elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
Malicious Document Analysis_2022/ -
Malware Analysis Series_2021/ -
Malware Analyst's Cookbook and DVD/ -
4n0n_do_exposed.pdf 411K
610.1 - Malware Analysis Fundamentals.pdf 31M
A Method for Detecting Obfuscated Calls in Malicious Binaries.pdf 1.3M
AV_Evasion.pdf 433K
Accelerated_Windows_Malware_Analysis_with_Memory_Dumps.pdf 7.8M
Administración de Botnets.pdf 861K
Advanced Malware Analysis.pdf 21M
A la caza del analista.pdf 506K
Análisis Forense De Computadoras - Policia Federal Argentina.pdf 3.0M
Análisis Forense de Sistemas.pdf 792K
Análisis forense con autopsy.pdf 142K
Análisis forenses a tarjetas SIM.pdf 220K
Analisis de malware, metodologia.pdf 4.2M
Analisis de malware cuenca.pdf 2.9M
Analizando Malware Basico.pdf 270K
Analysis Report for Windows Loader.exe.pdf 275K
Analyzing the Effectiveness of Passive Correlation Attacks on the.pdf 452K
Android Malware And Analysis (2015 Ken Dunham Et Al; Crc Press).pdf 4.3M
Anti-Unpacker Tricks 1 .pdf 53K
Anti-Virus Evasion Techniques and countermeasures.pdf 433K
Aplicación de Metodología de Malware para el Análisis de la amenaza avanzada persistente.pdf 4.2M
Attacks on Virtual Machine Emulators.pdf 142K
BH-JP-06-Bilby-up.pdf 5.8M
BH-US-06-Rutkowska.pdf 5.1M
BHUSA09-.NET Framework Rootkits – Backdoors Inside Your Framework.pdf 375K
BHUSA09-Advanced Mac OS X Rootkits-PAPER.pdf 128K
BHUSA09-Anti-Forensics The Rootkit Connection.pdf 596K
BHUSA09-Kortchinsky-Cloudburst.pdf 667K
BiosRootkit BH-Fed-06-Heasman.pdf 928K
BlackHat_DC_2011_Mandt_kernelpool-wp.pdf 1.9M
BlackHat_EU_2011_Chiriac_Rootkit_detection-WP.pdf 195K
Bluepilling the Xen part3.pdf 2.6M
Bootkit_analysis_trend.pdf 961K
BotHunter-BotHunter Detecting Malware Infection Through IDS-Driven Dialog Correlation.pdf 266K
Bypass-AV.pdf 54K
Bypassing Anti-Virus Scanners.pdf 1.0M
Clase 096 - Lab de malware III - Analisis de infeccion del Novalite.pdf 1.3M
Compressing the Imports Section.pdf 78K
Computer Viruses And Malware.pdf 11M
Computer Viruses For Dummies.pdf 2.6M
Creating an Anti-AV scanner Article.pdf 330K
CuckooSandbox.pdf 778K
DeepSec_2009_Kleissner_Eisendle_-_Stoned_Bootkit.pdf 1.3M
Depurando con Olly.pdf 185K
Descifrando virus vbs.pdf 678K
Desinfeccion por rogue y rootkit.pdf 1.8M
Detección y eliminación de Malware.pdf 1.0M
Detectando malware desconocido [ESET].pdf 178K
Detecting-Malice.pdf 5.7M
Detection of Intrusions and Malware, and Vulnerability Assessment_ 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings ( PDFDrive.com ).pdf 27M
Disk-Level Behavioral Malware Detection.pdf 1.1M
ESET-lojax.pdf 2.2M
Effectiveness of AVs in Detecting Web Application Backdoors.pdf 438K
Elsevier Syngress - How to Defeat Advanced Malware - New Tools - Dalziel H 2015 - 978-0-12-802731-8.pdf 4.3M
Estudio_completo_de_virus_simples.pdf 143K
Forensic Analysis Of Microsoft Windows Recycle Bin Records.pdf 2.2M
Graham & Dodd - Security Analysis (6th ed).pdf 2.8M
HACKING EXPOSED COMPUTER FORENSICS.pdf 12M
HBGary Malware Analysis Report.pdf 946K
Hack_X_Crack_Malware_parte1.pdf 2.5M
Hacking Exposed Malware & Rootkits - McGrawHill - 2010.pdf 10M
IDA Pro Quick Reference Sheet.pdf 71K
IH11-Stegobot.pdf 367K
Ind_malw_cercando_firmas.pdf 480K
InfoForenseWindows.pdf 97K
Informatica - Demostración De Hacking De Un Honeypot Y Analisis Forense.pdf 1.3M
Ingeniería inversa de troyanos I.pdf 147K
Ingeniería inversa de troyanos II.pdf 173K
