elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
1. Goals and Learning Objectives.mp4 2.9M
1. Goals and Learning Objectives.srt 1.2K
2.1 httpkrebsonsecurity.com201210the-scrap-value-of-a-hacked-pc-revisited.html 137
2.2 httpkrebsonsecurity.com201306the-value-of-a-hacked-email-account.html 132
2. Why You Need Security – The Value Of A Hack.mp4 29M
2. Why You Need Security – The Value Of A Hack.srt 6.7K
3.1 httpsresearch.google.compubspub43963.html.html 107
3. The Top 3 Things You Need To Stay Safe Online.mp4 2.5M
3. The Top 3 Things You Need To Stay Safe Online.srt 1.6K
4.1 CVE details.html 88
4.2 httpswww.exploit-db.comsearch.html 95
4.3 Exploit Kit Landscape Map.html 99
4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.mp4 38M
4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.srt 12K
5. Hackers, crackers and cyber criminals.mp4 7.7M
5. Hackers, crackers and cyber criminals.srt 3.4K
6.1 7 most common RATs.html 149
6.2 Malware stats.html 107
6.3 Chef Jamie Oliver’s website hacked for the third time.html 106
6.4 SophosLabs 2018 Malware Forecast.html 162
6.5 Report - Spotlight perils of malvertisements.html 142
6. Malware, viruses, rootkits and RATs.mp4 12M
6. Malware, viruses, rootkits and RATs.srt 8.2K
7.1 httpwww.slate.comarticlestechnologybitwise201502lenovo_superfish_scandal_why_it_s_one_of_the_worst_consumer_computing_screw.html.html 198
7.2 httpwww.mcafee.comusresourcesreportsrp-quarterly-threat-q4-2014.pdf.html 135
7.3 httpssecurelist.comanalysisquarterly-malware-reports72493it-threat-evolution-in-q3-2015.html 156
7.4 httpwww.telegraph.co.uknewsworldnewsnorthamericausa11416985Millions-of-computers-may-be-compromised-by-US-spyware-report.html.html 195
7. Spyware, Adware, Scareware, PUPs & Browser hijacking.mp4 11M
7. Spyware, Adware, Scareware, PUPs & Browser hijacking.srt 6.0K
8.1 Live phishing links.html 87
8.2 Homograph attack using internationalized domain name.html 134
8.3 XSS example vulnerability.html 136
8. What is Phishing, Vishing and SMShing.mp4 26M
8. What is Phishing, Vishing and SMShing.srt 17K
9.1 Spam example.html 142
9.2 Spam stats.html 104
9. Spamming & Doxing.mp4 4.8M
9. Spamming & Doxing.srt 3.9K
10.1 Top 10 scams.html 127
10.2 httpwww.actionfraud.police.uktypes_of_fraud.html 108
10.3 httpwww.consumerfraudreporting.org.html 98
10. Social engineering - Scams, cons, tricks and fraud.mp4 12M
10. Social engineering - Scams, cons, tricks and fraud.srt 6.7K
11.1 httpsthehackernews.com201802cryptojacking-malware.html.html 121
11.2 httpbgr.com20180213android-malware-mining-cryptocurrency-monero-xmr.html 136
11.3 httpswww.engadget.com20180213attackers-telegram-deliver-cryptocurrency-mining-malware.html 154
11.4 httpsaddons.mozilla.orgen-GBfirefoxaddonno-coin.html 116
11.5 httpscoinhive.com.html 82
11.6 httpsaddons.mozilla.orgen-USfirefoxaddonublock-origin.html 122
11.7 httpsgithub.comhoshsadiqadblock-nocoin-list.html 110
11.8 httpsarstechnica.cominformation-technology201801now-even-youtube-serves-ads-with-cpu-draining-cryptocurrency-miners.html 184
11.9 Cryptocurrency Mining Malware Infected Over Half-Million PCs Using an NSA Exploit.html 129
11.10 httpstorrentfreak.compirate-bay-is-mining-cryptocurrency-again-no-opt-out-171011.html 146
11. CPU Hijackers - Crypto Mining Malware and Cryptojackers.mp4 16M
11. CPU Hijackers - Crypto Mining Malware and Cryptojackers.srt 11K
