elhacker.INFO Downloads
Name Last modified Size
Parent Directory -
Malicious Document Analysis_2022/ 2022-05-06 20:48 -
Malware Analysis Series_2021/ 2022-05-06 20:01 -
Malware Analyst's Cookbook and DVD/ 2022-04-12 17:25 -
4n0n_do_exposed.pdf 2023-10-18 00:02 411K
610.1 - Malware Analysis Fundamentals.pdf 2023-10-18 00:04 31M
A Method for Detecting Obfuscated Calls in Malicious Binaries.pdf 2023-10-18 00:04 1.3M
AV_Evasion.pdf 2023-10-18 00:05 433K
Accelerated_Windows_Malware_Analysis_with_Memory_Dumps.pdf 2023-11-06 17:31 7.8M
Administración de Botnets.pdf 2023-10-18 00:16 861K
Advanced Malware Analysis.pdf 2023-10-18 00:18 21M
A la caza del analista.pdf 2023-10-18 00:14 506K
Análisis Forense De Computadoras - Policia Federal Argentina.pdf 2023-10-18 00:15 3.0M
Análisis Forense de Sistemas.pdf 2023-10-18 00:01 792K
Análisis forense con autopsy.pdf 2023-10-18 00:16 142K
Análisis forenses a tarjetas SIM.pdf 2023-10-18 00:16 220K
Analisis de malware, metodologia.pdf 2023-10-18 00:04 4.2M
Analisis de malware cuenca.pdf 2023-10-18 00:02 2.9M
Analizando Malware Basico.pdf 2023-10-18 00:01 270K
Analysis Report for Windows Loader.exe.pdf 2023-10-18 00:14 275K
Analyzing the Effectiveness of Passive Correlation Attacks on the.pdf 2023-10-18 00:18 452K
Android Malware And Analysis (2015 Ken Dunham Et Al; Crc Press).pdf 2023-10-18 00:17 4.3M
Anti-Unpacker Tricks 1 .pdf 2023-10-18 00:01 53K
Anti-Virus Evasion Techniques and countermeasures.pdf 2023-10-18 00:18 433K
Aplicación de Metodología de Malware para el Análisis de la amenaza avanzada persistente.pdf 2023-10-18 00:16 4.2M
Attacks on Virtual Machine Emulators.pdf 2023-10-18 00:02 142K
BH-JP-06-Bilby-up.pdf 2023-10-18 00:01 5.8M
BH-US-06-Rutkowska.pdf 2023-10-18 00:18 5.1M
BHUSA09-.NET Framework Rootkits – Backdoors Inside Your Framework.pdf 2023-10-18 00:14 375K
BHUSA09-Advanced Mac OS X Rootkits-PAPER.pdf 2023-10-18 00:16 128K
BHUSA09-Anti-Forensics The Rootkit Connection.pdf 2023-10-18 00:04 596K
BHUSA09-Kortchinsky-Cloudburst.pdf 2023-10-18 00:01 667K
BiosRootkit BH-Fed-06-Heasman.pdf 2023-10-18 00:16 928K
BlackHat_DC_2011_Mandt_kernelpool-wp.pdf 2023-10-18 00:14 1.9M
BlackHat_EU_2011_Chiriac_Rootkit_detection-WP.pdf 2023-10-18 00:16 195K
Bluepilling the Xen part3.pdf 2023-10-18 00:00 2.6M
Bootkit_analysis_trend.pdf 2023-10-18 00:01 961K
BotHunter-BotHunter Detecting Malware Infection Through IDS-Driven Dialog Correlation.pdf 2023-10-18 00:15 266K
Bypass-AV.pdf 2023-10-18 00:01 54K
Bypassing Anti-Virus Scanners.pdf 2023-10-18 00:16 1.0M
Clase 096 - Lab de malware III - Analisis de infeccion del Novalite.pdf 2023-10-18 00:17 1.3M
Compressing the Imports Section.pdf 2023-10-18 00:04 78K
Computer Viruses And Malware.pdf 2023-10-18 00:14 11M
Computer Viruses For Dummies.pdf 2023-10-18 00:02 2.6M
