Niflheim World

Welcome to Niflheim !

  • First 5 messages from new users (pre-moderated user) will be checked for flood/spam before being posted on the forum. Users will also be checked for a multi-account.
    If you want to communicate without delay, get a free Huscarl status (how to get - User Groups), or buy premium status (how to buy - Premium status)
  • We have a scammer on our forum who poses as the administrator of our forum in his telegram channel.
    Scammer screen group - Screen 1, Screen 2 and group name - https://t.me/Niflheimworld (This is not an admin, the link is only for reference with whom not to conduct transactions)
    Do not trust him and do not conduct transactions with him!
    The administrator has only one telegram - @ftmadmin and our chat - Link on chat

Rootkits and Stealth Apps: Creating & Revealing 2.0 HACKING

  • Thread starter User_30344
  • Start date
  • Replies 9
  • Views 12K

U

User_30344

Guest
What you’ll learn
Over 30 lectures and 10 hours of content!

Lectures in PDF + Live Video Training

Free source code package to download

How to create shellcode

How to inject code

How to hide processes, files, directories and registry entries

How to keep a rootkit in a system

How to create a backdoor

How to create an invisible keylogger and remote console

How to make a screenshot

Creating undetectable applications

How to deceive Anti-Virus applications

How to use anti-emulation techniques

How to bypass a firewall

How to create a rootkit detector

How to protect against rootkits

Requirements
interest in ITsec and ethical hacking

some IT and programming basics (C/C++)

Who this course is for:
students interested in rootkit development

ethical hackers

system and network administrators

everyone interested in ethical hacking in general





ISA CISS, CEH, CISSP, MCSE, CCNA
 

Cobra89

Under Review
Under Review
Joined
Jun 8, 2024
Messages
2
Reaction score
0
NL COIN
3
What you’ll learn
Over 30 lectures and 10 hours of content!

Lectures in PDF + Live Video Training

Free source code package to download

How to create shellcode

How to inject code

How to hide processes, files, directories and registry entries

How to keep a rootkit in a system

How to create a backdoor

How to create an invisible keylogger and remote console

How to make a screenshot

Creating undetectable applications

How to deceive Anti-Virus applications

How to use anti-emulation techniques

How to bypass a firewall

How to create a rootkit detector

How to protect against rootkits

Requirements
interest in ITsec and ethical hacking

some IT and programming basics (C/C++)

Who this course is for:
students interested in rootkit development

ethical hackers

system and network administrators

everyone interested in ethical hacking in general



*** Hidden text: cannot be quoted. ***


ISA CISS, CEH, CISSP, MCSE, CCNA
The download link is not showing to me
 

bbc44

New user
Landboar
Joined
Jun 10, 2024
Messages
9
Reaction score
0
NL COIN
20
What you’ll learn
Over 30 lectures and 10 hours of content!

Lectures in PDF + Live Video Training

Free source code package to download

How to create shellcode

How to inject code

How to hide processes, files, directories and registry entries

How to keep a rootkit in a system

How to create a backdoor

How to create an invisible keylogger and remote console

How to make a screenshot

Creating undetectable applications

How to deceive Anti-Virus applications

How to use anti-emulation techniques

How to bypass a firewall

How to create a rootkit detector

How to protect against rootkits

Requirements
interest in ITsec and ethical hacking

some IT and programming basics (C/C++)

Who this course is for:
students interested in rootkit development

ethical hackers

system and network administrators

everyone interested in ethical hacking in general



*** Hidden text: cannot be quoted. ***


ISA CISS, CEH, CISSP, MCSE, CCNA
Looking forward to content like this.
 

xOregon

Under Review
Under Review
Joined
Dec 12, 2024
Messages
3
Reaction score
0
NL COIN
5
What you’ll learn
Over 30 lectures and 10 hours of content!

Lectures in PDF + Live Video Training

Free source code package to download

How to create shellcode

How to inject code

How to hide processes, files, directories and registry entries

How to keep a rootkit in a system

How to create a backdoor

How to create an invisible keylogger and remote console

How to make a screenshot

Creating undetectable applications

How to deceive Anti-Virus applications

How to use anti-emulation techniques

How to bypass a firewall

How to create a rootkit detector

How to protect against rootkits

Requirements
interest in ITsec and ethical hacking

some IT and programming basics (C/C++)

Who this course is for:
students interested in rootkit development

ethical hackers

system and network administrators

everyone interested in ethical hacking in general



*** Hidden text: cannot be quoted. ***


ISA CISS, CEH, CISSP, MCSE, CCNA
amazing
 
shape1
shape2
shape3
shape4
shape7
shape8
Top