elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
28.assignment.html 301K
25.Dropper overview.mp4 1.1M
RTO-maldev.zip 1.9M
1.Introduction.mp4 3.2M
29.Course closing information.mp4 4.1M
15.Antivirus vs call obfuscation.mp4 4.8M
20.Injecting code into remote process.mp4 5.1M
17.Backdooring PE theory.mp4 5.4M
19.What is code injection-.mp4 6.1M
11.Encoding and Encryption.mp4 6.3M
7.Where to store payloads-.mp4 6.4M
5.Generating EXE vs DLL.mp4 7.2M
22.Loading DLLs into remote process.mp4 7.3M
2.Development VM Setup.mp4 9.3M
4.PE Bear - looking inside.mp4 12M
23.DLL generator and injector.mp4 12M
3.PE files - format and structure.mp4 12M
9.Data section as a container.mp4 15M
24.Making program invisible.mp4 18M
14.Encrypting payloads - AES.mp4 18M
13.Encrypting payloads - XOR.mp4 21M
21.Implementing code injection.mp4 22M
6.PE compilation.mp4 26M
12.Payload encoding.mp4 26M
10.Payloads in resource section.mp4 26M
16.Implementing function call obfuscation.mp4 27M
8.Storing payloads in code section.mp4 29M
27.Bypassing Windows Defender.mp4 52M
18.Making Putty a trojan.mp4 67M
26.Dropper implementation.mp4 69M