Curated Video
The Complete Strapi™ Course with Plugins and Deployment - Deleting a Project
In this video, you will learn how to delete a project. This clip is from the chapter "Strapi Plugin Development: Create a Plugin" of the series "The Complete Strapiâ„¢ Course with Plugins and Deployment".In this section, we will cover...
Curated Video
The Complete Strapi™ Course with Plugins and Deployment - Lifecycle Hooks Exercise: Part 5 (Declarative Hook)
In this video, we will cover the declarative hook. This clip is from the chapter "Extending Strapi Core: Custom Controllers and More" of the series "The Complete Strapiâ„¢ Course with Plugins and Deployment".In this section, we will dive...
Curated Video
The Complete Strapi™ Course with Plugins and Deployment - Lifecycle Hooks Exercise: Part 3 (First Programmatic Hook)
In this video, we will cover the first programmatic hook. This clip is from the chapter "Extending Strapi Core: Custom Controllers and More" of the series "The Complete Strapiâ„¢ Course with Plugins and Deployment".In this section, we...
Curated Video
The Complete Strapi™ Course with Plugins and Deployment - Webhooks: An Overview
In this video, we will have a quick overview of the Webhooks. This clip is from the chapter "Extending Strapi Core: Custom Controllers and More" of the series "The Complete Strapiâ„¢ Course with Plugins and Deployment".In this section,...
Curated Video
Mega Web Development Bootcamp with React Bootstrap 5, Redux, and REST API - Implementing Logout Functionality
This video focuses on implementing the logout functionality, allowing users to securely log out of their accounts and clear session-related data. This clip is from the chapter "User Session, Dynamic Menu, Redux, Context API" of the...
Curated Video
Mega Web Development Bootcamp with React Bootstrap 5, Redux, and REST API - What Is Redux and Why We Need It
In this video, learn about Redux, its purpose, and why it is beneficial for managing the application state in complex React projects. This clip is from the chapter "User Session, Dynamic Menu, Redux, Context API" of the series "Mega Web...
Curated Video
Inject Whatsapp Application With a Payload
In this video, we will extract a legit Whatsapp application from our phone, inject it with malware, then repackage it and distribute it. The techniques will be done using Kali tools
Curated Video
The Powerful Armitage Tool
This video will demonstrate the powerful armitage tool, which is a GUI application for the metasploit framework
Curated Video
Getting Started With Powershell Empire
This video will show you how to install Powershell Empire and install a keylogger on a victim's machine. A jump-start tutorial on how to use this tool.
Curated Video
Create a $3 Rubber Ducky Key-logger
Rubber ducky is the most famous key logger, but it is expensive. In this video you will learn how to create a similar device by buying an Arduino hardware from AliExpress at a cheap price
Curated Video
All-in-one Metasploit Framework
This video will explain the powerful metasploit framework
Curated Video
Injecting a Legit APK and Analyze it using MobSF
MobSF is a powerful setup for analyzing mobile malware. In this video we will learn how to install this framework and analyze malicious applications on it.
Curated Video
Create Your First Trojan
In this video, you will learn how to create your first Trojan file, and how to use this file once it is invoked by the victim. The Trojan file is moved to the victim's machine by using various social engineering techniques.
Curated Video
Wireshark D4 V5 - IPv6 Deep Dive
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 5: IPv6 deep-dive
Curated Video
Hide a Payload in an Image
In this video, you will learn how to hide a payload in a JPEG image.
Curated Video
Create a Malicious Application
This video will teach you how to create an Android malicious application using Kali Linux
Curated Video
Introduction to Metasploit
In this video, you will learn the building blocks and the basics of the powerful Metasploit framework, developed by Rapid7. Use Metasploit ethically !!!
Curated Video
Create a $3 Undetectable Bad USB
In this tutorial, you will learn how to mimic a Rubber Ducky USB and how to upload your payload in order to execute various types of attacks.
Curated Video
Create Your First Trojan and Infiltrate a Target
This video wil show you the baby steps on how to create your first trojan file in Kali Linux. We will put his file into action and start infiltrating data from the victim's machine
Curated Video
Create a Malicious APK with One Command
Learn how to use KALI Linux to create a phony Android application that you can use to have full access to a smartphone.
Curated Video
Hide a Payload in a JPEG Image
A stealthy approach is to hide your payload in an image. This video will show you how to do so
NASA
The Invisible Network: 20. LCRD - The Design: Flight | NASA's The Invisible Network Podcast
In this third episode of a five-part series about NASA’s Laser Communications Relay Demonstration, we look at the LCRD flight payload, which launched on the U.S. Space Force’s Space Test Program Satellite-6 earlier on December 7.
NASA
The Invisible Network: 21. LCRD - The Design: Ground | NASA's The Invisible Network Podcast
In this fourth episode of a five-part series about NASA’s Laser Communications Relay Demonstration, we look at the LCRD ground segment, which consists of infrastructure in Hawaii, California, and New Mexico.
Debunked
Myths & Misconceptions About North Korea
How close is North Korea to having a nuclear missile that can hit the USA? And can we really believe everything we hear about the secret state?