elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
00001 Security_Penetration_Testing_for_Today_s_DevOps_and_Cloud_Environments_-_Introduction.mp4 178M
00002 Learning_objectives.mp4 71M
00003 1.1_Understanding_Ethical_Hacking_and_Penetration_Testing.mp4 44M
00004 1.2_Surveying_Web_Application_Penetration_Testing_Methodologies.mp4 133M
00005 1.3_Understanding_the_Need_for_Web_Application_Penetration_Testing.mp4 75M
00006 1.4_Exploring_How_Web_Applications_Have_Evolved_Over_Time.mp4 123M
00007 1.5_Exploring_What_Programming_Languages_You_Should_Know.mp4 167M
00008 Learning_objectives.mp4 72M
00009 2.1_Understanding_the_Web_Application_Protocols.mp4 219M
00010 2.2_Exploring_the_HTTP_Request_and_Response.mp4 167M
00011 2.3_Surveying_Session_Management_and_Cookies.mp4 231M
00012 2.4_Introducing_DevOps.mp4 74M
00013 2.5_Exploring_Cloud_Services.mp4 108M
00014 2.6_Exploring_Web_Application_Frameworks.mp4 69M
00015 2.7_Surveying_Docker_Containers.mp4 182M
00016 2.8_Introducing_Kubernetes.mp4 96M
00017 Learning_objectives.mp4 78M
00018 3.1_Exploring_Kali_Linux.mp4 559M
00019 3.2_Introducing_Vulnerable_Applications.mp4 57M
00020 3.3_Surveying_DVWA.mp4 51M
00021 3.4_Surveying_WebGoat.mp4 64M
00022 3.5_Surveying_Hackazon.mp4 100M
00023 3.6_Exploring_the_Web_Security_Dojo.mp4 105M
00024 3.7_Understanding_Web_Application_Proxies.mp4 109M
00025 3.8_Understanding_Cyber_Ranges_and_Capture_the_Flag_Events.mp4 109M
00026 Learning_objectives.mp4 88M
00027 4.1_Understanding_Passive_vs._Active_Reconnaissance.mp4 131M
00028 4.2_Using_Search_Engines_and_Public_Information.mp4 162M
00029 4.3_Exploring_Shodan_Maltego_Recon-NG_SpiderFoot_and_TheHarvester.mp4 488M
00030 4.4_Exploring_CMS_and_Framework_Identification.mp4 134M
00031 4.5_Surveying_Web_Crawlers_and_Directory_Brute_Force.mp4 152M
00032 4.6_Understanding_How_Web_Application_Scanners_Work.mp4 64M
00033 4.7_Introducing_Nikto.mp4 117M
00034 4.8_Introducing_the_Burp_Suite.mp4 524M
00035 4.9_Introducing_OWASP_Zed_Application_Proxy_ZAP.mp4 170M
00036 4.10_Introducing_OpenVAS.mp4 266M
00037 Learning_objectives.mp4 38M
00038 5.1_Understanding_Authentication_Schemes_in_Web_Applications_and_Related_Vulnerabilities.mp4 699M
00039 5.2_Exploring_Session_Management_Mechanisms_and_Related_Vulnerabilities.mp4 439M
00040 Learning_objectives.mp4 54M
00041 6.1_Understanding_Command_Injection.mp4 68M
00042 6.2_Exploiting_Command_Injection_Vulnerabilities.mp4 97M
00043 6.3_Understanding_SQL_Injection.mp4 169M
00044 6.4_Exploiting_SQL_Injection_Vulnerabilities.mp4 808M
00045 6.5_Understanding_XML_Injection.mp4 47M
00046 6.6_Exploiting_XML_Injection_Vulnerabilities.mp4 81M
00047 6.7_Mitigating_Injection_Vulnerabilities.mp4 79M
00048 Learning_objectives.mp4 72M
00049 7.1_Introducing_XSS.mp4 41M
00050 7.2_Exploiting_Reflected_XSS_Vulnerabilities.mp4 82M
00051 7.3_Exploiting_Stored_XSS_Vulnerabilities.mp4 106M
00052 7.4_Exploiting_DOM-based_XSS_Vulnerabilities.mp4 108M
00053 7.5_Understanding_Cross-Site_Request_Forgery_CSRF.mp4 42M
00054 7.6_Exploiting_CSRF_Vulnerabilities.mp4 72M
00055 7.7_Evading_Web_Application_Security_Controls.mp4 185M
00056 7.8_Mitigating_XSS_and_CSRF_Vulnerabilities.mp4 240M
00057 Learning_objectives.mp4 59M
00058 8.1_Introducing_Cryptography_Encryption_and_Hashing_Protocols.mp4 722M
00059 8.2_Identifying_Common_Flaws_in_Data_Storage_and_Transmission.mp4 289M
00060 8.3_Surveying_Examples_of_Crypto-based_Attacks_and_Vulnerabilities.mp4 136M
00061 8.4_Mitigating_Flaws_in_Cryptographic_Implementations.mp4 103M
00062 Learning_objectives.mp4 29M
00063 9.1_Understanding_the_APIs.mp4 94M
00064 9.2_Exploring_the_Tools_Used_to_Test_the_APIs.mp4 139M
00065 Learning_objectives.mp4 36M
00066 10.1_Surveying_the_Client-side_Code_and_Storage.mp4 187M
00067 10.2_Understanding_HTML5_Implementations.mp4 212M
00068 10.3_Understanding_AJAX_Implementations.mp4 80M
00069 10.4_Mitigating_AJAX_HTML5_and_Client-side_Vulnerabilities.mp4 59M
00070 Learning_objectives.mp4 54M
00071 11.1_Understanding_the_Other_Common_Security_Flaws_in_Web_Applications.mp4 132M
00072 11.2_Exploiting_Insecure_Direct_Object_References_and_Path_Traversal.mp4 309M
