elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
1.Introduction.mp4 3.2M
2.Development VM Setup.mp4 9.3M
3.PE files - format and structure.mp4 12M
4.PE Bear - looking inside.mp4 12M
5.Generating EXE vs DLL.mp4 7.2M
6.PE compilation.mp4 26M
7.Where to store payloads-.mp4 6.4M
8.Storing payloads in code section.mp4 29M
9.Data section as a container.mp4 15M
10.Payloads in resource section.mp4 26M
11.Encoding and Encryption.mp4 6.3M
12.Payload encoding.mp4 26M
13.Encrypting payloads - XOR.mp4 21M
14.Encrypting payloads - AES.mp4 18M
15.Antivirus vs call obfuscation.mp4 4.8M
16.Implementing function call obfuscation.mp4 27M
17.Backdooring PE theory.mp4 5.4M
18.Making Putty a trojan.mp4 67M
19.What is code injection-.mp4 6.1M
20.Injecting code into remote process.mp4 5.1M
21.Implementing code injection.mp4 22M
22.Loading DLLs into remote process.mp4 7.3M
23.DLL generator and injector.mp4 12M
24.Making program invisible.mp4 18M
25.Dropper overview.mp4 1.1M
26.Dropper implementation.mp4 69M
27.Bypassing Windows Defender.mp4 52M
28.assignment.html 301K
29.Course closing information.mp4 4.1M
RTO-maldev.zip 1.9M