Torrent Info
Title Build Undetectable Malware Using C Language
Category
Size 2.34GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
1.1 keylogger.h 12.42KB
1.1 str_cut function.c 993B
1. Changing Our Program Directory.mp4 94.91MB
1. Changing Our Program Directory.srt 12.68KB
1. Creating Our Shell Function.mp4 123.89MB
1. Creating Our Shell Function.srt 12.66KB
1. Ethical Hacking Advanced - Learn How To build Undetectable Malware Using C.mp4 30.17MB
1. Ethical Hacking Advanced - Learn How To build Undetectable Malware Using C.srt 2.44KB
1. Explaining Malware Structure & Including Needed Libraries.mp4 75.77MB
1. Explaining Malware Structure & Including Needed Libraries.srt 9.18KB
1. Taking A Look At Windows Registry.mp4 10.67MB
1. Taking A Look At Windows Registry.srt 3.56KB
1. Understanding Keylogger Code.mp4 137.38MB
1. Understanding Keylogger Code.srt 12.97KB
1. Updating Our Server Code.mp4 57.38MB
1. Updating Our Server Code.srt 4.92KB
2. Adding Keylogger Function To Our Backdoor.mp4 83.05MB
2. Adding Keylogger Function To Our Backdoor.srt 7.33KB
2. Executing Commands On Target Machine.mp4 116.91MB
2. Executing Commands On Target Machine.srt 11.17KB
2. Hacking Windows 10 Target With Our Program.mp4 175.65MB
2. Hacking Windows 10 Target With Our Program.srt 16.30KB
2. Hiding Our Program Console Window.mp4 92.43MB
2. Hiding Our Program Console Window.srt 9.84KB
2. Interacting With Registry In Order To Start Our Program Automaticly.mp4 200.20MB
2. Interacting With Registry In Order To Start Our Program Automaticly.srt 17.75KB
2. What Are We Going To Learn In This Course & What You Need To Know!.mp4 64.71MB
2. What Are We Going To Learn In This Course & What You Need To Know!.srt 6.18KB
3. Defining Connection Points To Our Backdoor.mp4 163.82MB
3. Defining Connection Points To Our Backdoor.srt 17.06KB
3. Our Malware In Action & Hacking Fully Secured And Updated Windows 10 Machine.mp4 56.85MB
3. Our Malware In Action & Hacking Fully Secured And Updated Windows 10 Machine.srt 7.44KB
3. Server Socket Initiation.mp4 161.05MB
3. Server Socket Initiation.srt 15.25KB
3. You Have Been Hacked.mp4 94.80MB
3. You Have Been Hacked.srt 8.81KB
4. Changing Malware Binary In Order To Bypass Antivirus.mp4 76.57MB
4. Changing Malware Binary In Order To Bypass Antivirus.srt 8.21KB
4. How To Make An .EXE Transform Into Any Other File Type (.jpg, .pdf, .mp4 ... ).mp4 112.55MB
4. How To Make An .EXE Transform Into Any Other File Type (.jpg, .pdf, .mp4 ... ).srt 9.92KB
4. Making Server Compatible With Our Backdoor.mp4 142.43MB
4. Making Server Compatible With Our Backdoor.srt 14.22KB
4. Note for next lecture (goto instruction in C programming).html 916B
5.1 sertest.c 1.31KB
5.1 server.c 1.57KB
5.2 backdoor.c 3.75KB
5.2 backdoortest.c 1.57KB
5. Attempting Connection Every 10 Seconds With Our Target.mp4 73.51MB
5. Attempting Connection Every 10 Seconds With Our Target.srt 7.91KB
5. Is It a Browser Or Backdoor .mp4 133.38MB
5. Is It a Browser Or Backdoor .srt 11.76KB
5. Testing Our Malware For Command Execution.mp4 116.29MB
5. Testing Our Malware For Command Execution.srt 11.91KB
6 Simple Memory Techniques.html 98B
USB Rubber Ducky Deluxe.html 84B
Yubico - YubiKey 5 NFC.html 84B
Distribution statistics by country
United States (US) 3
Bangladesh (BD) 2
Mexico (MX) 1
United Kingdom (GB) 1
Belgium (BE) 1
India (IN) 1
China (CN) 1
Turkey (TR) 1
Romania (RO) 1
Total 12
IP List List of IP addresses which were distributed this torrent