Mirror

Aus Robert's Wiki
Wechseln zu: Navigation, Suche

The Free Haven Anonymity Bibliography by The Free Haven Team Source January 2016

Cryptologs by National Security Agency Source March 2013



COMSEC beyond encryption by Ben Nagy and The Grugq (2014) Source

Apple USB Ethernet Drivers for Windows 10 x64 by ASIX (2015) Source

Apple USB Ethernet Drivers for Windows 7 x64 by ASIX (2010) Source

itsutils - RAPI Tools by Willem Jan Hengeveld (2011) Source

The Power Of Nightmares - Part 1 - Baby It's Cold Outside by Adam Curtis, BBC (2004) Source

The Power Of Nightmares - Part 2 - The Phantom Victory by Adam Curtis, BBC (2004) Source

The Power Of Nightmares - Part 3 - The Shadows in the Cave by Adam Curtis, BBC (2004) Source

Visual Studio Code for OSX 0.10.16 by Microsoft (01/2016) Source

O&O ShutUp10 Version 1.2.1353 by O&O Software (12/2015) Source

Hackito Ergo Sum 2015 Keynote by JB & FX Source

Security Analysis of TrueCrypt by BSI (2015) Source

Octopus: A Secure and Anonymous DHT Lookup by Qiyan Wang, Nikita Borisov (2012) Source

Zero days - security leaks for sale by VPRO Backlight (2014) Source

HackBack: A DIY Guide for those without the patience to wait for whistleblowers (2015) Source

IPv6 Leakage and DNS Hijacking in Commercial VPN clients (2015) Source

Citizenfour Snowden Documentary by Laura Poitras (2015) Source

PoC||GTFO 0x00 by Pastor Manul Laphroaig (August 2013) Source

PoC||GTFO 0x01 by Pastor Manul Laphroaig (October 2013) Source

PoC||GTFO 0x02 by Pastor Manul Laphroaig (December 2013) Source

PoC||GTFO 0x03 by Pastor Manul Laphroaig (March 2014) Source

PoC||GTFO 0x04 by Pastor Manul Laphroaig (June 2014) Source

PoC||GTFO 0x05 by Pastor Manul Laphroaig (August 2014) Source

PoC||GTFO 0x06 by Pastor Manul Laphroaig (November 2014) Source

PoC||GTFO 0x07 by Pastor Manul Laphroaig (March 2015) Source

PoC||GTFO 0x08 by Pastor Manul Laphroaig (June 2015) Source

PoC||GTFO 0x09 by Pastor Manul Laphroaig (September 2015) Source

PoC||GTFO 0x10 by Pastor Manul Laphroaig (January 2016) Source

PoC||GTFO 0x11 by Pastor Manul Laphroaig (March 2016) Source

RTL8188CUS 802.11n Wi-Fi Adapter Drivers for OS X by Realtek (2012) Source

TrueCrypt 7.1a (OS X Yosemite) by TrueCrypt Foundation (2015) Source

GPG Suite 2015.06 by GPGTools (2015) Source

TrueCrypt 7.1a (Linux 64 Bit) by TrueCrypt Foundation (2015) Source

TrueCrypt 7.1a (Linux 32 Bit) by TrueCrypt Foundation (2015) Source

TrueCrypt 7.1a (OS X) by TrueCrypt Foundation (2015) Source

TrueCrypt 7.1a (Windows) by TrueCrypt Foundation (2015) Source

Counterstrike Lawful Intercept by FX (2013) Source

EtreCheck 1.9.15 by Etresoft (2014) Source

Cybersecurity as Realpolitik by Dan Geer (2014) Source

The Objective-C Programming Language by Apple (2003) Source

AppleScript Language Guide by Apple (2014) Source

NSA Surveillance and What To Do About It by Bruce Schneier, MIT (2014) Source

Die Vorratsdatenspeicherung in Europa, Deutschland und Bayern by Michael Biendl, Universität Regensburg (2012) Source

Catching and Understanding GSM-Signals by Fabian van den Broek, Radboud University Nijmegen (2010)

Spare One User Manual by SpareOne (2012)

Einführung in Ada by Ulrich Grude, TFH Berlin (2001)

Individuelle Schlüsselverifikation via Socialist Millionaires’ Protocol by Sven Moritz Hallberg (2008)

Telefonüberwachung in Bayern - Bei jedem Auslandstelefonat hört der BND mit?, Drucksache 13/8856 , G10-Gesetz by Bayerischer Landtag, 13. Wahlperiode (1997) Source

„Gesetz zur Neuregelung von Beschränkungen des Brief-, Post- und Fernmeldegeheimnisses“, G10-Gesetz by Deutscher Bundestag (2001)