Creating an Anti-AV scanner Article.pdf 2023-10-18 00:16 330K
CuckooSandbox.pdf 2023-10-18 00:04 778K
DeepSec_2009_Kleissner_Eisendle_-_Stoned_Bootkit.pdf 2023-10-18 00:13 1.3M
Depurando con Olly.pdf 2023-10-18 00:04 185K
Descifrando virus vbs.pdf 2023-10-18 00:15 678K
Desinfeccion por rogue y rootkit.pdf 2023-10-18 00:14 1.8M
Detección y eliminación de Malware.pdf 2023-10-18 00:02 1.0M
Detectando malware desconocido [ESET].pdf 2023-10-18 00:15 178K
Detecting-Malice.pdf 2023-10-18 00:16 5.7M
Detection of Intrusions and Malware, and Vulnerability Assessment_ 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings ( PDFDrive.com ).pdf 2023-10-18 00:04 27M
Disk-Level Behavioral Malware Detection.pdf 2023-10-18 00:14 1.1M
ESET-lojax.pdf 2023-10-18 00:00 2.2M
Effectiveness of AVs in Detecting Web Application Backdoors.pdf 2023-10-18 00:18 438K
Elsevier Syngress - How to Defeat Advanced Malware - New Tools - Dalziel H 2015 - 978-0-12-802731-8.pdf 2023-10-18 00:01 4.3M
Estudio_completo_de_virus_simples.pdf 2023-10-18 00:14 143K
Forensic Analysis Of Microsoft Windows Recycle Bin Records.pdf 2023-10-18 00:01 2.2M
Graham & Dodd - Security Analysis (6th ed).pdf 2023-10-18 00:17 2.8M
HACKING EXPOSED COMPUTER FORENSICS.pdf 2023-10-18 00:04 12M
HBGary Malware Analysis Report.pdf 2023-10-18 00:01 946K
Hack_X_Crack_Malware_parte1.pdf 2023-10-18 00:18 2.5M
Hacking Exposed Malware & Rootkits - McGrawHill - 2010.pdf 2023-10-18 00:16 10M
IDA Pro Quick Reference Sheet.pdf 2023-10-18 00:01 71K
IH11-Stegobot.pdf 2023-10-18 00:16 367K
Ind_malw_cercando_firmas.pdf 2023-10-18 00:02 480K
InfoForenseWindows.pdf 2023-10-18 00:16 97K
Informatica - Demostración De Hacking De Un Honeypot Y Analisis Forense.pdf 2023-10-18 00:04 1.3M
Ingeniería inversa de troyanos I.pdf 2023-10-18 00:14 147K
Ingeniería inversa de troyanos II.pdf 2023-10-18 00:02 173K
Ingeniería inversa de troyanos III.pdf 2023-10-18 00:17 324K
Introduccion-a-la-informatica-forense-en-Windows.pdf 2023-10-18 00:02 601K
Introduction to Computer Virus and Malware.pdf 2023-10-18 00:14 1.1M
Intrusion Detection Systems with Snort.pdf 2023-10-18 00:14 2.5M
IsGameOver - Joanna Rutkowska.pdf 2023-10-18 00:14 2.2M
Learning Malware Analysis_ Explore the concepts, tools, and techniques to analyze and investigate Windows malware ( PDFDrive.com ).pdf 2023-10-18 00:01 17M
MAzarD apihooking.pdf 2023-10-18 00:04 120K
Malicious Code Detection Technologies.pdf 2023-10-18 00:15 414K
Malware-detection-advances-in-information-security.pdf 2023-10-18 00:14 16M
Malware.Fighting.Malicious.Code.pdf 2023-10-18 00:17 11M
Malware Incident Prevention and Handling.pdf 2023-10-18 00:16 2.9M
Malware Incident Response.PDF 2023-10-18 00:17 25M
Malware Reverse Engineering part1 of 2. Static analysis.pdf 2023-10-18 00:03 1.3M
Malware_Magazine_1.pdf 2023-10-18 00:01 5.5M
