elhacker.INFO Downloads
Name Last modified Size
Parent Directory -
01 Introduction/ 2022-04-15 20:46 -
02 Installing The Tools/ 2022-04-15 20:47 -
03 Building EXE and DLL and Examining PE Structure/ 2022-04-15 20:51 -
04 Embedding Shellcode Payloads in EXE files/ 2022-04-15 20:52 -
05 Generating Shellcodes Using Metasploit in Kali Linux/ 2022-04-15 20:55 -
08 Base64 Encoding of Shellcode Payload/ 2022-04-15 20:57 -
09 Reverse Engineering Base64 Encoded Payloads/ 2022-04-15 20:58 -
10 XOR Encryption of Payload/ 2022-04-15 20:59 -
11 Reverse Engineering XOR Encryption/ 2022-04-15 21:01 -
12 AES Encryption of Payload/ 2022-04-15 21:02 -
13 Reverse Engineering AES Encryption Using CryptDecrypt/ 2022-04-15 21:03 -
14 Testing Shellcode Using Shellcode Runner/ 2022-04-15 21:04 -
15 Obfuscating Functions Using GetProcAddress and XOR Encryption/ 2022-04-15 21:05 -
16 Reverse Engineering Function Obfuscation/ 2022-04-15 21:07 -
17 Trojan Engineering Using Code Caves/ 2022-04-15 21:08 -
18 Reverse Engineering Code Cave Trojans/ 2022-04-15 21:12 -
19 Process Injection/ 2022-04-15 21:13 -
20 Detecting Process Injection and Reverse Engineering it/ 2022-04-15 21:16 -
21 Testing Process Injection Shellcode with ShellcodeRunnerInjected/ 2022-04-15 21:18 -
22 DLL Injection/ 2022-04-15 21:18 -
23 Detecting and Reverse Engineering DLL Injection/ 2022-04-15 21:22 -
24 Creating a Stealth Trojan/ 2022-04-15 21:24 -
26 Reverse Engineering the Lab Project Trojan/ 2022-04-15 21:24 -
27 Anti Virus Evasion/ 2022-04-15 21:26 -
28 Bonus Lecture/ 2022-04-15 21:30 -