elhacker.INFO Downloads

[ index of contents ]

Copyright issues contact webmaster@elhacker.info
Icon  Name                                                                                                    Size  
[Volver] Parent Directory - [TXT] 25.9 httpscanary.tools.html 82 [TXT] 17.2 httptomoyo.osdn.jp.html 83 [TXT] 17.1 httpswww.rsbac.org.html 84 [TXT] 8.1 voodooshield.com.html 85 [TXT] 16.9 httpsalpinelinux.org.html 85 [TXT] 25.3 httpswww.bromium.com.html 85 [TXT] 25.5 httpswww.invincea.com.html 86 [TXT] 8.2 AppGuard® Breach Prevention.html 87 [TXT] 17.4 httpspax.grsecurity.net.html 88 [TXT] 25.10 httpsattivonetworks.com.html 88 [TXT] 25.4 httpwww.deepinstinct.com.html 89 [TXT] 25.6 httpjavelin-networks.com.html 89 [TXT] 25.1 httpbufferzonesecurity.com.html 91 [TXT] 17.3 httpschreuders.orgFBAC-LSM.html 92 [TXT] 22.2 httpsgithub.comgooglesanta.html 92 [TXT] 10.2 HitmanPro.Alert.html 93 [TXT] 25.8 httpswww.illusivenetworks.com.html 94 [TXT] 16.5 Which is better, grsecurity, AppArmor or SELinux.html 95 [TXT] 16.6 grsecurity.net.html 96 [TXT] 15.3 SELinux on Debian.html 98 [TXT] 8.3 Kaspersky Internet Security 20xx.html 99 [TXT] 8.8 httpswww.carbonblack.comproducts.html 99 [TXT] 14.2 AppArmor From Wikipedia.html 99 [TXT] 23.1 httpscampaigns.f-secure.comxfence.html 99 [TXT] 15.1 SELinux Project Wiki.html 101 [TXT] 20.1 OS X About Gatekeeper.html 101 [TXT] 21.2 About System Integrity Protection on your Mac.html 101 [TXT] 25.7 httpswww.cylance.com.html 101 [TXT] 9.7 Whitepaper on Bypassing ASLRDEP.html 102 [TXT] 10.5 httpswww.malwarebytes.organtiexploit.html 102 [TXT] 14.1 AppArmor How To Use.html 102 [TXT] 12.2 Windows Defender Application Guard for Microsoft Edge.html 104 [TXT] 20.3 Gatekeeper Exposed - Video.html 104 [TXT] 24.4 httpsobjective-see.comproductsdhs.html.html 104 [TXT] 9.4 Microsoft - The Enhanced Mitigation Experience Toolkit.html 107 [TXT] 16.8 Hardening Debian for the Desktop Using Grsecurity.html 109 [TXT] 20.4 httpsobjective-see.comproductsostiarius.html.html 110 [TXT] 24.1 httpsobjective-see.comproductsoversight.html.html 110 [TXT] 4.2 User Account Control From Wikipedia.html 111 [TXT] 24.2 httpsobjective-see.comproductsransomwhere.html.html 112 [TXT] 8.4 NoVirusThanks EXE Radar Pro.html 113 [TXT] 9.2 Enhanced Mitigation Experience Toolkit (EMET).html 114 [TXT] 15.2 Security-Enhanced Linux From Wikipedia.html 114 [TXT] 21.3 httpsdeveloper.apple.comvideosplaywwdc2015706 - Video.html 114 [TXT] 2.1 the-backdoor-factory.html 115 [TXT] 3.2 Windows Permission Identifier.html 115 [TXT] 4.3 Windows 7 – How to Configure UAC (User Account Control).html 117 [TXT] 6.11 Bypass the Windows AppLocker bouncer with a tweet-size command.html 118 [TXT] 10.4 HitmanPro.Alert - Exploit Test Tool Manual.html 118 [TXT] 8.7 httpwww.mcafee.comusproductsapplication-control.aspx.html 119 [TXT] 3.3 How to Change File Permissions on Windows 7.html 120 [TXT] 8.6 Lumension Application Control.html 120 [TXT] 25.2 httpwww.faronics.comen-ukproductsdeep-freezestandard.html 121 [TXT] 4.1 User Account Control (UAC).html 122 [TXT] 9.3 EMET Guide To New Features - Video.html 122 [TXT] 11.5 Device Guard and Credential Guard hardware readiness tool.html 123 [TXT] 9.1 Microsoft - Moving Beyond EMET.html 124 [TXT] 16.1 Debian grsecurity kernel APT repository (unofficial).html 124 [TXT] 3.1 