Curated Video
DEX File
This video will explain the nature DEX file, which has a a set of bytecode instructions
Curated Video
Insecure Deserialization
Insecure deserialization is one of the new OWASP top 10 vulnerabilities. We will explain this vulnerability in details in this video
Curated Video
Decode and Decompile Android Apps
This is a hands on tutorial on how to reverse engineer an Android application
Curated Video
NMAP and ZENMAP Simplified
ZENMAP is the GUI version of NMAP, you will learn how to use both applications
Curated Video
Introducing NMAP
NMAP is the classic network scanner, in this video we will deep dive into its features
Curated Video
Understand NETBIOS and SMB Attacks
This video will teach you how to perform NETBIOS and SMB attacks using various tools in Kali
Curated Video
Update, Upgrade, and Alias Commands
This video will show you how to keep your pentest box up-to-date
Curated Video
How to Prepare and Present Your Report final mp4 new
This video will teach you how to professionally present your findings to a client
Curated Video
Run a Simple Ransomware
In this tutorial, you will learn how to create a very simple Ransomware to encrypt files, and how to use a Decrypter to gain access to these files again. THIS VIDEO IS FOR EDUCATIONAL PURPOSES ONLY. I AM NOT RESPONSIBLE FOR YOUR ACTIONS....
Curated Video
Android Platform
This video explains Android platform in general. It is a pre-requisite before going ahead with the other videos.
Curated Video
Injection
SQL injection is one of the new OWASP top 10 vulnerabilities. We will explain this vulnerability in details in this video
Curated Video
Broken Access Control
This video will explain the broken access attack vector on web applications and how can attackers leverage this vulnerability to gain unauthorized access
Curated Video
Ethical Hacking with Kali Linux Introduction
This video is an introduction on ethical hacking
Curated Video
Android Security Architecture
A very important video that details the security architecture of an APK app and how it interacts with the Android platform
Curated Video
Bluetooth Devices Recon
In this tutorial, you will learn how to recon BT devices and enumerate its services.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Creating Linux Users and Groups Lab
User and group management in Linux can be performed at the command line. This demo makes use of the user add and group add commands to create authentication identities. This clip is from the chapter "Identity and Account Management" of...
Curated Video
Explain web security : Operating Systems and Tools Used
From the section: First Steps. In this section, the viewer will be introduced to the course with a look at the course in general, have a look at some of the operating systems used in this course, and begin to understand basic...
Curated Video
Describe cyber attacks that could affect a computer system or network : Types of man-in-the-middle Attack
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools. In this video, we will know about what is...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Docker Container Lab
Containerized applications are self-contained boundaries consisting of only application files, not an operating system. This demo shows how to work with Docker containers on the Linux platform. This clip is from the chapter "Securing...
Curated Video
The Importance and Applications of Potassium: A Nutrient and Element
Learn about potassium, an important nutrient and element found in bananas. The video covers the discovery and properties of potassium, its role in the human body, its presence in various foods, and its uses in agriculture and other...
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Installing Kali Linux
In this video, you'll learn to install Kali Linux. This clip is from the chapter "Setting Up a Pentesting Lab" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll learn to set up a...
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Important Things to do After Installing Kali Linux
In this video, you'll see a few steps that you need to keep in mind after installing Kali Linux. This clip is from the chapter "Setting Up a Pentesting Lab" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In...
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Creating a Bootable Kali USB Flash Drive
In this video, you'll learn how to create a bootable Kali USB flash drive. This clip is from the chapter "Setting Up a Pentesting Lab" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll...