Instructional Video3:09
Curated Video

Create a Malicious Application

Higher Ed
This video will teach you how to create an Android malicious application using Kali Linux
Instructional Video0:50
Curated Video

Tips to Improve Your Wireless Network Security

Higher Ed
This video will teach you some tips on how to protect your network
Instructional Video1:52
Curated Video

Password Management Tips

Higher Ed
This video will share important tips to setup passwords
Instructional Video2:33
Curated Video

Metasploitable VM

Higher Ed
Metasploitable MV is an intentionaly vulnerable machine by Rapid7, it is made for learning purposes. We will learn how to setup this virtual machine to exploit it in many of the videos in this course
Instructional Video6:15
Curated Video

How Can Pentest.ws Help You

Higher Ed
Learn how to document your findings for a professional presentation
Instructional Video6:17
Curated Video

Wireshark Simplified

Higher Ed
In this video, you will learn about the famous packet capturing tool, Wireshark. The tutorial demonstrates the capabilities of the application on KALI, while inspecting traffic between the KALI machine and a cloud windows server. Use...
Instructional Video1:43
Curated Video

Installing Windows

Higher Ed
This video will teach you how to install and setup Windows (The victim's machine)
Instructional Video1:49
Curated Video

Insufficient Logging and Monitoring

Higher Ed
Insufficient logging and monitoring is one of the new OWASP top 10 vulnerabilities. We will explain this vulnerability in details in this video
Instructional Video7:56
Curated Video

Discover Vulnerabilities in Websites

Higher Ed
In this video, you will learn about various tools used to discover vulberabilities in web applications.
Instructional Video1:13
Curated Video

God Mode on Windows 10

Higher Ed
redpython.{ED7BA470-8E54-465E-825C-99712043E01C}
Instructional Video2:22
Curated Video

Reverse Engineer an APK in KALI

Higher Ed
In practice, it means working with a translator with a specific background who understands the original document.
Instructional Video6:13
Curated Video

Install a Backdoor

Higher Ed
In this video, you will learn how to maintain a permanent access to a compromised machine by installing a backdoor. Use this approach ethically !!!
Instructional Video1:57
Curated Video

Attack a Router Using Medusa

Higher Ed
In this video, you will learn how to run an online password attack on a router using Medusa on KALI. Use this ethically !!!
Instructional Video1:31
Curated Video

Why Android

Higher Ed
This video will shed the light on the market share of Android and its dominance
Instructional Video1:53
Curated Video

Extract APKs From Your Phone

Higher Ed
You will learn how to export any Android application that exists on your phone and reverse engineer it in your lab
Instructional Video7:39
Curated Video

Intercept_ Analyze_ and Replay Web Traffic

Higher Ed
Learn how to leverage the powerful Burp suite in analyzing web traffic and crafting attacks
Instructional Video0:36
Curated Video

Different Installation Methods

Higher Ed
This video will show you various approaches to setup Kali Linux
Instructional Video9:37
Curated Video

Introduction to Metasploit

Higher Ed
In this video, you will learn the building blocks and the basics of the powerful Metasploit framework, developed by Rapid7. Use Metasploit ethically !!!
Instructional Video6:29
Curated Video

Offline Password Attack on Linux

Higher Ed
In this video, you will learn how to extract and identify password hashes on a Linux machine. Use the powerful Hashcat tool to crack those hashes.
Instructional Video4:13
Curated Video

Hack a Website in a Few Seconds

Higher Ed
In this video, you will learn how to install a backdoor on websites in order to deface them.
Instructional Video1:57
Curated Video

Run an Online Password Attack on a Router

Higher Ed
Learn how to plan an execute an online password attack on a router
Instructional Video10:09
Curated Video

Create a $3 Undetectable Bad USB

Higher Ed
In this tutorial, you will learn how to mimic a Rubber Ducky USB and how to upload your payload in order to execute various types of attacks.
Instructional Video10:45
Curated Video

Netcat on KALI and Windows Simplified

Higher Ed
In this video, you will learn how to easily use all the features of the powerful independent networking utility, NETCAT on Kali Linux. Use this ethically !!!
Instructional Video2:16
Curated Video

Install Kali on Windows 10

Higher Ed
How to Install Kali on Windows 10