elhacker.INFO Downloads

[ índice de contenido ]

Copyright issues contact webmaster@elhacker.info
Icon  Name                                                                                               Size  
[Volver] Parent Directory - [VID] 00075 Summary.mp4 108M [VID] 00074 11.4_Fuzzing_Web_Applications.mp4 297M [VID] 00073 11.3_Surveying_Information_Disclosure_Vulnerabilities.mp4 52M [VID] 00072 11.2_Exploiting_Insecure_Direct_Object_References_and_Path_Traversal.mp4 309M [VID] 00071 11.1_Understanding_the_Other_Common_Security_Flaws_in_Web_Applications.mp4 132M [VID] 00070 Learning_objectives.mp4 54M [VID] 00069 10.4_Mitigating_AJAX_HTML5_and_Client-side_Vulnerabilities.mp4 59M [VID] 00068 10.3_Understanding_AJAX_Implementations.mp4 80M [VID] 00067 10.2_Understanding_HTML5_Implementations.mp4 212M [VID] 00066 10.1_Surveying_the_Client-side_Code_and_Storage.mp4 187M [VID] 00065 Learning_objectives.mp4 36M [VID] 00064 9.2_Exploring_the_Tools_Used_to_Test_the_APIs.mp4 139M [VID] 00063 9.1_Understanding_the_APIs.mp4 94M [VID] 00062 Learning_objectives.mp4 29M [VID] 00061 8.4_Mitigating_Flaws_in_Cryptographic_Implementations.mp4 103M [VID] 00060 8.3_Surveying_Examples_of_Crypto-based_Attacks_and_Vulnerabilities.mp4 136M [VID] 00059 8.2_Identifying_Common_Flaws_in_Data_Storage_and_Transmission.mp4 289M [VID] 00058 8.1_Introducing_Cryptography_Encryption_and_Hashing_Protocols.mp4 722M [VID] 00057 Learning_objectives.mp4 59M [VID] 00056 7.8_Mitigating_XSS_and_CSRF_Vulnerabilities.mp4 240M [VID] 00055 7.7_Evading_Web_Application_Security_Controls.mp4 185M [VID] 00054 7.6_Exploiting_CSRF_Vulnerabilities.mp4 72M [VID] 00053 7.5_Understanding_Cross-Site_Request_Forgery_CSRF.mp4 42M [VID] 00052 7.4_Exploiting_DOM-based_XSS_Vulnerabilities.mp4 108M [VID] 00051 7.3_Exploiting_Stored_XSS_Vulnerabilities.mp4 106M [VID] 00050 7.2_Exploiting_Reflected_XSS_Vulnerabilities.mp4 82M [VID] 00049 7.1_Introducing_XSS.mp4 41M [VID] 00048 Learning_objectives.mp4 72M [VID] 00047 6.7_Mitigating_Injection_Vulnerabilities.mp4 79M [VID] 00046 6.6_Exploiting_XML_Injection_Vulnerabilities.mp4 81M [VID] 00045 6.5_Understanding_XML_Injection.mp4 47M [VID] 00044 6.4_Exploiting_SQL_Injection_Vulnerabilities.mp4 808M [VID] 00043 6.3_Understanding_SQL_Injection.mp4 169M [VID] 00042 6.2_Exploiting_Command_Injection_Vulnerabilities.mp4 97M [VID] 00041 6.1_Understanding_Command_Injection.mp4 68M [VID] 00040 Learning_objectives.mp4 54M [VID] 00039 5.2_Exploring_Session_Management_Mechanisms_and_Related_Vulnerabilities.mp4 439M [VID] 00038 5.1_Understanding_Authentication_Schemes_in_Web_Applications_and_Related_Vulnerabilities.mp4 699M [VID] 00037 Learning_objectives.mp4 38M [VID] 00036 4.10_Introducing_OpenVAS.mp4 266M [VID] 00035 4.9_Introducing_OWASP_Zed_Application_Proxy_ZAP.mp4 170M [VID] 00034 4.8_Introducing_the_Burp_Suite.mp4 524M [VID] 00033 4.7_Introducing_Nikto.mp4 117M [VID] 00032 4.6_Understanding_How_Web_Application_Scanners_Work.mp4 