12.1 httpswww.deepdotweb.comdark-net-market-comparison-chart.html 121
12. Darknets, Dark Markets and Exploit kits.mp4 32M
12. Darknets, Dark Markets and Exploit kits.srt 9.4K
13. Governments, spies and secret stuff part I.mp4 27M
13. Governments, spies and secret stuff part I.srt 6.6K
14.1 httpstheintercept.com.html 86
14.2 httpwww.nsaplayset.org.html 87
14.3 Through a PRISM, Darkly - Everything we know about NSA spying [30c3].html 104
14.4 httpswikileaks.org-Leaks-.html.html 95
14.5 httpsnsa.gov1.infodninsa-ant-catalog.html 103
14.6 httpscryptome.org201401nsa-codenames.htm.html 107
14. Governments, spies and secret stuff part II.mp4 30M
14. Governments, spies and secret stuff part II.srt 12K
15.1 A Worldwide Survey of Encryption Products - pdf.html 153
15.2 NSA Admits It Collects Too MUCH Info to Stop Terror Attacks.html 204
15.3 The Case against Regulating Encryption Technology.html 112
15.4 httpcis-india.orginternet-governancebloghow-india-regulates-encryption.html 137
15.5 Clipper chip.html 192
15.6 MATT BLAZE - DECIPHERING THE DEBATE OVER ENCRYPTION.html 160
15.7 WhatsApp was Banned for 48 Hours in Brazil.html 112
15.8 UK data communications bill.html 121
15.9 Report - Keys Under Doormats Mandating insecurity by requiring government access to all data and communication.html 150
15.10 httpswww.csoonline.comarticle3213033securitynsa-whistleblower-william-binney-presented-how-the-nsa-tracks-you-at-sha2017.html.html 193
15.11 Matt Blaze Speaking to a US congressional committee.html 107
15.12 A Worldwide Survey of E ncryption Products - xls.html 154
15.13 Kazakhstans new encryption law.html 185
15. Regulating encryption, mandating insecurity & legalizing spying.mp4 43M
15. Regulating encryption, mandating insecurity & legalizing spying.srt 18K
16.1 Video on how to build your own software reproducibly.html 142
16.2 Apple removes malware infected apps from the app store.html 165
16.3 httpsreproducible-builds.org.html 93
16.4 Apple backdoor order.html 112
16.5 httpsblog.torproject.orgblogdeterministic-builds-part-one-cyberwar-and-global-compromise.html 154
16.6 httpblog.cryptographyengineering.com201512on-juniper-backdoor.html.html 133
16.7 Examples of backdoors.html 123
16.8 Formal methods.html 105
16. Trust & Backdoors.mp4 24M
16. Trust & Backdoors.srt 13K
17.1 httpsearchenginewatch.comsewnews2351154google-censorship-ruling-in-canada-has-worldwide-implications.html 168
17.2 httpswww.google.comtransparencyreportremovalsgovernmenthl=en.html 129
17.3 httpswww.google.comtransparencyreportremovalseuropeprivacyhl=en.html 132
17. Censorship.mp4 6.5M
17. Censorship.srt 3.1K
18.1 httpwww.stationx.netalerts.html 91
18. Cyber Threat Intelligence – Stay Informed.mp4 2.6M
18. Cyber Threat Intelligence – Stay Informed.srt 1.2K
Recent Courses
CEHv13
HackTricks - AWS Red Team Expert (ARTE)
Certified Exploit Development Professional [CEDP]
Advance Exploitation Course By Umar Sabil
CompTIA Security+ (SY0-701 & SY0-601) Full Training Guide
ITProTV - LPIC-2 Linux Engineer (202-450)_
OffSec - PEN-210 - Foundational Wireless Network Attacks
OffSec EXP-301
FOR508 Videos 2023
Introduction Windows Malware Development
Red-Teaming-Exploit-Development-with-Assembly-and-C-MSAC
SEC450 Videos 2020
AWS Cloud Red Team Specialist [CARTS]
SEC670 MP3 2025.4
Zero Point Security - Red Team Ops 2025.2
Certified Red Team Analyst [CCRTA] 2022
