elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
RTO-maldev.zip 1.9M
29.Course closing information.mp4 4.1M
28.assignment.html 301K
27.Bypassing Windows Defender.mp4 52M
26.Dropper implementation.mp4 69M
25.Dropper overview.mp4 1.1M
24.Making program invisible.mp4 18M
23.DLL generator and injector.mp4 12M
22.Loading DLLs into remote process.mp4 7.3M
21.Implementing code injection.mp4 22M
20.Injecting code into remote process.mp4 5.1M
19.What is code injection-.mp4 6.1M
18.Making Putty a trojan.mp4 67M
17.Backdooring PE theory.mp4 5.4M
16.Implementing function call obfuscation.mp4 27M
15.Antivirus vs call obfuscation.mp4 4.8M
14.Encrypting payloads - AES.mp4 18M
13.Encrypting payloads - XOR.mp4 21M
12.Payload encoding.mp4 26M
11.Encoding and Encryption.mp4 6.3M
10.Payloads in resource section.mp4 26M
9.Data section as a container.mp4 15M
8.Storing payloads in code section.mp4 29M
7.Where to store payloads-.mp4 6.4M
6.PE compilation.mp4 26M
5.Generating EXE vs DLL.mp4 7.2M
4.PE Bear - looking inside.mp4 12M
3.PE files - format and structure.mp4 12M
2.Development VM Setup.mp4 9.3M
1.Introduction.mp4 3.2M