elhacker.INFO Downloads
Name Last modified Size
Parent Directory -
1. Goals and Learning Objectives.mp4 2022-04-17 19:17 2.9M
1. Goals and Learning Objectives.srt 2022-04-17 19:17 1.2K
2.1 httpkrebsonsecurity.com201210the-scrap-value-of-a-hacked-pc-revisited.html 2022-04-17 19:17 137
2.2 httpkrebsonsecurity.com201306the-value-of-a-hacked-email-account.html 2022-04-17 19:17 132
2. Why You Need Security – The Value Of A Hack.mp4 2022-04-17 19:17 29M
2. Why You Need Security – The Value Of A Hack.srt 2022-04-17 19:17 6.7K
3.1 httpsresearch.google.compubspub43963.html.html 2022-04-17 19:17 107
3. The Top 3 Things You Need To Stay Safe Online.mp4 2022-04-17 19:17 2.5M
3. The Top 3 Things You Need To Stay Safe Online.srt 2022-04-17 19:17 1.6K
4.1 CVE details.html 2022-04-17 19:17 88
4.2 httpswww.exploit-db.comsearch.html 2022-04-17 19:17 95
4.3 Exploit Kit Landscape Map.html 2022-04-17 19:17 99
4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.mp4 2022-04-17 19:17 38M
4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.srt 2022-04-17 19:17 12K
5. Hackers, crackers and cyber criminals.mp4 2022-04-17 19:17 7.7M
5. Hackers, crackers and cyber criminals.srt 2022-04-17 19:17 3.4K
6.1 7 most common RATs.html 2022-04-17 19:17 149
6.2 Malware stats.html 2022-04-17 19:17 107
6.3 Chef Jamie Oliver’s website hacked for the third time.html 2022-04-17 19:17 106
6.4 SophosLabs 2018 Malware Forecast.html 2022-04-17 19:17 162
6.5 Report - Spotlight perils of malvertisements.html 2022-04-17 19:17 142
6. Malware, viruses, rootkits and RATs.mp4 2022-04-17 19:17 12M
6. Malware, viruses, rootkits and RATs.srt 2022-04-17 19:17 8.2K
7.1 httpwww.slate.comarticlestechnologybitwise201502lenovo_superfish_scandal_why_it_s_one_of_the_worst_consumer_computing_screw.html.html 2022-04-17 19:17 198
7.2 httpwww.mcafee.comusresourcesreportsrp-quarterly-threat-q4-2014.pdf.html 2022-04-17 19:17 135
7.3 httpssecurelist.comanalysisquarterly-malware-reports72493it-threat-evolution-in-q3-2015.html 2022-04-17 19:17 156
7.4 httpwww.telegraph.co.uknewsworldnewsnorthamericausa11416985Millions-of-computers-may-be-compromised-by-US-spyware-report.html.html 2022-04-17 19:17 195
7. Spyware, Adware, Scareware, PUPs & Browser hijacking.mp4 2022-04-17 19:17 11M
7. Spyware, Adware, Scareware, PUPs & Browser hijacking.srt 2022-04-17 19:17 6.0K
8.1 Live phishing links.html 2022-04-17 19:17 87
8.2 Homograph attack using internationalized domain name.html 2022-04-17 19:17 134
8.3 XSS example vulnerability.html 2022-04-17 19:17 136
8. What is Phishing, Vishing and SMShing.mp4 2022-04-17 19:17 26M
8. What is Phishing, Vishing and SMShing.srt 2022-04-17 19:17 17K
9.1 Spam example.html 2022-04-17 19:17 142
9.2 Spam stats.html 2022-04-17 19:17 104
9. Spamming & Doxing.mp4 2022-04-17 19:17 4.8M
9. Spamming & Doxing.srt 2022-04-17 19:17 3.9K
10.1 Top 10 scams.html 2022-04-17 19:17 127
10.2 httpwww.actionfraud.police.uktypes_of_fraud.html 2022-04-17 19:17 108
10.3 httpwww.consumerfraudreporting.org.html 2022-04-17 19:17 98
10. Social engineering - Scams, cons, tricks and fraud.mp4 2022-04-17 19:17 12M
10. Social engineering - Scams, cons, tricks and fraud.srt 2022-04-17 19:17 6.7K
11.1 httpsthehackernews.com201802cryptojacking-malware.html.html 2022-04-17 19:17 121
11.2 httpbgr.com20180213android-malware-mining-cryptocurrency-monero-xmr.html 2022-04-17 19:17 136
11.3 httpswww.engadget.com20180213attackers-telegram-deliver-cryptocurrency-mining-malware.html 2022-04-17 19:17 154
11.4 httpsaddons.mozilla.orgen-GBfirefoxaddonno-coin.html 2022-04-17 19:17 116
11.5 httpscoinhive.com.html 2022-04-17 19:17 82
11.6 httpsaddons.mozilla.orgen-USfirefoxaddonublock-origin.html 2022-04-17 19:17 122
11.7 httpsgithub.comhoshsadiqadblock-nocoin-list.html 2022-04-17 19:17 110
11.8 httpsarstechnica.cominformation-technology201801now-even-youtube-serves-ads-with-cpu-draining-cryptocurrency-miners.html 2022-04-17 19:17 184
