Instructional Video3:48
Curated Video

Download and Setup Genymotion

Higher Ed
Genymotion is an easy to use Android emulator. We will learn how to setup this emulator and use it for Dynamic malware analysis.
Instructional Video3:01
Curated Video

Decode and Decompile an APK

Higher Ed
This is a hands on tutorial on how to reverse engineer an Android application
Instructional Video1:20
Curated Video

XML External Entity

Higher Ed
XXE is one of the new OWASP top 10 vulnerabilities. We will explain this vulnerability in details in this video
Instructional Video10:45
Curated Video

Netcat Simplified

Higher Ed
Netcat is a simple networking utility, however it can be leveraged to powerfully exploit victims. In this video you will learn how to set it up and use it
Instructional Video3:05
Curated Video

Hide a Payload in a JPEG Image

Higher Ed
A stealthy approach is to hide your payload in an image. This video will show you how to do so
Instructional Video11:53
Curated Video

Decrypt SSL Session

Higher Ed
In this video, we will intercept SSL traffic by decrypting the SSL tunnel between an APK and a server
Instructional Video1:26
Curated Video

Cracking WEP

Higher Ed
This video will explain the wireless WEP protocol, and will show you how easy it is to crack routers using it
Instructional Video1:13
Curated Video

Unzip vs Decode

Higher Ed
This video will explaing the differences between unzipping an APK file versus decoding it
Instructional Video1:19
Curated Video

DEX File

Higher Ed
This video will explain the nature DEX file, which has a a set of bytecode instructions
Instructional Video0:41
Curated Video

Insecure Deserialization

Higher Ed
Insecure deserialization is one of the new OWASP top 10 vulnerabilities. We will explain this vulnerability in details in this video
Instructional Video2:58
Curated Video

Decode and Decompile Android Apps

Higher Ed
This is a hands on tutorial on how to reverse engineer an Android application
Instructional Video9:56
Curated Video

NMAP and ZENMAP Simplified

Higher Ed
ZENMAP is the GUI version of NMAP, you will learn how to use both applications
Instructional Video2:57
Curated Video

Introducing NMAP

Higher Ed
NMAP is the classic network scanner, in this video we will deep dive into its features
Instructional Video2:33
Curated Video

Understand NETBIOS and SMB Attacks

Higher Ed
This video will teach you how to perform NETBIOS and SMB attacks using various tools in Kali
Instructional Video2:46
Curated Video

Update, Upgrade, and Alias Commands

Higher Ed
This video will show you how to keep your pentest box up-to-date
Instructional Video12:41
Curated Video

How to Prepare and Present Your Report final mp4 new

Higher Ed
This video will teach you how to professionally present your findings to a client
Instructional Video8:09
Curated Video

How to Analyze a Cyber Attack

Higher Ed
Traditional information security attack analysis focuses on malware and computer intrusions, in which an attacker utilizes technical prowess to exploit a vulnerability to gain access to or harm a system (or network).
Instructional Video3:10
Curated Video

Run a Simple Ransomware

Higher Ed
In this tutorial, you will learn how to create a very simple Ransomware to encrypt files, and how to use a Decrypter to gain access to these files again. THIS VIDEO IS FOR EDUCATIONAL PURPOSES ONLY. I AM NOT RESPONSIBLE FOR YOUR ACTIONS....
Instructional Video1:24
Curated Video

Android Platform

Higher Ed
This video explains Android platform in general. It is a pre-requisite before going ahead with the other videos.
Instructional Video3:13
Curated Video

Injection

Higher Ed
SQL injection is one of the new OWASP top 10 vulnerabilities. We will explain this vulnerability in details in this video
Instructional Video1:08
Curated Video

Broken Access Control

Higher Ed
This video will explain the broken access attack vector on web applications and how can attackers leverage this vulnerability to gain unauthorized access
Instructional Video1:05
Curated Video

Advanced Persistent Threats (APTs)

Higher Ed
A stealthy threat actor, usually a nation state or state-sponsored organization, that gains unauthorized access to a computer network and goes unnoticed for a long time constitutes an advanced persistent threat.
Instructional Video1:55
Curated Video

Ethical Hacking with Kali Linux Introduction

Higher Ed
This video is an introduction on ethical hacking
Instructional Video1:54
Curated Video

Android Security Architecture

Higher Ed
A very important video that details the security architecture of an APK app and how it interacts with the Android platform