Niflheim World

Welcome to Niflheim !

  • First 5 messages from new users (pre-moderated user) will be checked for flood/spam before being posted on the forum. Users will also be checked for a multi-account.
    If you want to communicate without delay, get a free Huscarl status (how to get - User Groups), or buy premium status (how to buy - Premium status)

Rootkits and Stealth Apps: Creating & Revealing 2.0 HACKING


Odin

Local User
Bond
Joined
Mar 18, 2024
Messages
235
Reaction score
29
NL COIN
1,188
What you’ll learn
Over 30 lectures and 10 hours of content!

Lectures in PDF + Live Video Training

Free source code package to download

How to create shellcode

How to inject code

How to hide processes, files, directories and registry entries

How to keep a rootkit in a system

How to create a backdoor

How to create an invisible keylogger and remote console

How to make a screenshot

Creating undetectable applications

How to deceive Anti-Virus applications

How to use anti-emulation techniques

How to bypass a firewall

How to create a rootkit detector

How to protect against rootkits

Requirements
interest in ITsec and ethical hacking

some IT and programming basics (C/C++)

Who this course is for:
students interested in rootkit development

ethical hackers

system and network administrators

everyone interested in ethical hacking in general





ISA CISS, CEH, CISSP, MCSE, CCNA
 
shape1
shape2
shape3
shape4
shape7
shape8
Top