as Exploitation Tool.srt 2.2K [TXT] 8. Lab Connectivity and Taking Snapshots.srt 2.2K [TXT] 68. Maintaining Access.srt 2.2K [TXT] 28. What is Enumeration.srt 2.3K [TXT] 15. Encoder Modules.srt 2.6K [TXT] 33. SSH Enumeration.srt 2.6K [TXT] 44. PHP CGI Argument Injection (php_cgi_arg_injection).srt 2.9K [TXT] 46. Java JMX Server Insecure Configuration Java Code Execution (java_jmx_server).srt 2.9K [TXT] 43. Distributed Ruby Remote Code Execution (drb_remote_codeexec).srt 3.1K [TXT] 47. Elastic Search Dynamic Script Arbitrary Java Execution (script_mvel_rce).srt 3.1K [TXT] 71. Antivirus Evasion and Cleaning.srt 3.1K [TXT] 52. Exploiting Poorly Configured MySQL Service.srt 3.1K [TXT] 27. More on Exploits in MSF.srt 3.4K [TXT] 7. Requirements ( Like Storage. Processor ).srt 3.4K [TXT] 36. MTP Enumeration.srt 3.5K [TXT] 24. MSFConsole Basic Commands 3.srt 3.5K [TXT] 26. Using Databases in MSF 2.srt 3.5K [TXT] 18. Metasploit Community.srt 3.5K [TXT] 62. Visual Interaction with the Target.srt 3.6K [TXT] 20. Armitage.srt 3.7K [TXT] 16. Post Modules.srt 3.7K [TXT] 35. SNMP Enumeration.srt 3.7K [TXT] 14. Exploit Modules.srt 3.8K [TXT] 31. MySQL Enumeration.srt 3.8K [TXT] 3. Importance of Penetration Testing.srt 3.9K [TXT] 76. Cleaning Events and Security Management Logs.srt 3.9K [TXT] 1. What is a Penetration Test.srt 4.0K [TXT] 50. WinRM Script Exec Remote Code Execution (winrm_script_exec).srt 4.1K [TXT] 73. MSFVenom Using Encoders.srt 4.2K [TXT] 45. MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption.srt 4.2K [TXT] 38. Intro to Vulnerability Scanning.srt 4.2K [TXT] 32. FTP Enumeration.srt 4.4K [TXT] 17. Metasploit Editions.srt 4.5K [TXT] 9. Evolution of Metasploit.srt 4.6K [TXT] 12. Auxiliary Modules.srt 4.6K [TXT] 10. Metasploit Filesystem and Libraries.srt 4.8K [TXT] 53. Axis2 SAP Business Objects Authenticated Code Execution via SOAP.srt 4.8K [TXT] 51. HTTP Writable Path PUTDELETE File Access (http_put).srt 4.8K [TXT] 37. Using Shodan with MSF.srt 4.9K [TXT] 41. Integrating Nessus into MSF.srt 4.9K [TXT] 19. Metasploit Interfaces.srt 5.1K [TXT] 21. MSFconsole.srt 5.2K [TXT] 63. Enabling Remote Desktop.srt 5.3K [TXT] 57. Extracting Password Hashes.srt 5.4K [TXT] 25. Using Databases in MSF 1.srt 5.6K [TXT] 74. MSFVenom Using Custom Executable Template.srt 5.8K [TXT] 39. Downloading and Installing Nessus Home.srt 5.8K [TXT] 64. Searching for Critical Information.srt 5.9K [TXT] 49. Jenkins-CI Script-Console Java Execution (jenkins_script_console).srt 5.9K [TXT] 77. Deceiving File System Using Timestomp.srt 6.0K [TXT] 13. Payload Modules.srt 6.2K [TXT] 30. SMB and Samba Enumeration.srt 6.2K [TXT] 2. Why Metasploit Framework AKA MSF.srt 6.2K [TXT] 69. Interacting with the Registry.srt 6.3K [TXT] 65. Packet Sniffing.srt 6.3K [TXT] 54. Using Allports Payload.srt 6.4K [TXT] 59. Pass The Hash with Metasploit.srt 6.4K [TXT] 55. Using Resource Files.srt 6.4K [TXT] 60. Token Impersonation.srt 6.4K [TXT] 6. Penetration Testing Execution Standard.srt 6.5K [TXT] 70. Keylogging.srt 6.8K [TXT] 72. MSFvenom.srt 6.8K [TXT] 40. Vulnerability Scanning with Nessus Home.srt 7.0K [TXT] 29. Nmap Integration and Port Scanning.srt 7.0K [TXT] 22. MSFConsole Basic Commands 1.srt 7.3K [TXT] 67. Port Forwarding.srt 7.9K [TXT] 23. MSFConsole Basic Commands 2.srt 8.4K [TXT] 56. Privilege Escalation.srt 8.6K [TXT] 75. Using Custom Payload Generators.srt 9.4K [TXT] 61. Extracting Cleartext Passwords.srt 10K [TXT] 66. Pivoting.srt 11K [VID] 42. Metasploit as Exploitation Tool.mp4 13M [VID] 68. Maintaining Access.mp4 13M [VID] 8. Lab Connectivity and Taking Snapshots.mp4 15M [VID] 11. The Architecture of MSF.mp4 15M [VID] 28. What is Enumeration.mp4 15M [VID] 4. Basics of