Malwares+#1(1).pdf 2023-10-18 00:00 683K
Malwares+#1.pdf 2023-10-18 00:14 683K
Managed Code Rootkits Hooking Into Runtime Environments.pdf 2023-10-18 00:00 5.6M
MazarD inyecciones.pdf 2023-10-18 00:01 176K
NcN_2012_Analisis_de_Malware_para_Administradores_de_Sistema-Juan_Garrido.pdf 2023-10-18 00:14 44K
No.Starch.Press.Practical.Malware.Analysis.Feb.2012.eBook-NGR.pdf 2023-10-18 00:01 9.4M
No Starch Press - Practical Malware Analysis - The Hands-On Guide to Dissecting Malicious Software - Feb 2012.pdf 2023-10-18 00:15 9.4M
PDF malware analysis.pdf 2023-10-18 00:16 190K
Paper_III_Malwares.pdf 2023-10-18 00:05 526K
Parte VIII - Códigos Maliciosos (Malware).pdf 2023-10-18 00:03 235K
Pequeño user mode rootkit sin DLL.txt 2023-10-18 00:18 5.9K
Practical_Malware_Analysis.pdf 2023-10-18 00:03 9.4M
Presentation HAR.pdf 2023-10-18 00:16 1.1M
ProcessDumpAnalyses_v1.0_20060722.pdf 2023-10-18 00:02 265K
Que.Absolute.Beginners.Guide.to.Security.Spam.Spyware.and.Viruses.Nov.2005.chm 2023-10-18 00:17 16M
RAIDE_RootkitAnalisysIdentificationElimination.pdf 2023-10-18 00:01 190K
RN_SpyEye-Kicked-to-Curb_Bodmer.pdf 2023-10-18 00:04 872K
RSA-2015-Mobile-Malware-MBS-W01-Lever.pptx 2023-10-18 00:16 10M
ReallyUsefulEbooks.com_159749156X_Windows Forensic Analysis DVD Toolkit.pdf 2023-10-18 00:14 4.3M
Recogiendo datos para Analisis Forense de sistemas Windows.pdf 2023-10-18 00:16 210K
Reverse Engineering.pdf 2023-10-18 00:04 1.1M
Reverse_Engineering_Smashing_the_Signature.pdf 2023-10-18 00:15 924K
Reversing_malware.pdf 2023-10-18 00:17 776K
Revese Engineering And Memory Patching.pdf 2023-10-18 00:01 198K
Ring -3 Rootkits.pdf 2023-10-18 00:15 4.5M
Robust Static Analysis of.pdf 2023-10-18 00:02 1.6M
Rootkit Detection Framework for UEFI.rar 2023-10-18 00:03 31M
Rootkits - Subverting the Windows Kernel.chm 2023-10-18 00:16 1.6M
Rootkits_-_Ring_0f_Fire_by_FlUxIuS(FR).pdf 2023-10-18 00:15 901K
Script_sysinspector.pdf 2023-10-18 00:16 844K
Security Challenges in Virtualized Enviroments.pdf 2023-10-18 00:17 2.9M
Seguridad%20en%20las%20Comunicaciones%20y%20acceso%20remoto%20en%20Windows.pdf 2023-10-18 00:03 133K
Seguridad%20y%20confidencialidad%20de%20la%20informacion.pdf 2023-10-18 00:00 133K
Seguridad - Analisis forense de sistemas Linux.pdf 2023-10-18 00:14 1.2M
Seguridad En Redes Analisis Forense-Proyecto Fin Carrera.pdf 2023-10-18 00:17 717K
Servicios online para analizar el pc, páginas web y archivos.txt 2023-10-18 00:02 5.8K
Session_1_Detection _and_Removal_of_Malwares.pdf 2023-10-18 00:17 19M
Shmoocon2011_SmartphoneBotnets_GeorgiaW.pdf 2023-10-18 00:16 139K
Singh A. Identifying Malicious Code Through Reverse Engineering (Springer, 2009)(0387098240).pdf 2023-10-18 00:02 6.2M
Sistema_de_ofuscacion_de_malware_para_el_evasion_de_NIDS.pdf 2023-10-18 00:02 3.7M
