elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
26.Dropper implementation.mp4 69M
18.Making Putty a trojan.mp4 67M
27.Bypassing Windows Defender.mp4 52M
8.Storing payloads in code section.mp4 29M
16.Implementing function call obfuscation.mp4 27M
10.Payloads in resource section.mp4 26M
12.Payload encoding.mp4 26M
6.PE compilation.mp4 26M
21.Implementing code injection.mp4 22M
13.Encrypting payloads - XOR.mp4 21M
14.Encrypting payloads - AES.mp4 18M
24.Making program invisible.mp4 18M
9.Data section as a container.mp4 15M
3.PE files - format and structure.mp4 12M
23.DLL generator and injector.mp4 12M
4.PE Bear - looking inside.mp4 12M
2.Development VM Setup.mp4 9.3M
22.Loading DLLs into remote process.mp4 7.3M
5.Generating EXE vs DLL.mp4 7.2M
7.Where to store payloads-.mp4 6.4M
11.Encoding and Encryption.mp4 6.3M
19.What is code injection-.mp4 6.1M
17.Backdooring PE theory.mp4 5.4M
20.Injecting code into remote process.mp4 5.1M
15.Antivirus vs call obfuscation.mp4 4.8M
29.Course closing information.mp4 4.1M
1.Introduction.mp4 3.2M
RTO-maldev.zip 1.9M
25.Dropper overview.mp4 1.1M
28.assignment.html 301K