EC Council - DroneWorkshop
HTB - AI Red Teamer 2025.3 Path
SEC670 Red Teaming Tools - Developing Windows Implants, Shellcode, Command and Control
Maltrak - Threat Hunting In Microsoft Sentinel and Defender
Hybrid Multi-Cloud Red Team Specialist [CHMRTS]
Stealth Cyber Operator [CSCO]
Process Injection Analyst [CPIA]
Red Team Specialist [CRTS V1]
Practical Hardware Hacking
Red Team Infra Dev [CRT-ID]
Purple Team Analyst [CPTA V1]
Assembly 101
EC-Council Certified Cloud Security Engineer (CCSE)
Udemy - Web Security & Bug Bounty Learn Penetration Testing 2025
INE - Advanced Web Application Penetration Testing (New)_
Windows Red Team Lab (CRTE) 2025.2
Mandiant - Malware Analysis 2025
13Cubed - Investigating Linux Devices
Zero Point Security - DevOps for Pentesters 2025.3
Offensive Development w Greg Hatcher & John Stigerwalt
Pluralsight - Windows Server 2022 Administration
BittenTech - TechHacker Ethical Hacking and Cyber Security
Kaspersky - Hunting APTs like a Ninja with YARA
A-Windows_Process_Injection_For_Red-Blue_Team
QURE Academy - Advanced Attacks Against Active Directory
EC-Council - Certified Network Defender v3 2024.11
EC-Council - Cyber Security Technician
PEN-200 - Penetration Testing with Kali Linux Videos
EDRPv3 EC-Council Disaster Recovery Professional
OffSec - PEN-200 2024.11
Practical Analysis with Security Onion
SANS ON DEMAND COURSE
Top 5 Tools & Techniques for Penetration Testing
CVE's for Bug Bounties & Penetration Testing
Creating Batch Scripts For Android
Oreilly - Mastering Cybersecurity with Python - From Basics to Advanced Defense
Recon For Bug Bounties & Penetration Testing
Bug Bounty Hunting and Penetration Testing v2
Bug Bounty Hunting and Penetration Testing v1
Bootcamp de Backend Avanzado_ Microservicios
Sketchup desde Cero para Arquitectos
Creación y consulta de bases de datos con ChatGPT y SQL
Storytelling Audiovisual para redes sociales
Introducción a Frameworks de Frontend con Vue 3"
Trafficker Expert
2. Digital Marketing Course ( English )
Creación de videojuegos
Master en Creación de Videojuegos
Photoshop 2020 para fotógrafos. Conoce el Retoque nivel PRO!
Soporte Técnico a Computadoras en Entornos Corporativos
13 CURSO DE REPARACION DE IMPRESORAS
18. Copywriting como escribir para vender mas
Master en Reparación de iPhone
Crea Aplicaciones Java Web
Curso de creación de bots [CodigoFacilito]
Maestría en CSS3 Flexbox, Grid, SASS, Bootstrap 5
Robótica con Matlab Cinemática directa y Simulación
COMMUNITY AND CONTENT MANAGER
Aprende Android con Ejemplos
Adobe Premiere desde Cero
ELECTRICIDAD
Invertir en Criptomonedas - Blockchain - Trading - DeFi - UDEMY
Angular - De cero a experto
Electrónica desde cero
Creación de videojuegos
Universidad del dropshipping
Cursos PhotoShop
reparacion de ps2
Curso de Linux s4vitar
rofesional en Reparacion de Laptops
Curso Marketing PRO Masterclass - John Dani
Curso de Reparación de Discos Duros y Recuperación de Datos
CURSO WORD, POWERPOINT
EXCEL DE PRINCIPIANTE A EXPERTO
CURSO SOLIDWORKS
Seguridad Informática desde Cero
Master Unreal Engine 4 Para Arquitectura en Español
Aprende.realidad.aumentada.con.ARKit
COMO VENDER POR FB e IG ADS - FELIPE VERGARA
AUTOCAD 2019 DE PRINCIPIANTE A AVANZADO
Curso Word
Curso Adobe Illustrator Sé un experto en ilustración digital
Universidad Python 2021 - POO, Django, Flask y Postgresql