资源详情

返回首页 | 相关搜索
Udemy - Build Undetectable Malware Using C Language Ethical Hacking (2021)
大小 3.97 GB
文件数 51
Info Hash: 97A7F7B5064E1840DFFC5537E8777FFE1482E4E9
收录时间 2026-02-22 16:42:55
更新时间 2026-02-22 16:42:55
文件列表 (51)
01 - Introduction & Welcome To Hacking With C!/001 Ethical Hacking Advanced - Learn How To build Undetectable Malware Using C.mp4
48.67 MB
01 - Introduction & Welcome To Hacking With C!/001 Ethical Hacking Advanced - Learn How To build Undetectable Malware Using C.srt
2.34 KB
01 - Introduction & Welcome To Hacking With C!/002 What Are We Going To Learn In This Course & What You Need To Know!.mp4
103.78 MB
01 - Introduction & Welcome To Hacking With C!/002 What Are We Going To Learn In This Course & What You Need To Know!.srt
6.18 KB
01 - Introduction & Welcome To Hacking With C!/003 Our Malware In Action & Hacking Fully Secured And Updated Windows 10 Machine.mp4
99.2 MB
01 - Introduction & Welcome To Hacking With C!/003 Our Malware In Action & Hacking Fully Secured And Updated Windows 10 Machine.srt
7.5 KB
01 - Introduction & Welcome To Hacking With C!/004 How To Make An .EXE Transform Into Any Other File Type (.jpg, .pdf, .mp4 ... ).mp4
192.52 MB
01 - Introduction & Welcome To Hacking With C!/004 How To Make An .EXE Transform Into Any Other File Type (.jpg, .pdf, .mp4 ... ).srt
10.25 KB
02 - Hiding Our Program & Defining Connection Points/001 Explaining Malware Structure & Including Needed Libraries.mp4
144.33 MB
02 - Hiding Our Program & Defining Connection Points/001 Explaining Malware Structure & Including Needed Libraries.srt
9.06 KB
02 - Hiding Our Program & Defining Connection Points/002 Hiding Our Program Console Window.mp4
170.77 MB
02 - Hiding Our Program & Defining Connection Points/002 Hiding Our Program Console Window.srt
9.73 KB
02 - Hiding Our Program & Defining Connection Points/003 Defining Connection Points To Our Backdoor.mp4
291.73 MB
02 - Hiding Our Program & Defining Connection Points/003 Defining Connection Points To Our Backdoor.srt
16.91 KB
02 - Hiding Our Program & Defining Connection Points/004 Note for next lecture (goto instruction in C programming).html
927 B
02 - Hiding Our Program & Defining Connection Points/005 Attempting Connection Every 10 Seconds With Our Target.mp4
131.88 MB
02 - Hiding Our Program & Defining Connection Points/005 Attempting Connection Every 10 Seconds With Our Target.srt
7.71 KB
03 - Building Shell Function & Executing Commands/001 Creating Our Shell Function.mp4
221.03 MB
03 - Building Shell Function & Executing Commands/001 Creating Our Shell Function.srt
12.57 KB
03 - Building Shell Function & Executing Commands/002 Executing Commands On Target Machine.mp4
213.19 MB
03 - Building Shell Function & Executing Commands/002 Executing Commands On Target Machine.srt
11.35 KB
03 - Building Shell Function & Executing Commands/003 Server Socket Initiation.mp4
287.55 MB
03 - Building Shell Function & Executing Commands/003 Server Socket Initiation.srt
15.19 KB
03 - Building Shell Function & Executing Commands/004 Making Server Compatible With Our Backdoor.mp4
246.7 MB
03 - Building Shell Function & Executing Commands/004 Making Server Compatible With Our Backdoor.srt
13.97 KB
03 - Building Shell Function & Executing Commands/005 Testing Our Malware For Command Execution.mp4
210.94 MB
03 - Building Shell Function & Executing Commands/005 Testing Our Malware For Command Execution.srt
12.03 KB
04 - Switching Directories Inside Of A Program/001 Changing Our Program Directory.mp4
166.41 MB
04 - Switching Directories Inside Of A Program/001 Changing Our Program Directory.srt
12.76 KB
05 - Creating Persistance & Nesting Our Program In Windows Registry/001 Taking A Look At Windows Registry.mp4
18.42 MB
05 - Creating Persistance & Nesting Our Program In Windows Registry/001 Taking A Look At Windows Registry.srt
3.55 KB
05 - Creating Persistance & Nesting Our Program In Windows Registry/002 Interacting With Registry In Order To Start Our Program Automaticly.mp4
353.25 MB
05 - Creating Persistance & Nesting Our Program In Windows Registry/002 Interacting With Registry In Order To Start Our Program Automaticly.srt
17.28 KB
06 - Adding Keylogger To Our Malware/001 Understanding Keylogger Code.mp4
233.6 MB
06 - Adding Keylogger To Our Malware/001 Understanding Keylogger Code.srt
12.88 KB
06 - Adding Keylogger To Our Malware/002 Adding Keylogger Function To Our Backdoor.mp4
142.55 MB
06 - Adding Keylogger To Our Malware/002 Adding Keylogger Function To Our Backdoor.srt
7.29 KB
07 - Hacking Windows 10/001 Updating Our Server Code.mp4
97.65 MB
07 - Hacking Windows 10/001 Updating Our Server Code.srt
5.41 KB
07 - Hacking Windows 10/002 Hacking Windows 10 Target With Our Program.mp4
304.54 MB
07 - Hacking Windows 10/002 Hacking Windows 10 Target With Our Program.srt
16.5 KB
07 - Hacking Windows 10/003 You Have Been Hacked.mp4
165.95 MB
07 - Hacking Windows 10/003 You Have Been Hacked.srt
8.8 KB
07 - Hacking Windows 10/004 Is It a Browser Or Backdoor.mp4
225.32 MB
07 - Hacking Windows 10/004 Is It a Browser Or Backdoor.srt
11.54 KB
resources/03 - Building Shell Function & Executing Commands/005 backdoortest.c
1.57 KB
resources/03 - Building Shell Function & Executing Commands/005 sertest.c
1.31 KB
resources/04 - Switching Directories Inside Of A Program/001 str-cut-function.c
993 B
resources/06 - Adding Keylogger To Our Malware/001 keylogger.h
2.42 KB
resources/07 - Hacking Windows 10/004 backdoor.c
3.75 KB
resources/07 - Hacking Windows 10/004 server.c
1.57 KB

免责声明

本网站仅提供DHT网络磁力资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 lulutang@protonmail.com。