Hi, what do you want to do?
Curated Video
Offline Password Attack on Windows
In this video, you will learn how to extract the password hashes on a windows machine, then crack the hashes on KALI using John the Ripper.
<br<br/>/>
Use this ethically !!!
Use this ethically !!!
Curated Video
Dissecting FTP
In this tutorial, you will learn the modes FTP functions under as well as their security architecture.
Curated Video
Hack Active Directory Database
Hack the NTDS.DIT database using shadow copies, registry command, and powershell commands
Curated Video
Easily Hack a WordPress Site
WPScan is an easy to use tool that is used to hack into wordpress websites. Given that wordpress websites dominate the internet, this tool is priceless.
Curated Video
Why a Regular Domain User Can be a Real Security Threat
In this video you will learn about the reasons why a regular domain user can be a real danger to your environment, and why those generic and shared Active Directory accounts should not exist.
Curated Video
Execute an Offline Password Attack on Windows
Learn how to plan an execute an offline password attack on Windows using John The Ripper tool
Curated Video
All-in-one Metasploit Framework
This video will explain the powerful metasploit framework
Curated Video
Wireshark D5 V2 - HTTP analysisFTP analysis
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 2: FTP analysis
Curated Video
Setup a Stealthy Command and Control Center Online
This video will teach you how to setup a command and control center over the internet to start you actual attacks
Curated Video
Install KALI (Command Center)
This video will teach you how to install and setup KALI Linux
Curated Video
Injecting a Legit APK and Analyze it using MobSF
MobSF is a powerful setup for analyzing mobile malware. In this video we will learn how to install this framework and analyze malicious applications on it.
Curated Video
Create Your First Trojan
In this video, you will learn how to create your first Trojan file, and how to use this file once it is invoked by the victim. The Trojan file is moved to the victim's machine by using various social engineering techniques.
Curated Video
Takeover a Database Server
In this tutorial, you will learn how to exploit a web application using SQLMAP in order to control a Database Server fully.
<br<br/>/>
Use this technique ethically.
Use this technique ethically.
Curated Video
Bypass Firewalls by Tunneling Data and Commands over DNS new
This video will teach you how to setup a Command and Control center to bypass firewall rules and control the victim over DNS traffic, which in many cases is not suspicious to anyone monitoring a network traffic.
Curated Video
Email Security Simplified
Learn how to simulate an SMTP connection and sniff the traffic.
Curated Video
Hacking with Termux
A simple tool for ethical hacking is Termux. There are numerous tools for Termux available online, so we've compiled a list of the top hacking tools for Termux along with instructions on how to use each one.
Curated Video
Setup Your Lab in Kali
In this video, you will learn how to install the necessary tools to setup your safe lab for malware analysis
Curated Video
How Can Pentest.ws Help You
Learn how to document your findings for a professional presentation
Curated Video
Lab 4 Task 1 Buck Converter relations | Power Electronics
Lab 4 Task 1 Buck Converter relations | Power Electronics
Curated Video
Reverse Engineer an APK in KALI
In practice, it means working with a translator with a specific background who understands the original document.
Curated Video
Install a Backdoor
In this video, you will learn how to maintain a permanent access to a compromised machine by installing a backdoor.
<br<br/>/>
Use this approach ethically !!!
Use this approach ethically !!!
Curated Video
Introduction to Metasploit
In this video, you will learn the building blocks and the basics of the powerful Metasploit framework, developed by Rapid7.
<br<br/>/>
Use Metasploit ethically !!!
Use Metasploit ethically !!!
Curated Video
Hack a Website in a Few Seconds
In this video, you will learn how to install a backdoor on websites in order to deface them.