Penetration Testing.mp4 17M [VID] 71. Antivirus Evasion and Cleaning.mp4 18M [VID] 58. John the Ripper Module.mp4 18M [VID] 24. MSFConsole Basic Commands 3.mp4 21M [VID] 38. Intro to Vulnerability Scanning.mp4 21M [VID] 5. Types of Penetration Testing.mp4 22M [VID] 20. Armitage.mp4 22M [VID] 27. More on Exploits in MSF.mp4 25M [VID] 9. Evolution of Metasploit.mp4 25M [VID] 18. Metasploit Community.mp4 26M [VID] 3. Importance of Penetration Testing.mp4 26M [VID] 7. Requirements ( Like Storage. Processor ).mp4 26M [VID] 26. Using Databases in MSF 2.mp4 27M [VID] 17. Metasploit Editions.mp4 29M [VID] 33. SSH Enumeration.mp4 31M [VID] 6. Penetration Testing Execution Standard.mp4 31M [VID] 25. Using Databases in MSF 1.mp4 32M [VID] 62. Visual Interaction with the Target.mp4 32M [VID] 52. Exploiting Poorly Configured MySQL Service.mp4 33M [VID] 1. What is a Penetration Test.mp4 34M [VID] 35. SNMP Enumeration.mp4 35M [VID] 47. Elastic Search Dynamic Script Arbitrary Java Execution (script_mvel_rce).mp4 35M [VID] 36. MTP Enumeration.mp4 35M [VID] 76. Cleaning Events and Security Management Logs.mp4 36M [VID] 43. Distributed Ruby Remote Code Execution (drb_remote_codeexec).mp4 36M [VID] 40. Vulnerability Scanning with Nessus Home.mp4 37M [VID] 73. MSFVenom Using Encoders.mp4 37M [VID] 46. Java JMX Server Insecure Configuration Java Code Execution (java_jmx_server).mp4 39M [VID] 15. Encoder Modules.mp4 40M [VID] 44. PHP CGI Argument Injection (php_cgi_arg_injection).mp4 41M [VID] 59. Pass The Hash with Metasploit.mp4 42M [VID] 31. MySQL Enumeration.mp4 43M [VID] 39. Downloading and Installing Nessus Home.mp4 44M [VID] 22. MSFConsole Basic Commands 1.mp4 44M [VID] 19. Metasploit Interfaces.mp4 45M [VID] 32. FTP Enumeration.mp4 47M [VID] 23. MSFConsole Basic Commands 2.mp4 47M [VID] 63. Enabling Remote Desktop.mp4 48M [VID] 60. Token Impersonation.mp4 48M [VID] 41. Integrating Nessus into MSF.mp4 48M [VID] 53. Axis2 SAP Business Objects Authenticated Code Execution via SOAP.mp4 48M [VID] 74. MSFVenom Using Custom Executable Template.mp4 49M [VID] 57. Extracting Password Hashes.mp4 50M [VID] 45. MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption.mp4 50M [VID] 2. Why Metasploit Framework AKA MSF.mp4 51M [VID] 37. Using Shodan with MSF.mp4 51M [VID] 50. WinRM Script Exec Remote Code Execution (winrm_script_exec).mp4 51M [VID] 54. Using Allports Payload.mp4 51M [VID] 69. Interacting with the Registry.mp4 52M [VID] 49. Jenkins-CI Script-Console Java Execution (jenkins_script_console).mp4 52M [VID] 51. HTTP Writable Path PUTDELETE File Access (http_put).mp4 52M [VID] 16. Post Modules.mp4 54M [VID] 30. SMB and Samba Enumeration.mp4 55M [VID] 70. Keylogging.mp4 55M [VID] 64. Searching for Critical Information.mp4 55M [VID] 77. Deceiving File System Using Timestomp.mp4 56M [VID] 65. Packet Sniffing.mp4 57M [VID] 14. Exploit Modules.mp4 57M [VID] 29. Nmap Integration and Port Scanning.mp4 59M [VID] 21. MSFconsole.mp4 60M [VID] 55. Using Resource Files.mp4 64M [VID] 34. HTTP Enumeration.mp4 65M [VID] 67. Port Forwarding.mp4 66M [VID] 72. MSFvenom.mp4 66M [VID] 12. Auxiliary Modules.mp4 69M [VID] 48. SunOracle GlassFish Server Authenticated Code Execution (glassfish_deployer).mp4 70M [VID] 56. Privilege Escalation.mp4 71M [VID] 75. Using Custom Payload Generators.mp4 76M [VID] 10. Metasploit Filesystem and Libraries.mp4 80M [VID] 61. Extracting Cleartext Passwords.mp4 85M [VID] 13. Payload Modules.mp4 86M [VID] 66. Pivoting.mp4 90M

Recent Courses

CEHv13
HackTricks - AWS Red Team Expert (ARTE)
Certified Exploit Development Professional [CEDP]
Advance Exploitation Course By Umar Sabil
CompTIA Security+ (SY0-701 & SY0-601) Full Training Guide
