Instructional Video5:21
Curated Video

DNS Poisoning Attack

Higher Ed
In this video, you will use KALI to learn how to cache poison the DNS (Domain Name Server) entries to redirect the requester to a different page.
Instructional Video9:09
Curated Video

Hidden Tear Ransomware Setup

Higher Ed
In this tutorial, you will learn how to customize one of the publicly available forks of the Hidden Tear Ransomware, and how to deploy it. Use this only for learning purposes. Use this only in test VM environment. I'm not responsible for...
Instructional Video8:11
Curated Video

Create Your First Trojan

Higher Ed
In this video, you will learn how to create your first Trojan file, and how to use this file once it is invoked by the victim. The Trojan file is moved to the victim's machine by using various social engineering techniques.
Instructional Video8:26
Curated Video

Takeover a Database Server

Higher Ed
In this tutorial, you will learn how to exploit a web application using SQLMAP in order to control a Database Server fully. Use this technique ethically.
Instructional Video5:34
Curated Video

Hashing in a Nutshell

Higher Ed
In this video, you will learn the basics of hashing and the various ways it can be used for password storage, file verification, and indexing.
Instructional Video4:55
Curated Video

Bloodhound and Sharphound

Higher Ed
Learn how attackers use Bloodhound and Sharphound to Get Active Directory Domain Admin Access.
Instructional Video1:34
Curated Video

Display WiFi Passwords in Clear Text

Higher Ed
Display WiFi Passwords in Clear Text
Instructional Video3:05
Curated Video

Hide a Payload in an Image

Higher Ed
In this video, you will learn how to hide a payload in a JPEG image.
Instructional Video1:13
Curated Video

God Mode on Windows 10

Higher Ed
redpython.{ED7BA470-8E54-465E-825C-99712043E01C}
Instructional Video2:22
Curated Video

Reverse Engineer an APK in KALI

Higher Ed
In practice, it means working with a translator with a specific background who understands the original document.
Instructional Video6:13
Curated Video

Install a Backdoor

Higher Ed
In this video, you will learn how to maintain a permanent access to a compromised machine by installing a backdoor. Use this approach ethically !!!
Instructional Video4:13
Curated Video

Hack a Website in a Few Seconds

Higher Ed
In this video, you will learn how to install a backdoor on websites in order to deface them.
Instructional Video10:09
Curated Video

Create a $3 Undetectable Bad USB

Higher Ed
In this tutorial, you will learn how to mimic a Rubber Ducky USB and how to upload your payload in order to execute various types of attacks.
Instructional Video2:16
Curated Video

Install Kali on Windows 10

Higher Ed
How to Install Kali on Windows 10
Instructional Video6:21
Curated Video

Hack WPA2 Wireless Networks

Higher Ed
In this tutorial, you will learn how to crack into WPA and WPA2 wireless networks using various tools like aircrack-ng.
Instructional Video3:10
Curated Video

Run a Simple Ransomware

Higher Ed
In this tutorial, you will learn how to create a very simple Ransomware to encrypt files, and how to use a Decrypter to gain access to these files again. THIS VIDEO IS FOR EDUCATIONAL PURPOSES ONLY. I AM NOT RESPONSIBLE FOR YOUR ACTIONS....
Instructional Video3:13
Financial Times

Why China's control of rare earths matters

Higher Ed
China dominates the world's production and supply of rare earths - obscure elements that are vital for high tech-manufacturing. The FT's Jamie Smyth explains their importance.
Instructional Video4:47
National Institute of Standards and Technology

Heroes of American Manufacturing Series - Lee Spring

9th - 12th
Meet the next "Hero of American Manufacturing": Lee Spring. This Brooklyn, New York-based company is the latest manufacturer featured in the Heroes of American Manufacturing video series. Check out their story and how they've been able...
Instructional Video9:04
Professor Dave Explains

Double Object Pronouns in Italian: Pronomi Doppi o Combinati

12th - Higher Ed
Double object pronouns.
Instructional Video9:46
The Economist

How covid-19 could change the financial world order

12th - Higher Ed
America has dominated global finance for decades. But could covid-19 tip the balance of financial power in China's favour?
Instructional Video1:09
Next Animation Studio

How China used iPhone hack in Uyghur genocide

12th - Higher Ed
MIT’s Technology Review magazine recently analyzed the infamous Chaos hack that targeted iPhones in 2018, suggesting that China used a civilian competition to create the hack and then used it to spy on its Uyghur Muslim minority. The...
Instructional Video5:42
Barcroft Media

Genius Car Designer Builds 32ft Long 'Plane Car

Higher Ed
ROSWELL, GEORGIA - OCTOBER 2: INGENIOUS car customiser Mark Ray has indulged his latest flight of fancy by building a brand new plane car. Mark is known for turning heads in his home town of Roswell, Georgia with his unusual car designs,...
Instructional Video19:47
The Wall Street Journal

Michael Wolf on Tech Surprises and the 2021 Outlook

Higher Ed
At WSJ Tech Live, Michael Wolf, founder and CEO of Activate, shares his predictions on tech and media trends for 2021.
Instructional Video8:10
Flame Media

Real Futures: VR Healthcare

12th - Higher Ed
Virtual reality has been over-hyped for decades, but with the release of Facebook's Oculus Rift, Google's Cardboard, and Samsung's Gear VR, it seems to be on the cusp of arriving for real. Most VR fans are excited to play games and watch...