elhacker.INFO Downloads

[ index of contents ]

Copyright issues contact webmaster@elhacker.info
Icon  Name                                          Size  
[Volver] Parent Directory - [TXT] 28.assignment.html 301K [VID] 25.Dropper overview.mp4 1.1M [Fichero comrpimido] RTO-maldev.zip 1.9M [VID] 1.Introduction.mp4 3.2M [VID] 29.Course closing information.mp4 4.1M [VID] 15.Antivirus vs call obfuscation.mp4 4.8M [VID] 20.Injecting code into remote process.mp4 5.1M [VID] 17.Backdooring PE theory.mp4 5.4M [VID] 19.What is code injection-.mp4 6.1M [VID] 11.Encoding and Encryption.mp4 6.3M [VID] 7.Where to store payloads-.mp4 6.4M [VID] 5.Generating EXE vs DLL.mp4 7.2M [VID] 22.Loading DLLs into remote process.mp4 7.3M [VID] 2.Development VM Setup.mp4 9.3M [VID] 4.PE Bear - looking inside.mp4 12M [VID] 23.DLL generator and injector.mp4 12M [VID] 3.PE files - format and structure.mp4 12M [VID] 9.Data section as a container.mp4 15M [VID] 24.Making program invisible.mp4 18M [VID] 14.Encrypting payloads - AES.mp4 18M [VID] 13.Encrypting payloads - XOR.mp4 21M [VID] 21.Implementing code injection.mp4 22M [VID] 6.PE compilation.mp4 26M [VID] 12.Payload encoding.mp4 26M [VID] 10.Payloads in resource section.mp4 26M [VID] 16.Implementing function call obfuscation.mp4 27M [VID] 8.Storing payloads in code section.mp4 29M [VID] 27.Bypassing Windows Defender.mp4 52M [VID] 18.Making Putty a trojan.mp4 67M [VID] 26.Dropper implementation.mp4 69M