Curated Video
Plan DOS and DDOS Attacks
This video will teach you how to use Ettercap to perform DDOS attacks
Curated Video
Perform a DNS Spoofing Attack
This video will teach you how to perform a DNS spoofing attack, and how to take user's URL request to a crafted web application of your own
Curated Video
Hack an Android Phone with Armitage
In this video, we will actually hack an Android phone by deploying our payload using Armitage, which is a GUI for metasploit framework.
Curated Video
Create an IoT WIFI Jammer
This video will show you how to create a hardware WiFi jammer to disrupt the wireless connetivity in a certain area
Curated Video
WPS Cracking
In this video you will learn how to take over a router with enabled WPS protocol
Curated Video
Publish Your Weapons Online
This video will teach you how to prepare your lab for a real world attack
Curated Video
Broken Authentication
This video will explain the broken authentication on web applications and how can attackers leverage this vulnerability to gain unauthorized access
Curated Video
Download and Setup Genymotion
Genymotion is an easy to use Android emulator. We will learn how to setup this emulator and use it for Dynamic malware analysis.
Curated Video
Decode and Decompile an APK
This is a hands on tutorial on how to reverse engineer an Android application
Curated Video
XML External Entity
XXE is one of the new OWASP top 10 vulnerabilities. We will explain this vulnerability in details in this video
Curated Video
Netcat Simplified
Netcat is a simple networking utility, however it can be leveraged to powerfully exploit victims. In this video you will learn how to set it up and use it
Curated Video
Hide a Payload in a JPEG Image
A stealthy approach is to hide your payload in an image. This video will show you how to do so
Curated Video
Decrypt SSL Session
In this video, we will intercept SSL traffic by decrypting the SSL tunnel between an APK and a server
Curated Video
Cracking WEP
This video will explain the wireless WEP protocol, and will show you how easy it is to crack routers using it
Curated Video
Unzip vs Decode
This video will explaing the differences between unzipping an APK file versus decoding it
Curated Video
DEX File
This video will explain the nature DEX file, which has a a set of bytecode instructions
Curated Video
Insecure Deserialization
Insecure deserialization is one of the new OWASP top 10 vulnerabilities. We will explain this vulnerability in details in this video
Curated Video
Decode and Decompile Android Apps
This is a hands on tutorial on how to reverse engineer an Android application
Curated Video
NMAP and ZENMAP Simplified
ZENMAP is the GUI version of NMAP, you will learn how to use both applications
Curated Video
Introducing NMAP
NMAP is the classic network scanner, in this video we will deep dive into its features
Curated Video
Understand NETBIOS and SMB Attacks
This video will teach you how to perform NETBIOS and SMB attacks using various tools in Kali
Curated Video
Linux Fundamentals - Starting Additional Processes and Killing Processes
This video demonstrates how to start additional processes and kill processes. This clip is from the chapter "Processes in Linux" of the series "Linux Fundamentals".This section explores processes. You will also learn to start and end the...
Curated Video
Linux Fundamentals - Data Streams of the Process
This video explains the data streams of processes. This clip is from the chapter "Data Streams and Piping in Linux" of the series "Linux Fundamentals".This section will introduce you to the data streams and piping in Linux. By the end of...
Curated Video
DevOps and CICD Easily Explained
DevOps is an agile development practice and mindset that uses agile principles (collaboration, communication, utilizing the right tools) to streamline software building, testing, and release. CI/CD is a DevOps tactic, which makes use of...