elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
15. Regulating encryption, mandating insecurity & legalizing spying.mp4 43M
4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.mp4 38M
12. Darknets, Dark Markets and Exploit kits.mp4 32M
14. Governments, spies and secret stuff part II.mp4 30M
2. Why You Need Security – The Value Of A Hack.mp4 29M
13. Governments, spies and secret stuff part I.mp4 27M
8. What is Phishing, Vishing and SMShing.mp4 26M
16. Trust & Backdoors.mp4 24M
11. CPU Hijackers - Crypto Mining Malware and Cryptojackers.mp4 16M
6. Malware, viruses, rootkits and RATs.mp4 12M
10. Social engineering - Scams, cons, tricks and fraud.mp4 12M
7. Spyware, Adware, Scareware, PUPs & Browser hijacking.mp4 11M
5. Hackers, crackers and cyber criminals.mp4 7.7M
17. Censorship.mp4 6.5M
9. Spamming & Doxing.mp4 4.8M
1. Goals and Learning Objectives.mp4 2.9M
18. Cyber Threat Intelligence – Stay Informed.mp4 2.6M
3. The Top 3 Things You Need To Stay Safe Online.mp4 2.5M
15. Regulating encryption, mandating insecurity & legalizing spying.vtt 16K
8. What is Phishing, Vishing and SMShing.vtt 15K
16. Trust & Backdoors.vtt 11K
14. Governments, spies and secret stuff part II.vtt 11K
4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.vtt 11K
11. CPU Hijackers - Crypto Mining Malware and Cryptojackers.vtt 9.6K
12. Darknets, Dark Markets and Exploit kits.vtt 8.2K
6. Malware, viruses, rootkits and RATs.vtt 7.3K
10. Social engineering - Scams, cons, tricks and fraud.vtt 5.9K
13. Governments, spies and secret stuff part I.vtt 5.9K
2. Why You Need Security – The Value Of A Hack.vtt 5.9K
7. Spyware, Adware, Scareware, PUPs & Browser hijacking.vtt 5.3K
9. Spamming & Doxing.vtt 3.5K
5. Hackers, crackers and cyber criminals.vtt 3.0K
17. Censorship.vtt 2.7K
3. The Top 3 Things You Need To Stay Safe Online.vtt 1.4K
1. Goals and Learning Objectives.vtt 1.1K
18. Cyber Threat Intelligence – Stay Informed.vtt 1.1K
15.1 Clipper chip.html 192
15.7 Kazakhstans new encryption law.html 185
16.5 Apple removes malware infected apps from the app store.html 165
6.1 SophosLabs 2018 Malware Forecast.html 162
15.12 A Worldwide Survey of E ncryption Products - xls.html 154
15.6 A Worldwide Survey of Encryption Products - pdf.html 153
6.5 7 most common RATs.html 149
16.8 Video on how to build your own software reproducibly.html 142
9.2 Spam example.html 142
6.4 Report - Spotlight perils of malvertisements.html 142
15.5 httpcis-india.orginternet-governancebloghow-india-regulates-encryption.html 137
2.1 httpkrebsonsecurity.com201210the-scrap-value-of-a-hacked-pc-revisited.html 137
11.1 httpbgr.com20180213android-malware-mining-cryptocurrency-monero-xmr.html 136
8.2 XSS example vulnerability.html 136
7.4 httpwww.mcafee.comusresourcesreportsrp-quarterly-threat-q4-2014.pdf.html 135
8.1 Homograph attack using internationalized domain name.html 134
16.3 httpblog.cryptographyengineering.com201512on-juniper-backdoor.html.html 133
17.3 httpswww.google.comtransparencyreportremovalseuropeprivacyhl=en.html 132
2.2 httpkrebsonsecurity.com201306the-value-of-a-hacked-email-account.html 132
17.1 httpswww.google.comtransparencyreportremovalsgovernmenthl=en.html 129
10.2 Top 10 scams.html 127
16.1 Examples of backdoors.html 123
11.7 httpsaddons.mozilla.orgen-USfirefoxaddonublock-origin.html 122
15.13 UK data communications bill.html 121
12.1 httpswww.deepdotweb.comdark-net-market-comparison-chart.html 121
11.5 httpsthehackernews.com201802cryptojacking-malware.html.html 121
15.11 httpwww.crypto.compapersgovernmentreform-blaze2015.pdf.html 120
11.4 httpsaddons.mozilla.orgen-GBfirefoxaddonno-coin.html 116
16.6 Apple backdoor order.html 112
15.4 The Case against Regulating Encryption Technology.html 112
15.2 WhatsApp was Banned for 48 Hours in Brazil.html 112
11.8 httpsgithub.comhoshsadiqadblock-nocoin-list.html 110
10.1 httpwww.actionfraud.police.uktypes_of_fraud.html 108
15.10 Matt Blaze Speaking to a US congressional committee.html 107
14.4 httpscryptome.org201401nsa-codenames.htm.html 107
6.3 Malware stats.html 107
3.1 httpsresearch.google.compubspub43963.html.html 107
6.2 Chef Jamie Oliver’s website hacked for the third time.html 106
16.7 Formal methods.html 105
14.1 Through a PRISM, Darkly - Everything we know about NSA spying [30c3].html 104
9.1 Spam stats.html 104
14.2 httpsnsa.gov1.infodninsa-ant-catalog.html 103
4.1 Exploit Kit Landscape Map.html 99
10.3 httpwww.consumerfraudreporting.org.html 98
14.5 httpswikileaks.org-Leaks-.html.html 95
4.3 httpswww.exploit-db.comsearch.html 95
16.4 httpsreproducible-builds.org.html 93
18.1 httpwww.stationx.netalerts.html 91
4.2 CVE details.html 88
14.6 httpwww.nsaplayset.org.html 87
8.3 Live phishing links.html 87
14.3 httpstheintercept.com.html 86
11.6 httpscoinhive.com.html 82