Curated Video
Threat Modeling
Threat modeling is a process by which potential threats, such as structural vulnerabilities or the absence of appropriate safeguards, can be identified, enumerated, and mitigations can be prioritized. In this video, you will learn about...
Curated Video
SE Attack Vectors
This video will explain the various attack vectors used in social engineering
Curated Video
Static vs Dynamic Malware Analysis
The video will explain the main differences between two major approaches in analyzing malware. Static and Dynamic.
Curated Video
Open-source Intelligence (OSINT)
In this video, you will learn about OSINT (Open-source intelligence), which is a multi-methods methodology for collecting, analyzing and making decisions about data accessible in publicly available sources to be used in an intelligence...
Curated Video
Web Applications Security Overview
This video will highlight the security concerns when it comes to web applications
Curated Video
Reverse Engineer an Android Application
This is a hands on tutorial on how to reverse engineer an Android application
Curated Video
Understand Color Codings
This video will teach you the difference in Linux terminal color coding
Curated Video
AWS Security Boiled Down
A general overview about AWS security architecture and tools. Learn more about VPC, EC2, S3, AIM, Security Groups, and NACLs. This video will give you a quick jump into cloud security.
Curated Video
Android Application Anatomy
This video will shed the light on the components of an Android application
Curated Video
Mobile Attack Surface
In this video, you will get an overview on the different types of threats that affect a mobile application.
Curated Video
Malware Distribution Mechanisms
In this video, we will explain how hackers leverages various channels to publish their malicious Android applications to that users start using them.
Curated Video
Inject Whatsapp Application With a Payload
In this video, we will extract a legit Whatsapp application from our phone, inject it with malware, then repackage it and distribute it. The techniques will be done using Kali tools
Curated Video
Web Applications Attack Surface
This video will shed the light on all possible attack vectors for web applications
Curated Video
Steps to plan a successfull pentest
This video will teach you how to plan for a penetration testing engagement, and what are the phases you will go through
Curated Video
Hack Facebook, Twitter, and Gmail Accounts
We will use the SET tool to setup a phishing campaign in order to hack social media accounts
Curated Video
Mobile Attacks Surface
This video will shed the light on all possible attack vectors for mobile phones
Curated Video
Create a Simple SIEM
Learn the basic feature of SIEM solutions; logs aggregation using Powershell commands.
Curated Video
Crack Passwords with Rainbow Tables
This video will explain the concept of Rainbow tables, and how you can use them to expedite password cracking time
Curated Video
Mobile Malware Types
In this video, we will explain the various types of mobile malway such as RAT, trojans, spyware, etc..
Curated Video
The Powerful Armitage Tool
This video will demonstrate the powerful armitage tool, which is a GUI application for the metasploit framework
Curated Video
Root User Color Coding
This video will show you how to change the color of the terminal when using a root user
Curated Video
Identify a DNS Zone Transfer Vulnerability
Learn how to check for the DNS zone transfer vulnerability, a serious weakness that might lead to fully leaking your domain information.
Curated Video
Tools Explained
In this video, we will explain the various tools needed to start reverse engineering an Android application and analyzing the malware. Tools such as APKTool in Kali Linux, Android Studio, various emulators, and other GUI tools for...