elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
Malware Analyst's Cookbook and DVD/ -
Malware Analysis Series_2021/ -
Malicious Document Analysis_2022/ -
vb2011-bureau.pdf 677K
unpacking_malware_using_ida_pro_extensions.pdf 170K
the_ida_pro_book.pdf 37M
teamspy.pdf 1.7M
static Disassembly and Code Analysis.pdf 1.3M
softwareexploitationhbgary.pdf 1.0M
skywiper.pdf 645K
rootkit_for_the_masses.pdf 1.9M
reverse-malware.pdf 351K
retoforense.pdf 951K
practica.pdf 112K
pek-analysis-es.pdf 605K
myloader-oficla-analysis-es.pdf 1.3M
milf_ndh2010.pdf 1.0M
malwares.pdf 533K
malware_analysis1.pdf 23K
malware-taxonomy.pdf 344K
malware-reverse-part-1.pdf 1.3M
malware-removal.pdf 429K
malware-cheat-sheet.pdf 60K
malware-analysis-introduction-2103.pdf 1.0M
labmalware.pdf 1.2M
kernel-land-rootkits.pdf 122K
jmieres-analizando-malware.pdf 133K
intro-to-malware-analysis.pdf 3.7M
intro-reverseeng.pdf 839K
inside-carberp-botnet-es.pdf 2.3M
indiceanalisisforense.pdf 275K
imperfect-forward-secrecy.pdf 1.3M
http___www.damballa.com_downloads_r_pubs_WP_Botnet_Detection_for_CSPs.pdf 806K
hbgary_seven_things.pdf 710K
defeating_data_execution_prevention_and_aslr_in_windows_xp_sp3.pdf 1.2M
cuckoo.pdf 523K
crossview_detection_thoughts.pdf 99K
bh-jp-05-sparks-butler.pdf 557K
bh-eu-06-Rutkowska.pdf 350K
asia-17-Matrosov-The-UEFI-Firmware-Rootkits-Myths-And-Reality.pdf 30M
anti-evasion.pdf 619K
analysis-attack-malware-es.pdf 231K
acns_social_botnet_2010.pdf 494K
[eBook] Analisis forense de sistemas GNU Linux y Unix.pdf 149K
[EBOOK] Sotware Protection and it's annihilation.pdf 820K
[2007] - Perl Scripting for Windows Security Live Response, Forensic Analysis, and Monitoring - [Elsevier Inc] - [159749173X].pdf 5.5M
Writing_Security_Tools_And_Exploits.pdf 11M
World-Intrusion-.pdf 6.6M
Windows Malware Analysis Essentials_ Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set ( PDFDrive.com ).pdf 21M
Windows.Forensic.Analysis.DVD.Toolkit.2007.pdf 4.3M
WinFE.pdf 1.4M
Wiley The Art Of Memory Forensics, Detecting Malware And Threats In Windows Linux And Mac Memory (2014).pdf 27M
Wiley,.Reversing.Secrets.of.Reverse.Engineering.(2005).DDU.LotB.pdf 8.4M
WP_SerialVariantEvasionTactics.pdf 2.7M
WP_Botnet_vs_Malware.pdf 669K
WASA - Análisis estático de malware.pdf 1.8M
Virus en papelera de reciclaje.txt 4.5K
Virt-ICE Next-generation Debugger for Malware Analysis.PDF 150K
Userland Hooking in Windows.pdf 4.8M
Urko_Zurutuza_-_maquinas_trampa.conoce_a_tu_enemigo.pdf 1.4M
Unpacking Malware using IDA Pro Extensions.pdf 170K
Understanding the PEB Loader Data Structure.pdf 138K
UnderstandingStealthMalware-program-1.4.pdf 172K
USC-Forense.pdf 672K
UC0x07-Windows%20Rootkits%20-%20Diseno%20y%20Estrategia.pdf 1.1M
Trustwave_SpiderLabs_PhysPenTest.pdf 216K
TrustwaveSecurityAlert_TrackDataParsingAug2008.pdf 102K
Trustwave-SpiderLabs-Malware-Briefing-Malicious-PDF-Public.pdf 2.9M
Trustwave-SpiderLabs-BlackHatUSA2010-Malware-Freakshow-2010-Whitepaper.pdf 1.0M
Trustwave-Security-Alert-ATM-Malware-Analysis-Briefing.pdf 69K
Troyano_policia.pdf 1.6M
Tricks.pdf 154K
Tipos de virus y sus acciones.pdf 125K
Tipos de virus.txt 2.8K
The art of stealth scanning.pdf 334K
The Rootkit Arsenal.pdf 81M
The Rootkit Arsenal, Escape and Evasion in the Dark Corners of the System 2nd - Jones & Bartlett Publishers - 2013.pdf 68M
The Rise of MBR Rootkits & Bootkits in the Wild.pdf 325K
The Definitive Guide to Controlling Malware, Spyware, Phishing, and Spam.pdf 2.9M
