Curated Video
Create a $3 Rubber Ducky Key-logger
Rubber ducky is the most famous key logger, but it is expensive. In this video you will learn how to create a similar device by buying an Arduino hardware from AliExpress at a cheap price
Curated Video
Execute an Offline Password Attack on Windows
Learn how to plan an execute an offline password attack on Windows using John The Ripper tool
Curated Video
Components with Known Vulnerabilities
This video will explain the drawbacks of using off the shelf components on your web application
Curated Video
All-in-one Metasploit Framework
This video will explain the powerful metasploit framework
Curated Video
Keyword Search Tecniques
This video will guide you on how to use keyword search techniques in spotting malicious code within an APK
Curated Video
Android Security Features
This video will highlight the various security features oferred by Android
Curated Video
Execute a Phishing Attack
In this video, you will learn how to plan and execute a phishing attack using the SET tool
Curated Video
Setup a Stealthy Command and Control Center Online
This video will teach you how to setup a command and control center over the internet to start you actual attacks
Curated Video
Run an Online Password Attack on Linux
Learn how to plan an execute an online password attack on Linux machine
Curated Video
Install KALI (Command Center)
This video will teach you how to install and setup KALI Linux
Curated Video
Backdoor Tools Explained
This video will explain how to create backdoors to attack web applications
Curated Video
Injecting a Legit APK and Analyze it using MobSF
MobSF is a powerful setup for analyzing mobile malware. In this video we will learn how to install this framework and analyze malicious applications on it.
Curated Video
SSL Interception
In this video, we will intercept SSL traffic by decrypting the SSL tunnel between an APK and a server
Curated Video
Various Password Attacks
This video will show you the various techniques used in hacking passowrds
Curated Video
Execute an Offline Password Attack in Linux
Learn how to plan an execute an offline password attack on Linux using the HashCat powerful tool
Curated Video
Collect and Visualize Data with Maltego
This video will explain the poweful OSINT application called Maltego, and how you can leverage it in collecting open source data on your victim.
Curated Video
Bypass Firewalls by Tunneling Data and Commands over DNS new
This video will teach you how to setup a Command and Control center to bypass firewall rules and control the victim over DNS traffic, which in many cases is not suspicious to anyone monitoring a network traffic.
Curated Video
Sensitive Data Exposure
Sensntive data exposure is one of the new OWASP top 10 vulnerabilities. We will explain this vulnerability in details in this video
Curated Video
How to Attack Modern Wireless Networks - Introduction
This video is a general overview on how to attack wireless networks
Curated Video
Setup Your Lab in Kali
In this video, you will learn how to install the necessary tools to setup your safe lab for malware analysis
Curated Video
Create a Malicious Application
This video will teach you how to create an Android malicious application using Kali Linux
Curated Video
Tips to Improve Your Wireless Network Security
This video will teach you some tips on how to protect your network