elhacker.INFO Downloads

[ ├Źndice de Contenidos ]

IP's with more than 100 concurrents connections will be automatically banned

Be careful when using wget -r (recusrive) , use -w (wait) 10 seconds or more

Copyright issues contact webmaster@elhacker.info
Icon  Name                                                                 Size  
[Volver] Parent Directory - [Directorio] 01 Introduction/ - [Directorio] 02 Installing The Tools/ - [Directorio] 03 Building EXE and DLL and Examining PE Structure/ - [Directorio] 04 Embedding Shellcode Payloads in EXE files/ - [Directorio] 05 Generating Shellcodes Using Metasploit in Kali Linux/ - [Directorio] 08 Base64 Encoding of Shellcode Payload/ - [Directorio] 09 Reverse Engineering Base64 Encoded Payloads/ - [Directorio] 10 XOR Encryption of Payload/ - [Directorio] 11 Reverse Engineering XOR Encryption/ - [Directorio] 12 AES Encryption of Payload/ - [Directorio] 13 Reverse Engineering AES Encryption Using CryptDecrypt/ - [Directorio] 14 Testing Shellcode Using Shellcode Runner/ - [Directorio] 15 Obfuscating Functions Using GetProcAddress and XOR Encryption/ - [Directorio] 16 Reverse Engineering Function Obfuscation/ - [Directorio] 17 Trojan Engineering Using Code Caves/ - [Directorio] 18 Reverse Engineering Code Cave Trojans/ - [Directorio] 19 Process Injection/ - [Directorio] 20 Detecting Process Injection and Reverse Engineering it/ - [Directorio] 21 Testing Process Injection Shellcode with ShellcodeRunnerInjected/ - [Directorio] 22 DLL Injection/ - [Directorio] 23 Detecting and Reverse Engineering DLL Injection/ - [Directorio] 24 Creating a Stealth Trojan/ - [Directorio] 26 Reverse Engineering the Lab Project Trojan/ - [Directorio] 27 Anti Virus Evasion/ - [Directorio] 28 Bonus Lecture/ -