„Gesetz zur Neuregelung von Beschränkungen des Brief-, Post- und Fernmeldegeheimnisses“, Begründung, G10-Gesetz by Deutscher Bundestag (2001)

Quick introduction to reverse engineering for beginners by Dennis Yurichev (2013) Source

How To Write Unmaintainable Code via The Hacker's Choice (2004) Source

Hiding Data in Hard-Drive’s Service Areas by Ariel Berkman, Recover Information Technologies LTD (2013) Source

"On the existence of ... (ECHELON interception system), (2001/2098(INI))" by EP Temporary Committee on ECHELON (2001) Source

Proximax: A Measurement Based System for Proxies Dissemination by Damon McCoy, Jose Andre Morales and Kirill Levchenko (2012) Source

IRISS Report: Deliverable D1.1 Surveillance, fighting, crime and violence by IRISS Project (2013) Source

Gutachten zum Einsatz der Quellen-TKÜ via Generalbundesanwalt beim Bundesgerichtshof (2013) Source

TreVisor - OS-Independent Software-Based Full Disk Encryption Secure Against Main Memory Attacks by Tilo M?uller, Benjamin Taubmann and Felix C. Freiling (2012) Source

Bypassing Windows 7 Kernel ASLR by Stefan LE BERRE on behalf of NES Conseil R&D Security lab (2011) Source

Try Harder 2 Be Yourself by FX of Phenoelit (2012) Source

We Came In Peace – they don’t by FX of Phenoelit (2012) Source

Influence of Aerodynamics and Proximity Effects in Quadrotor Flight by Daniel Mellinger (2012) Source

Trajectory Generation and Control for Precise Aggressive Maneuvers with Quadrotors by Daniel Mellinger (2011) Source

Image Reconstruction Invariant to Relighting by Todor Georgiev† (2005) Source

A Call to Cryptographic Arms by Julian Assange (2012) Source

Splinternet Behind the Great Firewall of China by Daniel Anderson, acmqueue (2012) Source

Titan Universal Remote Controls UR 1200 Instructions by Vivanco (2009) Source

Titan UR 1200 & UR 1250 Device Brand Code List by Vivanco (2010) Source

W32.Stuxnet Dossier by Symantec (2011) Source

Gephi (0.8.1-beta, OS X) by The Gephi Consortium (2012) Source

Eureqa (0.97.0, OS X) by Nutonian (2012) Source

Eureqa (0.97.0, Linux x64) by Nutonian (2012) Source

Eureqa (0.97.0, Linux x32) by Nutonian (2012) Source

Eureqa (0.97.0, Windows) by Nutonian (2012) Source

G-Mask - a 32 bit Image Mask Tool (English Version) by Tsuyoshi Furumizo (2000) Source

OPSEC for РУССКИХ by The Grugq (2012) Source

OPSEC for hackers: because jail is for wuftpd by The Grugq (2012) Source

2012 in review: Tor and the censorship arms race by Runa A. Sandvik (2012) Source

BigDog, the Rough-Terrain Robot by Marc Raibert, a former MIT Professor and founder of Boston Dynamics Corporation (2010) Source

Behavioral Advertising: The Offer You Cannot Refuse by Chris Jay Hoofnagle, Ashkan Soltani, Nathan Good, Dietrich James Wambach and Mika Ayenson (2012) Source

Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption by Omar Choudary (University of Cambridge), Felix Gröbert, Joachim Metz (2012) Source

DE MYSTERIIS DOM JOBSIVS - Mac EFI Rootkits, Presentation by Loukas K (SyScan Singapore 2012) Source

DE MYSTERIIS DOM JOBSIVS - Mac EFI Rootkits, Paper by Loukas K (Black Hat USA 2012) Source

Scrambling for lightweight censorship resistance (2011) by Joseph Bonneau and Rubin Xu, University of Cambridge Source

Saving Private Herm1t (2012) by Eric Filiol Source

Lettre Herm1t (2012) by Eric Filiol Source

Publius: A robust, tamper-evident, censorship-resistant web publishing system (2000) by Marc Waldman, Aviel D. Rubin, Lorrie Faith Cranor Source

Report Bitcoin Virtual Currency: Intelligence Unique Features Present Distinct Challenges for Deterring Illicit Activity (2012) by Federal Bureau of Investigation (FBI) Source

ReplicatorG 0029 R2 (OS X) + Attraktor 3D Printer Base Profile EMC-4 (2012)

Lines in the Sand: Which Side Are You On in the Hacker Class War (2012) by Phrack Volume 0x0e, Issue 0x44, Phile #0x10 of 0x13 Source

