Curated Video
Android Application Anatomy
This video will shed the light on the components of an Android application
Curated Video
Malware Distribution Mechanisms
In this video, we will explain how hackers leverages various channels to publish their malicious Android applications to that users start using them.
Curated Video
Inject Whatsapp Application With a Payload
In this video, we will extract a legit Whatsapp application from our phone, inject it with malware, then repackage it and distribute it. The techniques will be done using Kali tools
Curated Video
Web Applications Attack Surface
This video will shed the light on all possible attack vectors for web applications
Curated Video
Steps to plan a successfull pentest
This video will teach you how to plan for a penetration testing engagement, and what are the phases you will go through
Curated Video
Hack Facebook, Twitter, and Gmail Accounts
We will use the SET tool to setup a phishing campaign in order to hack social media accounts
Curated Video
Mobile Attacks Surface
This video will shed the light on all possible attack vectors for mobile phones
Curated Video
Crack Passwords with Rainbow Tables
This video will explain the concept of Rainbow tables, and how you can use them to expedite password cracking time
Curated Video
Mobile Malware Types
In this video, we will explain the various types of mobile malway such as RAT, trojans, spyware, etc..
Curated Video
The Powerful Armitage Tool
This video will demonstrate the powerful armitage tool, which is a GUI application for the metasploit framework
Curated Video
Root User Color Coding
This video will show you how to change the color of the terminal when using a root user
Curated Video
Identify a DNS Zone Transfer Vulnerability
Learn how to check for the DNS zone transfer vulnerability, a serious weakness that might lead to fully leaking your domain information.
Curated Video
Tools Explained
In this video, we will explain the various tools needed to start reverse engineering an Android application and analyzing the malware. Tools such as APKTool in Kali Linux, Android Studio, various emulators, and other GUI tools for...
Curated Video
Design Effective Wordlists
Learn how to effectively create wordlists that will aid you in cracking passwords
Curated Video
Control a Database Server with SQLMap-2 new
This video will show you how to leverage SQL injection vulnerability to take full control over a Database server
Curated Video
Analysis of Code4hk APK
This video will deep dive into the analysis of a malicious APK file named Code4hk, and wil show you how hackers can inject an APK within another APK's resources.
Curated Video
Master KALI Desktop Environment
Before crafting attacks, get familiar with the desktop environment of Kali linux
Curated Video
Post-Exploitation Terminologies
This video will teach you the jardong used when it comes to post exploiting a target
Curated Video
Acquire Malicious Apps1
This video will describe the methods of acquiring malicious Android applications over the internet. There are few publicly available sites in addition to Github links that will be shared.
Curated Video
Create a Simple Ransomware
This video will show you how easy it is to create a simple ranwonware
Curated Video
How Does Port Scanning Work
In this video, you will learn the two main techniques used in port scanning. We will be mainly using NMAP tool
Curated Video
Easily Hack a WordPress Site
WPScan is an easy to use tool that is used to hack into wordpress websites. Given that wordpress websites dominate the internet, this tool is priceless.
Curated Video
Google Security Services
Google adds various security features on top of the Android platform. This video will help you explore those feaures.