elhacker.INFO Downloads

[ index of contents ]

Copyright issues contact webmaster@elhacker.info
Icon  Name                                                           Size  
[Volver] Parent Directory - [Fichero comrpimido] exercisefiles.zip 147M [Fichero comrpimido] allsubtitles.zip 231K [Fichero PDF] Offensive_IoT_Exploitation_-_SecurityTube.pdf 80M [VID] 042-b-Zigbee_Exploitation_-_Part_2.mp4 125M [VID] 042-a-Zigbee_Exploitation_-_part_one_.mp4 93M [VID] 041-Introduction_to_Zigbee_and_Sniffing.mp4 140M [VID] 040-Sniffing_BLE_using_Ubertooth.mp4 112M [VID] 039-b-BLE_Cracking_and_Pairing_modes.mp4 179M [VID] 039-a-Introduction_to_BLE.mp4 115M [VID] 038-Extracting_text_from_Signal_-_part_2_(using_Audacity)_.mp4 98M [VID] 037-Extracting_text_from_signal.mp4 106M [VID] 036-Analysing_wireless_doorbells_using_RTL-SDR.mp4 83M [VID] 035-Capturing_FM_signals_using_RTL-SDR.mp4 106M [VID] 034-Decoding_captured_AM_Signal.mp4 44M [VID] 033-Getting_started_with_GNU_Radio_companion.mp4 100M [VID] 032-Introduction_to_SDR.mp4 164M [VID] 031-Debugging_with_JTAG.mp4 138M [VID] 030-JTAGulator.mp4 87M [VID] 029-Identifying_JTAG_pinouts_using_Arduino.mp4 103M [VID] 028-Introduction_to_JTAG.mp4 85M [VID] 027-Writing_and_Reading_EEPROM_using_Arduino.mp4 51M [VID] 026-SPI_and_I2C_-_Introduction_and_Dumping_data.mp4 135M [VID] 025-NAND_Glitching.mp4 84M [VID] 024-Serial_interfacing_over_UART_.mp4 78M [VID] 023-Introduction_to_Serial_Interfacing_and_UART.mp4 154M [VID] 022-Exploitation_using_GDB_remote_debugging_on_MIPS.mp4 153M [VID] 021-Using_Radare2_for_MIPS_binary_analysis.mp4 163M [VID] 020-Exploit_Development_on_ARM.mp4 129M [VID] 019-Buffer_overflow_on_ARM_.mp4 101M [VID] 018-Getting_started_with_ARM.mp4 220M [VID] 017-Controlling_Smart_Plug.mp4 97M [VID] 016-Reversing_Smart_plug_encryption.mp4 137M [VID] 015-Analysing_Smart_Plug_-_Getting_started.mp4 92M [VID] 014-Conventional_attack_vectors_-_Password_cracking.mp4 64M [VID] 013-Conventional_Attack_vectors_.mp4 84M [VID] 012-CSRF_and_Firmware_diffing.mp4 90M [VID] 011-Exploiting_Command_Injection_-_Part_2.mp4 63M [VID] 010-Exploiting_Command_Injection_-_Part_1.mp4 59M [VID] 009-Using_Burp_for_IoT_Web_app_security.mp4 67M [VID] 008-Web_application_security_for_IoT_devices.mp4 90M [VID] 007-Firmware_Emulation_using_FAT.mp4 80M [VID] 006-Backdooring_a_firmware_-_2.mp4 126M [VID] 005-Backdooring_a_firmware_-_1_.mp4 81M [VID] 004-Emulating_firmware_binary.mp4 97M [VID] 003-a-Firmware_Analysis_101.mp4 169M [VID] 003-Firmware_analysis_-_Identifying_hardcoded_secrets.mp4 65M [VID] 002-b-Setting_up_your_IoT_pentesting_VM_.mp4 99M [Fichero PDF] 002-b-Setting_up_your_IoT_pentesting_VM.pdf 255K [VID] 002-Mapping_Attack_surface_and_previous_vulnerabilities.mp4 105M [VID] 001-Introduction_to_IoT_Security.mp4 100M