elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
01-Android-Security-Introduction.mp4 60M
01-Android-Security-Introduction.pdf 123K
02-Android-Architecture.mp4 64M
02-Android-Architecture.pdf 242K
03-Android-Permissions.mp4 104M
03-Android-Permissions.pdf 103K
04-Android-Applications.mp4 118M
04-Android-Applications.pdf 278K
04.zip 23M
05-Setting-up-Genymotion.mp4 62M
05-Setting-up-Genymotion.pdf 114K
06-Android-Application-Components.mp4 108M
06-Android-Application-Components.pdf 136K
06.zip 7.9M
07-Dex-Analysis.mp4 123M
07-Dex-Analysis.pdf 485K
08-Android-Debug-Bridge.mp4 97M
08-Android-Debug-Bridge.pdf 661K
08.zip 7.7M
09-Logging-based-vulnerabilities.mp4 127M
09-Logging-based-vulnerabilities.pdf 1.9M
09.zip 2.6M
10-Application-Reversing.mp4 145M
10-Application-Reversing.pdf 193K
10.zip 13K
11-Analyzing-Android-Malwares.mp4 124M
11-Analyzing-Android-Malwares.pdf 101K
12-Traffic-Analysis.mp4 87M
12-Traffic-Analysis.pdf 226K
12.zip 4.9M
13-SSL-Pinning.mp4 72M
13-SSL-Pinning.pdf 111K
13.zip 274K
14-Leaking-Content-Providers.mp4 98M
14.zip 81K
15-Drozer-Kung-Fu.mp4 79M
15-Drozer-Kung-Fu.pdf 109K
16-Read-Based-Content-Provider-Vulnerability.mp4 76M
16-Read-Based-Content-Provider-Vulnerability.pdf 275K
16.srt 7.3K
16.zip 3.1M
17-Advanced-Drozer-Kung-Fu.mp4 142M
17-Advanced-Drozer-Kung-Fu.pdf 103K
17.srt 11K
17.zip 5.2M
18-Drozer-Scripting.mp4 62M
18-Drozer-Scripting.pdf 185K
18.srt 6.4K
19-Dropbox-Vulnerability.mp4 75M
19-Dropbox-Vulnerability.pdf 252K
19.srt 7.3K
20-Backup-based-vulnerabilities.mp4 95M
20-Backup-based-vulnerabilities.pdf 352K
20.srt 8.4K
20.zip 7.9M
21-Client-Side-Injection.mp4 86M
21-Client-Side-Injection.pdf 110K
21.srt 6.8K
21.zip 259K
22-Hooking-Introduction-and-Setting-up-InsecureBankSetup.mp4 81M
22-Hooking-Introduction-and-Setting-up-InsecureBankSetup.pdf 104K
22.srt 6.3K
22.zip 213K
23-Android-Debugging-with-Andbug.mp4 78M
23-Android-Debugging-with-Andbug.pdf 102K
23.srt 6.0K
23.zip 393K
24-Debugging-with-JDB.mp4 99M
24-Debugging-with-JDB.pdf 208K
24.srt 7.1K
25-Automated-Hooking-with-Introspy.mp4 127M
25-Automated-Hooking-with-Introspy.pdf 115K
25.srt 10K
25.zip 4.7M
26-Cydia-Substrate.mp4 135M
26-Cydia-Substrate.pdf 487K
26.srt 11K
27-Hooking-using-Xposed.mp4 107M
27-Hooking-using-Xposed.pdf 563K
27.srt 8.8K
28-Androguard-Scripting-and-Analysis.mp4 99M
28-Androguard-Scripting-and-Analysis.pdf 2.5M
28.srt 8.3K
29-Webview-based-vulnerabilities.mp4 114M
29-Webview-based-vulnerabilities.pdf 130K
29.srt 9.8K
29.zip 427K
30-Exploiting-Webviews-with-Metasploit.mp4 80M
30-Exploiting-Webviews-with-Metasploit.pdf 92K
30.srt 6.8K
Learning Pentesting for Android Devices.pdf 14M
introduction.mp4 73M
Recent Courses
Creación de videojuegos
Universidad del dropshipping
Cursos PhotoShop
reparacion de ps2
Curso de Linux s4vitar
Profesional en Reparacion de Laptops
Curso Marketing PRO Masterclass - John Dani
Curso de Reparación de Discos Duros y Recuperación de Datos
CURSO WORD, POWERPOINT
EXCEL DE PRINCIPIANTE A EXPERTO
CURSO SOLIDWORKS
Seguridad Informática desde Cero
Master Unreal Engine 4 Para Arquitectura en Español
Aprende.realidad.aumentada.con.ARKit
COMO VENDER POR FB e IG ADS - FELIPE VERGARA