Señor Jordan
03 Spanish Lesson - Affirmative tú commands (part 2) - Irregulars
¡Hola! Here's another video in a series on commands in Spanish. In this video we'll be going over affirmative tú commands in Spanish that are irregular. The funny thing is those irregulars always seem to be some of the most common verbs...
Señor Jordan
03 Practice Usted commands with a special guest! - Practice 2
03 Practice Usted commands with a special guest! - Practice 2
Señor Jordan
03 Practice Usted commands with a special guest! - Practice 1
03 Practice Usted commands with a special guest! - Practice 1
Señor Jordan
03 How to form Vosotros commands in Spanish
03 How to form Vosotros commands in Spanish
Señor Jordan
03 How to form Nosotros commands in Spanish
03 How to form Nosotros commands in Spanish
Curated Video
Get Started with Linux Commands
This video will teach you the basic commands we will use in this course
Curated Video
Lab 1 Task 1 Building First circuit in LTSpice
Lab 1 Task 1 Building First circuit Basics of Power Electronics - Walid Issa
Curated Video
Getting Started With Powershell Empire
This video will show you how to install Powershell Empire and install a keylogger on a victim's machine. A jump-start tutorial on how to use this tool.
Curated Video
Hack an Android Phone
In this video, you will learn how to hack into an android phone by deploying a malicious application. Gain total control over the mobile phone and manage it through Armitage on KALI.
Curated Video
Create Your First Trojan
In this video, you will learn how to create your first Trojan file, and how to use this file once it is invoked by the victim. The Trojan file is moved to the victim's machine by using various social engineering techniques.
Curated Video
Takeover a Database Server
In this tutorial, you will learn how to exploit a web application using SQLMAP in order to control a Database Server fully. Use this technique ethically.
Curated Video
Bypass Firewalls by Tunneling Data and Commands over DNS new
This video will teach you how to setup a Command and Control center to bypass firewall rules and control the victim over DNS traffic, which in many cases is not suspicious to anyone monitoring a network traffic.
Curated Video
How Can Pentest.ws Help You
Learn how to document your findings for a professional presentation
Curated Video
Wireshark D5 V5 - HTTP analysisMTP analysis
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 5: SMTP analysis
Curated Video
Create Your First Trojan and Infiltrate a Target
This video wil show you the baby steps on how to create your first trojan file in Kali Linux. We will put his file into action and start infiltrating data from the victim's machine
Curated Video
Hack an Android Phone with Armitage
In this video, we will actually hack an Android phone by deploying our payload using Armitage, which is a GUI for metasploit framework.