64M [VID] 00031 4.5_Surveying_Web_Crawlers_and_Directory_Brute_Force.mp4 152M [VID] 00030 4.4_Exploring_CMS_and_Framework_Identification.mp4 134M [VID] 00029 4.3_Exploring_Shodan_Maltego_Recon-NG_SpiderFoot_and_TheHarvester.mp4 488M [VID] 00028 4.2_Using_Search_Engines_and_Public_Information.mp4 162M [VID] 00027 4.1_Understanding_Passive_vs._Active_Reconnaissance.mp4 131M [VID] 00026 Learning_objectives.mp4 88M [VID] 00025 3.8_Understanding_Cyber_Ranges_and_Capture_the_Flag_Events.mp4 109M [VID] 00024 3.7_Understanding_Web_Application_Proxies.mp4 109M [VID] 00023 3.6_Exploring_the_Web_Security_Dojo.mp4 105M [VID] 00022 3.5_Surveying_Hackazon.mp4 100M [VID] 00021 3.4_Surveying_WebGoat.mp4 64M [VID] 00020 3.3_Surveying_DVWA.mp4 51M [VID] 00019 3.2_Introducing_Vulnerable_Applications.mp4 57M [VID] 00018 3.1_Exploring_Kali_Linux.mp4 559M [VID] 00017 Learning_objectives.mp4 78M [VID] 00016 2.8_Introducing_Kubernetes.mp4 96M [VID] 00015 2.7_Surveying_Docker_Containers.mp4 182M [VID] 00014 2.6_Exploring_Web_Application_Frameworks.mp4 69M [VID] 00013 2.5_Exploring_Cloud_Services.mp4 108M [VID] 00012 2.4_Introducing_DevOps.mp4 74M [VID] 00011 2.3_Surveying_Session_Management_and_Cookies.mp4 231M [VID] 00010 2.2_Exploring_the_HTTP_Request_and_Response.mp4 167M [VID] 00009 2.1_Understanding_the_Web_Application_Protocols.mp4 219M [VID] 00008 Learning_objectives.mp4 72M [VID] 00007 1.5_Exploring_What_Programming_Languages_You_Should_Know.mp4 167M [VID] 00006 1.4_Exploring_How_Web_Applications_Have_Evolved_Over_Time.mp4 123M [VID] 00005 1.3_Understanding_the_Need_for_Web_Application_Penetration_Testing.mp4 75M [VID] 00004 1.2_Surveying_Web_Application_Penetration_Testing_Methodologies.mp4 133M [VID] 00003 1.1_Understanding_Ethical_Hacking_and_Penetration_Testing.mp4 44M [VID] 00002 Learning_objectives.mp4 71M [VID] 00001 Security_Penetration_Testing_for_Today_s_DevOps_and_Cloud_Environments_-_Introduction.mp4 178M

Recent Courses

CEHv13
HackTricks - AWS Red Team Expert (ARTE)
Certified Exploit Development Professional [CEDP]
Advance Exploitation Course By Umar Sabil
CompTIA Security+ (SY0-701 & SY0-601) Full Training Guide
ITProTV - LPIC-2 Linux Engineer (202-450)_
OffSec - PEN-210 - Foundational Wireless Network Attacks
OffSec EXP-301
FOR508 Videos 2023
Introduction Windows Malware Development
Red-Teaming-Exploit-Development-with-Assembly-and-C-MSAC
SEC450 Videos 2020
AWS Cloud Red Team Specialist [CARTS]
SEC670 MP3 2025.4
Zero Point Security - Red Team Ops 2025.2
Certified Red Team Analyst [CCRTA] 2022
EC Council - DroneWorkshop
HTB - AI Red Teamer 2025.3 Path
SEC670 Red Teaming Tools - Developing Windows Implants, Shellcode, Command and Control
Maltrak - Threat Hunting In Microsoft Sentinel and Defender
Hybrid Multi-Cloud Red Team Specialist [CHMRTS]
Stealth Cyber Operator [CSCO]
Process Injection Analyst [CPIA]
Red Team Specialist [CRTS V1]
Practical Hardware Hacking
Red Team Infra Dev [CRT-ID]
