elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
   
 Name                                                                 Last modified      Size  
 Parent Directory                                                                          -   
 01 Introduction/                                                     2022-04-15 20:46    -   
 02 Installing The Tools/                                             2022-04-15 20:47    -   
 03 Building EXE and DLL and Examining PE Structure/                  2022-04-15 20:51    -   
 04 Embedding Shellcode Payloads in EXE files/                        2022-04-15 20:52    -   
 05 Generating Shellcodes Using Metasploit in Kali Linux/             2022-04-15 20:55    -   
 08 Base64 Encoding of Shellcode Payload/                             2022-04-15 20:57    -   
 09 Reverse Engineering Base64 Encoded Payloads/                      2022-04-15 20:58    -   
 10 XOR Encryption of Payload/                                        2022-04-15 20:59    -   
 11 Reverse Engineering XOR Encryption/                               2022-04-15 21:01    -   
 12 AES Encryption of Payload/                                        2022-04-15 21:02    -   
 13 Reverse Engineering AES Encryption Using CryptDecrypt/            2022-04-15 21:03    -   
 14 Testing Shellcode Using Shellcode Runner/                         2022-04-15 21:04    -   
 15 Obfuscating Functions Using GetProcAddress and XOR Encryption/    2022-04-15 21:05    -   
 16 Reverse Engineering Function Obfuscation/                         2022-04-15 21:07    -   
 17 Trojan Engineering Using Code Caves/                              2022-04-15 21:08    -   
 18 Reverse Engineering Code Cave Trojans/                            2022-04-15 21:12    -   
 19 Process Injection/                                                2022-04-15 21:13    -   
 20 Detecting Process Injection and Reverse Engineering it/           2022-04-15 21:16    -   
 21 Testing Process Injection Shellcode with ShellcodeRunnerInjected/ 2022-04-15 21:18    -   
 22 DLL Injection/                                                    2022-04-15 21:18    -   
 23 Detecting and Reverse Engineering DLL Injection/                  2022-04-15 21:22    -   
 24 Creating a Stealth Trojan/                                        2022-04-15 21:24    -   
 26 Reverse Engineering the Lab Project Trojan/                       2022-04-15 21:24    -   
 27 Anti Virus Evasion/                                               2022-04-15 21:26    -   
 28 Bonus Lecture/                                                    2022-04-15 21:30    -