TorBT - Torrents and Magnet Links Search Engine

Udemy - Build Undetectable Malware Using C Language Ethical Hacking (2021)

File Name
Size
01 - Introduction & Welcome To Hacking With C!/001 Ethical Hacking Advanced - Learn How To build Undetectable Malware Using C.mp4
49 MB
01 - Introduction & Welcome To Hacking With C!/001 Ethical Hacking Advanced - Learn How To build Undetectable Malware Using C.srt
2.3 kB
01 - Introduction & Welcome To Hacking With C!/002 What Are We Going To Learn In This Course & What You Need To Know!.mp4
104 MB
01 - Introduction & Welcome To Hacking With C!/002 What Are We Going To Learn In This Course & What You Need To Know!.srt
6.2 kB
01 - Introduction & Welcome To Hacking With C!/003 Our Malware In Action & Hacking Fully Secured And Updated Windows 10 Machine.mp4
99 MB
01 - Introduction & Welcome To Hacking With C!/003 Our Malware In Action & Hacking Fully Secured And Updated Windows 10 Machine.srt
7.5 kB
01 - Introduction & Welcome To Hacking With C!/004 How To Make An .EXE Transform Into Any Other File Type (.jpg, .pdf, .mp4 ... ).mp4
192 MB
01 - Introduction & Welcome To Hacking With C!/004 How To Make An .EXE Transform Into Any Other File Type (.jpg, .pdf, .mp4 ... ).srt
10 kB
02 - Hiding Our Program & Defining Connection Points/001 Explaining Malware Structure & Including Needed Libraries.mp4
144 MB
02 - Hiding Our Program & Defining Connection Points/001 Explaining Malware Structure & Including Needed Libraries.srt
9.1 kB
02 - Hiding Our Program & Defining Connection Points/002 Hiding Our Program Console Window.mp4
171 MB
02 - Hiding Our Program & Defining Connection Points/002 Hiding Our Program Console Window.srt
9.7 kB
02 - Hiding Our Program & Defining Connection Points/003 Defining Connection Points To Our Backdoor.mp4
292 MB
02 - Hiding Our Program & Defining Connection Points/003 Defining Connection Points To Our Backdoor.srt
17 kB
02 - Hiding Our Program & Defining Connection Points/004 Note for next lecture (goto instruction in C programming).html
927 B
02 - Hiding Our Program & Defining Connection Points/005 Attempting Connection Every 10 Seconds With Our Target.mp4
132 MB
02 - Hiding Our Program & Defining Connection Points/005 Attempting Connection Every 10 Seconds With Our Target.srt
7.7 kB
03 - Building Shell Function & Executing Commands/001 Creating Our Shell Function.mp4
221 MB
03 - Building Shell Function & Executing Commands/001 Creating Our Shell Function.srt
13 kB
03 - Building Shell Function & Executing Commands/002 Executing Commands On Target Machine.mp4
213 MB
03 - Building Shell Function & Executing Commands/002 Executing Commands On Target Machine.srt
11 kB
03 - Building Shell Function & Executing Commands/003 Server Socket Initiation.mp4
288 MB
03 - Building Shell Function & Executing Commands/003 Server Socket Initiation.srt
15 kB
03 - Building Shell Function & Executing Commands/004 Making Server Compatible With Our Backdoor.mp4
247 MB
03 - Building Shell Function & Executing Commands/004 Making Server Compatible With Our Backdoor.srt
14 kB
03 - Building Shell Function & Executing Commands/005 Testing Our Malware For Command Execution.mp4
211 MB
03 - Building Shell Function & Executing Commands/005 Testing Our Malware For Command Execution.srt
12 kB
04 - Switching Directories Inside Of A Program/001 Changing Our Program Directory.mp4
166 MB
04 - Switching Directories Inside Of A Program/001 Changing Our Program Directory.srt
13 kB
05 - Creating Persistance & Nesting Our Program In Windows Registry/001 Taking A Look At Windows Registry.mp4
18 MB
05 - Creating Persistance & Nesting Our Program In Windows Registry/001 Taking A Look At Windows Registry.srt
3.6 kB
05 - Creating Persistance & Nesting Our Program In Windows Registry/002 Interacting With Registry In Order To Start Our Program Automaticly.mp4
353 MB
05 - Creating Persistance & Nesting Our Program In Windows Registry/002 Interacting With Registry In Order To Start Our Program Automaticly.srt
17 kB
06 - Adding Keylogger To Our Malware/001 Understanding Keylogger Code.mp4
234 MB
06 - Adding Keylogger To Our Malware/001 Understanding Keylogger Code.srt
13 kB
06 - Adding Keylogger To Our Malware/002 Adding Keylogger Function To Our Backdoor.mp4
143 MB
06 - Adding Keylogger To Our Malware/002 Adding Keylogger Function To Our Backdoor.srt
7.3 kB
07 - Hacking Windows 10/001 Updating Our Server Code.mp4
98 MB
07 - Hacking Windows 10/001 Updating Our Server Code.srt
5.4 kB
07 - Hacking Windows 10/002 Hacking Windows 10 Target With Our Program.mp4
304 MB
07 - Hacking Windows 10/002 Hacking Windows 10 Target With Our Program.srt
16 kB
07 - Hacking Windows 10/003 You Have Been Hacked.mp4
166 MB
07 - Hacking Windows 10/003 You Have Been Hacked.srt
8.8 kB
07 - Hacking Windows 10/004 Is It a Browser Or Backdoor.mp4
225 MB
07 - Hacking Windows 10/004 Is It a Browser Or Backdoor.srt
12 kB
resources/03 - Building Shell Function & Executing Commands/005 backdoortest.c
1.6 kB
resources/03 - Building Shell Function & Executing Commands/005 sertest.c
1.3 kB
resources/04 - Switching Directories Inside Of A Program/001 str-cut-function.c
993 B
resources/06 - Adding Keylogger To Our Malware/001 keylogger.h
2.4 kB
resources/07 - Hacking Windows 10/004 backdoor.c
3.7 kB
resources/07 - Hacking Windows 10/004 server.c
1.6 kB