• 🌙 Community Spirit

    Ramadan Mubarak! To honor this month, Crax has paused NSFW categories. Wishing you peace and growth!

  1. Khaled Ibn Al-Walid

    EBook/Course ZERO TO HERO MALWARE ENGINEERING

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  2. MulaBhai

    ⭕ SPREAD YOUR MALWARE ⭕ BUILD YOUR OWN BOTNET ⭕ SUPER HIGH QUALITY GUIDE

    JOIN MY CHANNEL - TELEGRAM MY CRACKING COURSE - CLICK HERE Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  3. mayoufi

    Kaspersky - Targeted Malware Reverse Engineering

    MP4 | Video: H264 1920x1080 | Audio: AAC 48000Hz 2 Ch Language: English | Duration: 60+ min | Size: 7.52 GB he online format of Kaspersky’s training helps more engineers upgrade their reversing skills and become confident users of our software disassembly product, IDA Pro Overview & objectives...
  4. tronny

    Udemy - YARA Malware Analysis and Threat Detection 1-2024

    Udemy - YARA Malware Analysis and Threat Detection 1-2024, by Pack Of Coders *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  5. uhhuh

    Malware Forensics Field Guide for Windows Systems

    https://mega.nz/file/9T82EY7T#mjbP1_KTXRXjacl8DvpWw9ix-yjmxE762KU2sUKYGUY Malware Forensics Field Guide for Windows Systems
  6. ro7nikmok

    Login:Pass ConF-Malware powerfull windows Malware

    Download: https://github.com/ConfusedCharacter/ConF-Malware *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** To run Edit Line 484 in C#...
  7. WalleXer

    Source Code UHQ+ |❄️ .LNK EXPLOIT ❄️ SPREAD YOUR MALWARE ❄️ EASY

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  8. hhsuvo

    Key/Code IObit Malware Fighter PRO 11

    IObit Malware Fighter PRO 11 Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  9. andrew19630

    Method/Tut UEFI Bootkit malware bypasses Windows 11 Secure Boot

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  10. tronny

    Kaspersky - Targeted Malware Reverse Engineering, by Denis Legezo

    Kaspersky - Targeted Malware Reverse Engineering, by Denis Legezo *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  11. highzum

    Stealing Offline Crypto Wallets with Malware — Top 6 Popular + Source-Codes

    Cryptocurrencies are becoming increasingly popular, with a rising number of people storing their digital assets in physical crypto wallets. These wallets, however, are excellent targets for attackers looking to steal bitcoin or other coins. In this lesson, we’ll demonstrate how to add...
  12. tronny

    TCMSecurity - Practical Malware Analysis & Triage

    TCMSecurity - Practical Malware Analysis & Triage *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  13. tronny

    Kaspersky - Advanced Malware Analysis Techniques

    Kaspersky - Advanced Malware Analysis Techniques *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  14. f3d0m43ver

    Kaspersky - Advanced malware analysis techniques

    https://xtraining.kaspersky.com/courses/advanced-malware-analysis-techniques/ *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  15. tronny

    Volexity - Malware & Memory Forensics Training with Volatility 2023

    Volexity - Malware & Memory Forensics Training with Volatility 2023 *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  16. tronny

    CodeMachine - Windows Malware Techniques

    CodeMachine - Windows Malware Techniques *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  17. tronny

    eCMAP - Malware Analysis Professional - eLearnSecurity(INE) 2021

    eCMAP - Malware Analysis Professional - eLearnSecurity(INE) 2021 *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  18. zeroroz

    [100% Off] Mastering Reverse Engineering &Amp; Malware Analysis | Remasm+

    What you’ll learn The theory behind disassembly and its role in reverse engineering. The four stages of binary analysis: Preprocessing, Compilation, Assembly, and Linking. The compilation process breakdown and the purpose of each phase. Working with symbolic information in stripped and not...
  19. f3d0m43ver

    Rootkits and Bootkits Reversing Modern Malware - PDF

    Rootkits and Bootkits Reversing Modern Malware and Next Generation Threats (Alex Matrosov, Eugene Rodionov, Sergey Bratus) - PDF Rootkits and Bootkits will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine’s boot process or UEFI firmware. With the...
  20. f3d0m43ver

    Mastering Malware Analysis - EPUB

    Mastering Malware Analysis - Alexey Kleymenov, Amr Thabet - EPUB Learn effective malware analysis tactics to prevent your systems from getting infected Key Features Investigate cyberattacks and prevent malware-related incidents from occurring in the future Learn core concepts of static and...
  21. f3d0m43ver

    Malware forensics field guide for Windows systems - PDF

    Malware forensics field guide for Windows systems Digital forensics field guides by Cameron H. Malin, Eoghan Casey, James M. Aquilina - PDF Malware Forensics Field Guide for Windows Systems is a handy reference that shows students the essential tools needed to do computer forensics analysis at...
  22. f3d0m43ver

    Malware Data Science Attack Detection and Attribution - PDF

    Malware Data Science Attack Detection and Attribution (Joshua Saxe, Hillary Sanders) - PDF Malware Data Science explains how to identify, analyze, and classify large-scale malware using machine learning and data visualization. Security has become a "big data" problem. The growth rate of...
  23. f3d0m43ver

