Instructional Video10:05
Curated Video

The Complete Strapi™ Course with Plugins and Deployment - Deleting a Project

Higher Ed
In this video, you will learn how to delete a project. This clip is from the chapter "Strapi Plugin Development: Create a Plugin" of the series "The Complete Strapiâ„¢ Course with Plugins and Deployment".In this section, we will cover...
Instructional Video12:03
Curated Video

The Complete Strapi™ Course with Plugins and Deployment - Lifecycle Hooks Exercise: Part 5 (Declarative Hook)

Higher Ed
In this video, we will cover the declarative hook. This clip is from the chapter "Extending Strapi Core: Custom Controllers and More" of the series "The Complete Strapiâ„¢ Course with Plugins and Deployment".In this section, we will dive...
Instructional Video16:11
Curated Video

The Complete Strapi™ Course with Plugins and Deployment - Lifecycle Hooks Exercise: Part 3 (First Programmatic Hook)

Higher Ed
In this video, we will cover the first programmatic hook. This clip is from the chapter "Extending Strapi Core: Custom Controllers and More" of the series "The Complete Strapiâ„¢ Course with Plugins and Deployment".In this section, we...
Instructional Video4:34
Curated Video

The Complete Strapi™ Course with Plugins and Deployment - Webhooks: An Overview

Higher Ed
In this video, we will have a quick overview of the Webhooks. This clip is from the chapter "Extending Strapi Core: Custom Controllers and More" of the series "The Complete Strapiâ„¢ Course with Plugins and Deployment".In this section,...
Instructional Video6:38
Curated Video

Mega Web Development Bootcamp with React Bootstrap 5, Redux, and REST API - Implementing Logout Functionality

Higher Ed
This video focuses on implementing the logout functionality, allowing users to securely log out of their accounts and clear session-related data. This clip is from the chapter "User Session, Dynamic Menu, Redux, Context API" of the...
Instructional Video3:38
Curated Video

Mega Web Development Bootcamp with React Bootstrap 5, Redux, and REST API - What Is Redux and Why We Need It

Higher Ed
In this video, learn about Redux, its purpose, and why it is beneficial for managing the application state in complex React projects. This clip is from the chapter "User Session, Dynamic Menu, Redux, Context API" of the series "Mega Web...
Instructional Video4:10
Curated Video

Inject Whatsapp Application With a Payload

Higher Ed
In this video, we will extract a legit Whatsapp application from our phone, inject it with malware, then repackage it and distribute it. The techniques will be done using Kali tools
Instructional Video8:07
Curated Video

The Powerful Armitage Tool

Higher Ed
This video will demonstrate the powerful armitage tool, which is a GUI application for the metasploit framework
Instructional Video9:29
Curated Video

Getting Started With Powershell Empire

Higher Ed
This video will show you how to install Powershell Empire and install a keylogger on a victim's machine. A jump-start tutorial on how to use this tool.
Instructional Video10:09
Curated Video

Create a $3 Rubber Ducky Key-logger

Higher Ed
Rubber ducky is the most famous key logger, but it is expensive. In this video you will learn how to create a similar device by buying an Arduino hardware from AliExpress at a cheap price
Instructional Video9:37
Curated Video

All-in-one Metasploit Framework

Higher Ed
This video will explain the powerful metasploit framework
Instructional Video5:26
Curated Video

Injecting a Legit APK and Analyze it using MobSF

Higher Ed
MobSF is a powerful setup for analyzing mobile malware. In this video we will learn how to install this framework and analyze malicious applications on it.
Instructional Video8:11
Curated Video

Create Your First Trojan

Higher Ed
In this video, you will learn how to create your first Trojan file, and how to use this file once it is invoked by the victim. The Trojan file is moved to the victim's machine by using various social engineering techniques.
Instructional Video4:48
Curated Video

Wireshark D4 V5 - IPv6 Deep Dive

Higher Ed
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 5: IPv6 deep-dive
Instructional Video3:05
Curated Video

Hide a Payload in an Image

Higher Ed
In this video, you will learn how to hide a payload in a JPEG image.
Instructional Video3:09
Curated Video

Create a Malicious Application

Higher Ed
This video will teach you how to create an Android malicious application using Kali Linux
Instructional Video9:37
Curated Video

Introduction to Metasploit

Higher Ed
In this video, you will learn the building blocks and the basics of the powerful Metasploit framework, developed by Rapid7. Use Metasploit ethically !!!
Instructional Video10:09
Curated Video

Create a $3 Undetectable Bad USB

Higher Ed
In this tutorial, you will learn how to mimic a Rubber Ducky USB and how to upload your payload in order to execute various types of attacks.
Instructional Video8:11
Curated Video

Create Your First Trojan and Infiltrate a Target

Higher Ed
This video wil show you the baby steps on how to create your first trojan file in Kali Linux. We will put his file into action and start infiltrating data from the victim's machine
Instructional Video2:28
Curated Video

Create a Malicious APK with One Command

Higher Ed
Learn how to use KALI Linux to create a phony Android application that you can use to have full access to a smartphone.
Instructional Video3:05
Curated Video

Hide a Payload in a JPEG Image

Higher Ed
A stealthy approach is to hide your payload in an image. This video will show you how to do so
Podcast19:36
NASA

‎The Invisible Network: 20. LCRD - The Design: Flight | NASA's The Invisible Network Podcast

Pre-K - Higher Ed
In this third episode of a five-part series about NASA’s Laser Communications Relay Demonstration, we look at the LCRD flight payload, which launched on the U.S. Space Force’s Space Test Program Satellite-6 earlier on December 7.
Podcast18:45
NASA

‎The Invisible Network: 21. LCRD - The Design: Ground | NASA's The Invisible Network Podcast

Pre-K - Higher Ed
In this fourth episode of a five-part series about NASA’s Laser Communications Relay Demonstration, we look at the LCRD ground segment, which consists of infrastructure in Hawaii, California, and New Mexico.
Instructional Video18:39
Debunked

Myths & Misconceptions About North Korea

9th - 12th
How close is North Korea to having a nuclear missile that can hit the USA? And can we really believe everything we hear about the secret state?