elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
Malware Analyst's Cookbook and DVD/ -
Malware Analysis Series_2021/ -
Malicious Document Analysis_2022/ -
T-ZINE_BY_ANTRAX1.rar 525M
T-ZINE_BY_ANTRAX2.rar 365M
The Rootkit Arsenal.pdf 81M
The Rootkit Arsenal, Escape and Evasion in the Dark Corners of the System 2nd - Jones & Bartlett Publishers - 2013.pdf 68M
the_ida_pro_book.pdf 37M
610.1 - Malware Analysis Fundamentals.pdf 31M
Rootkit Detection Framework for UEFI.rar 31M
asia-17-Matrosov-The-UEFI-Firmware-Rootkits-Myths-And-Reality.pdf 30M
Detection of Intrusions and Malware, and Vulnerability Assessment_ 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings ( PDFDrive.com ).pdf 27M
Wiley The Art Of Memory Forensics, Detecting Malware And Threats In Windows Linux And Mac Memory (2014).pdf 27M
Malware Incident Response.PDF 25M
Advanced Malware Analysis.pdf 21M
Windows Malware Analysis Essentials_ Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set ( PDFDrive.com ).pdf 21M
Session_1_Detection _and_Removal_of_Malwares.pdf 19M
Learning Malware Analysis_ Explore the concepts, tools, and techniques to analyze and investigate Windows malware ( PDFDrive.com ).pdf 17M
Malware-detection-advances-in-information-security.pdf 16M
THE ART OF COMPUTER VIRUS RESEARCH AND DEFENSE - Mendes Manuel J., Suomi Reima, Passos Carlos - 2004 - Kluwer Academic Publishers -.pdf 16M
Que.Absolute.Beginners.Guide.to.Security.Spam.Spyware.and.Viruses.Nov.2005.chm 16M
HACKING EXPOSED COMPUTER FORENSICS.pdf 12M
Malware.Fighting.Malicious.Code.pdf 11M
Writing_Security_Tools_And_Exploits.pdf 11M
Computer Viruses And Malware.pdf 11M
Hacking Exposed Malware & Rootkits - McGrawHill - 2010.pdf 10M
RSA-2015-Mobile-Malware-MBS-W01-Lever.pptx 10M
Practical_Malware_Analysis.pdf 9.4M
No Starch Press - Practical Malware Analysis - The Hands-On Guide to Dissecting Malicious Software - Feb 2012.pdf 9.4M
No.Starch.Press.Practical.Malware.Analysis.Feb.2012.eBook-NGR.pdf 9.4M
Wiley,.Reversing.Secrets.of.Reverse.Engineering.(2005).DDU.LotB.pdf 8.4M
Accelerated_Windows_Malware_Analysis_with_Memory_Dumps.pdf 7.8M
Syngress - Botnets - The Killer Web App.pdf 7.0M
World-Intrusion-.pdf 6.6M
Singh A. Identifying Malicious Code Through Reverse Engineering (Springer, 2009)(0387098240).pdf 6.2M
BH-JP-06-Bilby-up.pdf 5.8M
Detecting-Malice.pdf 5.7M
Managed Code Rootkits Hooking Into Runtime Environments.pdf 5.6M
[2007] - Perl Scripting for Windows Security Live Response, Forensic Analysis, and Monitoring - [Elsevier Inc] - [159749173X].pdf 5.5M
Malware_Magazine_1.pdf 5.5M
BH-US-06-Rutkowska.pdf 5.1M
Userland Hooking in Windows.pdf 4.8M
Ring -3 Rootkits.pdf 4.5M
Elsevier Syngress - How to Defeat Advanced Malware - New Tools - Dalziel H 2015 - 978-0-12-802731-8.pdf 4.3M
Windows.Forensic.Analysis.DVD.Toolkit.2007.pdf 4.3M
ReallyUsefulEbooks.com_159749156X_Windows Forensic Analysis DVD Toolkit.pdf 4.3M
Android Malware And Analysis (2015 Ken Dunham Et Al; Crc Press).pdf 4.3M
Aplicación de Metodología de Malware para el Análisis de la amenaza avanzada persistente.pdf 4.2M
Analisis de malware, metodologia.pdf 4.2M
Sistema_de_ofuscacion_de_malware_para_el_evasion_de_NIDS.pdf 3.7M
intro-to-malware-analysis.pdf 3.7M
Tecnicas_Deteccion_Analisis_Zapata_2015.pdf 3.0M
Análisis Forense De Computadoras - Policia Federal Argentina.pdf 3.0M
The Definitive Guide to Controlling Malware, Spyware, Phishing, and Spam.pdf 2.9M