The Art of Bootkit Development.pdf 1.6M
Test%20de%20Intrusion_ES.pdf 44K
Tecnicas_Deteccion_Analisis_Zapata_2015.pdf 3.0M
Taller_Malwares_IV.pdf 1.3M
Taller- Encriptando Malware a Mano.pdf 400K
TT-Joanna-Rutkowska-HITB-Virginity-Verifier.ppt 528K
THE ART OF COMPUTER VIRUS RESEARCH AND DEFENSE - Mendes Manuel J., Suomi Reima, Passos Carlos - 2004 - Kluwer Academic Publishers -.pdf 16M
T-ZINE_BY_ANTRAX2.rar 365M
T-ZINE_BY_ANTRAX1.rar 525M
Syspeace manual.pdf 1.4M
Sys_Hack.pdf 128K
Syngress - Botnets - The Killer Web App.pdf 7.0M
Subverting the Xen part1.pdf 858K
Stuxnet_Under_the_Microscope.pdf 2.8M
Sony, Rootkits y Gestión de Derechos Digitales ido demasiado lejos.docx 523K
Solución 2º reto elhacker.pdf 468K
Software Attacks on Intel VT-d.pdf 688K
Sistema_de_ofuscacion_de_malware_para_el_evasion_de_NIDS.pdf 3.7M
Singh A. Identifying Malicious Code Through Reverse Engineering (Springer, 2009)(0387098240).pdf 6.2M
Shmoocon2011_SmartphoneBotnets_GeorgiaW.pdf 139K
Session_1_Detection _and_Removal_of_Malwares.pdf 19M
Servicios online para analizar el pc, páginas web y archivos.txt 5.8K
Seguridad En Redes Analisis Forense-Proyecto Fin Carrera.pdf 717K
Seguridad - Analisis forense de sistemas Linux.pdf 1.2M
Seguridad%20y%20confidencialidad%20de%20la%20informacion.pdf 133K
Seguridad%20en%20las%20Comunicaciones%20y%20acceso%20remoto%20en%20Windows.pdf 133K
Security Challenges in Virtualized Enviroments.pdf 2.9M
Script_sysinspector.pdf 844K
Rootkits_-_Ring_0f_Fire_by_FlUxIuS(FR).pdf 901K
Rootkits - Subverting the Windows Kernel.chm 1.6M
Rootkit Detection Framework for UEFI.rar 31M
Robust Static Analysis of.pdf 1.6M
Ring -3 Rootkits.pdf 4.5M
Revese Engineering And Memory Patching.pdf 198K
Reversing_malware.pdf 776K
Reverse_Engineering_Smashing_the_Signature.pdf 924K
Reverse Engineering.pdf 1.1M
Recogiendo datos para Analisis Forense de sistemas Windows.pdf 210K
ReallyUsefulEbooks.com_159749156X_Windows Forensic Analysis DVD Toolkit.pdf 4.3M
RSA-2015-Mobile-Malware-MBS-W01-Lever.pptx 10M
RN_SpyEye-Kicked-to-Curb_Bodmer.pdf 872K
RAIDE_RootkitAnalisysIdentificationElimination.pdf 190K
Que.Absolute.Beginners.Guide.to.Security.Spam.Spyware.and.Viruses.Nov.2005.chm 16M
ProcessDumpAnalyses_v1.0_20060722.pdf 265K
Presentation HAR.pdf 1.1M
Practical_Malware_Analysis.pdf 9.4M
Pequeño user mode rootkit sin DLL.txt 5.9K
Parte VIII - Códigos Maliciosos (Malware).pdf 235K
Paper_III_Malwares.pdf 526K
PDF malware analysis.pdf 190K
No Starch Press - Practical Malware Analysis - The Hands-On Guide to Dissecting Malicious Software - Feb 2012.pdf 9.4M
No.Starch.Press.Practical.Malware.Analysis.Feb.2012.eBook-NGR.pdf 9.4M
NcN_2012_Analisis_de_Malware_para_Administradores_de_Sistema-Juan_Garrido.pdf 44K
MazarD inyecciones.pdf 176K
Managed Code Rootkits Hooking Into Runtime Environments.pdf 5.6M
Malwares+#1.pdf 683K
Malwares+#1(1).pdf 683K
Malware_Magazine_1.pdf 5.5M
Malware Reverse Engineering part1 of 2. Static analysis.pdf 1.3M
Malware Incident Response.PDF 25M
Malware Incident Prevention and Handling.pdf 2.9M
Malware.Fighting.Malicious.Code.pdf 11M
Malware-detection-advances-in-information-security.pdf 16M
Malicious Code Detection Technologies.pdf 414K
MAzarD apihooking.pdf 120K
Learning Malware Analysis_ Explore the concepts, tools, and techniques to analyze and investigate Windows malware ( PDFDrive.com ).pdf 17M
IsGameOver - Joanna Rutkowska.pdf 2.2M
Intrusion Detection Systems with Snort.pdf 2.5M
