elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
18. Cyber Threat Intelligence – Stay Informed.srt 1.2K
18. Cyber Threat Intelligence – Stay Informed.mp4 2.6M
18.1 httpwww.stationx.netalerts.html 91
17. Censorship.srt 3.1K
17. Censorship.mp4 6.5M
17.3 httpswww.google.comtransparencyreportremovalseuropeprivacyhl=en.html 132
17.2 httpswww.google.comtransparencyreportremovalsgovernmenthl=en.html 129
17.1 httpsearchenginewatch.comsewnews2351154google-censorship-ruling-in-canada-has-worldwide-implications.html 168
16. Trust & Backdoors.srt 13K
16. Trust & Backdoors.mp4 24M
16.8 Formal methods.html 105
16.7 Examples of backdoors.html 123
16.6 httpblog.cryptographyengineering.com201512on-juniper-backdoor.html.html 133
16.5 httpsblog.torproject.orgblogdeterministic-builds-part-one-cyberwar-and-global-compromise.html 154
16.4 Apple backdoor order.html 112
16.3 httpsreproducible-builds.org.html 93
16.2 Apple removes malware infected apps from the app store.html 165
16.1 Video on how to build your own software reproducibly.html 142
15. Regulating encryption, mandating insecurity & legalizing spying.srt 18K
15. Regulating encryption, mandating insecurity & legalizing spying.mp4 43M
15.13 Kazakhstans new encryption law.html 185
15.12 A Worldwide Survey of E ncryption Products - xls.html 154
15.11 Matt Blaze Speaking to a US congressional committee.html 107
15.10 httpswww.csoonline.comarticle3213033securitynsa-whistleblower-william-binney-presented-how-the-nsa-tracks-you-at-sha2017.html.html 193
15.9 Report - Keys Under Doormats Mandating insecurity by requiring government access to all data and communication.html 150
15.8 UK data communications bill.html 121
15.7 WhatsApp was Banned for 48 Hours in Brazil.html 112
15.6 MATT BLAZE - DECIPHERING THE DEBATE OVER ENCRYPTION.html 160
15.5 Clipper chip.html 192
15.4 httpcis-india.orginternet-governancebloghow-india-regulates-encryption.html 137
15.3 The Case against Regulating Encryption Technology.html 112
15.2 NSA Admits It Collects Too MUCH Info to Stop Terror Attacks.html 204
15.1 A Worldwide Survey of Encryption Products - pdf.html 153
14. Governments, spies and secret stuff part II.srt 12K
14. Governments, spies and secret stuff part II.mp4 30M
14.6 httpscryptome.org201401nsa-codenames.htm.html 107
14.5 httpsnsa.gov1.infodninsa-ant-catalog.html 103
14.4 httpswikileaks.org-Leaks-.html.html 95
14.3 Through a PRISM, Darkly - Everything we know about NSA spying [30c3].html 104
14.2 httpwww.nsaplayset.org.html 87
14.1 httpstheintercept.com.html 86
13. Governments, spies and secret stuff part I.srt 6.6K
13. Governments, spies and secret stuff part I.mp4 27M
12. Darknets, Dark Markets and Exploit kits.srt 9.4K
12. Darknets, Dark Markets and Exploit kits.mp4 32M
12.1 httpswww.deepdotweb.comdark-net-market-comparison-chart.html 121
11. CPU Hijackers - Crypto Mining Malware and Cryptojackers.srt 11K
11. CPU Hijackers - Crypto Mining Malware and Cryptojackers.mp4 16M
11.10 httpstorrentfreak.compirate-bay-is-mining-cryptocurrency-again-no-opt-out-171011.html 146
11.9 Cryptocurrency Mining Malware Infected Over Half-Million PCs Using an NSA Exploit.html 129
11.8 httpsarstechnica.cominformation-technology201801now-even-youtube-serves-ads-with-cpu-draining-cryptocurrency-miners.html 184
11.7 httpsgithub.comhoshsadiqadblock-nocoin-list.html 110
11.6 httpsaddons.mozilla.orgen-USfirefoxaddonublock-origin.html 122
11.5 httpscoinhive.com.html 82
11.4 httpsaddons.mozilla.orgen-GBfirefoxaddonno-coin.html 116
11.3 httpswww.engadget.com20180213attackers-telegram-deliver-cryptocurrency-mining-malware.html 154
11.2 httpbgr.com20180213android-malware-mining-cryptocurrency-monero-xmr.html 136
11.1 httpsthehackernews.com201802cryptojacking-malware.html.html 121
10. Social engineering - Scams, cons, tricks and fraud.srt 6.7K
10. Social engineering - Scams, cons, tricks and fraud.mp4 12M
10.3 httpwww.consumerfraudreporting.org.html 98
10.2 httpwww.actionfraud.police.uktypes_of_fraud.html 108
10.1 Top 10 scams.html 127
9. Spamming & Doxing.srt 3.9K
9. Spamming & Doxing.mp4 4.8M
9.2 Spam stats.html 104
9.1 Spam example.html 142
8. What is Phishing, Vishing and SMShing.srt 17K
8. What is Phishing, Vishing and SMShing.mp4 26M
8.3 XSS example vulnerability.html 136
8.2 Homograph attack using internationalized domain name.html 134
8.1 Live phishing links.html 87
7. Spyware, Adware, Scareware, PUPs & Browser hijacking.srt 6.0K
7. Spyware, Adware, Scareware, PUPs & Browser hijacking.mp4 11M
7.4 httpwww.telegraph.co.uknewsworldnewsnorthamericausa11416985Millions-of-computers-may-be-compromised-by-US-spyware-report.html.html 195
7.3 httpssecurelist.comanalysisquarterly-malware-reports72493it-threat-evolution-in-q3-2015.html 156
7.2 httpwww.mcafee.comusresourcesreportsrp-quarterly-threat-q4-2014.pdf.html 135
7.1 httpwww.slate.comarticlestechnologybitwise201502lenovo_superfish_scandal_why_it_s_one_of_the_worst_consumer_computing_screw.html.html 198
6. Malware, viruses, rootkits and RATs.srt 8.2K
6. Malware, viruses, rootkits and RATs.mp4 12M
6.5 Report - Spotlight perils of malvertisements.html 142
6.4 SophosLabs 2018 Malware Forecast.html 162
6.3 Chef Jamie Oliver’s website hacked for the third time.html 106
6.2 Malware stats.html 107
6.1 7 most common RATs.html 149
5. Hackers, crackers and cyber criminals.srt 3.4K
5. Hackers, crackers and cyber criminals.mp4 7.7M
4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.srt 12K
4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.mp4 38M
4.3 Exploit Kit Landscape Map.html 99
4.2 httpswww.exploit-db.comsearch.html 95
4.1 CVE details.html 88
3. The Top 3 Things You Need To Stay Safe Online.srt 1.6K
3. The Top 3 Things You Need To Stay Safe Online.mp4 2.5M
3.1 httpsresearch.google.compubspub43963.html.html 107
2. Why You Need Security – The Value Of A Hack.srt 6.7K
2. Why You Need Security – The Value Of A Hack.mp4 29M
2.2 httpkrebsonsecurity.com201306the-value-of-a-hacked-email-account.html 132
2.1 httpkrebsonsecurity.com201210the-scrap-value-of-a-hacked-pc-revisited.html 137
1. Goals and Learning Objectives.srt 1.2K
1. Goals and Learning Objectives.mp4 2.9M