TorBT - Torrents and Magnet Links Search Engine
[FreeCourseSite.com] Udemy - Rootkits and Stealth Apps Creating & Revealing 2.0 HACKING
- Date: 2025-06-29
- Size: 951 MB
- Files: 82
File Name
Size
1. Introduction/1. Theory Foreword, What is a rootkit, Rootkit structure, Examples of rootkits.html
208 B
1. Introduction/1.1 003_RTK_EN_Rootkits_and_invisible_by_www.HackingSchool.com.pdf.pdf
197 kB
1. Introduction/1.2 017_RTK_EN_Rootkits_and_invisible_by_www.HackingSchool.com.pdf.pdf
536 kB
1. Introduction/1.3 009_RTK_EN_Rootkits_and_invisible_by_www.HackingSchool.com.pdf.pdf
218 kB
1. Introduction/2. Introduction and setup - VIDEO TRAINING.mp4
68 MB
1. Introduction/2. Introduction and setup - VIDEO TRAINING.vtt
20 kB
10. Defense and rootkit detectors/1. Theory Rootkit detectors.html
78 B
10. Defense and rootkit detectors/1.1 219_RTK_EN_Rootkits_and_invisible_by_www.HackingSchool.com.pdf.pdf
460 kB
10. Defense and rootkit detectors/2. Defense and rootkit detectors - VIDEO TRAINING.mp4
49 MB
10. Defense and rootkit detectors/2. Defense and rootkit detectors - VIDEO TRAINING.vtt
19 kB
11. Rootkit development and summary/1. Theory Rootkit development and summary.html
108 B
11. Rootkit development and summary/1.1 239_RTK_EN_Rootkits_and_invisible_by_www.HackingSchool.com.pdf.pdf
325 kB
11. Rootkit development and summary/2. Rootkit development and summary - VIDEO TRAINING.mp4
37 MB
11. Rootkit development and summary/2. Rootkit development and summary - VIDEO TRAINING.vtt
16 kB
12. BONUS section/1. Become CISS - Certified Hacking Training - Monitoring Transmitted 1.mp4
68 MB
12. BONUS section/1. Become CISS - Certified Hacking Training - Monitoring Transmitted 1.vtt
33 kB
12. BONUS section/2. Become CISS - Certified Hacking Training - Monitoring Transmitted 2.mp4
92 MB
12. BONUS section/2. Become CISS - Certified Hacking Training - Monitoring Transmitted 2.vtt
31 kB
12. BONUS section/3. Become CISS - Certified Hacking Training - WiFi Security - Part 1.mp4
42 MB
12. BONUS section/3. Become CISS - Certified Hacking Training - WiFi Security - Part 1.vtt
23 kB
12. BONUS section/4. Become CISS - Certified Hacking Training - WiFi Security - Part 2.mp4
39 MB
12. BONUS section/4. Become CISS - Certified Hacking Training - WiFi Security - Part 2.vtt
21 kB
12. BONUS section/5. Become CISS - Certified Hacking Training - WiFi Threats and Attacks.mp4
54 MB
12. BONUS section/5. Become CISS - Certified Hacking Training - WiFi Threats and Attacks.vtt
29 kB
12. BONUS section/6. Website Hacking in Practice - SQL Injection.mp4
39 MB
12. BONUS section/6. Website Hacking in Practice - SQL Injection.vtt
12 kB
12. BONUS section/7. BONUS LECTURE Learn more and get to know our other courses.html
6.4 kB
12. BONUS section/8. Thank you for joining this training.html
374 B
2. Download your training source code and examples/1. Your ZIP package with the source code and examples.html
125 B
2. Download your training source code and examples/1.1 RTK-Modules-sources-only.zip.zip
1.3 MB
2. Download your training source code and examples/1.2 RTK-Tools.zip.zip
3.6 kB
3. Basics of shellcode/1. Theory Assembly language crash course, Register types, Instruction syntax.html
234 B
3. Basics of shellcode/1.1 033_RTK_EN_Rootkits_and_invisible_by_www.HackingSchool.com.pdf.pdf
333 kB
3. Basics of shellcode/2. Basics of shellcode development - VIDEO TRAINING.mp4
42 MB
3. Basics of shellcode/2. Basics of shellcode development - VIDEO TRAINING.vtt
14 kB
4. Hiding processes, files and registry entries/1. Theory Intro, Writing rootkit code, Hiding processes.html
110 B
4. Hiding processes, files and registry entries/1.1 047_RTK_EN_Rootkits_and_invisible_by_www.HackingSchool.com.pdf.pdf
458 kB
4. Hiding processes, files and registry entries/2. Hiding processes - VIDEO TRAINING.mp4
40 MB
4. Hiding processes, files and registry entries/2. Hiding processes - VIDEO TRAINING.vtt
18 kB
4. Hiding processes, files and registry entries/3. Theory Hiding files.html
73 B
4. Hiding processes, files and registry entries/3.1 075_RTK_EN_Rootkits_and_invisible_by_www.HackingSchool.com.pdf.pdf
