elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
1 Reverse Engineering and Malware Analysis Fundamentals.mp4 30M
2 Installing Virtual Machine.mp4 23M
3 Configuring the virtual machine.mp4 38M
4 Installing the tools Flare VM.mp4 27M
5 Files and File Formats.mp4 19M
6 Exercise Identify File Formats.mp4 33M
7 Process Creation.mp4 32M
8 Virtual Memory.mp4 66M
9 Portable Executable PE File Part 1.mp4 73M
10 Portable Executable PE File Part 2.mp4 52M
11 Win32 AP.mp4 63M
12 Intro to Static and Dynamic Analysis.mp4 38M
13 Installing addtional tools bintext.mp4 11M
14 Installing addtional tools graphviz.mp4 23M
15 Lab Static Analysis of Malware Sample 1.mp4 62M
16 Dynamic Analysis Workflow.mp4 41M
17 Lab Dynamic Analysis of Malware Sample 1.mp4 79M
18 Lab Procdot Analysis of Malware Sample 1.mp4 77M
19 Lab Network Analysis of Malware Sample 1.mp4 33M
20 Lab Exercise Intro to Analysis of Malware Sample 2.mp4 14M
21 Lab Static Analysis of Malware Sample 2 Unpacking.mp4 20M
22 Lab Static Analysis of Malware Sample 2 Embedded Strings Analysis.mp4 34M
23 Lab Static Analysis of Malware Sample 2 PE Header and Hash Analysis.mp4 26M
24 Lab Dynamic Analysis of Malware Sample 2 Regshot Analysis.mp4 62M
25 Lab Static Analysis of Malware Sample 2 Procdot Analysis.mp4 53M
26 Lab Static Analysis of Malware Sample 2 Network Analysis.mp4 24M
27 Assembly Language Basics.mp4 25M
28 Intro to Malware Sample 3.mp4 4.0M
29 Decompiling and extraction using exe2aut.mp4 75M
30 Disassembling and Decompiling with Ghidra.mp4 78M
31 Debugging with xdbg.mp4 72M
32 Dumping Memory Using Process Hacker.mp4 34M
33 Intro To Malware Sample 4 TeslaCrypt Ransomware.mp4 11M
34 File and Packer Identification.mp4 32M
35 Debugging and Unpacking with xdbg and Process Hacker.mp4 39M
36 Unpacking Part 2.mp4 69M
37 Analysis with Ghidra.mp4 31M
38 Intro To Malware Sample 5 Simda Trojan.mp4 19M
39 File and Packer Identification.mp4 19M
40 Identifying Abnormal Epilogue.mp4 43M
41 Unpacking the Shellcode.mp4 52M
42 Final Unpacking and Analysis in Ghidra - Final.mp4 30M
Recent Courses
CEHv13
HackTricks - AWS Red Team Expert (ARTE)
Certified Exploit Development Professional [CEDP]
Advance Exploitation Course By Umar Sabil
CompTIA Security+ (SY0-701 & SY0-601) Full Training Guide
ITProTV - LPIC-2 Linux Engineer (202-450)_
OffSec - PEN-210 - Foundational Wireless Network Attacks
OffSec EXP-301
FOR508 Videos 2023
Introduction Windows Malware Development
Red-Teaming-Exploit-Development-with-Assembly-and-C-MSAC
SEC450 Videos 2020
AWS Cloud Red Team Specialist [CARTS]
SEC670 MP3 2025.4
Zero Point Security - Red Team Ops 2025.2
Certified Red Team Analyst [CCRTA] 2022
EC Council - DroneWorkshop
HTB - AI Red Teamer 2025.3 Path
SEC670 Red Teaming Tools - Developing Windows Implants, Shellcode, Command and Control
Maltrak - Threat Hunting In Microsoft Sentinel and Defender
Hybrid Multi-Cloud Red Team Specialist [CHMRTS]
Stealth Cyber Operator [CSCO]
Process Injection Analyst [CPIA]
Red Team Specialist [CRTS V1]
Practical Hardware Hacking
Red Team Infra Dev [CRT-ID]
Purple Team Analyst [CPTA V1]
Assembly 101
EC-Council Certified Cloud Security Engineer (CCSE)
Udemy - Web Security & Bug Bounty Learn Penetration Testing 2025
INE - Advanced Web Application Penetration Testing (New)_
Windows Red Team Lab (CRTE) 2025.2
Mandiant - Malware Analysis 2025
13Cubed - Investigating Linux Devices
Zero Point Security - DevOps for Pentesters 2025.3
Offensive Development w Greg Hatcher & John Stigerwalt
Pluralsight - Windows Server 2022 Administration
BittenTech - TechHacker Ethical Hacking and Cyber Security
Kaspersky - Hunting APTs like a Ninja with YARA
A-Windows_Process_Injection_For_Red-Blue_Team
QURE Academy - Advanced Attacks Against Active Directory
EC-Council - Certified Network Defender v3 2024.11
EC-Council - Cyber Security Technician
PEN-200 - Penetration Testing with Kali Linux Videos
EDRPv3 EC-Council Disaster Recovery Professional
OffSec - PEN-200 2024.11
Practical Analysis with Security Onion
SANS ON DEMAND COURSE
Top 5 Tools & Techniques for Penetration Testing
CVE's for Bug Bounties & Penetration Testing
Creating Batch Scripts For Android
Oreilly - Mastering Cybersecurity with Python - From Basics to Advanced Defense
Recon For Bug Bounties & Penetration Testing
Bug Bounty Hunting and Penetration Testing v2
Bug Bounty Hunting and Penetration Testing v1
Bootcamp de Backend Avanzado_ Microservicios
Sketchup desde Cero para Arquitectos
Creación y consulta de bases de datos con ChatGPT y SQL
Storytelling Audiovisual para redes sociales
Introducción a Frameworks de Frontend con Vue 3"
Trafficker Expert
2. Digital Marketing Course ( English )
Creación de videojuegos
Master en Creación de Videojuegos
Photoshop 2020 para fotógrafos. Conoce el Retoque nivel PRO!
Soporte Técnico a Computadoras en Entornos Corporativos
13 CURSO DE REPARACION DE IMPRESORAS
18. Copywriting como escribir para vender mas
Master en Reparación de iPhone
Crea Aplicaciones Java Web
Curso de creación de bots [CodigoFacilito]
Maestría en CSS3 Flexbox, Grid, SASS, Bootstrap 5
Robótica con Matlab Cinemática directa y Simulación
COMMUNITY AND CONTENT MANAGER
Aprende Android con Ejemplos
Adobe Premiere desde Cero
ELECTRICIDAD
Invertir en Criptomonedas - Blockchain - Trading - DeFi - UDEMY
Angular - De cero a experto
Electrónica desde cero
Creación de videojuegos
Universidad del dropshipping
Cursos PhotoShop
reparacion de ps2
Curso de Linux s4vitar
rofesional en Reparacion de Laptops
Curso Marketing PRO Masterclass - John Dani
Curso de Reparación de Discos Duros y Recuperación de Datos
CURSO WORD, POWERPOINT
EXCEL DE PRINCIPIANTE A EXPERTO
CURSO SOLIDWORKS
Seguridad Informática desde Cero
Master Unreal Engine 4 Para Arquitectura en Español
Aprende.realidad.aumentada.con.ARKit
COMO VENDER POR FB e IG ADS - FELIPE VERGARA
AUTOCAD 2019 DE PRINCIPIANTE A AVANZADO
Curso Word
Curso Adobe Illustrator Sé un experto en ilustración digital
Universidad Python 2021 - POO, Django, Flask y Postgresql