Curated Video
DNS Poisoning Attack
In this video, you will use KALI to learn how to cache poison the DNS (Domain Name Server) entries to redirect the requester to a different page.
Curated Video
Hidden Tear Ransomware Setup
In this tutorial, you will learn how to customize one of the publicly available forks of the Hidden Tear Ransomware, and how to deploy it. Use this only for learning purposes. Use this only in test VM environment. I'm not responsible for...
Curated Video
Create Your First Trojan
In this video, you will learn how to create your first Trojan file, and how to use this file once it is invoked by the victim. The Trojan file is moved to the victim's machine by using various social engineering techniques.
Curated Video
Takeover a Database Server
In this tutorial, you will learn how to exploit a web application using SQLMAP in order to control a Database Server fully. Use this technique ethically.
Curated Video
Hashing in a Nutshell
In this video, you will learn the basics of hashing and the various ways it can be used for password storage, file verification, and indexing.
Curated Video
Bloodhound and Sharphound
Learn how attackers use Bloodhound and Sharphound to Get Active Directory Domain Admin Access.
Curated Video
Hide a Payload in an Image
In this video, you will learn how to hide a payload in a JPEG image.
Curated Video
Reverse Engineer an APK in KALI
In practice, it means working with a translator with a specific background who understands the original document.
Curated Video
Install a Backdoor
In this video, you will learn how to maintain a permanent access to a compromised machine by installing a backdoor. Use this approach ethically !!!
Curated Video
Hack a Website in a Few Seconds
In this video, you will learn how to install a backdoor on websites in order to deface them.
Curated Video
Create a $3 Undetectable Bad USB
In this tutorial, you will learn how to mimic a Rubber Ducky USB and how to upload your payload in order to execute various types of attacks.
Curated Video
Hack WPA2 Wireless Networks
In this tutorial, you will learn how to crack into WPA and WPA2 wireless networks using various tools like aircrack-ng.
Curated Video
Run a Simple Ransomware
In this tutorial, you will learn how to create a very simple Ransomware to encrypt files, and how to use a Decrypter to gain access to these files again. THIS VIDEO IS FOR EDUCATIONAL PURPOSES ONLY. I AM NOT RESPONSIBLE FOR YOUR ACTIONS....
Financial Times
Why China's control of rare earths matters
China dominates the world's production and supply of rare earths - obscure elements that are vital for high tech-manufacturing. The FT's Jamie Smyth explains their importance.
National Institute of Standards and Technology
Heroes of American Manufacturing Series - Lee Spring
Meet the next "Hero of American Manufacturing": Lee Spring. This Brooklyn, New York-based company is the latest manufacturer featured in the Heroes of American Manufacturing video series. Check out their story and how they've been able...
Professor Dave Explains
Double Object Pronouns in Italian: Pronomi Doppi o Combinati
Double object pronouns.
The Economist
How covid-19 could change the financial world order
America has dominated global finance for decades. But could covid-19 tip the balance of financial power in China's favour?
Next Animation Studio
How China used iPhone hack in Uyghur genocide
MIT’s Technology Review magazine recently analyzed the infamous Chaos hack that targeted iPhones in 2018, suggesting that China used a civilian competition to create the hack and then used it to spy on its Uyghur Muslim minority. The...
Barcroft Media
Genius Car Designer Builds 32ft Long 'Plane Car
ROSWELL, GEORGIA - OCTOBER 2: INGENIOUS car customiser Mark Ray has indulged his latest flight of fancy by building a brand new plane car. Mark is known for turning heads in his home town of Roswell, Georgia with his unusual car designs,...
The Wall Street Journal
Michael Wolf on Tech Surprises and the 2021 Outlook
At WSJ Tech Live, Michael Wolf, founder and CEO of Activate, shares his predictions on tech and media trends for 2021.
Flame Media
Real Futures: VR Healthcare
Virtual reality has been over-hyped for decades, but with the release of Facebook's Oculus Rift, Google's Cardboard, and Samsung's Gear VR, it seems to be on the cusp of arriving for real. Most VR fans are excited to play games and watch...