elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
28 Bonus Lecture/ -
27 Anti Virus Evasion/ -
26 Reverse Engineering the Lab Project Trojan/ -
24 Creating a Stealth Trojan/ -
23 Detecting and Reverse Engineering DLL Injection/ -
22 DLL Injection/ -
21 Testing Process Injection Shellcode with ShellcodeRunnerInjected/ -
20 Detecting Process Injection and Reverse Engineering it/ -
19 Process Injection/ -
18 Reverse Engineering Code Cave Trojans/ -
17 Trojan Engineering Using Code Caves/ -
16 Reverse Engineering Function Obfuscation/ -
15 Obfuscating Functions Using GetProcAddress and XOR Encryption/ -
14 Testing Shellcode Using Shellcode Runner/ -
13 Reverse Engineering AES Encryption Using CryptDecrypt/ -
12 AES Encryption of Payload/ -
11 Reverse Engineering XOR Encryption/ -
10 XOR Encryption of Payload/ -
09 Reverse Engineering Base64 Encoded Payloads/ -
08 Base64 Encoding of Shellcode Payload/ -
05 Generating Shellcodes Using Metasploit in Kali Linux/ -
04 Embedding Shellcode Payloads in EXE files/ -
03 Building EXE and DLL and Examining PE Structure/ -
02 Installing The Tools/ -
01 Introduction/ -