elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
11.5 httpscoinhive.com.html 82
14.1 httpstheintercept.com.html 86
8.1 Live phishing links.html 87
14.2 httpwww.nsaplayset.org.html 87
4.1 CVE details.html 88
18.1 httpwww.stationx.netalerts.html 91
16.3 httpsreproducible-builds.org.html 93
4.2 httpswww.exploit-db.comsearch.html 95
14.4 httpswikileaks.org-Leaks-.html.html 95
10.3 httpwww.consumerfraudreporting.org.html 98
4.3 Exploit Kit Landscape Map.html 99
14.5 httpsnsa.gov1.infodninsa-ant-catalog.html 103
9.2 Spam stats.html 104
14.3 Through a PRISM, Darkly - Everything we know about NSA spying [30c3].html 104
16.8 Formal methods.html 105
6.3 Chef Jamie Oliver’s website hacked for the third time.html 106
3.1 httpsresearch.google.compubspub43963.html.html 107
6.2 Malware stats.html 107
14.6 httpscryptome.org201401nsa-codenames.htm.html 107
15.11 Matt Blaze Speaking to a US congressional committee.html 107
10.2 httpwww.actionfraud.police.uktypes_of_fraud.html 108
11.7 httpsgithub.comhoshsadiqadblock-nocoin-list.html 110
15.3 The Case against Regulating Encryption Technology.html 112
15.7 WhatsApp was Banned for 48 Hours in Brazil.html 112
16.4 Apple backdoor order.html 112
11.4 httpsaddons.mozilla.orgen-GBfirefoxaddonno-coin.html 116
11.1 httpsthehackernews.com201802cryptojacking-malware.html.html 121
12.1 httpswww.deepdotweb.comdark-net-market-comparison-chart.html 121
15.8 UK data communications bill.html 121
11.6 httpsaddons.mozilla.orgen-USfirefoxaddonublock-origin.html 122
16.7 Examples of backdoors.html 123
10.1 Top 10 scams.html 127
11.9 Cryptocurrency Mining Malware Infected Over Half-Million PCs Using an NSA Exploit.html 129
17.2 httpswww.google.comtransparencyreportremovalsgovernmenthl=en.html 129
2.2 httpkrebsonsecurity.com201306the-value-of-a-hacked-email-account.html 132
17.3 httpswww.google.comtransparencyreportremovalseuropeprivacyhl=en.html 132
16.6 httpblog.cryptographyengineering.com201512on-juniper-backdoor.html.html 133
8.2 Homograph attack using internationalized domain name.html 134
7.2 httpwww.mcafee.comusresourcesreportsrp-quarterly-threat-q4-2014.pdf.html 135
8.3 XSS example vulnerability.html 136
11.2 httpbgr.com20180213android-malware-mining-cryptocurrency-monero-xmr.html 136
2.1 httpkrebsonsecurity.com201210the-scrap-value-of-a-hacked-pc-revisited.html 137
15.4 httpcis-india.orginternet-governancebloghow-india-regulates-encryption.html 137
6.5 Report - Spotlight perils of malvertisements.html 142
9.1 Spam example.html 142
16.1 Video on how to build your own software reproducibly.html 142
11.10 httpstorrentfreak.compirate-bay-is-mining-cryptocurrency-again-no-opt-out-171011.html 146
6.1 7 most common RATs.html 149
15.9 Report - Keys Under Doormats Mandating insecurity by requiring government access to all data and communication.html 150
15.1 A Worldwide Survey of Encryption Products - pdf.html 153
11.3 httpswww.engadget.com20180213attackers-telegram-deliver-cryptocurrency-mining-malware.html 154
15.12 A Worldwide Survey of E ncryption Products - xls.html 154
16.5 httpsblog.torproject.orgblogdeterministic-builds-part-one-cyberwar-and-global-compromise.html 154
7.3 httpssecurelist.comanalysisquarterly-malware-reports72493it-threat-evolution-in-q3-2015.html 156
15.6 MATT BLAZE - DECIPHERING THE DEBATE OVER ENCRYPTION.html 160
6.4 SophosLabs 2018 Malware Forecast.html 162
16.2 Apple removes malware infected apps from the app store.html 165
17.1 httpsearchenginewatch.comsewnews2351154google-censorship-ruling-in-canada-has-worldwide-implications.html 168
11.8 httpsarstechnica.cominformation-technology201801now-even-youtube-serves-ads-with-cpu-draining-cryptocurrency-miners.html 184
15.13 Kazakhstans new encryption law.html 185
15.5 Clipper chip.html 192
15.10 httpswww.csoonline.comarticle3213033securitynsa-whistleblower-william-binney-presented-how-the-nsa-tracks-you-at-sha2017.html.html 193
7.4 httpwww.telegraph.co.uknewsworldnewsnorthamericausa11416985Millions-of-computers-may-be-compromised-by-US-spyware-report.html.html 195
7.1 httpwww.slate.comarticlestechnologybitwise201502lenovo_superfish_scandal_why_it_s_one_of_the_worst_consumer_computing_screw.html.html 198
15.2 NSA Admits It Collects Too MUCH Info to Stop Terror Attacks.html 204
18. Cyber Threat Intelligence – Stay Informed.srt 1.2K
1. Goals and Learning Objectives.srt 1.2K
3. The Top 3 Things You Need To Stay Safe Online.srt 1.6K
17. Censorship.srt 3.1K
5. Hackers, crackers and cyber criminals.srt 3.4K
9. Spamming & Doxing.srt 3.9K
7. Spyware, Adware, Scareware, PUPs & Browser hijacking.srt 6.0K
13. Governments, spies and secret stuff part I.srt 6.6K
2. Why You Need Security – The Value Of A Hack.srt 6.7K
10. Social engineering - Scams, cons, tricks and fraud.srt 6.7K
6. Malware, viruses, rootkits and RATs.srt 8.2K
12. Darknets, Dark Markets and Exploit kits.srt 9.4K
11. CPU Hijackers - Crypto Mining Malware and Cryptojackers.srt 11K
4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.srt 12K
14. Governments, spies and secret stuff part II.srt 12K
16. Trust & Backdoors.srt 13K
8. What is Phishing, Vishing and SMShing.srt 17K
15. Regulating encryption, mandating insecurity & legalizing spying.srt 18K
3. The Top 3 Things You Need To Stay Safe Online.mp4 2.5M
18. Cyber Threat Intelligence – Stay Informed.mp4 2.6M
1. Goals and Learning Objectives.mp4 2.9M
9. Spamming & Doxing.mp4 4.8M
17. Censorship.mp4 6.5M
5. Hackers, crackers and cyber criminals.mp4 7.7M
7. Spyware, Adware, Scareware, PUPs & Browser hijacking.mp4 11M
10. Social engineering - Scams, cons, tricks and fraud.mp4 12M
6. Malware, viruses, rootkits and RATs.mp4 12M
11. CPU Hijackers - Crypto Mining Malware and Cryptojackers.mp4 16M
16. Trust & Backdoors.mp4 24M
8. What is Phishing, Vishing and SMShing.mp4 26M
13. Governments, spies and secret stuff part I.mp4 27M
2. Why You Need Security – The Value Of A Hack.mp4 29M
14. Governments, spies and secret stuff part II.mp4 30M
12. Darknets, Dark Markets and Exploit kits.mp4 32M
4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.mp4 38M
15. Regulating encryption, mandating insecurity & legalizing spying.mp4 43M