437 kB
4. Hiding processes, files and registry entries/4. Hiding files and directories - VIDEO TRAINING.mp4
48 MB
4. Hiding processes, files and registry entries/4. Hiding files and directories - VIDEO TRAINING.vtt
16 kB
4. Hiding processes, files and registry entries/5. Theory Intro, Notes about the 64-bit mode, Hiding registry entries.html
120 B
4. Hiding processes, files and registry entries/5.1 091_RTK_EN_Rootkits_and_invisible_by_www.HackingSchool.com.pdf.pdf
348 kB
4. Hiding processes, files and registry entries/6. Hiding registry entries - VIDEO TRAINING.mp4
29 MB
4. Hiding processes, files and registry entries/6. Hiding registry entries - VIDEO TRAINING.vtt
9.6 kB
5. Creating a backdoor and a keylogger/1. Theory Creating a backdoor to a system, Keylogger, Taking a screenshot, Sending.html
147 B
5. Creating a backdoor and a keylogger/1.1 103_RTK_EN_Rootkits_and_invisible_by_www.HackingSchool.com.pdf.pdf
444 kB
5. Creating a backdoor and a keylogger/2. Creating a keylogger - VIDEO TRAINING.mp4
52 MB
5. Creating a backdoor and a keylogger/2. Creating a keylogger - VIDEO TRAINING.vtt
24 kB
5. Creating a backdoor and a keylogger/3. Theory Remote console.html
75 B
5. Creating a backdoor and a keylogger/3.1 131_RTK_EN_Rootkits_and_invisible_by_www.HackingSchool.com.pdf.pdf
379 kB
5. Creating a backdoor and a keylogger/4. Creating a remote console - VIDEO TRAINING.mp4
26 MB
5. Creating a backdoor and a keylogger/4. Creating a remote console - VIDEO TRAINING.vtt
13 kB
6. Windows security features/1. Theory What defense mechanisms are included in Windows.html
98 B
6. Windows security features/1.1 147_RTK_EN_Rootkits_and_invisible_by_www.HackingSchool.com.pdf.pdf
258 kB
6. Windows security features/2. Windows security features - VIDEO TRAINING.mp4
24 MB
6. Windows security features/2. Windows security features - VIDEO TRAINING.vtt
11 kB
7. Creating undetectable applications/1. Theory Understanding how antiviruses detect threats, Signatures.html
117 B
7. Creating undetectable applications/1.1 157_RTK_EN_Rootkits_and_invisible_by_www.HackingSchool.com.pdf.pdf
324 kB
7. Creating undetectable applications/2. Creating undetectable applications - VIDEO TRAINING.mp4
34 MB
7. Creating undetectable applications/2. Creating undetectable applications - VIDEO TRAINING.vtt
8.4 kB
7. Creating undetectable applications/3. Theory Heuristics, Deceiving a heuristic scanner.html
91 B
7. Creating undetectable applications/3.1 165_RTK_EN_Rootkits_and_invisible_by_www.HackingSchool.com.pdf.pdf
271 kB
7. Creating undetectable applications/4. Deceiving a heuristic scanner - VIDEO TRAINING.mp4
20 MB
7. Creating undetectable applications/4. Deceiving a heuristic scanner - VIDEO TRAINING.vtt
19 MB
7. Creating undetectable applications/5. Theory Emulation, RC4 overview, System calls and 64-bit architecture.html
122 B
7. Creating undetectable applications/5.1 171_RTK_EN_Rootkits_and_invisible_by_www.HackingSchool.com.pdf.pdf
289 kB
7. Creating undetectable applications/6. Anti-emulation techniques - VIDEO TRAINING.mp4
23 MB
7. Creating undetectable applications/6. Anti-emulation techniques - VIDEO TRAINING.vtt
23 MB
8. Bypassing a firewall/1. Theory Bypassing a firewall, Modifying the remote console.html
100 B
8. Bypassing a firewall/1.1 183_RTK_EN_Rootkits_and_invisible_by_www.HackingSchool.com.pdf.pdf
389 kB
8. Bypassing a firewall/2. Bypassing a firewall - VIDEO TRAINING.mp4
35 MB
8. Bypassing a firewall/2. Bypassing a firewall - VIDEO TRAINING.vtt
14 kB
9. Keeping a rootkit in a system/1. Theory Areas for hiding programs, Running a program as a system service, Dll sp.html
139 B
9. Keeping a rootkit in a system/1.1 199_RTK_EN_Rootkits_and_invisible_by_www.HackingSchool.com.pdf.pdf
402 kB
9. Keeping a rootkit in a system/2. Keeping a rootkit in a system - VIDEO TRAINING.mp4
40 MB
9. Keeping a rootkit in a system/2. Keeping a rootkit in a system - VIDEO TRAINING.vtt
18 kB
[CourseClub.NET].url
123 B
[FCS Forum].url
133 B
[FreeCourseSite.com].url
127 B