el-hacker.org Downloads
    Name                                                               Last modified      Size
 Name                                                               Last modified      Size  
![[Volver]](/icons/back.gif) Parent Directory                                                                        -
 Parent Directory                                                                        -   
![[Directorio]](/icons/folder2.png) 1.1 Introduction to Advanced Incident Response and Threat Hunting/ 2025-01-27 00:01    -
 1.1 Introduction to Advanced Incident Response and Threat Hunting/ 2025-01-27 00:01    -   
![[Directorio]](/icons/folder2.png) 1.2 Incident Response & Threat Hunting/                            2025-01-27 00:01    -
 1.2 Incident Response & Threat Hunting/                            2025-01-27 00:01    -   
![[Directorio]](/icons/folder2.png) 1.3 Threat Intelligence/                                           2025-01-27 00:01    -
 1.3 Threat Intelligence/                                           2025-01-27 00:01    -   
![[Directorio]](/icons/folder2.png) 1.4 Malware-ology/                                                 2025-01-27 00:01    -
 1.4 Malware-ology/                                                 2025-01-27 00:01    -   
![[Directorio]](/icons/folder2.png) 1.5 Malware Persistence/                                           2025-01-27 00:01    -
 1.5 Malware Persistence/                                           2025-01-27 00:01    -   
![[Directorio]](/icons/folder2.png) 1.6 Incident Response Hunting Across the Enterprise/               2025-01-27 00:01    -
 1.6 Incident Response Hunting Across the Enterprise/               2025-01-27 00:01    -   
![[Directorio]](/icons/folder2.png) 1.7 Credential theft/                                              2025-01-27 00:01    -
 1.7 Credential theft/                                              2025-01-27 00:01    -   
![[Directorio]](/icons/folder2.png) 2.1 Advanced Evidence of Execution/                                2025-01-27 00:01    -
 2.1 Advanced Evidence of Execution/                                2025-01-27 00:01    -   
![[Directorio]](/icons/folder2.png) 2.2 Event Log Analysis for Responders and Hunters/                 2025-01-27 00:01    -
 2.2 Event Log Analysis for Responders and Hunters/                 2025-01-27 00:01    -   
![[Directorio]](/icons/folder2.png) 2.3 Lateral Movement Adversary Tactics/                            2025-01-27 00:01    -
 2.3 Lateral Movement Adversary Tactics/                            2025-01-27 00:01    -   
![[Directorio]](/icons/folder2.png) 2.4 Command Line, PowerShell, and WMI Analysis/                    2025-01-27 00:01    -
 2.4 Command Line, PowerShell, and WMI Analysis/                    2025-01-27 00:01    -   
![[Directorio]](/icons/folder2.png) 3.1 Why Memory Forensics/                                          2025-01-27 00:01    -
 3.1 Why Memory Forensics/                                          2025-01-27 00:01    -   
![[Directorio]](/icons/folder2.png) 3.2 Acquiring Memory/                                              2025-01-27 00:01    -
 3.2 Acquiring Memory/                                              2025-01-27 00:01    -   
![[Directorio]](/icons/folder2.png) 3.3 Introduction to Memory Analysis/                               2025-01-27 00:01    -
 3.3 Introduction to Memory Analysis/                               2025-01-27 00:01    -   
![[Directorio]](/icons/folder2.png) 3.4 Code Injection, Rootkits, and Extraction/                      2025-06-12 15:52    -
 3.4 Code Injection, Rootkits, and Extraction/                      2025-06-12 15:52    -   
![[Directorio]](/icons/folder2.png) 4.1 Malware Discovery/                                             2025-06-12 15:52    -
 4.1 Malware Discovery/                                             2025-06-12 15:52    -   
![[Directorio]](/icons/folder2.png) 4.2 Timeline Analysis Overview/                                    2025-06-12 15:52    -
 4.2 Timeline Analysis Overview/                                    2025-06-12 15:52    -   
![[Directorio]](/icons/folder2.png) 4.3 Filesystem Timeline Creation and Analysis/                     2025-06-12 15:52    -
 4.3 Filesystem Timeline Creation and Analysis/                     2025-06-12 15:52    -   
![[Directorio]](/icons/folder2.png) 4.4 Introducing the Super Timeline/                                2025-06-12 15:52    -
 4.4 Introducing the Super Timeline/                                2025-06-12 15:52    -   
![[Directorio]](/icons/folder2.png) 4.5 Targeted Super Timeline Creation/                              2025-06-12 15:52    -
 4.5 Targeted Super Timeline Creation/                              2025-06-12 15:52    -   
![[Directorio]](/icons/folder2.png) 4.6 Filtering the Super Timeline/                                  2025-06-12 15:52    -
 4.6 Filtering the Super Timeline/                                  2025-06-12 15:52    -   
![[Directorio]](/icons/folder2.png) 4.7 Super Timeline Analysis/                                       2025-06-12 15:52    -
 4.7 Super Timeline Analysis/                                       2025-06-12 15:52    -   
![[Directorio]](/icons/folder2.png) 5.1 Anti-Forensics Overview/                                       2025-06-12 15:52    -
 5.1 Anti-Forensics Overview/                                       2025-06-12 15:52    -   
![[Directorio]](/icons/folder2.png) 5.2 Recovery of Deleted Files via VSS/                             2025-06-12 15:52    -
 5.2 Recovery of Deleted Files via VSS/                             2025-06-12 15:52    -   
![[Directorio]](/icons/folder2.png) 5.3 Advanced NTFS Filesystem Tactics/                              2025-06-12 15:52    -
 5.3 Advanced NTFS Filesystem Tactics/                              2025-06-12 15:52    -   
![[Directorio]](/icons/folder2.png) 5.4 Advanced Evidence Recovery/                                    2025-06-12 15:52    -
 5.4 Advanced Evidence Recovery/                                    2025-06-12 15:52    -   
![[Directorio]](/icons/folder2.png) 5.5 Defensive Countermeasures/                                     2025-06-12 15:52    -
 5.5 Defensive Countermeasures/                                     2025-06-12 15:52    -   
![[Directorio]](/icons/folder2.png) 6.1 Introduction to the Stark Research Labs Intrusion/             2025-06-12 15:52    -
 6.1 Introduction to the Stark Research Labs Intrusion/             2025-06-12 15:52    -   
![[Directorio]](/icons/folder2.png) 6.2 Findings Report/                                               2025-06-12 15:52    -
 6.2 Findings Report/                                               2025-06-12 15:52    -   
![[Fichero PDF]](/icons/pdf2.png) FOR508 I01_01 2023 hide01.ir.pdf                                   2025-02-13 17:22   88M
 FOR508 I01_01 2023 hide01.ir.pdf                                   2025-02-13 17:22   88M