elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
001-Introduction_to_IoT_Security.mp4 100M
002-Mapping_Attack_surface_and_previous_vulnerabilities.mp4 105M
002-b-Setting_up_your_IoT_pentesting_VM.pdf 255K
002-b-Setting_up_your_IoT_pentesting_VM_.mp4 99M
003-Firmware_analysis_-_Identifying_hardcoded_secrets.mp4 65M
003-a-Firmware_Analysis_101.mp4 169M
004-Emulating_firmware_binary.mp4 97M
005-Backdooring_a_firmware_-_1_.mp4 81M
006-Backdooring_a_firmware_-_2.mp4 126M
007-Firmware_Emulation_using_FAT.mp4 80M
008-Web_application_security_for_IoT_devices.mp4 90M
009-Using_Burp_for_IoT_Web_app_security.mp4 67M
010-Exploiting_Command_Injection_-_Part_1.mp4 59M
011-Exploiting_Command_Injection_-_Part_2.mp4 63M
012-CSRF_and_Firmware_diffing.mp4 90M
013-Conventional_Attack_vectors_.mp4 84M
014-Conventional_attack_vectors_-_Password_cracking.mp4 64M
015-Analysing_Smart_Plug_-_Getting_started.mp4 92M
016-Reversing_Smart_plug_encryption.mp4 137M
017-Controlling_Smart_Plug.mp4 97M
018-Getting_started_with_ARM.mp4 220M
019-Buffer_overflow_on_ARM_.mp4 101M
020-Exploit_Development_on_ARM.mp4 129M
021-Using_Radare2_for_MIPS_binary_analysis.mp4 163M
022-Exploitation_using_GDB_remote_debugging_on_MIPS.mp4 153M
023-Introduction_to_Serial_Interfacing_and_UART.mp4 154M
024-Serial_interfacing_over_UART_.mp4 78M
025-NAND_Glitching.mp4 84M
026-SPI_and_I2C_-_Introduction_and_Dumping_data.mp4 135M
027-Writing_and_Reading_EEPROM_using_Arduino.mp4 51M
028-Introduction_to_JTAG.mp4 85M
029-Identifying_JTAG_pinouts_using_Arduino.mp4 103M
030-JTAGulator.mp4 87M
031-Debugging_with_JTAG.mp4 138M
032-Introduction_to_SDR.mp4 164M
033-Getting_started_with_GNU_Radio_companion.mp4 100M
034-Decoding_captured_AM_Signal.mp4 44M
035-Capturing_FM_signals_using_RTL-SDR.mp4 106M
036-Analysing_wireless_doorbells_using_RTL-SDR.mp4 83M
037-Extracting_text_from_signal.mp4 106M
038-Extracting_text_from_Signal_-_part_2_(using_Audacity)_.mp4 98M
039-a-Introduction_to_BLE.mp4 115M
039-b-BLE_Cracking_and_Pairing_modes.mp4 179M
040-Sniffing_BLE_using_Ubertooth.mp4 112M
041-Introduction_to_Zigbee_and_Sniffing.mp4 140M
042-a-Zigbee_Exploitation_-_part_one_.mp4 93M
042-b-Zigbee_Exploitation_-_Part_2.mp4 125M
Offensive_IoT_Exploitation_-_SecurityTube.pdf 80M
allsubtitles.zip 231K
exercisefiles.zip 147M
Recent Courses
Creación de videojuegos
Universidad del dropshipping
Cursos PhotoShop
reparacion de ps2
Curso de Linux s4vitar
Profesional en Reparacion de Laptops
Curso Marketing PRO Masterclass - John Dani
Curso de Reparación de Discos Duros y Recuperación de Datos
CURSO WORD, POWERPOINT
EXCEL DE PRINCIPIANTE A EXPERTO
CURSO SOLIDWORKS
Seguridad Informática desde Cero
Master Unreal Engine 4 Para Arquitectura en Español
Aprende.realidad.aumentada.con.ARKit
COMO VENDER POR FB e IG ADS - FELIPE VERGARA