BITCQ

build-undetectable-malware-using-c-language-ethical-hacking

Size: 4 GB
Magnet link

Name Size
build-undetectable-malware-using-c-language-ethical-hacking/course/05 - Creating Persistance & Nesting Our Program In Windows Registry/002 Interacting With Registry In Order To Start Our Program Automaticly.mp4 353.2 MB
build-undetectable-malware-using-c-language-ethical-hacking/Text.txt 484 B
build-undetectable-malware-using-c-language-ethical-hacking/course/01 - Introduction & Welcome To Hacking With C!/001 Ethical Hacking Advanced - Learn How To build Undetectable Malware Using C.mp4 48.7 MB
build-undetectable-malware-using-c-language-ethical-hacking/course/01 - Introduction & Welcome To Hacking With C!/001 Ethical Hacking Advanced - Learn How To build Undetectable Malware Using C_en.srt 2 KB
build-undetectable-malware-using-c-language-ethical-hacking/course/01 - Introduction & Welcome To Hacking With C!/002 What Are We Going To Learn In This Course & What You Need To Know!.mp4 103.8 MB
build-undetectable-malware-using-c-language-ethical-hacking/course/01 - Introduction & Welcome To Hacking With C!/002 What Are We Going To Learn In This Course & What You Need To Know!_en.srt 6 KB
build-undetectable-malware-using-c-language-ethical-hacking/course/01 - Introduction & Welcome To Hacking With C!/003 Our Malware In Action & Hacking Fully Secured And Updated Windows 10 Machine.mp4 99.2 MB
build-undetectable-malware-using-c-language-ethical-hacking/course/01 - Introduction & Welcome To Hacking With C!/003 Our Malware In Action & Hacking Fully Secured And Updated Windows 10 Machine_en.srt 7 KB
build-undetectable-malware-using-c-language-ethical-hacking/course/01 - Introduction & Welcome To Hacking With C!/004 How To Make An .EXE Transform Into Any Other File Type (.jpg, .pdf, .mp4 ... ).mp4 192.5 MB
build-undetectable-malware-using-c-language-ethical-hacking/course/01 - Introduction & Welcome To Hacking With C!/004 How To Make An .EXE Transform Into Any Other File Type (.jpg, .pdf, .mp4 ... )_en.srt 10 KB
build-undetectable-malware-using-c-language-ethical-hacking/course/02 - Hiding Our Program & Defining Connection Points/001 Explaining Malware Structure & Including Needed Libraries.mp4 144.3 MB
build-undetectable-malware-using-c-language-ethical-hacking/course/02 - Hiding Our Program & Defining Connection Points/001 Explaining Malware Structure & Including Needed Libraries_en.srt 9 KB
build-undetectable-malware-using-c-language-ethical-hacking/course/02 - Hiding Our Program & Defining Connection Points/002 Hiding Our Program Console Window.mp4 170.8 MB
build-undetectable-malware-using-c-language-ethical-hacking/course/02 - Hiding Our Program & Defining Connection Points/002 Hiding Our Program Console Window_en.srt 10 KB
build-undetectable-malware-using-c-language-ethical-hacking/course/02 - Hiding Our Program & Defining Connection Points/003 Defining Connection Points To Our Backdoor.mp4 291.7 MB
build-undetectable-malware-using-c-language-ethical-hacking/course/02 - Hiding Our Program & Defining Connection Points/003 Defining Connection Points To Our Backdoor_en.srt 17 KB
build-undetectable-malware-using-c-language-ethical-hacking/course/02 - Hiding Our Program & Defining Connection Points/004 Note for next lecture (goto instruction in C programming).html 927 B
build-undetectable-malware-using-c-language-ethical-hacking/course/02 - Hiding Our Program & Defining Connection Points/005 Attempting Connection Every 10 Seconds With Our Target.mp4 131.9 MB
build-undetectable-malware-using-c-language-ethical-hacking/course/02 - Hiding Our Program & Defining Connection Points/005 Attempting Connection Every 10 Seconds With Our Target_en.srt 8 KB
build-undetectable-malware-using-c-language-ethical-hacking/course/03 - Building Shell Function & Executing Commands/001 Creating Our Shell Function.mp4 221 MB
build-undetectable-malware-using-c-language-ethical-hacking/course/03 - Building Shell Function & Executing Commands/001 Creating Our Shell Function_en.srt 13 KB
build-undetectable-malware-using-c-language-ethical-hacking/course/03 - Building Shell Function & Executing Commands/002 Executing Commands On Target Machine.mp4 213.2 MB
build-undetectable-malware-using-c-language-ethical-hacking/course/03 - Building Shell Function & Executing Commands/002 Executing Commands On Target Machine_en.srt 11 KB
build-undetectable-malware-using-c-language-ethical-hacking/course/03 - Building Shell Function & Executing Commands/003 Server Socket Initiation.mp4 287.5 MB
