elhacker.INFO Downloads

[ index of contents ]

Copyright issues contact webmaster@elhacker.info
Icon  Name                                                                   Size  
[Volver] Parent Directory - [VID] 5. Listing All token privileges.mp4 363M [VID] 3. NetShareEnumW - Enumerating network shares.mp4 244M [VID] 14. Backdooring PE Files.mp4 242M [VID] 1. MessageBoxW and GetUserNameW.mp4 187M [VID] 8. Shellcode Injection in remote process.mp4 180M [VID] 4. GetTokenInformation - Checking our elevation privilege.mp4 177M [VID] 10. DLL Injection.mp4 161M [VID] 12. Checking if Process is attached to debugger or not.mp4 148M [VID] 2. Structures and Unions.mp4 137M [VID] 7. Simple Shellcode runner.mp4 120M [VID] 6. Enabling all assigned token privileges - AdjustTokenPrivilege.mp4 115M [VID] 15. Getting Screenshots.mp4 113M [VID] 11. Finding DLLs and their Base addresses in a process.mp4 97M [VID] 16. Obfuscating Function names using Delegates.mp4 73M [VID] 13. Detaching the debugger from process using NtRemoveProcessDebug.mp4 67M [VID] 9. Storing shellcode in .rsrc resources section.mp4 39M [TXT] 5. Listing All token privileges.srt 27K [TXT] 1. MessageBoxW and GetUserNameW.srt 19K [TXT] 3. NetShareEnumW - Enumerating network shares.srt 18K [TXT] 10. DLL Injection.srt 17K [TXT] 4. GetTokenInformation - Checking our elevation privilege.srt 16K [TXT] 2. Structures and Unions.srt 15K [TXT] 8. Shellcode Injection in remote process.srt 14K [TXT] 7. Simple Shellcode runner.srt 12K [TXT] 15. Getting Screenshots.srt 10K [TXT] 12. Checking if Process is attached to debugger or not.srt 10K [TXT] 6. Enabling all assigned token privileges - AdjustTokenPrivilege.srt 9.1K [TXT] 11. Finding DLLs and their Base addresses in a process.srt 7.6K [TXT] 16. Obfuscating Function names using Delegates.srt 6.6K [TXT] 13. Detaching the debugger from process using NtRemoveProcessDebug.srt 6.6K [TXT] 9. Storing shellcode in .rsrc resources section.srt 4.4K [TXT] 14. Backdooring PE Files.srt 1.3K