Instructional Video3:39
Curated Video

Malware Distribution Mechanisms

Higher Ed
In this video, we will explain how hackers leverages various channels to publish their malicious Android applications to that users start using them.
Instructional Video4:10
Curated Video

Inject Whatsapp Application With a Payload

Higher Ed
In this video, we will extract a legit Whatsapp application from our phone, inject it with malware, then repackage it and distribute it. The techniques will be done using Kali tools
Instructional Video5:59
Curated Video

Web Applications Attack Surface

Higher Ed
This video will shed the light on all possible attack vectors for web applications
Instructional Video3:54
Curated Video

Steps to plan a successfull pentest

Higher Ed
This video will teach you how to plan for a penetration testing engagement, and what are the phases you will go through
Instructional Video6:52
Curated Video

Hack Facebook, Twitter, and Gmail Accounts

Higher Ed
We will use the SET tool to setup a phishing campaign in order to hack social media accounts
Instructional Video1:47
Curated Video

Dealing With Security Incidents

Higher Ed
This video will advise you on how to deal with cyber security incidents once they happen, and whom to contact in order to get help
Instructional Video4:19
Curated Video

Crack Passwords with Rainbow Tables

Higher Ed
This video will explain the concept of Rainbow tables, and how you can use them to expedite password cracking time
Instructional Video8:07
Curated Video

The Powerful Armitage Tool

Higher Ed
This video will demonstrate the powerful armitage tool, which is a GUI application for the metasploit framework
Instructional Video6:58
Curated Video

Mobile Malware Types

Higher Ed
In this video, we will explain the various types of mobile malway such as RAT, trojans, spyware, etc..
Instructional Video0:59
Curated Video

Root User Color Coding

Higher Ed
This video will show you how to change the color of the terminal when using a root user
Instructional Video3:43
Curated Video

Identify a DNS Zone Transfer Vulnerability

Higher Ed
Learn how to check for the DNS zone transfer vulnerability, a serious weakness that might lead to fully leaking your domain information.
Instructional Video1:01
Curated Video

Tools Explained

Higher Ed
In this video, we will explain the various tools needed to start reverse engineering an Android application and analyzing the malware. Tools such as APKTool in Kali Linux, Android Studio, various emulators, and other GUI tools for...
Instructional Video8:26
Curated Video

Control a Database Server with SQLMap-2 new

Higher Ed
This video will show you how to leverage SQL injection vulnerability to take full control over a Database server
Instructional Video12:59
Curated Video

Analysis of Code4hk APK

Higher Ed
This video will deep dive into the analysis of a malicious APK file named Code4hk, and wil show you how hackers can inject an APK within another APK's resources.
Instructional Video2:01
Curated Video

Master KALI Desktop Environment

Higher Ed
Before crafting attacks, get familiar with the desktop environment of Kali linux
Instructional Video3:41
Curated Video

Post-Exploitation Terminologies

Higher Ed
This video will teach you the jardong used when it comes to post exploiting a target
Instructional Video4:37
Curated Video

Acquire Malicious Apps1

Higher Ed
This video will describe the methods of acquiring malicious Android applications over the internet. There are few publicly available sites in addition to Github links that will be shared.
Instructional Video3:10
Curated Video

Create a Simple Ransomware

Higher Ed
This video will show you how easy it is to create a simple ranwonware
Instructional Video3:59
Curated Video

How Does Port Scanning Work

Higher Ed
In this video, you will learn the two main techniques used in port scanning. We will be mainly using NMAP tool
Instructional Video1:14
Curated Video

Google Security Services

Higher Ed
Google adds various security features on top of the Android platform. This video will help you explore those feaures.
Instructional Video3:42
Curated Video

Analysis of COVID Spy Max APK

Higher Ed
This video will deep dive into the analysis of a spyware APK
Instructional Video1:01
Curated Video

Dangerous Permissions

Higher Ed
A very important part of doing static malware analysis is to check the dangerous permissions acquired by an application. This video will teach you how to spot those dangerous permissions.
Instructional Video1:31
Curated Video

Security Misconfiguration

Higher Ed
Security configuration is one of the new OWASP top 10 vulnerabilities. We will explain this vulnerability in details in this video
Instructional Video6:27
Curated Video

Google Dorks Live Examples

Higher Ed
Spot the vulnerabilities in the wild, leverage Google to hack into web applications and systems that are published over the Internet. You will be surprised by how easy it is.