ITProTV - LPIC-2 Linux Engineer (202-450)_
OffSec - PEN-210 - Foundational Wireless Network Attacks
OffSec EXP-301
FOR508 Videos 2023
Introduction Windows Malware Development
Red-Teaming-Exploit-Development-with-Assembly-and-C-MSAC
SEC450 Videos 2020
AWS Cloud Red Team Specialist [CARTS]
SEC670 MP3 2025.4
Zero Point Security - Red Team Ops 2025.2
Certified Red Team Analyst [CCRTA] 2022
EC Council - DroneWorkshop
HTB - AI Red Teamer 2025.3 Path
SEC670 Red Teaming Tools - Developing Windows Implants, Shellcode, Command and Control
Maltrak - Threat Hunting In Microsoft Sentinel and Defender
Hybrid Multi-Cloud Red Team Specialist [CHMRTS]
Stealth Cyber Operator [CSCO]
Process Injection Analyst [CPIA]
Red Team Specialist [CRTS V1]
Practical Hardware Hacking
Red Team Infra Dev [CRT-ID]
Purple Team Analyst [CPTA V1]
Assembly 101
EC-Council Certified Cloud Security Engineer (CCSE)
Udemy - Web Security & Bug Bounty Learn Penetration Testing 2025
INE - Advanced Web Application Penetration Testing (New)_
Windows Red Team Lab (CRTE) 2025.2
Mandiant - Malware Analysis 2025
13Cubed - Investigating Linux Devices
Zero Point Security - DevOps for Pentesters 2025.3
Offensive Development w Greg Hatcher & John Stigerwalt
Pluralsight - Windows Server 2022 Administration
BittenTech - TechHacker Ethical Hacking and Cyber Security
Kaspersky - Hunting APTs like a Ninja with YARA
A-Windows_Process_Injection_For_Red-Blue_Team
QURE Academy - Advanced Attacks Against Active Directory
EC-Council - Certified Network Defender v3 2024.11
EC-Council - Cyber Security Technician
PEN-200 - Penetration Testing with Kali Linux Videos
EDRPv3 EC-Council Disaster Recovery Professional
OffSec - PEN-200 2024.11
Practical Analysis with Security Onion
SANS ON DEMAND COURSE
Top 5 Tools & Techniques for Penetration Testing
CVE's for Bug Bounties & Penetration Testing
Creating Batch Scripts For Android
Oreilly - Mastering Cybersecurity with Python - From Basics to Advanced Defense
Recon For Bug Bounties & Penetration Testing
Bug Bounty Hunting and Penetration Testing v2
Bug Bounty Hunting and Penetration Testing v1
Bootcamp de Backend Avanzado_ Microservicios
Sketchup desde Cero para Arquitectos
Creación y consulta de bases de datos con ChatGPT y SQL
Storytelling Audiovisual para redes sociales
Introducción a Frameworks de Frontend con Vue 3"
Trafficker Expert
2. Digital Marketing Course ( English )
Creación de videojuegos
Master en Creación de Videojuegos
Photoshop 2020 para fotógrafos. Conoce el Retoque nivel PRO!
Soporte Técnico a Computadoras en Entornos Corporativos
13 CURSO DE REPARACION DE IMPRESORAS
18. Copywriting como escribir para vender mas
Master en Reparación de iPhone
Crea Aplicaciones Java Web
Curso de creación de bots [CodigoFacilito]
Maestría en CSS3 Flexbox, Grid, SASS, Bootstrap 5
Robótica con Matlab Cinemática directa y Simulación
COMMUNITY AND CONTENT MANAGER
Aprende Android con Ejemplos
Adobe Premiere desde Cero
ELECTRICIDAD
Invertir en Criptomonedas - Blockchain - Trading - DeFi - UDEMY
Angular - De cero a experto
Electrónica desde cero
Creación de videojuegos
Universidad del dropshipping
Cursos PhotoShop
reparacion de ps2
Curso de Linux s4vitar
rofesional en Reparacion de Laptops
Curso Marketing PRO Masterclass - John Dani
Curso de Reparación de Discos Duros y Recuperación de Datos
CURSO WORD, POWERPOINT
EXCEL DE PRINCIPIANTE A EXPERTO
CURSO SOLIDWORKS
Seguridad Informática desde Cero
Master Unreal Engine 4 Para Arquitectura en Español
Aprende.realidad.aumentada.con.ARKit
COMO VENDER POR FB e IG ADS - FELIPE VERGARA
AUTOCAD 2019 DE PRINCIPIANTE A AVANZADO
Curso Word
Curso Adobe Illustrator Sé un experto en ilustración digital
Universidad Python 2021 - POO, Django, Flask y Postgresql