00073 11.3_Surveying_Information_Disclosure_Vulnerabilities.mp4 52M
00074 11.4_Fuzzing_Web_Applications.mp4 297M
00075 Summary.mp4 108M
Recent Courses
CEHv13
HackTricks - AWS Red Team Expert (ARTE)
Certified Exploit Development Professional [CEDP]
Advance Exploitation Course By Umar Sabil
CompTIA Security+ (SY0-701 & SY0-601) Full Training Guide
ITProTV - LPIC-2 Linux Engineer (202-450)_
OffSec - PEN-210 - Foundational Wireless Network Attacks
OffSec EXP-301
FOR508 Videos 2023
Introduction Windows Malware Development
Red-Teaming-Exploit-Development-with-Assembly-and-C-MSAC
SEC450 Videos 2020
AWS Cloud Red Team Specialist [CARTS]
SEC670 MP3 2025.4
Zero Point Security - Red Team Ops 2025.2
Certified Red Team Analyst [CCRTA] 2022
EC Council - DroneWorkshop
HTB - AI Red Teamer 2025.3 Path
SEC670 Red Teaming Tools - Developing Windows Implants, Shellcode, Command and Control
Maltrak - Threat Hunting In Microsoft Sentinel and Defender
Hybrid Multi-Cloud Red Team Specialist [CHMRTS]
Stealth Cyber Operator [CSCO]
Process Injection Analyst [CPIA]
Red Team Specialist [CRTS V1]
Practical Hardware Hacking
Red Team Infra Dev [CRT-ID]
Purple Team Analyst [CPTA V1]
Assembly 101
EC-Council Certified Cloud Security Engineer (CCSE)
Udemy - Web Security & Bug Bounty Learn Penetration Testing 2025
INE - Advanced Web Application Penetration Testing (New)_
Windows Red Team Lab (CRTE) 2025.2
Mandiant - Malware Analysis 2025
13Cubed - Investigating Linux Devices
Zero Point Security - DevOps for Pentesters 2025.3
Offensive Development w Greg Hatcher & John Stigerwalt
Pluralsight - Windows Server 2022 Administration
BittenTech - TechHacker Ethical Hacking and Cyber Security
Kaspersky - Hunting APTs like a Ninja with YARA
A-Windows_Process_Injection_For_Red-Blue_Team
QURE Academy - Advanced Attacks Against Active Directory
EC-Council - Certified Network Defender v3 2024.11
EC-Council - Cyber Security Technician
PEN-200 - Penetration Testing with Kali Linux Videos
EDRPv3 EC-Council Disaster Recovery Professional
OffSec - PEN-200 2024.11
Practical Analysis with Security Onion
SANS ON DEMAND COURSE
Top 5 Tools & Techniques for Penetration Testing
CVE's for Bug Bounties & Penetration Testing
Creating Batch Scripts For Android
Oreilly - Mastering Cybersecurity with Python - From Basics to Advanced Defense
Recon For Bug Bounties & Penetration Testing
Bug Bounty Hunting and Penetration Testing v2
Bug Bounty Hunting and Penetration Testing v1
Bootcamp de Backend Avanzado_ Microservicios
Sketchup desde Cero para Arquitectos
Creación y consulta de bases de datos con ChatGPT y SQL
Storytelling Audiovisual para redes sociales
Introducción a Frameworks de Frontend con Vue 3"
Trafficker Expert
2. Digital Marketing Course ( English )
Creación de videojuegos
Master en Creación de Videojuegos
Photoshop 2020 para fotógrafos. Conoce el Retoque nivel PRO!
Soporte Técnico a Computadoras en Entornos Corporativos
13 CURSO DE REPARACION DE IMPRESORAS
18. Copywriting como escribir para vender mas
Master en Reparación de iPhone
Crea Aplicaciones Java Web
Curso de creación de bots [CodigoFacilito]
Maestría en CSS3 Flexbox, Grid, SASS, Bootstrap 5
Robótica con Matlab Cinemática directa y Simulación
COMMUNITY AND CONTENT MANAGER
Aprende Android con Ejemplos
Adobe Premiere desde Cero
ELECTRICIDAD
Invertir en Criptomonedas - Blockchain - Trading - DeFi - UDEMY
Angular - De cero a experto
Electrónica desde cero
Creación de videojuegos
Universidad del dropshipping
Cursos PhotoShop
reparacion de ps2
Curso de Linux s4vitar
rofesional en Reparacion de Laptops
Curso Marketing PRO Masterclass - John Dani
Curso de Reparación de Discos Duros y Recuperación de Datos
CURSO WORD, POWERPOINT
EXCEL DE PRINCIPIANTE A EXPERTO
CURSO SOLIDWORKS
Seguridad Informática desde Cero
Master Unreal Engine 4 Para Arquitectura en Español
Aprende.realidad.aumentada.con.ARKit
COMO VENDER POR FB e IG ADS - FELIPE VERGARA
AUTOCAD 2019 DE PRINCIPIANTE A AVANZADO
Curso Word
Curso Adobe Illustrator Sé un experto en ilustración digital
Universidad Python 2021 - POO, Django, Flask y Postgresql