Security Challenges in Virtualized Enviroments.pdf 2.9M
Trustwave-SpiderLabs-Malware-Briefing-Malicious-PDF-Public.pdf 2.9M
Analisis de malware cuenca.pdf 2.9M
Malware Incident Prevention and Handling.pdf 2.9M
Graham & Dodd - Security Analysis (6th ed).pdf 2.8M
Stuxnet_Under_the_Microscope.pdf 2.8M
WP_SerialVariantEvasionTactics.pdf 2.7M
Computer Viruses For Dummies.pdf 2.6M
Bluepilling the Xen part3.pdf 2.6M
Intrusion Detection Systems with Snort.pdf 2.5M
Hack_X_Crack_Malware_parte1.pdf 2.5M
inside-carberp-botnet-es.pdf 2.3M
Forensic Analysis Of Microsoft Windows Recycle Bin Records.pdf 2.2M
ESET-lojax.pdf 2.2M
IsGameOver - Joanna Rutkowska.pdf 2.2M
BlackHat_DC_2011_Mandt_kernelpool-wp.pdf 1.9M
rootkit_for_the_masses.pdf 1.9M
Desinfeccion por rogue y rootkit.pdf 1.8M
WASA - Análisis estático de malware.pdf 1.8M
teamspy.pdf 1.7M
The Art of Bootkit Development.pdf 1.6M
Rootkits - Subverting the Windows Kernel.chm 1.6M
Robust Static Analysis of.pdf 1.6M
Troyano_policia.pdf 1.6M
WinFE.pdf 1.4M
Syspeace manual.pdf 1.4M
Urko_Zurutuza_-_maquinas_trampa.conoce_a_tu_enemigo.pdf 1.4M
Clase 096 - Lab de malware III - Analisis de infeccion del Novalite.pdf 1.3M
static Disassembly and Code Analysis.pdf 1.3M
Taller_Malwares_IV.pdf 1.3M
myloader-oficla-analysis-es.pdf 1.3M
A Method for Detecting Obfuscated Calls in Malicious Binaries.pdf 1.3M
DeepSec_2009_Kleissner_Eisendle_-_Stoned_Bootkit.pdf 1.3M
malware-reverse-part-1.pdf 1.3M
Malware Reverse Engineering part1 of 2. Static analysis.pdf 1.3M
imperfect-forward-secrecy.pdf 1.3M
Informatica - Demostración De Hacking De Un Honeypot Y Analisis Forense.pdf 1.3M
defeating_data_execution_prevention_and_aslr_in_windows_xp_sp3.pdf 1.2M
labmalware.pdf 1.2M
Seguridad - Analisis forense de sistemas Linux.pdf 1.2M
Presentation HAR.pdf 1.1M
Introduction to Computer Virus and Malware.pdf 1.1M
Reverse Engineering.pdf 1.1M
Disk-Level Behavioral Malware Detection.pdf 1.1M
UC0x07-Windows%20Rootkits%20-%20Diseno%20y%20Estrategia.pdf 1.1M
Trustwave-SpiderLabs-BlackHatUSA2010-Malware-Freakshow-2010-Whitepaper.pdf 1.0M
milf_ndh2010.pdf 1.0M
Detección y eliminación de Malware.pdf 1.0M
Bypassing Anti-Virus Scanners.pdf 1.0M
malware-analysis-introduction-2103.pdf 1.0M
softwareexploitationhbgary.pdf 1.0M
Bootkit_analysis_trend.pdf 961K
retoforense.pdf 951K
HBGary Malware Analysis Report.pdf 946K
BiosRootkit BH-Fed-06-Heasman.pdf 928K
Reverse_Engineering_Smashing_the_Signature.pdf 924K
Rootkits_-_Ring_0f_Fire_by_FlUxIuS(FR).pdf 901K
RN_SpyEye-Kicked-to-Curb_Bodmer.pdf 872K
Administración de Botnets.pdf 861K
Subverting the Xen part1.pdf 858K
Script_sysinspector.pdf 844K
intro-reverseeng.pdf 839K
[EBOOK] Sotware Protection and it's annihilation.pdf 820K
http___www.damballa.com_downloads_r_pubs_WP_Botnet_Detection_for_CSPs.pdf 806K
Análisis Forense de Sistemas.pdf 792K
CuckooSandbox.pdf 778K
Reversing_malware.pdf 776K
Seguridad En Redes Analisis Forense-Proyecto Fin Carrera.pdf 717K
hbgary_seven_things.pdf 710K
Software Attacks on Intel VT-d.pdf 688K
Malwares+#1.pdf 683K
Malwares+#1(1).pdf 683K
Descifrando virus vbs.pdf 678K
vb2011-bureau.pdf 677K
USC-Forense.pdf 672K
WP_Botnet_vs_Malware.pdf 669K
BHUSA09-Kortchinsky-Cloudburst.pdf 667K
skywiper.pdf 645K
anti-evasion.pdf 619K
pek-analysis-es.pdf 605K
Introduccion-a-la-informatica-forense-en-Windows.pdf 601K
BHUSA09-Anti-Forensics The Rootkit Connection.pdf 596K
bh-jp-05-sparks-butler.pdf 557K
malwares.pdf 533K