    Malware Analysts Cookbook - PDF

    Malware Analysts Cookbook - PDF A computer forensics "how-to" for fighting malicious code and analyzing incidents With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by...
  24. salchipapa2023

    Key/Code keys malwarebytes premium

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  25. jain

    Windows malware analysis beginners

    https://mega.nz/folder/a3xjRCLA#wjiM23b1T5z8AnVPQuXUPQ
  26. matrixuniverse

    Dynamic Malware Analysis Tools

    Dynamics Malware Analysis Risks Please be aware of the fact that Dynamic Malware Analysis can put your system and network at risk, you will be executing real malware to analyse it’s behaviour. We advise you to only execute malware on virtual machines or dedicated systems in isolated networks...
  27. nicaeal

    IObit Malware Fighter PRO 11 Key 2023

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  28. tronny

    How Hackers Create Undetectable Malware and Viruses

    How Hackers Create Undetectable Malware and Viruses *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  29. Fady4_

    @HackingAssets - Red Team Operator Malware Development Essentials

    @HackingAssets - Red Team Operator Malware Development Essentials *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  30. 0O1

    Malware In a PDF file using Python.

    I created this tutorial because I remember when the YouTube channel LTT (LinusTech Tips) got hacked when an employee opened a fake PDF file, it's so strange how a guy supposed likes high techs and got some good computer science skills can just fall into this trap. Same for the hack of twitter in...
  31. Hemanth

    🥶Reverse Engineering & Malware Analysis in 21 Hours | REMAC+

    Link : https://www.udemy.com/course/reverse_engineering/?couponCode=OCSALY-YOUTUBE-1M Just Click and Enroll and Happy Learning Dudes...🤗
  32. tronny

    LiveLessons - Malware and Incident Response, by Aamir Lakhani

    LiveLessons - Malware and Incident Response, by Aamir Lakhani *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  33. oiashdjas

    How to activate Windows 11 from cmd (free malware)

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  34. edfdfgsdfgsdfgsdfgds

    Sektor 7 Malware Development Essentials

    This is the ESSENTIALS course! Not to be confused with Sekto7's int course This course will teach you how to become a better ethical hacker, pentester and red teamer by learning malware development in Windows. Contents:- Intro and Setup Short introduction to malware development and setting...
  35. rarara007

    Course/Tutorial [ebook][pdf] Practical Malware Analysis | $35 |

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  36. rarara007

    Course/Tutorial [ebook] Offensive Shellcode from Scratch | $22.66 worth|

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  37. rarara007

    Others The Android Malware Handbook (2023-pdf) | 49.99$ worth

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** Password: cracked
  38. carxproveteran

    Cracking the Code: Demystifying Computer Viruses

    Cracking the Code: Demystifying Computer Viruses Empowering Users with Knowledge on Malware, Its Objectives, and How It Multiplies What you'll learn What is the meaning of Computer Virus? Why do people create Viruses? How do viruses spread? What is the difference between Computer Virus and...
  39. marwat147

    Saferwall – An open source malware sandbox

    Saferwall is an open source malware analysis platform. It aims at the following objectives: Provides a collaborative platform for sharing samples between malware researchers. Acts as a system expert, to help researchers generate an automated malware analysis report. Hunting platform to find...
  40. mayoufi

    Malware Development Lab: Understanding the Dark Side

    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Genre: eLearning | Language: English | Duration: 10 Lectures ( 4h 7m ) | Size: 2.43 GB Master Malware Creation, Cyber Attacks Strategies. What you'll learn Learning the theory behind most major types of malwares. The ability to write from...
  41. davidsnufle

    EBook/Course Sektor7 RED TEAM Operator: Malware Development Essentials Course

    Link:https://go.linuxia.ir/link/rtomde.txt *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  42. oiun098

    Harnessing Malware for Remote Computer Espionage

    In this topic, we shall discuss the sinister art of utilizing malware to spy on computers from a distance. Brace yourselves for an expedition into the realms of remote surveillance! "Types of Remote Access Trojans (RATs): Unleashing Covert Control" Explore various strains of Remote Access...
  43. saba66

    Link Exploit Builder By saba

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  44. sisu13

    MALWARE RESOURCES

    Blog: [cocomelonc](https://cocomelonc.github.io/) [Crow's Nest](https://www.crow.rip/crows-nest/mal/dev) [0xPat blog](https://0xpat.github.io/) [Red Team Notes - Code & Process Injection](https://www.ired.team/offensive-security...-injection) [@0xHossam](https://medium.com/@0xHossam/)...
  45. ITSUKI69

    Malware Reverse Engineering Course

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  46. bluelife

    Key/Code Glarysoft Malware Hunter Pro

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  47. andre1232

    Reverse Engineering & Malware Analysis in 21 Hours | REMAC+

    Launch a career in cybersecurity: Gain practical expertise in reverse engineering and malware analysis opening doors to lucrative opportunities in the field. Unveil the secrets of malware: Discover how to dissect and analyze malicious code to understand its inner workings with Reverse...
  48. bald_guy

    Private Iobit Malware Fighter key 11

    Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  49. bald_guy

    Private IObit Malware Fighter key 10

    Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  50. bald_guy

    Private IObit Malware Fighter key 09

    Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Top Bottom