AccessEnum.html 125 [TXT] 9.5 Process Explorer.html 125 [TXT] 9.8 Process Explorer.html 125 [TXT] 10.1 Palo Alto Traps.html 125 [TXT] 16.7 Arch Linux kernel and modules with grsecurity.html 125 [TXT] 16.3 Linux Kernel Security (SELinux vs AppArmor vs Grsecurity).html 129 [TXT] 6.3 What Is AppLocker.html 131 [TXT] 6.4 AppLocker Step-by-Step Guide.html 131 [TXT] 6.5 Lock down Windows 10 to specific apps.html 131 [TXT] 11.1 Device Guard deployment guide.html 131 [TXT] 11.4 What's new in Windows 10, versions 1507 and 1511.html 131 [TXT] 20.5 Gatekeeper Exposed.html 132 [TXT] 6.8 Guide to Application Whitelisting.html 133 [TXT] 22.1 How to bypass Google’s Santa LOCKDOWN mode.html 137 [TXT] 9.9 ANGLER EXPLOIT KIT EVADING EMET.html 138 [TXT] 16.2 GrsecurityConfiguring and Installing grsecurity.html 139 [TXT] 20.2 Researchers slip malware onto Apple's App Store, again.html 139 [TXT] 9.6 CVE-2015-2545 ITW EMET Evasion.html 142 [TXT] 24.3 FREE TOOL PROTECTS MAC USERS FROM WEBCAM SURVEILLANCE.html 145 [TXT] 6.2 Finding Evil in the Whitelist.html 146 [TXT] 4.4 How User Account Control works.html 153 [TXT] 6.7 Restrict Access to Programs with AppLocker in Windows 7.html 156 [TXT] 11.2 Microsoft future security strategy - black hat talk.html 158 [TXT] 7.2 Ensure a Windows PC Never Gets Malware By Whitelisting Applications.html 161 [TXT] 12.1 Introducing Windows Defender Application Guard for Microsoft Edge.html 161 [TXT] 11.3 IOMMU A Detailed view.html 164 [TXT] 5.2 Use Software Restriction Policies to block viruses and malware.html 166 [TXT] 7.1 Test Parental control software for Windows and Mac OS X.html 166 [TXT] 19.1 How can I ensure only “whitelisted” applications run on OS X.html 167 [TXT] 17.5 Yama is a Linux Security Module.html 168 [TXT] 16.4 Which distributions maintain a kernel package with grsecurity support.html 178 [TXT] 6.9 Use AppLocker and Software Restriction Policies in the same domain.html 189 [VID] 24. Mac - Other Stuff!.mp4 3.7M [VID] 17. Linux - Security frameworks - PaX and more.mp4 3.8M [VID] 14. Linux - Security frameworks - AppArmor.mp4 4.4M [VID] 7. Windows - Application Control - Parental controls.mp4 4.9M [VID] 1. Goals and Learning Objectives.mp4 5.8M [VID] 15. Linux - Security frameworks - SElinux.mp4 6.7M [VID] 22. Mac - Application control - Santa.mp4 7.0M [VID] 19. Mac - Application control - Parental controls.mp4 8.0M [VID] 12. Windows - Defender Application Guard for Microsoft Edge.mp4 9.1M [VID] 26. Cylance.mp4 9.5M [VID] 20. Mac - Application control - Gatekeeper.mp4 10M [VID] 10. Windows - Exploitation Prevention - Traps, MBEA and HMPA.mp4 11M [VID] 5. Windows - Application control - Software Restriction Policies.mp4 11M [VID] 21. Mac - Application control - System Integrity Protection.mp4 12M [VID] 16. Linux - Security frameworks - Grsecurity.mp4 13M [VID] 13. Linux - Access Control Models.mp4 13M [VID] 4. Windows - Application control - User Account Control (UAC).mp4 15M [VID] 18. Linux & Mac - File permissions, POSIX and ACLs.mp4 19M [VID] 23. Mac - Application control - Xfence (Previously Little Flocker).mp4 20M [VID] 25. The New Normal For End-Point-Protection Technology.mp4 22M [VID] 11. Windows 10 - Device Guard.mp4 28M [VID] 6. Windows - Application control - AppLocker.mp4 32M [VID] 9. Windows - Exploitation Prevention - EMET.mp4 37M