elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
exercisefiles.zip 147M
allsubtitles.zip 231K
Offensive_IoT_Exploitation_-_SecurityTube.pdf 80M
042-b-Zigbee_Exploitation_-_Part_2.mp4 125M
042-a-Zigbee_Exploitation_-_part_one_.mp4 93M
041-Introduction_to_Zigbee_and_Sniffing.mp4 140M
040-Sniffing_BLE_using_Ubertooth.mp4 112M
039-b-BLE_Cracking_and_Pairing_modes.mp4 179M
039-a-Introduction_to_BLE.mp4 115M
038-Extracting_text_from_Signal_-_part_2_(using_Audacity)_.mp4 98M
037-Extracting_text_from_signal.mp4 106M
036-Analysing_wireless_doorbells_using_RTL-SDR.mp4 83M
035-Capturing_FM_signals_using_RTL-SDR.mp4 106M
034-Decoding_captured_AM_Signal.mp4 44M
033-Getting_started_with_GNU_Radio_companion.mp4 100M
032-Introduction_to_SDR.mp4 164M
031-Debugging_with_JTAG.mp4 138M
030-JTAGulator.mp4 87M
029-Identifying_JTAG_pinouts_using_Arduino.mp4 103M
028-Introduction_to_JTAG.mp4 85M
027-Writing_and_Reading_EEPROM_using_Arduino.mp4 51M
026-SPI_and_I2C_-_Introduction_and_Dumping_data.mp4 135M
025-NAND_Glitching.mp4 84M
024-Serial_interfacing_over_UART_.mp4 78M
023-Introduction_to_Serial_Interfacing_and_UART.mp4 154M
022-Exploitation_using_GDB_remote_debugging_on_MIPS.mp4 153M
021-Using_Radare2_for_MIPS_binary_analysis.mp4 163M
020-Exploit_Development_on_ARM.mp4 129M
019-Buffer_overflow_on_ARM_.mp4 101M
018-Getting_started_with_ARM.mp4 220M
017-Controlling_Smart_Plug.mp4 97M
016-Reversing_Smart_plug_encryption.mp4 137M
015-Analysing_Smart_Plug_-_Getting_started.mp4 92M
014-Conventional_attack_vectors_-_Password_cracking.mp4 64M
013-Conventional_Attack_vectors_.mp4 84M
012-CSRF_and_Firmware_diffing.mp4 90M
011-Exploiting_Command_Injection_-_Part_2.mp4 63M
010-Exploiting_Command_Injection_-_Part_1.mp4 59M
009-Using_Burp_for_IoT_Web_app_security.mp4 67M
008-Web_application_security_for_IoT_devices.mp4 90M
007-Firmware_Emulation_using_FAT.mp4 80M
006-Backdooring_a_firmware_-_2.mp4 126M
005-Backdooring_a_firmware_-_1_.mp4 81M
004-Emulating_firmware_binary.mp4 97M
003-a-Firmware_Analysis_101.mp4 169M
003-Firmware_analysis_-_Identifying_hardcoded_secrets.mp4 65M
002-b-Setting_up_your_IoT_pentesting_VM_.mp4 99M
002-b-Setting_up_your_IoT_pentesting_VM.pdf 255K
002-Mapping_Attack_surface_and_previous_vulnerabilities.mp4 105M
001-Introduction_to_IoT_Security.mp4 100M