elhacker.INFO Downloads

[ index of contents ]

Copyright issues contact webmaster@elhacker.info
Icon  Name                                                                                                                                      Size  
[Volver] Parent Directory - [VID] 1. Goals and Learning Objectives.mp4 2.9M [TXT] 1. Goals and Learning Objectives.srt 1.2K [TXT] 2.1 httpkrebsonsecurity.com201210the-scrap-value-of-a-hacked-pc-revisited.html 137 [TXT] 2.2 httpkrebsonsecurity.com201306the-value-of-a-hacked-email-account.html 132 [VID] 2. Why You Need Security – The Value Of A Hack.mp4 29M [TXT] 2. Why You Need Security – The Value Of A Hack.srt 6.7K [TXT] 3.1 httpsresearch.google.compubspub43963.html.html 107 [VID] 3. The Top 3 Things You Need To Stay Safe Online.mp4 2.5M [TXT] 3. The Top 3 Things You Need To Stay Safe Online.srt 1.6K [TXT] 4.1 CVE details.html 88 [TXT] 4.2 httpswww.exploit-db.comsearch.html 95 [TXT] 4.3 Exploit Kit Landscape Map.html 99 [VID] 4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.mp4 38M [TXT] 4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.srt 12K [VID] 5. Hackers, crackers and cyber criminals.mp4 7.7M [TXT] 5. Hackers, crackers and cyber criminals.srt 3.4K [TXT] 6.1 7 most common RATs.html 149 [TXT] 6.2 Malware stats.html 107 [TXT] 6.3 Chef Jamie Oliver’s website hacked for the third time.html 106 [TXT] 6.4 SophosLabs 2018 Malware Forecast.html 162 [TXT] 6.5 Report - Spotlight perils of malvertisements.html 142 [VID] 6. Malware, viruses, rootkits and RATs.mp4 12M [TXT] 6. Malware, viruses, rootkits and RATs.srt 8.2K [TXT] 7.1 httpwww.slate.comarticlestechnologybitwise201502lenovo_superfish_scandal_why_it_s_one_of_the_worst_consumer_computing_screw.html.html 198 [TXT] 7.2 httpwww.mcafee.comusresourcesreportsrp-quarterly-threat-q4-2014.pdf.html 135 [TXT] 7.3 httpssecurelist.comanalysisquarterly-malware-reports72493it-threat-evolution-in-q3-2015.html 156 [TXT] 7.4 httpwww.telegraph.co.uknewsworldnewsnorthamericausa11416985Millions-of-computers-may-be-compromised-by-US-spyware-report.html.html 195 [VID] 7. Spyware, Adware, Scareware, PUPs & Browser hijacking.mp4 11M [TXT] 7. Spyware, Adware, Scareware, PUPs & Browser hijacking.srt 6.0K [TXT] 8.1 Live phishing links.html 87 [TXT] 8.2 Homograph attack using internationalized domain name.html 134 [TXT] 8.3 XSS example vulnerability.html 136 [VID] 8. What is Phishing, Vishing and SMShing.mp4 26M [TXT] 8. What is Phishing, Vishing and SMShing.srt 17K [TXT] 9.1 Spam example.html 142 [TXT] 9.2 Spam stats.html 104 [VID] 9. Spamming & Doxing.mp4 4.8M [TXT] 9. Spamming & Doxing.srt 3.9K [TXT] 10.1 Top 10 scams.html 127 [TXT] 10.2 httpwww.actionfraud.police.uktypes_of_fraud.html 108 [TXT] 10.3 httpwww.consumerfraudreporting.org.html 98 [VID] 10. Social engineering - Scams, cons, tricks and fraud.mp4 12M [TXT] 10. Social engineering - Scams, cons, tricks and fraud.srt 6.7K [TXT] 11.1 httpsthehackernews.com201802cryptojacking-malware.html.html 121 [TXT] 11.2 httpbgr.com20180213android-malware-mining-cryptocurrency-monero-xmr.html 136 [TXT] 11.3 httpswww.engadget.com20180213attackers-telegram-deliver-cryptocurrency-mining-malware.html 154 [TXT] 11.4 httpsaddons.mozilla.orgen-GBfirefoxaddonno-coin.html 116 [TXT] 11.5 httpscoinhive.com.html 82 [TXT] 11.6 httpsaddons.mozilla.orgen-USfirefoxaddonublock-origin.html 122 [TXT] 11.7 httpsgithub.comhoshsadiqadblock-nocoin-list.html 110 [TXT] 11.8 