How China Is Blocking Tor by Philipp Winter and Stefan Lindskog, Karlstad University (2012) Source

Law Enforcement Cell Phone Records - Training Materials by California District Attorneys Association, Iowa City Police Department Source

RTL8188S / RTL8191SU WiFi Drivers for Mac OS X 10.7 by Realtek Source

A Biopunk Manifesto by Meredith L. Patterson Source

Hacker's Manifesto by The Mentor Source

ADA Textmate Bundle by MacroMates Source

Transcript Textmate Bundle by Sons of Thunder Software Source

A Cypherpunk's Manifesto by Eric Hughes Source

The Crypto Anarchist Manifesto by Timothy C. May Source

Process Lasso by Bitsum Technologies Source

Dust: A Blocking-Resistant Internet Transport Protocol by Brandon Wilson Source

JQ’s Nokia Net Monitor Guide by Jeremy Quirke Source

MPI-Gutachten: Schutzlücken durch Wegfall der Vorratsdatenspeicherung? via Max-Planck-Institut Source

openswan-2.6.26-1.i386.rpm by openswan.org Source

openswan-doc-2.6.26-1.i386.rpm by openswan.org Source

Brother HL-1430 CUPS Driver 4.0.0a for Mac OS X 10.7 by Brother Industries (2011) Source

Mining writeprints from anonymous e-mails for forensic investigation by Farkhund Iqbal, Hamad Binsalleeh, Benjamin C.M. Fung, Mourad Debbabi (2010) Source

From Fingerprint to Writeprint by Jiexun Li, Rong Zheng, Hsinchun Chen (2006) Source

THC-Magazine #1 ('96) by The Hacker's Choice

THC-Magazine #2 ('96) by The Hacker's Choice

THC-Magazine #3 ('96) by The Hacker's Choice

THC-Magazine #4 ('97) by The Hacker's Choice

owned and exp0sed Issue 1 by Happy Ninjas Source

owned and exp0sed Issue 2 by Happy Ninjas Source

owned and exp0sed Issue 3 by Happy Ninjas Source

Mac OS Lion Forensic Memory Acquisition Using IEEE 1394 by Todd Garriso (2011) Source

TopSec Product Family Voice encryption at the highest security level (Product Brochure) by Rohde & Schwarz (2009) Source

Freenet: A Distributed Anonymous Information Storage and Retrieval System by Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W. Hong (2003) Source

The Free Haven Project: Distributed Anonymous Storage Service by Roger Dingledine, Michael J. Freedman, David Molnar (2000) Source

RTL8192SE Linux driver, Release Date: 2010-1207, ver 0019 for 2.6 Kernel by Realtek Source

Remove -DENABLE_LPS in HAL/rtl8192/Makefile otherwise the driver will be very unstable.

IC-3005Wn IP Camera Linux Source by EDIMAX Source

IC-3005Wn IP Camera Firmware by EDIMAX Source

IC-3005Wn IP Camera Viewer by EDIMAX Source

SIGINT09: Analyse von Daten aus Überwachungsvorgängen; Werkzeuge der Geheimdienste (Video) by Andy Müller-Maguhn Source

SIGINT09: Analyse von Daten aus Überwachungsvorgängen; Werkzeuge der Geheimdienste (Paper) by Andy Müller-Maguhn Source

4chan and /b/: An Analysis of Anonymity and Ephemerality in a Large Online Community by Michael Bernstein, MIT CSAIL Source

Part I by Efim Bushmanov Source

Part II by Efim Bushmanov Source

Part III by Efim Bushmanov Source

Crimson Editor SVN286 by Ingyu Kang Source

BlueBEEP Source by Onkel Dittmeyer Source

BlueBEEP by Onkel Dittmeyer Source

A message from Comodo Hacker by Comodo Hacker Source

Defeating OCSP With The Character '3' by Moxie Marlinspike Source

2010 Report to Congress by U.S.-China Economic and Security Review Commission Source

HBGary China Cyber Espionage by HBGary Source

Lessons In Electric Circuits, Volume IV by Tony R. Kuphaldt Source

PEPatch PE File Header Patcher via Source

The 8052-Basic Microcontroller via FZ Jülich Source

Homemade nixie tubes by Aleksander Zawada Source

Evolutionary fault repair of electronics in space applications by Sverre Vigander Source

ThinkPad eSATA/USB Portable Secure Hard Disk Drive Datasheet (March 2010) via Lenovo Source

ThinkPad USB Portable Secure Hard Drive User Guide via Lenovo Source

Setup poster for ThinkPad USB Portable Secure Hard Drives via Lenovo Source

TCP-Z TCP Half Open Limited Patcher & Monitor by deepxw Source