Software Attacks on Intel VT-d.pdf 2023-10-18 00:18 688K
Solución 2º reto elhacker.pdf 2023-10-18 00:16 468K
Sony, Rootkits y Gestión de Derechos Digitales ido demasiado lejos.docx 2023-10-18 00:14 523K
Stuxnet_Under_the_Microscope.pdf 2023-10-18 00:01 2.8M
Subverting the Xen part1.pdf 2023-10-18 00:16 858K
Syngress - Botnets - The Killer Web App.pdf 2023-10-18 00:18 7.0M
Sys_Hack.pdf 2023-10-18 00:01 128K
Syspeace manual.pdf 2023-10-18 00:14 1.4M
T-ZINE_BY_ANTRAX1.rar 2023-10-18 00:02 525M
T-ZINE_BY_ANTRAX2.rar 2023-10-18 00:18 365M
THE ART OF COMPUTER VIRUS RESEARCH AND DEFENSE - Mendes Manuel J., Suomi Reima, Passos Carlos - 2004 - Kluwer Academic Publishers -.pdf 2023-10-18 00:14 16M
TT-Joanna-Rutkowska-HITB-Virginity-Verifier.ppt 2023-10-18 00:04 528K
Taller- Encriptando Malware a Mano.pdf 2023-10-18 00:16 400K
Taller_Malwares_IV.pdf 2023-10-18 00:02 1.3M
Tecnicas_Deteccion_Analisis_Zapata_2015.pdf 2023-10-18 00:15 3.0M
Test%20de%20Intrusion_ES.pdf 2023-10-18 00:15 44K
The Art of Bootkit Development.pdf 2023-10-18 00:03 1.6M
The Definitive Guide to Controlling Malware, Spyware, Phishing, and Spam.pdf 2023-10-18 00:18 2.9M
The Rise of MBR Rootkits & Bootkits in the Wild.pdf 2023-10-18 00:02 325K
The Rootkit Arsenal, Escape and Evasion in the Dark Corners of the System 2nd - Jones & Bartlett Publishers - 2013.pdf 2023-10-18 00:03 68M
The Rootkit Arsenal.pdf 2023-10-18 00:15 81M
The art of stealth scanning.pdf 2023-10-18 00:02 334K
Tipos de virus.txt 2023-10-18 00:16 2.8K
Tipos de virus y sus acciones.pdf 2023-10-18 00:04 125K
Tricks.pdf 2023-10-18 00:04 154K
Troyano_policia.pdf 2023-10-18 00:01 1.6M
Trustwave-Security-Alert-ATM-Malware-Analysis-Briefing.pdf 2023-10-18 00:16 69K
Trustwave-SpiderLabs-BlackHatUSA2010-Malware-Freakshow-2010-Whitepaper.pdf 2023-10-18 00:14 1.0M
Trustwave-SpiderLabs-Malware-Briefing-Malicious-PDF-Public.pdf 2023-10-18 00:04 2.9M
TrustwaveSecurityAlert_TrackDataParsingAug2008.pdf 2023-10-18 00:03 102K
Trustwave_SpiderLabs_PhysPenTest.pdf 2023-10-18 00:16 216K
UC0x07-Windows%20Rootkits%20-%20Diseno%20y%20Estrategia.pdf 2023-10-18 00:18 1.1M
USC-Forense.pdf 2023-10-18 00:18 672K
UnderstandingStealthMalware-program-1.4.pdf 2023-10-18 00:18 172K
Understanding the PEB Loader Data Structure.pdf 2023-10-18 00:02 138K
Unpacking Malware using IDA Pro Extensions.pdf 2023-10-18 00:14 170K
Urko_Zurutuza_-_maquinas_trampa.conoce_a_tu_enemigo.pdf 2023-10-18 00:15 1.4M
Userland Hooking in Windows.pdf 2023-10-18 00:04 4.8M
Virt-ICE Next-generation Debugger for Malware Analysis.PDF 2023-10-18 00:01 150K
Virus en papelera de reciclaje.txt 2023-10-18 00:17 4.5K
WASA - Análisis estático de malware.pdf 2023-10-18 00:05 1.8M
WP_Botnet_vs_Malware.pdf 2023-10-18 00:13 669K
WP_SerialVariantEvasionTactics.pdf 2023-10-18 00:04 2.7M