httpsarstechnica.cominformation-technology201801now-even-youtube-serves-ads-with-cpu-draining-cryptocurrency-miners.html 184 [TXT] 11.9 Cryptocurrency Mining Malware Infected Over Half-Million PCs Using an NSA Exploit.html 129 [TXT] 11.10 httpstorrentfreak.compirate-bay-is-mining-cryptocurrency-again-no-opt-out-171011.html 146 [VID] 11. CPU Hijackers - Crypto Mining Malware and Cryptojackers.mp4 16M [TXT] 11. CPU Hijackers - Crypto Mining Malware and Cryptojackers.srt 11K [TXT] 12.1 httpswww.deepdotweb.comdark-net-market-comparison-chart.html 121 [VID] 12. Darknets, Dark Markets and Exploit kits.mp4 32M [TXT] 12. Darknets, Dark Markets and Exploit kits.srt 9.4K [VID] 13. Governments, spies and secret stuff part I.mp4 27M [TXT] 13. Governments, spies and secret stuff part I.srt 6.6K [TXT] 14.1 httpstheintercept.com.html 86 [TXT] 14.2 httpwww.nsaplayset.org.html 87 [TXT] 14.3 Through a PRISM, Darkly - Everything we know about NSA spying [30c3].html 104 [TXT] 14.4 httpswikileaks.org-Leaks-.html.html 95 [TXT] 14.5 httpsnsa.gov1.infodninsa-ant-catalog.html 103 [TXT] 14.6 httpscryptome.org201401nsa-codenames.htm.html 107 [VID] 14. Governments, spies and secret stuff part II.mp4 30M [TXT] 14. Governments, spies and secret stuff part II.srt 12K [TXT] 15.1 A Worldwide Survey of Encryption Products - pdf.html 153 [TXT] 15.2 NSA Admits It Collects Too MUCH Info to Stop Terror Attacks.html 204 [TXT] 15.3 The Case against Regulating Encryption Technology.html 112 [TXT] 15.4 httpcis-india.orginternet-governancebloghow-india-regulates-encryption.html 137 [TXT] 15.5 Clipper chip.html 192 [TXT] 15.6 MATT BLAZE - DECIPHERING THE DEBATE OVER ENCRYPTION.html 160 [TXT] 15.7 WhatsApp was Banned for 48 Hours in Brazil.html 112 [TXT] 15.8 UK data communications bill.html 121 [TXT] 15.9 Report - Keys Under Doormats Mandating insecurity by requiring government access to all data and communication.html 150 [TXT] 15.10 httpswww.csoonline.comarticle3213033securitynsa-whistleblower-william-binney-presented-how-the-nsa-tracks-you-at-sha2017.html.html 193 [TXT] 15.11 Matt Blaze Speaking to a US congressional committee.html 107 [TXT] 15.12 A Worldwide Survey of E ncryption Products - xls.html 154 [TXT] 15.13 Kazakhstans new encryption law.html 185 [VID] 15. Regulating encryption, mandating insecurity & legalizing spying.mp4 43M [TXT] 15. Regulating encryption, mandating insecurity & legalizing spying.srt 18K [TXT] 16.1 Video on how to build your own software reproducibly.html 142 [TXT] 16.2 Apple removes malware infected apps from the app store.html 165 [TXT] 16.3 httpsreproducible-builds.org.html 93 [TXT] 16.4 Apple backdoor order.html 112 [TXT] 16.5 httpsblog.torproject.orgblogdeterministic-builds-part-one-cyberwar-and-global-compromise.html 154 [TXT] 16.6 httpblog.cryptographyengineering.com201512on-juniper-backdoor.html.html 133 [TXT] 16.7 Examples of backdoors.html 123 [TXT] 16.8 Formal methods.html 105 [VID] 16. Trust & Backdoors.mp4 24M [TXT] 16. Trust & Backdoors.srt 13K [TXT] 17.1 httpsearchenginewatch.comsewnews2351154google-censorship-ruling-in-canada-has-worldwide-implications.html 168 [TXT] 17.2 httpswww.google.comtransparencyreportremovalsgovernmenthl=en.html 129 [TXT] 17.3 httpswww.google.comtransparencyreportremovalseuropeprivacyhl=en.html 132 [VID] 17. Censorship.mp4 6.5M [TXT] 17. Censorship.srt 3.1K [TXT] 18.1 httpwww.stationx.netalerts.html 91 [VID] 18. Cyber Threat Intelligence – Stay Informed.mp4 2.6M [TXT] 18. Cyber Threat Intelligence – Stay Informed.srt 1.2K