Ingeniería inversa de troyanos III.pdf 324K
Introduccion-a-la-informatica-forense-en-Windows.pdf 601K
Introduction to Computer Virus and Malware.pdf 1.1M
Intrusion Detection Systems with Snort.pdf 2.5M
IsGameOver - Joanna Rutkowska.pdf 2.2M
Learning Malware Analysis_ Explore the concepts, tools, and techniques to analyze and investigate Windows malware ( PDFDrive.com ).pdf 17M
MAzarD apihooking.pdf 120K
Malicious Code Detection Technologies.pdf 414K
Malware-detection-advances-in-information-security.pdf 16M
Malware.Fighting.Malicious.Code.pdf 11M
Malware Incident Prevention and Handling.pdf 2.9M
Malware Incident Response.PDF 25M
Malware Reverse Engineering part1 of 2. Static analysis.pdf 1.3M
Malware_Magazine_1.pdf 5.5M
Malwares+#1(1).pdf 683K
Malwares+#1.pdf 683K
Managed Code Rootkits Hooking Into Runtime Environments.pdf 5.6M
MazarD inyecciones.pdf 176K
NcN_2012_Analisis_de_Malware_para_Administradores_de_Sistema-Juan_Garrido.pdf 44K
No.Starch.Press.Practical.Malware.Analysis.Feb.2012.eBook-NGR.pdf 9.4M
No Starch Press - Practical Malware Analysis - The Hands-On Guide to Dissecting Malicious Software - Feb 2012.pdf 9.4M
PDF malware analysis.pdf 190K
Paper_III_Malwares.pdf 526K
Parte VIII - Códigos Maliciosos (Malware).pdf 235K
Pequeño user mode rootkit sin DLL.txt 5.9K
Practical_Malware_Analysis.pdf 9.4M
Presentation HAR.pdf 1.1M
ProcessDumpAnalyses_v1.0_20060722.pdf 265K
Que.Absolute.Beginners.Guide.to.Security.Spam.Spyware.and.Viruses.Nov.2005.chm 16M
RAIDE_RootkitAnalisysIdentificationElimination.pdf 190K
RN_SpyEye-Kicked-to-Curb_Bodmer.pdf 872K
RSA-2015-Mobile-Malware-MBS-W01-Lever.pptx 10M
ReallyUsefulEbooks.com_159749156X_Windows Forensic Analysis DVD Toolkit.pdf 4.3M
Recogiendo datos para Analisis Forense de sistemas Windows.pdf 210K
Reverse Engineering.pdf 1.1M
Reverse_Engineering_Smashing_the_Signature.pdf 924K
Reversing_malware.pdf 776K
Revese Engineering And Memory Patching.pdf 198K
Ring -3 Rootkits.pdf 4.5M
Robust Static Analysis of.pdf 1.6M
Rootkit Detection Framework for UEFI.rar 31M
Rootkits - Subverting the Windows Kernel.chm 1.6M
Rootkits_-_Ring_0f_Fire_by_FlUxIuS(FR).pdf 901K
Script_sysinspector.pdf 844K
Security Challenges in Virtualized Enviroments.pdf 2.9M
Seguridad%20en%20las%20Comunicaciones%20y%20acceso%20remoto%20en%20Windows.pdf 133K
Seguridad%20y%20confidencialidad%20de%20la%20informacion.pdf 133K
Seguridad - Analisis forense de sistemas Linux.pdf 1.2M
Seguridad En Redes Analisis Forense-Proyecto Fin Carrera.pdf 717K
Servicios online para analizar el pc, páginas web y archivos.txt 5.8K
Session_1_Detection _and_Removal_of_Malwares.pdf 19M
Shmoocon2011_SmartphoneBotnets_GeorgiaW.pdf 139K
Singh A. Identifying Malicious Code Through Reverse Engineering (Springer, 2009)(0387098240).pdf 6.2M
Sistema_de_ofuscacion_de_malware_para_el_evasion_de_NIDS.pdf 3.7M
Software Attacks on Intel VT-d.pdf 688K
Solución 2º reto elhacker.pdf 468K
Sony, Rootkits y Gestión de Derechos Digitales ido demasiado lejos.docx 523K
Stuxnet_Under_the_Microscope.pdf 2.8M
Subverting the Xen part1.pdf 858K
Syngress - Botnets - The Killer Web App.pdf 7.0M
Sys_Hack.pdf 128K
Syspeace manual.pdf 1.4M
T-ZINE_BY_ANTRAX1.rar 525M
T-ZINE_BY_ANTRAX2.rar 365M
THE ART OF COMPUTER VIRUS RESEARCH AND DEFENSE - Mendes Manuel J., Suomi Reima, Passos Carlos - 2004 - Kluwer Academic Publishers -.pdf 16M
TT-Joanna-Rutkowska-HITB-Virginity-Verifier.ppt 528K
Taller- Encriptando Malware a Mano.pdf 400K
