Tags
Language
Tags
May 2025
Su Mo Tu We Th Fr Sa
27 28 29 30 1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Rootkits and Stealth Apps: Creating & Revealing 2.0 HACKING

    Posted By: igor_lv
    Rootkits and Stealth Apps: Creating & Revealing 2.0 HACKING

    Rootkits and Stealth Apps: Creating & Revealing 2.0 HACKING
    MP4 | Video: 1280x720 | Duration: 5.5 Hours | 0.9 GB | Subtitles: VTT
    Author: Hacking School | Language: English | Skill level: Intermediate

    A rootkit is a stealthy type of software, typically malicious, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer. – definition by Wikipedia
    You can ignore the fact that rootkits really exist,
    You can pretend that goverment agencies don’t use rootkits,
    You can even believe that big companies don’t spend huge amount of money for developing malicious software that can spy on you and your family,
    You can just turn a blind eye on it and ignore these fact.

    But it does not make the problem disappear.

    Therefore we decided to face facts and show you how rootkits work, how they can hide inside your system, how to create such an invisible software, how to detect and protect against those threats.

    This course covers all the important techniques related with ROOTKITS AND CREATING INVISIBLE SOFTWARE used by hackers, system administrators, pentesters and IT forensic analysts.

    What you can expect from this course:
    You’ll learn how to create shellcode
    You’ll learn how to inject code into processes
    You’ll learn how to hide processes, files, directories and registry entries
    You’ll learn how to keep a rootkit in a system
    You’ll learn how to create a backdoor
    You’ll learn how to create an invisible keylogger and remote console
    You’ll learn how to make a screenshot
    You’ll learn how to create undetectable applications
    You’ll learn how to deceive Anti-Virus applications
    You’ll learn how to use anti-emulation techniques
    You’ll learn how to bypass a firewall
    You’ll learn how to create a rootkit detector
    You’ll learn how to protect against rootkits
    And many other interesting topics

    Rootkits and Stealth Apps: Creating & Revealing 2.0 HACKING

    Rootkits and Stealth Apps: Creating & Revealing 2.0 HACKING

    Rootkits and Stealth Apps: Creating & Revealing 2.0 HACKING


    Requirements:
    interest in ITsec and ethical hacking
    some IT and programming basics (C/C++)