Udemy - Rootkits And Stealth Apps: Creating & Revealing 2.0 HACKING [TP]

seeders: 2
leechers: 1
updated:
Added by tutplanet in Other > Tutorials

Download Fast Safe Anonymous
movies, software, shows...

Files

[Tutorialsplanet.NET] Udemy - Rootkits and Stealth Apps Creating & Revealing 2.0 HACKING 1. Introduction
  • 1. Theory Foreword, What is a rootkit, Rootkit structure, Examples of rootkits.html (0.2 KB)
  • 1.1 003_RTK_EN_Rootkits_and_invisible_by_www.HackingSchool.com.pdf.pdf (197.0 KB)
  • 1.2 017_RTK_EN_Rootkits_and_invisible_by_www.HackingSchool.com.pdf.pdf (536.1 KB)
  • 1.3 009_RTK_EN_Rootkits_and_invisible_by_www.HackingSchool.com.pdf.pdf (218.2 KB)
  • 2. Introduction and setup - VIDEO TRAINING.mp4 (67.8 MB)
  • 2. Introduction and setup - VIDEO TRAINING.vtt (20.5 KB)
10. Defense and rootkit detectors
  • 1. Theory Rootkit detectors.html (0.1 KB)
  • 1.1 219_RTK_EN_Rootkits_and_invisible_by_www.HackingSchool.com.pdf.pdf (460.2 KB)
  • 2. Defense and rootkit detectors - VIDEO TRAINING.mp4 (49.2 MB)
  • 2. Defense and rootkit detectors - VIDEO TRAINING.vtt (18.8 KB)
11. Rootkit development and summary
  • 1. Theory Rootkit development and summary.html (0.1 KB)
  • 1.1 239_RTK_EN_Rootkits_and_invisible_by_www.HackingSchool.com.pdf.pdf (325.2 KB)
  • 2. Rootkit development and summary - VIDEO TRAINING.mp4 (36.9 MB)
  • 2. Rootkit development and summary - VIDEO TRAINING.vtt (16.2 KB)
12. BONUS section
  • 1. Become CISS - Certified Hacking Training - Monitoring Transmitted 1.mp4 (68.2 MB)
  • 1. Become CISS - Certified Hacking Training - Monitoring Transmitted 1.vtt (33.0 KB)
  • 2. Become CISS - Certified Hacking Training - Monitoring Transmitted 2.mp4 (91.9 MB)
  • 2. Become CISS - Certified Hacking Training - Monitoring Transmitted 2.vtt (31.2 KB)
  • 3. Become CISS - Certified Hacking Training - WiFi Security - Part 1.mp4 (41.5 MB)
  • 3. Become CISS - Certified Hacking Training - WiFi Security - Part 1.vtt (23.2 KB)
  • 4. Become CISS - Certified Hacking Training - WiFi Security - Part 2.mp4 (39.2 MB)
  • 4. Become CISS - Certified Hacking Training - WiFi Security - Part 2.vtt (20.9 KB)
  • 5. Become CISS - Certified Hacking Training - WiFi Threats and Attacks.mp4 (54.3 MB)
  • 5. Become CISS - Certified Hacking Training - WiFi Threats and Attacks.vtt (29.3 KB)
  • 6. Website Hacking in Practice - SQL Injection.mp4 (38.6 MB)
  • 6. Website Hacking in Practice - SQL Injection.vtt (12.0 KB)
  • 7. BONUS LECTURE Learn more and get to know our other courses.html (6.4 KB)
  • 8. Thank you for joining this training.html (0.4 KB)
2. Download your training source code and examples
  • 1. Your ZIP package with the source code and examples.html (0.1 KB)
  • 1.1 RTK-Modules-sources-only.zip.zip (1.3 MB)
  • 1.2 RTK-Tools.zip.zip (3.6 KB)
3. Basics of shellcode
  • 1. Theory Assembly language crash course, Register types, Instruction syntax.html (0.2 KB)
  • 1.1 033_RTK_EN_Rootkits_and_invisible_by_www.HackingSchool.com.pdf.pdf (333.2 KB)
  • 2. Basics of shellcode development - VIDEO TRAINING.mp4 (41.9 MB)
  • 2. Basics of shellcode development - VIDEO TRAINING.vtt (13.9 KB)
4. Hiding processes, files and registry entries
  • 1. Theory Intro, Writing rootkit code, Hiding processes.html (0.1 KB)
  • 1.1 047_RTK_EN_Rootkits_and_invisible_by_www.HackingSchool.com.pdf.pdf (458.4 KB)
  • 2. Hiding processes - VIDEO TRAINING.mp4 (40.2 MB)
  • 2. Hiding processes - VIDEO TRAINING.vtt (18.4 KB)
  • 3. Theory Hiding files.html (0.1 KB)
  • 3.1 075_RTK_EN_Rootkits_and_invisible_by_www.HackingSchool.com.pdf.pdf (436.9 KB)
  • 4. Hiding files and directories - VIDEO TRAINING.mp4 (48.5 MB)
  • 4. Hiding files and directories - VIDEO TRAINING.vtt (15.6 KB)
  • 5. Theory Intro, Notes about the 64-bit mode, Hiding registry entries.html (0.1 KB)
  • 5.1 091_RTK_EN_Rootkits_and_invisible_by_www.HackingSchool.com.pdf.pdf (348.0 KB)
  • 6. Hiding registry entries - VIDEO TRAINING.mp4 (28.6 MB)
  • 6. Hiding registry entries - VIDEO TRAINING.vtt (9.6 KB)
5. Creating a backdoor and a keylogger
  • 1. Theory Creating a backdoor to a system, Keylogger, Taking a screenshot, Sending.html (0.1 KB)
  • 1.1 103_RTK_EN_Rootkits_and_invisible_by_www.HackingSchool.com.pdf.pdf (443.7 KB)
  • 2. Creating a keylogger - VIDEO TRAINING.mp4 (52.1 MB)
  • 2. Creating a keylogger - VIDEO TRAINING.vtt (23.5 KB)
  • 3. Theory Remote console.html (0.1 KB)
  • 3.1 131_RTK_EN_Rootkits_and_invisible_by_www.HackingSchool.com.pdf.pdf (378.6 KB)
  • 4. Creating a remote console - VIDEO TRAINING.mp4 (26.1 MB)
  • 4. Creating a remote console - VIDEO TRAINING.vtt (12.9 KB)
6. Windows security features
  • 1. Theory What defense mechanisms are included in Windows.html (0.1 KB)
  • 1.1 147_RTK_EN_Rootkits_and_invisible_by_www.HackingSchool.com.pdf.pdf (258.2 KB)
  • 2. Windows security features - VIDEO TRAINING.mp4 (23.6 MB)
  • 2. Windows security features - VIDEO TRAINING.vtt (11.0 KB)
7. Creating undetectable applications
  • 1. Theory Understanding how antiviruses detect threats, Signatures.html (0.1 KB)
  • 1.1 157_RTK_EN_Rootkits_and_invisible_by_www.HackingSchool.com.pdf.pdf (324.5 KB)
  • 2. Creating undetectable applications - VIDEO TRAINING.mp4 (33.6 MB)
  • 2. Creating undetectable applications - VIDEO TRAINING.vtt (8.4 KB)
  • 3. Theory Heuristics, Deceiving a heuristic scanner.html (0.1 KB)
  • 3.1 165_RTK_EN_Rootkits_and_invisible_by_www.HackingSchool.com.pdf.pdf (271.0 KB)
  • 4. Deceiving a heuristic scanner - VIDEO TRAINING.mp4 (20.4 MB)
  • 4. Deceiving a heuristic scanner - VIDEO TRAINING.vtt (19.0 MB)
  • 5. Theory Emulation, RC4 overview, System calls and 64-bit architecture.html (0.1 KB)
  • 5.1 171_RTK_EN_Rootkits_and_invisible_by_www.HackingSchool.com.pdf.pdf (289.4 KB)
  • 6. Anti-emulation techniques - VIDEO TRAINING.mp4 (23.3 MB)
  • 6. Anti-emulation techniques - VIDEO TRAINING.vtt (23.3 MB)
8. Bypassing a firewall
  • 1. Theory Bypassing a firewall, Modifying the remote console.html (0.1 KB)
  • 1.1 183_RTK_EN_Rootkits_and_invisible_by_www.HackingSchool.com.pdf.pdf (389.4 KB)
  • 2. Bypassing a firewall - VIDEO TRAINING.mp4 (35.2 MB)
  • 2. Bypassing a firewall - VIDEO TRAINING.vtt (14.5 KB)
9. Keeping a rootkit in a system
  • 1. Theory Areas for hiding programs, Running a program as a system service, Dll sp.html (0.1 KB)
  • 1.1 199_RTK_EN_Rootkits_and_invisible_by_www.HackingSchool.com.pdf.pdf (401.9 KB)
  • 2.