Taller_Malwares_IV.pdf 1.3M
Tecnicas_Deteccion_Analisis_Zapata_2015.pdf 3.0M
Test%20de%20Intrusion_ES.pdf 44K
The Art of Bootkit Development.pdf 1.6M
The Definitive Guide to Controlling Malware, Spyware, Phishing, and Spam.pdf 2.9M
The Rise of MBR Rootkits & Bootkits in the Wild.pdf 325K
The Rootkit Arsenal, Escape and Evasion in the Dark Corners of the System 2nd - Jones & Bartlett Publishers - 2013.pdf 68M
The Rootkit Arsenal.pdf 81M
The art of stealth scanning.pdf 334K
Tipos de virus.txt 2.8K
Tipos de virus y sus acciones.pdf 125K
Tricks.pdf 154K
Troyano_policia.pdf 1.6M
Trustwave-Security-Alert-ATM-Malware-Analysis-Briefing.pdf 69K
Trustwave-SpiderLabs-BlackHatUSA2010-Malware-Freakshow-2010-Whitepaper.pdf 1.0M
Trustwave-SpiderLabs-Malware-Briefing-Malicious-PDF-Public.pdf 2.9M
TrustwaveSecurityAlert_TrackDataParsingAug2008.pdf 102K
Trustwave_SpiderLabs_PhysPenTest.pdf 216K
UC0x07-Windows%20Rootkits%20-%20Diseno%20y%20Estrategia.pdf 1.1M
USC-Forense.pdf 672K
UnderstandingStealthMalware-program-1.4.pdf 172K
Understanding the PEB Loader Data Structure.pdf 138K
Unpacking Malware using IDA Pro Extensions.pdf 170K
Urko_Zurutuza_-_maquinas_trampa.conoce_a_tu_enemigo.pdf 1.4M
Userland Hooking in Windows.pdf 4.8M
Virt-ICE Next-generation Debugger for Malware Analysis.PDF 150K
Virus en papelera de reciclaje.txt 4.5K
WASA - Análisis estático de malware.pdf 1.8M
WP_Botnet_vs_Malware.pdf 669K
WP_SerialVariantEvasionTactics.pdf 2.7M
Wiley,.Reversing.Secrets.of.Reverse.Engineering.(2005).DDU.LotB.pdf 8.4M
Wiley The Art Of Memory Forensics, Detecting Malware And Threats In Windows Linux And Mac Memory (2014).pdf 27M
WinFE.pdf 1.4M
Windows.Forensic.Analysis.DVD.Toolkit.2007.pdf 4.3M
Windows Malware Analysis Essentials_ Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set ( PDFDrive.com ).pdf 21M
World-Intrusion-.pdf 6.6M
Writing_Security_Tools_And_Exploits.pdf 11M
[2007] - Perl Scripting for Windows Security Live Response, Forensic Analysis, and Monitoring - [Elsevier Inc] - [159749173X].pdf 5.5M
[EBOOK] Sotware Protection and it's annihilation.pdf 820K
[eBook] Analisis forense de sistemas GNU Linux y Unix.pdf 149K
acns_social_botnet_2010.pdf 494K
analysis-attack-malware-es.pdf 231K
anti-evasion.pdf 619K
asia-17-Matrosov-The-UEFI-Firmware-Rootkits-Myths-And-Reality.pdf 30M
bh-eu-06-Rutkowska.pdf 350K
bh-jp-05-sparks-butler.pdf 557K
crossview_detection_thoughts.pdf 99K
cuckoo.pdf 523K
defeating_data_execution_prevention_and_aslr_in_windows_xp_sp3.pdf 1.2M
hbgary_seven_things.pdf 710K
http___www.damballa.com_downloads_r_pubs_WP_Botnet_Detection_for_CSPs.pdf 806K
imperfect-forward-secrecy.pdf 1.3M
indiceanalisisforense.pdf 275K
inside-carberp-botnet-es.pdf 2.3M
intro-reverseeng.pdf 839K
intro-to-malware-analysis.pdf 3.7M
jmieres-analizando-malware.pdf 133K
kernel-land-rootkits.pdf 122K
labmalware.pdf 1.2M
malware-analysis-introduction-2103.pdf 1.0M
malware-cheat-sheet.pdf 60K
malware-removal.pdf 429K
malware-reverse-part-1.pdf 1.3M
malware-taxonomy.pdf 344K
malware_analysis1.pdf 23K
malwares.pdf 533K
milf_ndh2010.pdf 1.0M
myloader-oficla-analysis-es.pdf 1.3M
pek-analysis-es.pdf 605K
practica.pdf 112K
retoforense.pdf 951K
reverse-malware.pdf 351K
rootkit_for_the_masses.pdf 1.9M
skywiper.pdf 645K
softwareexploitationhbgary.pdf 1.0M
static Disassembly and Code Analysis.pdf 1.3M
teamspy.pdf 1.7M
the_ida_pro_book.pdf 37M
unpacking_malware_using_ida_pro_extensions.pdf 170K
vb2011-bureau.pdf 677K