TT-Joanna-Rutkowska-HITB-Virginity-Verifier.ppt 528K
Paper_III_Malwares.pdf 526K
Sony, Rootkits y Gestión de Derechos Digitales ido demasiado lejos.docx 523K
cuckoo.pdf 523K
A la caza del analista.pdf 506K
acns_social_botnet_2010.pdf 494K
Ind_malw_cercando_firmas.pdf 480K
Solución 2º reto elhacker.pdf 468K
Analyzing the Effectiveness of Passive Correlation Attacks on the.pdf 452K
Effectiveness of AVs in Detecting Web Application Backdoors.pdf 438K
Anti-Virus Evasion Techniques and countermeasures.pdf 433K
AV_Evasion.pdf 433K
malware-removal.pdf 429K
Malicious Code Detection Technologies.pdf 414K
4n0n_do_exposed.pdf 411K
Taller- Encriptando Malware a Mano.pdf 400K
BHUSA09-.NET Framework Rootkits – Backdoors Inside Your Framework.pdf 375K
IH11-Stegobot.pdf 367K
reverse-malware.pdf 351K
bh-eu-06-Rutkowska.pdf 350K
malware-taxonomy.pdf 344K
The art of stealth scanning.pdf 334K
Creating an Anti-AV scanner Article.pdf 330K
The Rise of MBR Rootkits & Bootkits in the Wild.pdf 325K
Ingeniería inversa de troyanos III.pdf 324K
indiceanalisisforense.pdf 275K
Analysis Report for Windows Loader.exe.pdf 275K
Analizando Malware Basico.pdf 270K
BotHunter-BotHunter Detecting Malware Infection Through IDS-Driven Dialog Correlation.pdf 266K
ProcessDumpAnalyses_v1.0_20060722.pdf 265K
Parte VIII - Códigos Maliciosos (Malware).pdf 235K
analysis-attack-malware-es.pdf 231K
Análisis forenses a tarjetas SIM.pdf 220K
Trustwave_SpiderLabs_PhysPenTest.pdf 216K
Recogiendo datos para Analisis Forense de sistemas Windows.pdf 210K
Revese Engineering And Memory Patching.pdf 198K
BlackHat_EU_2011_Chiriac_Rootkit_detection-WP.pdf 195K
PDF malware analysis.pdf 190K
RAIDE_RootkitAnalisysIdentificationElimination.pdf 190K
Depurando con Olly.pdf 185K
Detectando malware desconocido [ESET].pdf 178K
MazarD inyecciones.pdf 176K
Ingeniería inversa de troyanos II.pdf 173K
UnderstandingStealthMalware-program-1.4.pdf 172K
unpacking_malware_using_ida_pro_extensions.pdf 170K
Unpacking Malware using IDA Pro Extensions.pdf 170K
Tricks.pdf 154K
Virt-ICE Next-generation Debugger for Malware Analysis.PDF 150K
[eBook] Analisis forense de sistemas GNU Linux y Unix.pdf 149K
Ingeniería inversa de troyanos I.pdf 147K
Estudio_completo_de_virus_simples.pdf 143K
Análisis forense con autopsy.pdf 142K
Attacks on Virtual Machine Emulators.pdf 142K
Shmoocon2011_SmartphoneBotnets_GeorgiaW.pdf 139K
Understanding the PEB Loader Data Structure.pdf 138K
jmieres-analizando-malware.pdf 133K
Seguridad%20y%20confidencialidad%20de%20la%20informacion.pdf 133K
Seguridad%20en%20las%20Comunicaciones%20y%20acceso%20remoto%20en%20Windows.pdf 133K
BHUSA09-Advanced Mac OS X Rootkits-PAPER.pdf 128K
Sys_Hack.pdf 128K
Tipos de virus y sus acciones.pdf 125K
kernel-land-rootkits.pdf 122K
MAzarD apihooking.pdf 120K
practica.pdf 112K
TrustwaveSecurityAlert_TrackDataParsingAug2008.pdf 102K
crossview_detection_thoughts.pdf 99K
InfoForenseWindows.pdf 97K
Compressing the Imports Section.pdf 78K
IDA Pro Quick Reference Sheet.pdf 71K
Trustwave-Security-Alert-ATM-Malware-Analysis-Briefing.pdf 69K
malware-cheat-sheet.pdf 60K
Bypass-AV.pdf 54K
Anti-Unpacker Tricks 1 .pdf 53K
NcN_2012_Analisis_de_Malware_para_Administradores_de_Sistema-Juan_Garrido.pdf 44K
Test%20de%20Intrusion_ES.pdf 44K
malware_analysis1.pdf 23K
Pequeño user mode rootkit sin DLL.txt 5.9K
Servicios online para analizar el pc, páginas web y archivos.txt 5.8K
Virus en papelera de reciclaje.txt 4.5K
Tipos de virus.txt 2.8K