Description

Udemy - Rootkits And Stealth Apps: Creating & Revealing 2.0 HACKING [TP]

Ethical Hacking in Practice. Complete guide to rootkit and stealth software development. Practical ROOTKIT HACKING 101

For more Udemy Courses: https://tutorialsplanet.net



Download torrent
951.1 MB
seeders:2
leechers:1
Udemy - Rootkits And Stealth Apps: Creating & Revealing 2.0 HACKING [TP]


Trackers

tracker name
ahttp://0d.kebhana.mx:443/announce
udp://bigfoot1942.sektori.org:6969/announce
https://tracker.fastdownload.xyz:443/announce
https://opentracker.xyz:443/announce
http://open.trackerlist.xyz:80/announce
http://torrent.nwps.ws:80/announce
udp://tracker.port443.xyz:6969/announce
udp://tracker.tiny-vps.com:6969/announce
http://t.nyaatracker.com:80/announce
udp://tracker.birkenwald.de:6969/announce
udp://tracker.vanitycore.co:6969/announce
udp://tracker.torrent.eu.org:451/announce
udp://retracker.lanta-net.ru:2710/announce
udp://retracker.hotplug.ru:2710/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.uw0.xyz:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://explodie.org:6969/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://tracker.iamhansen.xyz:2000/announce
udp://tracker.toss.li:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.justseed.it:1337/announce
https://2.track.ga:443/announce
udp://open.stealth.si:80/announce
udp://zephir.monocul.us:6969/announce
udp://open.demonii.si:1337/announce
µTorrent compatible trackers list

Download torrent
951.1 MB
seeders:2
leechers:1
Udemy - Rootkits And Stealth Apps: Creating & Revealing 2.0 HACKING [TP]


Torrent hash: 3FA185E99318D6AEFB2B02F32F5142DC3C0707D5