build-undetectable-malware-using-c-language-ethical-hacking/course/03 - Building Shell Function & Executing Commands/003 Server Socket Initiation_en.srt 15 KB
build-undetectable-malware-using-c-language-ethical-hacking/course/03 - Building Shell Function & Executing Commands/004 Making Server Compatible With Our Backdoor.mp4 246.7 MB
build-undetectable-malware-using-c-language-ethical-hacking/course/03 - Building Shell Function & Executing Commands/004 Making Server Compatible With Our Backdoor_en.srt 14 KB
build-undetectable-malware-using-c-language-ethical-hacking/course/03 - Building Shell Function & Executing Commands/005 Testing Our Malware For Command Execution.mp4 210.9 MB
build-undetectable-malware-using-c-language-ethical-hacking/course/03 - Building Shell Function & Executing Commands/005 Testing Our Malware For Command Execution_en.srt 12 KB
build-undetectable-malware-using-c-language-ethical-hacking/course/04 - Switching Directories Inside Of A Program/001 Changing Our Program Directory.mp4 166.4 MB
build-undetectable-malware-using-c-language-ethical-hacking/course/04 - Switching Directories Inside Of A Program/001 Changing Our Program Directory_en.srt 13 KB
build-undetectable-malware-using-c-language-ethical-hacking/course/05 - Creating Persistance & Nesting Our Program In Windows Registry/001 Taking A Look At Windows Registry.mp4 18.4 MB
build-undetectable-malware-using-c-language-ethical-hacking/course/05 - Creating Persistance & Nesting Our Program In Windows Registry/001 Taking A Look At Windows Registry_en.srt 4 KB
build-undetectable-malware-using-c-language-ethical-hacking/[TGx]Downloaded from torrentgalaxy.to .txt 585 B
build-undetectable-malware-using-c-language-ethical-hacking/course/05 - Creating Persistance & Nesting Our Program In Windows Registry/002 Interacting With Registry In Order To Start Our Program Automaticly_en.srt 17 KB
build-undetectable-malware-using-c-language-ethical-hacking/course/06 - Adding Keylogger To Our Malware/001 Understanding Keylogger Code.mp4 233.6 MB
build-undetectable-malware-using-c-language-ethical-hacking/course/06 - Adding Keylogger To Our Malware/001 Understanding Keylogger Code_en.srt 13 KB
build-undetectable-malware-using-c-language-ethical-hacking/course/06 - Adding Keylogger To Our Malware/002 Adding Keylogger Function To Our Backdoor.mp4 142.6 MB
build-undetectable-malware-using-c-language-ethical-hacking/course/06 - Adding Keylogger To Our Malware/002 Adding Keylogger Function To Our Backdoor_en.srt 7 KB
build-undetectable-malware-using-c-language-ethical-hacking/course/07 - Hacking Windows 10/001 Updating Our Server Code.mp4 97.7 MB
build-undetectable-malware-using-c-language-ethical-hacking/course/07 - Hacking Windows 10/001 Updating Our Server Code_en.srt 5 KB
build-undetectable-malware-using-c-language-ethical-hacking/course/07 - Hacking Windows 10/002 Hacking Windows 10 Target With Our Program.mp4 304.5 MB
build-undetectable-malware-using-c-language-ethical-hacking/course/07 - Hacking Windows 10/002 Hacking Windows 10 Target With Our Program_en.srt 17 KB
build-undetectable-malware-using-c-language-ethical-hacking/course/07 - Hacking Windows 10/003 You Have Been Hacked.mp4 165.9 MB
build-undetectable-malware-using-c-language-ethical-hacking/course/07 - Hacking Windows 10/003 You Have Been Hacked_en.srt 9 KB
build-undetectable-malware-using-c-language-ethical-hacking/course/07 - Hacking Windows 10/004 Is It a Browser Or Backdoor.mp4 225.3 MB
build-undetectable-malware-using-c-language-ethical-hacking/course/07 - Hacking Windows 10/004 Is It a Browser Or Backdoor_en.srt 12 KB
build-undetectable-malware-using-c-language-ethical-hacking/resources/03 - Building Shell Function & Executing Commands/005 backdoortest.c 2 KB
build-undetectable-malware-using-c-language-ethical-hacking/resources/03 - Building Shell Function & Executing Commands/005 sertest.c 1 KB
build-undetectable-malware-using-c-language-ethical-hacking/resources/04 - Switching Directories Inside Of A Program/001 str-cut-function.c 993 B
build-undetectable-malware-using-c-language-ethical-hacking/resources/06 - Adding Keylogger To Our Malware/001 keylogger.h 2 KB
build-undetectable-malware-using-c-language-ethical-hacking/resources/07 - Hacking Windows 10/004 backdoor.c 4 KB
build-undetectable-malware-using-c-language-ethical-hacking/resources/07 - Hacking Windows 10/004 server.c 2 KB
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce

Loading...