Introduction to Computer Virus and Malware.pdf 1.1M
Introduccion-a-la-informatica-forense-en-Windows.pdf 601K
Ingeniería inversa de troyanos III.pdf 324K
Ingeniería inversa de troyanos II.pdf 173K
Ingeniería inversa de troyanos I.pdf 147K
Informatica - Demostración De Hacking De Un Honeypot Y Analisis Forense.pdf 1.3M
InfoForenseWindows.pdf 97K
Ind_malw_cercando_firmas.pdf 480K
IH11-Stegobot.pdf 367K
IDA Pro Quick Reference Sheet.pdf 71K
Hacking Exposed Malware & Rootkits - McGrawHill - 2010.pdf 10M
Hack_X_Crack_Malware_parte1.pdf 2.5M
HBGary Malware Analysis Report.pdf 946K
HACKING EXPOSED COMPUTER FORENSICS.pdf 12M
Graham & Dodd - Security Analysis (6th ed).pdf 2.8M
Forensic Analysis Of Microsoft Windows Recycle Bin Records.pdf 2.2M
Estudio_completo_de_virus_simples.pdf 143K
Elsevier Syngress - How to Defeat Advanced Malware - New Tools - Dalziel H 2015 - 978-0-12-802731-8.pdf 4.3M
Effectiveness of AVs in Detecting Web Application Backdoors.pdf 438K
ESET-lojax.pdf 2.2M
Disk-Level Behavioral Malware Detection.pdf 1.1M
Detection of Intrusions and Malware, and Vulnerability Assessment_ 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings ( PDFDrive.com ).pdf 27M
Detecting-Malice.pdf 5.7M
Detectando malware desconocido [ESET].pdf 178K
Detección y eliminación de Malware.pdf 1.0M
Desinfeccion por rogue y rootkit.pdf 1.8M
Descifrando virus vbs.pdf 678K
Depurando con Olly.pdf 185K
DeepSec_2009_Kleissner_Eisendle_-_Stoned_Bootkit.pdf 1.3M
CuckooSandbox.pdf 778K
Creating an Anti-AV scanner Article.pdf 330K
Computer Viruses For Dummies.pdf 2.6M
Computer Viruses And Malware.pdf 11M
Compressing the Imports Section.pdf 78K
Clase 096 - Lab de malware III - Analisis de infeccion del Novalite.pdf 1.3M
Bypassing Anti-Virus Scanners.pdf 1.0M
Bypass-AV.pdf 54K
BotHunter-BotHunter Detecting Malware Infection Through IDS-Driven Dialog Correlation.pdf 266K
Bootkit_analysis_trend.pdf 961K
Bluepilling the Xen part3.pdf 2.6M
BlackHat_EU_2011_Chiriac_Rootkit_detection-WP.pdf 195K
BlackHat_DC_2011_Mandt_kernelpool-wp.pdf 1.9M
BiosRootkit BH-Fed-06-Heasman.pdf 928K
BHUSA09-Kortchinsky-Cloudburst.pdf 667K
BHUSA09-Anti-Forensics The Rootkit Connection.pdf 596K
BHUSA09-Advanced Mac OS X Rootkits-PAPER.pdf 128K
BHUSA09-.NET Framework Rootkits – Backdoors Inside Your Framework.pdf 375K
BH-US-06-Rutkowska.pdf 5.1M
BH-JP-06-Bilby-up.pdf 5.8M
Attacks on Virtual Machine Emulators.pdf 142K
Aplicación de Metodología de Malware para el Análisis de la amenaza avanzada persistente.pdf 4.2M
Anti-Virus Evasion Techniques and countermeasures.pdf 433K
Anti-Unpacker Tricks 1 .pdf 53K
Android Malware And Analysis (2015 Ken Dunham Et Al; Crc Press).pdf 4.3M
Analyzing the Effectiveness of Passive Correlation Attacks on the.pdf 452K
Analysis Report for Windows Loader.exe.pdf 275K
Analizando Malware Basico.pdf 270K
Analisis de malware cuenca.pdf 2.9M
Analisis de malware, metodologia.pdf 4.2M
Análisis forenses a tarjetas SIM.pdf 220K
Análisis forense con autopsy.pdf 142K
Análisis Forense de Sistemas.pdf 792K
Análisis Forense De Computadoras - Policia Federal Argentina.pdf 3.0M
A la caza del analista.pdf 506K
Advanced Malware Analysis.pdf 21M
Administración de Botnets.pdf 861K
Accelerated_Windows_Malware_Analysis_with_Memory_Dumps.pdf 7.8M
AV_Evasion.pdf 433K
A Method for Detecting Obfuscated Calls in Malicious Binaries.pdf 1.3M
610.1 - Malware Analysis Fundamentals.pdf 31M
4n0n_do_exposed.pdf 411K