Instructional Video5:58
Curated Video

Offline Password Attack on Windows

Higher Ed
In this video, you will learn how to extract the password hashes on a windows machine, then crack the hashes on KALI using John the Ripper. <br<br/>/>

Use this ethically !!!
Instructional Video6:59
Curated Video

Dissecting FTP

Higher Ed
In this tutorial, you will learn the modes FTP functions under as well as their security architecture.
Instructional Video8:11
Curated Video

Hack Active Directory Database

Higher Ed
Hack the NTDS.DIT database using shadow copies, registry command, and powershell commands
Instructional Video6:54
Curated Video

Easily Hack a WordPress Site

Higher Ed
WPScan is an easy to use tool that is used to hack into wordpress websites. Given that wordpress websites dominate the internet, this tool is priceless.
Instructional Video4:09
Curated Video

Why a Regular Domain User Can be a Real Security Threat

Higher Ed
In this video you will learn about the reasons why a regular domain user can be a real danger to your environment, and why those generic and shared Active Directory accounts should not exist.
Instructional Video5:54
Curated Video

Execute an Offline Password Attack on Windows

Higher Ed
Learn how to plan an execute an offline password attack on Windows using John The Ripper tool
Instructional Video9:37
Curated Video

All-in-one Metasploit Framework

Higher Ed
This video will explain the powerful metasploit framework
Instructional Video6:49
Curated Video

Wireshark D5 V2 - HTTP analysisFTP analysis

Higher Ed
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 2: FTP analysis
Instructional Video6:02
Curated Video

Setup a Stealthy Command and Control Center Online

Higher Ed
This video will teach you how to setup a command and control center over the internet to start you actual attacks
Instructional Video4:14
Curated Video

Install KALI (Command Center)

Higher Ed
This video will teach you how to install and setup KALI Linux
Instructional Video5:26
Curated Video

Injecting a Legit APK and Analyze it using MobSF

Higher Ed
MobSF is a powerful setup for analyzing mobile malware. In this video we will learn how to install this framework and analyze malicious applications on it.
Instructional Video8:11
Curated Video

Create Your First Trojan

Higher Ed
In this video, you will learn how to create your first Trojan file, and how to use this file once it is invoked by the victim. The Trojan file is moved to the victim's machine by using various social engineering techniques.
Instructional Video8:26
Curated Video

Takeover a Database Server

Higher Ed
In this tutorial, you will learn how to exploit a web application using SQLMAP in order to control a Database Server fully. <br<br/>/>

Use this technique ethically.
Instructional Video6:10
Curated Video

Bypass Firewalls by Tunneling Data and Commands over DNS new

Higher Ed
This video will teach you how to setup a Command and Control center to bypass firewall rules and control the victim over DNS traffic, which in many cases is not suspicious to anyone monitoring a network traffic.
Instructional Video1:34
Curated Video

Display WiFi Passwords in Clear Text

Higher Ed
Display WiFi Passwords in Clear Text
Instructional Video3:16
Curated Video

Email Security Simplified

Higher Ed
Learn how to simulate an SMTP connection and sniff the traffic.
Instructional Video15:20
Curated Video

Hacking with Termux

Higher Ed
A simple tool for ethical hacking is Termux. There are numerous tools for Termux available online, so we've compiled a list of the top hacking tools for Termux along with instructions on how to use each one.
Instructional Video1:51
Curated Video

Setup Your Lab in Kali

Higher Ed
In this video, you will learn how to install the necessary tools to setup your safe lab for malware analysis
Instructional Video6:15
Curated Video

How Can Pentest.ws Help You

Higher Ed
Learn how to document your findings for a professional presentation
Instructional Video8:53
Curated Video

Lab 4 Task 1 Buck Converter relations | Power Electronics

Higher Ed
Lab 4 Task 1 Buck Converter relations | Power Electronics
Instructional Video2:22
Curated Video

Reverse Engineer an APK in KALI

Higher Ed
In practice, it means working with a translator with a specific background who understands the original document.
Instructional Video6:13
Curated Video

Install a Backdoor

Higher Ed
In this video, you will learn how to maintain a permanent access to a compromised machine by installing a backdoor. <br<br/>/>

Use this approach ethically !!!
Instructional Video9:37
Curated Video

Introduction to Metasploit

Higher Ed
In this video, you will learn the building blocks and the basics of the powerful Metasploit framework, developed by Rapid7. <br<br/>/>

Use Metasploit ethically !!!
Instructional Video4:13
Curated Video

Hack a Website in a Few Seconds

Higher Ed
In this video, you will learn how to install a backdoor on websites in order to deface them.