Instructional Video13:35
Hip Hughes History

The Gettysburg Address Explained (Feat. John Renn) US History Review

6th - 12th
An overview of one of the most historic speeches in US History with a deep dive from John Renn, a Social Studies teacher from Portland Middle School.
Instructional Video2:43
Vlogbrothers

On Exhaustion

6th - 11th
In which John discusses the many blessings and single horror of the Birmingham Alabama airport, the Looking for Alaska movie (which will be directed by the brilliant Becca Thomas), his ongoing exhaustion, his gratitude to nerdfighteria,...
Instructional Video5:43
Science Buddies

Make a Battery with Coins | Science Experiment

K - 5th
Make a battery with pennies, nickels, salt, and vinegar in this fun science experiment! This type of battery is also called a voltaic pile. You can use a multimeter to measure the voltage and current produced by your battery, and even...
Instructional Video6:46
Science Buddies

🦄How to Build a Simple Unicorn Robot🦄

K - 5th
Build a unicorn robot that makes its own art! A kit with the electronic parts for this project is available here: https://www.homesciencetools.com/product/bristlebot-robots-kit/?aff=SB1. Written instructions to build an Art Bot are...
Instructional Video3:58
Curated Video

Wireshark D2 V7 - Global prefrences

Higher Ed
DAY TWO - We will explore Wireshark interface in details - Video 7: Configure global preferences
Instructional Video3:50
Curated Video

Dynamic Analysis

Higher Ed
This video will explain Dynamic malware analysis in details, which is a runtime approach for analyzing malicious activities
Instructional Video4:24
Curated Video

Android Dynamic Malware Analysis

Higher Ed
In this tutorial, you will learn how to perform dynamic malware analysis for an APK file using MobSF or Mobile Security Framework, which is a super handy tool for analyzing Android applications.
Instructional Video2:27
Curated Video

Web Applications Security Overview

Higher Ed
This video will highlight the security concerns when it comes to web applications
Instructional Video4:10
Curated Video

Inject Whatsapp Application With a Payload

Higher Ed
In this video, we will extract a legit Whatsapp application from our phone, inject it with malware, then repackage it and distribute it. The techniques will be done using Kali tools
Instructional Video12:31
Curated Video

16 Switching Losses and LTSpice | Power Electronics

Higher Ed
Basics of Power Electronics - Walid Issa 16 Switching Losses and LTSpice | Power Electronics
Instructional Video6:52
Curated Video

Hack Facebook, Twitter, and Gmail Accounts

Higher Ed
We will use the SET tool to setup a phishing campaign in order to hack social media accounts
Instructional Video0:43
Curated Video

A model of mold

K - 8th
A model of mold
Instructional Video8:07
Curated Video

The Powerful Armitage Tool

Higher Ed
This video will demonstrate the powerful armitage tool, which is a GUI application for the metasploit framework
Instructional Video4:12
Curated Video

Hack Using a Rogue Access Point

Higher Ed
In this tutorial, you will learn how to create a fake wireless access point and use it to hack the users logged on to it. We will use WiFi Pineapple device.
Instructional Video3:10
Curated Video

Create a Simple Ransomware

Higher Ed
This video will show you how easy it is to create a simple ranwonware
Instructional Video10:09
Curated Video

Create a $3 Rubber Ducky Key-logger

Higher Ed
Rubber ducky is the most famous key logger, but it is expensive. In this video you will learn how to create a similar device by buying an Arduino hardware from AliExpress at a cheap price
Instructional Video4:49
Curated Video

Execute a Phishing Attack

Higher Ed
In this video, you will learn how to plan and execute a phishing attack using the SET tool
Instructional Video3:23
Curated Video

Run an Online Password Attack on Linux

Higher Ed
Learn how to plan an execute an online password attack on Linux machine
Instructional Video4:14
Curated Video

Install KALI (Command Center)

Higher Ed
This video will teach you how to install and setup KALI Linux
Instructional Video6:50
Curated Video

Hack an Android Phone

Higher Ed
In this video, you will learn how to hack into an android phone by deploying a malicious application. Gain total control over the mobile phone and manage it through Armitage on KALI.
Instructional Video3:58
Curated Video

Wireshark D5 V7 - HTTP analysisTroubleshoot your network

Higher Ed
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 7: Troubleshoot your network
Instructional Video3:09
Curated Video

Wireshark D3 V7 - Expressions and buttons

Higher Ed
DAY THREE - Learn to implement the various Filters of Wireshark including Display Filters and Capture Filters - Video 7: Expressions and buttons
Instructional Video4:47
Curated Video

Collect and Visualize Data with Maltego

Higher Ed
This video will explain the poweful OSINT application called Maltego, and how you can leverage it in collecting open source data on your victim.
Instructional Video6:10
Curated Video

Bypass Firewalls by Tunneling Data and Commands over DNS new

Higher Ed
This video will teach you how to setup a Command and Control center to bypass firewall rules and control the victim over DNS traffic, which in many cases is not suspicious to anyone monitoring a network traffic.