elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
1. Intro/ -
2. Career Paths/ -
3. Environment & Dev Tools/ -
4. EVM Deep Dive/ -
5. Exercises Guidelines/ -
6. Fungible Tokens Crash Course ERC20/ -
7. Non Fungible Tokens Crash Course ERC721/ -
8. Access Control & Default Visibility/ -
9. Randomness Vulnerabilities/ -
10. Reentrancy Attacks/ -
11. Arithmetic OverUnderflows/ -
12. DeFi Crash Course Decentralized Exchanges and AMMs/ -
13. DOS (Denial of Service) Attacks/ -
14. MEV & Frontrunning Attacks/ -
15. It's Just the Beginning Final Lecture/ -
Recent Courses
Complete Red Hat System Administration Boot Camp - RHCSA 9
CHFI v11 Evidence Files
AI Governance Professional (AIGP) Certification & AI Mastery
Dark Web Forensics (DWA)
ZeroToMastery - DevOps Bootcamp_ Learn Linux & Become a Linux Sysadmin
INE - Digital Forensics Professional (eCDFP)
Hacking Exposed
EC-Council Certified DevSecOps Engineer (ECDE)_Videos
PNPT Live Learn to Hack
DevOps for Developers
Building Your Cybersecurity Talent Pipeline
The Cybersecurity Threat Landscape
Security Tips - Metadata
iNE - Penetration Testing Student v2 (eJPTv2)
Udemy Course – Malware Development for Ethical Hackers & Pentesters
Udemy - The Ultimate Dark Web Anonymity Privacy Security Course 2025
iNE _ CCNA 200-301