Reverse Code Engineering

(Torrent) Kjacky’s Tutorial Collection

  Quote

File(s): 64-Tutorial Collection set

File Type: Flash Files / Videos / Pdf / Docs / PPT

File Size : 882 MB

Home Page: http://uret.in

Release Type: Torrent

Released on: Saturday, 21 March 2015 (GMT+5:30) | 8:39 PM IST

Tutorial Author / Cracker: Kjacky

Distributor: CybotX

Torrent hash: eee9070a9b47a8d7e57d0924ad120c54e014fd84

 

 

image.png

 

TorrentFile has been attached. Use any of your favorite bit-torrent client to download the file(s)

Magnetic Link :

magnet😕xt=urn:btih:53UQOCU3I6UNPZL5BESK2EQMKTQBJ7ME&dn=64Tut-Kjacky-URET&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969

 

Screenshot_from_2015_03_21_20_42_30.png

Please seed !

For those who have slow internet connection and prefer not to use torrent but download individual files directly or as a whole, here’s the public shared link to dropbox:

https://www.dropbox.com/sh/azosddr8j3d8emx/AABfvLxnEAMxEM4aWq1YgqiWa?dl=0'>>https://www.dropbox.com/sh/azosddr8j3d8emx/AABfvLxnEAMxEM4aWq1YgqiWa?dl=0

TorrentURET-Kja.torrent.zip

Reverse Code Engineering

CodeCracker Next Gen Tutorials

CodeCracker Next Gen Tutorials:

Included tutorials:
Network.zip
Understanding DOS.zip
DotNet_Generic.txt
LinuxReversing.txt
LinuxReversingLinks.txt
Realtek Microphone Not working.txt
Reverse Engineering youtbe videos.txt
Stack.txt
x64dbg-tips.txt
CodeCracker.Next.Gen.Tutorial-SND.zip

Reverse Code Engineering

Rootkits and Stealth Software: Creating and Revealing 2.0

Rootkits and Stealth Software: Creating and Revealing 2.0

Complete guide to rootkit and stealth software development. Practical rootkit hacking 101
  Quote

Complete guide to rootkit and stealth software development
Created by Hacking School, IT Security Academy
Last updated 8/2016
English
What Will I Learn?
Over 30 lectures and 10 hours of content!
Lectures in PDF + Live Video Training
Free source code package to download
How to create shellcode
How to inject code
How to hide processes, files, directories and registry entries
How to keep a rootkit in a system
How to create a backdoor
How to create an invisible keylogger and remote console
How to make a screenshot
Creating undetectable applications
How to deceive Anti-Virus applications
How to use anti-emulation techniques
How to bypass a firewall
How to create a rootkit detector
How to protect against rootkits

 

  Quote

 

This course covers all the important techniques related with ROOTKITS AND CREATING INVISIBLE SOFTWARE used by hackers, system administrators, pentesters and IT forensic analysts.

 

What you can expect from this course:

  • You’ll learn how to create shellcode
  • You’ll learn how to inject code into processes
  • You’ll learn how to hide processes, files, directories and registry entries
  • You’ll learn how to keep a rootkit in a system
  • You’ll learn how to create a backdoor
  • You’ll learn how to create an invisible keylogger and remote console
  • You’ll learn how to make a screenshot
  • You’ll learn how to create undetectable applications
  • You’ll learn how to deceive Anti-Virus applications
  • You’ll learn how to use anti-emulation techniques
  • You’ll learn how to bypass a firewall
  • You’ll learn how to create a rootkit detector
  • You’ll learn how to protect against rootkits
  • And many other interesting topics

 

 

MAGNET LINK:

  Quote

magnet:?xt=urn:btih:B34101021A63917A5F6153C5E98B56AD026BF9BF&dn=%5BUDEMY%5D+ROOTKITS+AND+STEALTH+SOFTWARE%3A+CREATING+AND+REVEALING+2.0&tr=udp%3A%2F%2F211.149.236.45%3A6969%2Fannounce&tr=udp%3A%2F%2F62.112.8.71%3A6969%2Fannounce&tr=udp%3A%2F%2F192.99.81.115%3A1337%2Fannounce&tr=udp%3A%2F%2F62.138.0.158%3A6969%2Fannounce&tr=udp%3A%2F%2F62.138.0.158%3A6969%2Fannounce&tr=udp%3A%2F%2F87.233.192.220%3A6969%2Fannounce&tr=udp%3A%2F%2F213.153.68.27%3A1337%2Fannounce&tr=udp%3A%2F%2F151.80.120.115%3A2710%2Fannounce&tr=http%3A%2F%2F163.172.81.35%3A1337%2Fannounce&tr=udp%3A%2F%2F163.172.81.35%3A1337%2Fannounce&tr=http%3A%2F%2F95.213.191.124%3A2710%2Fannounce&tr=udp%3A%2F%2F163.172.157.35%3A1337%2Fannounce&tr=http%3A%2F%2F163.172.157.35%3A1337%2Fannounce&tr=udp%3A%2F%2F185.82.217.160%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.zer0day.to%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.leechers-paradise.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fcoppersurfer.tk%3A6969%2Fannounce

Uncategorized

RARE SANS Tutorials with PDFs, VM IMAGES and TOOLS Used for LABS

Contains various Courses from SANS including the TOOLS, VM Images, PDFs and other learning Materials.

Highlights of the available courses include:

SANS SEC710: Advanced Exploit Development Course with all the required materials

SANS SEC556 – Comprehensive Packet Analysis

SANS SEC580: Metasploit Kung Fu for Enterprise Pen Testing – Post Mortem

SANS SEC542 2011 – Web App Penetration Testing

They also come along with the DVD material and the VMs ! Its pretty rare to find these, as you know ..

 

Download Link:

  Quote

 

These are RARE to get in a COMPLETE FORM like this with the VMWare Virtual Machines, LABS, DVDs  etc as well !

So grab ’em before the link goes down !

 

 

Cheers :)