11.9 Cryptocurrency Mining Malware Infected Over Half-Million PCs Using an NSA Exploit.html 2022-04-17 19:17 129
11.10 httpstorrentfreak.compirate-bay-is-mining-cryptocurrency-again-no-opt-out-171011.html 2022-04-17 19:17 146
11. CPU Hijackers - Crypto Mining Malware and Cryptojackers.mp4 2022-04-17 19:17 16M
11. CPU Hijackers - Crypto Mining Malware and Cryptojackers.srt 2022-04-17 19:17 11K
12.1 httpswww.deepdotweb.comdark-net-market-comparison-chart.html 2022-04-17 19:17 121
12. Darknets, Dark Markets and Exploit kits.mp4 2022-04-17 19:17 32M
12. Darknets, Dark Markets and Exploit kits.srt 2022-04-17 19:17 9.4K
13. Governments, spies and secret stuff part I.mp4 2022-04-17 19:17 27M
13. Governments, spies and secret stuff part I.srt 2022-04-17 19:17 6.6K
14.1 httpstheintercept.com.html 2022-04-17 19:17 86
14.2 httpwww.nsaplayset.org.html 2022-04-17 19:17 87
14.3 Through a PRISM, Darkly - Everything we know about NSA spying [30c3].html 2022-04-17 19:17 104
14.4 httpswikileaks.org-Leaks-.html.html 2022-04-17 19:17 95
14.5 httpsnsa.gov1.infodninsa-ant-catalog.html 2022-04-17 19:17 103
14.6 httpscryptome.org201401nsa-codenames.htm.html 2022-04-17 19:17 107
14. Governments, spies and secret stuff part II.mp4 2022-04-17 19:17 30M
14. Governments, spies and secret stuff part II.srt 2022-04-17 19:17 12K
15.1 A Worldwide Survey of Encryption Products - pdf.html 2022-04-17 19:17 153
15.2 NSA Admits It Collects Too MUCH Info to Stop Terror Attacks.html 2022-04-17 19:17 204
15.3 The Case against Regulating Encryption Technology.html 2022-04-17 19:17 112
15.4 httpcis-india.orginternet-governancebloghow-india-regulates-encryption.html 2022-04-17 19:17 137
15.5 Clipper chip.html 2022-04-17 19:17 192
15.6 MATT BLAZE - DECIPHERING THE DEBATE OVER ENCRYPTION.html 2022-04-17 19:17 160
15.7 WhatsApp was Banned for 48 Hours in Brazil.html 2022-04-17 19:17 112
15.8 UK data communications bill.html 2022-04-17 19:17 121
15.9 Report - Keys Under Doormats Mandating insecurity by requiring government access to all data and communication.html 2022-04-17 19:17 150
15.10 httpswww.csoonline.comarticle3213033securitynsa-whistleblower-william-binney-presented-how-the-nsa-tracks-you-at-sha2017.html.html 2022-04-17 19:17 193
15.11 Matt Blaze Speaking to a US congressional committee.html 2022-04-17 19:17 107
15.12 A Worldwide Survey of E ncryption Products - xls.html 2022-04-17 19:17 154
15.13 Kazakhstans new encryption law.html 2022-04-17 19:17 185
15. Regulating encryption, mandating insecurity & legalizing spying.mp4 2022-04-17 19:17 43M
15. Regulating encryption, mandating insecurity & legalizing spying.srt 2022-04-17 19:17 18K
16.1 Video on how to build your own software reproducibly.html 2022-04-17 19:17 142
16.2 Apple removes malware infected apps from the app store.html 2022-04-17 19:17 165
16.3 httpsreproducible-builds.org.html 2022-04-17 19:17 93
16.4 Apple backdoor order.html 2022-04-17 19:17 112
16.5 httpsblog.torproject.orgblogdeterministic-builds-part-one-cyberwar-and-global-compromise.html 2022-04-17 19:17 154
16.6 httpblog.cryptographyengineering.com201512on-juniper-backdoor.html.html 2022-04-17 19:17 133
16.7 Examples of backdoors.html 2022-04-17 19:17 123
16.8 Formal methods.html 2022-04-17 19:17 105
16. Trust & Backdoors.mp4 2022-04-17 19:17 24M
16. Trust & Backdoors.srt 2022-04-17 19:17 13K
17.1 httpsearchenginewatch.comsewnews2351154google-censorship-ruling-in-canada-has-worldwide-implications.html 2022-04-17 19:17 168
17.2 httpswww.google.comtransparencyreportremovalsgovernmenthl=en.html 2022-04-17 19:17 129
17.3 httpswww.google.comtransparencyreportremovalseuropeprivacyhl=en.html 2022-04-17 19:17 132
17. Censorship.mp4 2022-04-17 19:17 6.5M
17. Censorship.srt 2022-04-17 19:17 3.1K
18.1 httpwww.stationx.netalerts.html 2022-04-17 19:17 91
18. Cyber Threat Intelligence – Stay Informed.mp4 2022-04-17 19:17 2.6M
18. Cyber Threat Intelligence – Stay Informed.srt 2022-04-17 19:17 1.2K