Instructional Video4:49
Curated Video

Execute a Phishing Attack

Higher Ed
In this video, you will learn how to plan and execute a phishing attack using the SET tool
Instructional Video6:02
Curated Video

Setup a Stealthy Command and Control Center Online

Higher Ed
This video will teach you how to setup a command and control center over the internet to start you actual attacks
Instructional Video3:23
Curated Video

Run an Online Password Attack on Linux

Higher Ed
Learn how to plan an execute an online password attack on Linux machine
Instructional Video4:14
Curated Video

Install KALI (Command Center)

Higher Ed
This video will teach you how to install and setup KALI Linux
Instructional Video4:06
Curated Video

Backdoor Tools Explained

Higher Ed
This video will explain how to create backdoors to attack web applications
Instructional Video6:50
Curated Video

Hack an Android Phone

Higher Ed
In this video, you will learn how to hack into an android phone by deploying a malicious application. Gain total control over the mobile phone and manage it through Armitage on KALI.
Instructional Video9:09
Curated Video

Hidden Tear Ransomware Setup

Higher Ed
In this tutorial, you will learn how to customize one of the publicly available forks of the Hidden Tear Ransomware, and how to deploy it. Use this only for learning purposes. Use this only in test VM environment. I'm not responsible for...
Instructional Video5:26
Curated Video

Injecting a Legit APK and Analyze it using MobSF

Higher Ed
MobSF is a powerful setup for analyzing mobile malware. In this video we will learn how to install this framework and analyze malicious applications on it.
Instructional Video5:28
Curated Video

Cross Site Scripting

Higher Ed
This video will explain what CSS is
Instructional Video8:11
Curated Video

Create Your First Trojan

Higher Ed
In this video, you will learn how to create your first Trojan file, and how to use this file once it is invoked by the victim. The Trojan file is moved to the victim's machine by using various social engineering techniques.
Instructional Video8:26
Curated Video

Takeover a Database Server

Higher Ed
In this tutorial, you will learn how to exploit a web application using SQLMAP in order to control a Database Server fully. Use this technique ethically.
Instructional Video5:34
Curated Video

Hashing in a Nutshell

Higher Ed
In this video, you will learn the basics of hashing and the various ways it can be used for password storage, file verification, and indexing.
Instructional Video4:55
Curated Video

Bloodhound and Sharphound

Higher Ed
Learn how attackers use Bloodhound and Sharphound to Get Active Directory Domain Admin Access.
Instructional Video4:10
Curated Video

SSL Interception

Higher Ed
In this video, we will intercept SSL traffic by decrypting the SSL tunnel between an APK and a server
Instructional Video2:12
Curated Video

APK File Structure

Higher Ed
This video will explain the APK file structure
Instructional Video3:35
Curated Video

Various Password Attacks

Higher Ed
This video will show you the various techniques used in hacking passowrds
Instructional Video6:16
Curated Video

Execute an Offline Password Attack in Linux

Higher Ed
Learn how to plan an execute an offline password attack on Linux using the HashCat powerful tool
Instructional Video4:47
Curated Video

Collect and Visualize Data with Maltego

Higher Ed
This video will explain the poweful OSINT application called Maltego, and how you can leverage it in collecting open source data on your victim.
Instructional Video6:10
Curated Video

Bypass Firewalls by Tunneling Data and Commands over DNS new

Higher Ed
This video will teach you how to setup a Command and Control center to bypass firewall rules and control the victim over DNS traffic, which in many cases is not suspicious to anyone monitoring a network traffic.
Instructional Video1:34
Curated Video

Display WiFi Passwords in Clear Text

Higher Ed
Display WiFi Passwords in Clear Text
Instructional Video1:57
Curated Video

Sensitive Data Exposure

Higher Ed
Sensntive data exposure is one of the new OWASP top 10 vulnerabilities. We will explain this vulnerability in details in this video
Instructional Video7:11
Curated Video

How to Attack Modern Wireless Networks - Introduction

Higher Ed
This video is a general overview on how to attack wireless networks
Instructional Video3:05
Curated Video

Hide a Payload in an Image

Higher Ed
In this video, you will learn how to hide a payload in a JPEG image.
Instructional Video1:51
Curated Video

Setup Your Lab in Kali

Higher Ed
In this video, you will learn how to install the necessary tools to setup your safe lab for malware analysis