elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
01-Android-Security-Introduction.mp4 60M
01-Android-Security-Introduction.pdf 123K
02-Android-Architecture.mp4 64M
02-Android-Architecture.pdf 242K
03-Android-Permissions.mp4 104M
03-Android-Permissions.pdf 103K
04-Android-Applications.mp4 118M
04-Android-Applications.pdf 278K
04.zip 23M
05-Setting-up-Genymotion.mp4 62M
05-Setting-up-Genymotion.pdf 114K
06-Android-Application-Components.mp4 108M
06-Android-Application-Components.pdf 136K
06.zip 7.9M
07-Dex-Analysis.mp4 123M
07-Dex-Analysis.pdf 485K
08-Android-Debug-Bridge.mp4 97M
08-Android-Debug-Bridge.pdf 661K
08.zip 7.7M
09-Logging-based-vulnerabilities.mp4 127M
09-Logging-based-vulnerabilities.pdf 1.9M
09.zip 2.6M
10-Application-Reversing.mp4 145M
10-Application-Reversing.pdf 193K
10.zip 13K
11-Analyzing-Android-Malwares.mp4 124M
11-Analyzing-Android-Malwares.pdf 101K
12-Traffic-Analysis.mp4 87M
12-Traffic-Analysis.pdf 226K
12.zip 4.9M
13-SSL-Pinning.mp4 72M
13-SSL-Pinning.pdf 111K
13.zip 274K
14-Leaking-Content-Providers.mp4 98M
14.zip 81K
15-Drozer-Kung-Fu.mp4 79M
15-Drozer-Kung-Fu.pdf 109K
16-Read-Based-Content-Provider-Vulnerability.mp4 76M
16-Read-Based-Content-Provider-Vulnerability.pdf 275K
16.srt 7.3K
16.zip 3.1M
17-Advanced-Drozer-Kung-Fu.mp4 142M
17-Advanced-Drozer-Kung-Fu.pdf 103K
17.srt 11K
17.zip 5.2M
18-Drozer-Scripting.mp4 62M
18-Drozer-Scripting.pdf 185K
18.srt 6.4K
19-Dropbox-Vulnerability.mp4 75M
19-Dropbox-Vulnerability.pdf 252K
19.srt 7.3K
20-Backup-based-vulnerabilities.mp4 95M
20-Backup-based-vulnerabilities.pdf 352K
20.srt 8.4K
20.zip 7.9M
21-Client-Side-Injection.mp4 86M
21-Client-Side-Injection.pdf 110K
21.srt 6.8K
21.zip 259K
22-Hooking-Introduction-and-Setting-up-InsecureBankSetup.mp4 81M
22-Hooking-Introduction-and-Setting-up-InsecureBankSetup.pdf 104K
22.srt 6.3K
22.zip 213K
23-Android-Debugging-with-Andbug.mp4 78M
23-Android-Debugging-with-Andbug.pdf 102K
23.srt 6.0K
23.zip 393K
24-Debugging-with-JDB.mp4 99M
24-Debugging-with-JDB.pdf 208K
24.srt 7.1K
25-Automated-Hooking-with-Introspy.mp4 127M
25-Automated-Hooking-with-Introspy.pdf 115K
25.srt 10K
25.zip 4.7M
26-Cydia-Substrate.mp4 135M
26-Cydia-Substrate.pdf 487K
26.srt 11K
27-Hooking-using-Xposed.mp4 107M
27-Hooking-using-Xposed.pdf 563K
27.srt 8.8K
28-Androguard-Scripting-and-Analysis.mp4 99M
28-Androguard-Scripting-and-Analysis.pdf 2.5M
28.srt 8.3K
29-Webview-based-vulnerabilities.mp4 114M
29-Webview-based-vulnerabilities.pdf 130K
29.srt 9.8K
29.zip 427K
30-Exploiting-Webviews-with-Metasploit.mp4 80M
30-Exploiting-Webviews-with-Metasploit.pdf 92K
30.srt 6.8K
Learning Pentesting for Android Devices.pdf 14M
introduction.mp4 73M