Wiley,.Reversing.Secrets.of.Reverse.Engineering.(2005).DDU.LotB.pdf 2023-10-18 00:01 8.4M
Wiley The Art Of Memory Forensics, Detecting Malware And Threats In Windows Linux And Mac Memory (2014).pdf 2023-10-18 00:17 27M
WinFE.pdf 2023-10-18 00:17 1.4M
Windows.Forensic.Analysis.DVD.Toolkit.2007.pdf 2023-10-18 00:00 4.3M
Windows Malware Analysis Essentials_ Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set ( PDFDrive.com ).pdf 2023-10-18 00:17 21M
World-Intrusion-.pdf 2023-10-18 00:03 6.6M
Writing_Security_Tools_And_Exploits.pdf 2023-10-18 00:00 11M
[2007] - Perl Scripting for Windows Security Live Response, Forensic Analysis, and Monitoring - [Elsevier Inc] - [159749173X].pdf 2023-10-18 00:04 5.5M
[EBOOK] Sotware Protection and it's annihilation.pdf 2023-10-18 00:15 820K
[eBook] Analisis forense de sistemas GNU Linux y Unix.pdf 2023-10-18 00:16 149K
acns_social_botnet_2010.pdf 2023-10-18 00:04 494K
analysis-attack-malware-es.pdf 2023-10-18 00:18 231K
anti-evasion.pdf 2023-10-18 00:15 619K
asia-17-Matrosov-The-UEFI-Firmware-Rootkits-Myths-And-Reality.pdf 2023-10-18 00:13 30M
bh-eu-06-Rutkowska.pdf 2023-10-18 00:04 350K
bh-jp-05-sparks-butler.pdf 2023-10-18 00:14 557K
crossview_detection_thoughts.pdf 2023-10-18 00:17 99K
cuckoo.pdf 2023-10-18 00:03 523K
defeating_data_execution_prevention_and_aslr_in_windows_xp_sp3.pdf 2023-10-18 00:15 1.2M
hbgary_seven_things.pdf 2023-10-18 00:01 710K
http___www.damballa.com_downloads_r_pubs_WP_Botnet_Detection_for_CSPs.pdf 2023-10-18 00:03 806K
imperfect-forward-secrecy.pdf 2023-10-18 00:15 1.3M
indiceanalisisforense.pdf 2023-10-18 00:15 275K
inside-carberp-botnet-es.pdf 2023-10-18 00:16 2.3M
intro-reverseeng.pdf 2023-10-18 00:01 839K
intro-to-malware-analysis.pdf 2023-10-18 00:18 3.7M
jmieres-analizando-malware.pdf 2023-10-18 00:00 133K
kernel-land-rootkits.pdf 2023-10-18 00:02 122K
labmalware.pdf 2023-10-18 00:14 1.2M
malware-analysis-introduction-2103.pdf 2023-10-18 00:03 1.0M
malware-cheat-sheet.pdf 2023-10-18 00:15 60K
malware-removal.pdf 2023-10-18 00:02 429K
malware-reverse-part-1.pdf 2023-10-18 00:03 1.3M
malware-taxonomy.pdf 2023-10-18 00:01 344K
malware_analysis1.pdf 2023-10-18 00:04 23K
malwares.pdf 2023-10-18 00:01 533K
milf_ndh2010.pdf 2023-10-18 00:16 1.0M
myloader-oficla-analysis-es.pdf 2023-10-18 00:14 1.3M
pek-analysis-es.pdf 2023-10-18 00:17 605K
practica.pdf 2023-10-18 00:18 112K
retoforense.pdf 2023-10-18 00:16 951K
reverse-malware.pdf 2023-10-18 00:16 351K
rootkit_for_the_masses.pdf 2023-10-18 00:04 1.9M
skywiper.pdf 2023-10-18 00:01 645K
softwareexploitationhbgary.pdf 2023-10-18 00:18 1.0M
static Disassembly and Code Analysis.pdf 2023-10-18 00:02 1.3M
teamspy.pdf 2023-10-18 00:15 1.7M
the_ida_pro_book.pdf 2023-10-18 00:14 37M
unpacking_malware_using_ida_pro_extensions.pdf 2023-10-18 00:00 170K
vb2011-bureau.pdf 2023-10-18 00:15 677K