Udemy - How Hackers Create Undetectable Malware and Viruses

  • CategoryOther
  • TypeTutorials
  • LanguageEnglish
  • Total size277.7 MB
  • Uploaded ByFclab
  • Downloads164
  • Last checkedDec. 25th '70
  • Date uploadedDec. 12th '18
  • Seeders 0
  • Leechers0

Infohash : 7E237A2CF9BD36D4566E16F13C5EBEC2CBEC3A5F

Udemy - How Hackers Create Undetectable Malware and Viruses

How Hackers are Bypassing the Majority of Antivirus Software and Creating Malware and Viruses that Are Undetectable

For more Udemy Courses: https://freecourselab.com

Files:

[FreeCourseLab.com] Udemy - How Hackers Create Undetectable Malware and Viruses 1. We Begin Here
  • 1. Welcome and Introduction.mp4 (3.2 MB)
  • 1. Welcome and Introduction.vtt (2.1 KB)
  • 2. Introduction to Undetectable Malware.mp4 (35.0 MB)
  • 2. Introduction to Undetectable Malware.vtt (10.0 KB)
2. Understanding Malware and Creating the Hacking Environment
  • 1. Installing Python and Pip.mp4 (13.5 MB)
  • 1. Installing Python and Pip.vtt (4.5 KB)
  • 2. Installing Veil-Framework.mp4 (11.1 MB)
  • 2. Installing Veil-Framework.vtt (4.0 KB)
  • 3. Setting Up The Veil Framework.mp4 (46.3 MB)
  • 3. Setting Up The Veil Framework.vtt (8.2 KB)
  • 4. Installing Gnome Desktop.mp4 (43.0 MB)
  • 4. Installing Gnome Desktop.vtt (6.1 KB)
3. Veil and Metasploit
  • 1. Wine Mono and Veil-Evasion Installation.mp4 (6.3 MB)
  • 1. Wine Mono and Veil-Evasion Installation.vtt (2.5 KB)
  • 2. Installing Metasploit.mp4 (28.7 MB)
  • 2. Installing Metasploit.vtt (10.1 KB)
  • 3. Metasploit Installation Complete.mp4 (1.0 MB)
  • 3. Metasploit Installation Complete.vtt (0.6 KB)
  • 4. Testing MSF Console.mp4 (1.7 MB)
  • 4. Testing MSF Console.vtt (1.0 KB)
  • 5. Veil Evasion Final Installation.mp4 (15.7 MB)
  • 5. Veil Evasion Final Installation.vtt (4.0 KB)
  • 6. Adding the Metasploit Folder to Veil Installation.mp4 (1.4 MB)
  • 6. Adding the Metasploit Folder to Veil Installation.vtt (0.6 KB)
  • 7. Introduction to Veil and The Importance in Ethical Hacking.mp4 (10.2 MB)
  • 7. Introduction to Veil and The Importance in Ethical Hacking.vtt (6.1 KB)
4. How Hackers Create Undetectable Malware
  • 1. Creating an Exploit.mp4 (25.3 MB)
  • 1. Creating an Exploit.vtt (12.1 KB)
  • 2. Testing Exploit on Windows 10 Machine.mp4 (30.7 MB)
  • 2. Testing Exploit on Windows 10 Machine.vtt (13.3 KB)
  • 3. Encrypting Payload.mp4 (4.5 MB)
  • 3. Encrypting Payload.vtt (1.7 KB)
  • [FreeCourseLab.com].url (0.1 KB)

Code:

  • http://0d.kebhana.mx:443/announce
  • udp://tw.opentracker.ga:36920/announce
  • udp://temp1.opentracker.gq:6969/announce
  • udp://temp2.opentracker.gq:6969/announce
  • udp://tracker.torrent.eu.org:451/announce
  • http://torrent.nwps.ws:80/announce
  • udp://explodie.org:6969/announce
  • https://opentracker.xyz:443/announce
  • https://t.quic.ws:443/announce
  • https://tracker.fastdownload.xyz:443/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://ipv4.tracker.harry.lu:80/announce
  • udp://tracker.coppersurfer.tk:6969/announce
  • udp://tracker.justseed.it:1337/announce
  • udp://open.demonii.si:1337/announce