Purple Team Analyst [CPTA V1]
Assembly 101
EC-Council Certified Cloud Security Engineer (CCSE)
Udemy - Web Security & Bug Bounty Learn Penetration Testing 2025
INE - Advanced Web Application Penetration Testing (New)_
Windows Red Team Lab (CRTE) 2025.2
Mandiant - Malware Analysis 2025
13Cubed - Investigating Linux Devices
Zero Point Security - DevOps for Pentesters 2025.3
Offensive Development w Greg Hatcher & John Stigerwalt
Pluralsight - Windows Server 2022 Administration
BittenTech - TechHacker Ethical Hacking and Cyber Security
Kaspersky - Hunting APTs like a Ninja with YARA
A-Windows_Process_Injection_For_Red-Blue_Team
QURE Academy - Advanced Attacks Against Active Directory
EC-Council - Certified Network Defender v3 2024.11
EC-Council - Cyber Security Technician
PEN-200 - Penetration Testing with Kali Linux Videos
EDRPv3 EC-Council Disaster Recovery Professional
OffSec - PEN-200 2024.11
Practical Analysis with Security Onion
SANS ON DEMAND COURSE
Top 5 Tools & Techniques for Penetration Testing
CVE's for Bug Bounties & Penetration Testing
Creating Batch Scripts For Android
Oreilly - Mastering Cybersecurity with Python - From Basics to Advanced Defense
Recon For Bug Bounties & Penetration Testing
Bug Bounty Hunting and Penetration Testing v2
Bug Bounty Hunting and Penetration Testing v1
Bootcamp de Backend Avanzado_ Microservicios
Sketchup desde Cero para Arquitectos
Creación y consulta de bases de datos con ChatGPT y SQL
Storytelling Audiovisual para redes sociales
Introducción a Frameworks de Frontend con Vue 3"
Trafficker Expert
2. Digital Marketing Course ( English )
Creación de videojuegos
Master en Creación de Videojuegos
Photoshop 2020 para fotógrafos. Conoce el Retoque nivel PRO!
Soporte Técnico a Computadoras en Entornos Corporativos
13 CURSO DE REPARACION DE IMPRESORAS
18. Copywriting como escribir para vender mas
Master en Reparación de iPhone
Crea Aplicaciones Java Web
Curso de creación de bots [CodigoFacilito]
Maestría en CSS3 Flexbox, Grid, SASS, Bootstrap 5
Robótica con Matlab Cinemática directa y Simulación
COMMUNITY AND CONTENT MANAGER
Aprende Android con Ejemplos
Adobe Premiere desde Cero
ELECTRICIDAD
Invertir en Criptomonedas - Blockchain - Trading - DeFi - UDEMY
Angular - De cero a experto
Electrónica desde cero
Creación de videojuegos
Universidad del dropshipping
Cursos PhotoShop
reparacion de ps2
Curso de Linux s4vitar
rofesional en Reparacion de Laptops
Curso Marketing PRO Masterclass - John Dani
Curso de Reparación de Discos Duros y Recuperación de Datos
CURSO WORD, POWERPOINT
EXCEL DE PRINCIPIANTE A EXPERTO
CURSO SOLIDWORKS
Seguridad Informática desde Cero
Master Unreal Engine 4 Para Arquitectura en Español
Aprende.realidad.aumentada.con.ARKit
COMO VENDER POR FB e IG ADS - FELIPE VERGARA
AUTOCAD 2019 DE PRINCIPIANTE A AVANZADO
Curso Word
Curso Adobe Illustrator Sé un experto en ilustración digital
Universidad Python 2021 - POO, Django, Flask y Postgresql