Hi, what do you want to do?
Curated Video
Wireshark D5 V5 - HTTP analysisMTP analysis
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 5: SMTP analysis
Curated Video
Netcat on KALI and Windows Simplified
In this video, you will learn how to easily use all the features of the powerful independent networking utility, NETCAT on Kali Linux.
<b<br/>r/>
Use this ethically !!!
Use this ethically !!!
Curated Video
Hack WPA2 Wireless Networks
In this tutorial, you will learn how to crack into WPA and WPA2 wireless networks using various tools like aircrack-ng.
Curated Video
Coolest Way to Attack a Network
This video will show you how to acquire the NTLMv2 hashes of users on any Windows network, just by plugging your hacking box into that network that doesn't have any kind of NAC solution.
Curated Video
Explore Main Services and Install Necessary Programs
This video will help you get started in setting up your lab
Curated Video
Deface a Website in Few Seconds
Learn how to plan a backdoor and control a website in a minute
Curated Video
Create Your First Trojan and Infiltrate a Target
This video wil show you the baby steps on how to create your first trojan file in Kali Linux. We will put his file into action and start infiltrating data from the victim's machine
Curated Video
WPS Cracking
In this video you will learn how to take over a router with enabled WPS protocol
Curated Video
Introduction to Termux
A simple tool for ethical hacking is Termux. There are numerous tools for Termux available online, so we've compiled a list of the top hacking tools for Termux along with instructions on how to use each one.
Curated Video
Download and Setup Genymotion
Genymotion is an easy to use Android emulator. We will learn how to setup this emulator and use it for Dynamic malware analysis.
Curated Video
Decode and Decompile an APK
This is a hands on tutorial on how to reverse engineer an Android application
Curated Video
Netcat Simplified
Netcat is a simple networking utility, however it can be leveraged to powerfully exploit victims. In this video you will learn how to set it up and use it
Curated Video
Working in a matrixed organisation
This video discusses the concept of a matrix organization, a management structure where employees have multiple bosses and are accountable to different chains of command. It explores the benefits and challenges of this structure, and...
Curated Video
Understanding power and influence: The magnet for success
This video provides a comprehensive guide to understanding power and influence in the business environment. It covers the key differences between power and influence, and explains the six types of power that exist in business...
Curated Video
Cyber Kill Chain
Developed by Lockheed Martin, the Cyber Kill Chain® framework is part of the Intelligence Driven Defense® model for identification and prevention of cyber intrusions activity. The model identifies what the adversaries must complete in...
Curated Video
Decode and Decompile Android Apps
This is a hands on tutorial on how to reverse engineer an Android application
Curated Video
NMAP and ZENMAP Simplified
ZENMAP is the GUI version of NMAP, you will learn how to use both applications
Curated Video
Linux Fundamentals - Starting Additional Processes and Killing Processes
This video demonstrates how to start additional processes and kill processes.
<
br/>
This clip is from the chapter "Processes in Linux" of the series "Linux Fundamentals".This section explores processes. You will also learn to start...
<
br/>
This clip is from the chapter "Processes in Linux" of the series "Linux Fundamentals".This section explores processes. You will also learn to start...
Curated Video
Linux Fundamentals - Data Streams of the Process
This video explains the data streams of processes.
<
br/>
This clip is from the chapter "Data Streams and Piping in Linux" of the series "Linux Fundamentals".This section will introduce you to the data streams and piping in Linux....
<
br/>
This clip is from the chapter "Data Streams and Piping in Linux" of the series "Linux Fundamentals".This section will introduce you to the data streams and piping in Linux....
Curated Video
DevOps and CICD Easily Explained
DevOps is an agile development practice and mindset that uses agile principles (collaboration, communication, utilizing the right tools) to streamline software building, testing, and release. CI/CD is a DevOps tactic, which makes use of...
Curated Video
MongoDB Mastering MongoDB for Beginners (Theory and Projects) - Basic Database commands
In this video, we will cover basic database commands.
<
br/>
This clip is from the chapter "Basic Mongo Operations" of the series "MongoDB—Mastering MongoDB for Beginners (Theory and Projects)".In this section, we will cover basic...
<
br/>
This clip is from the chapter "Basic Mongo Operations" of the series "MongoDB—Mastering MongoDB for Beginners (Theory and Projects)".In this section, we will cover basic...
Curated Video
R Programming for Statistics and Data Science - Dealing with Missing Data in R
This video explains dealing with missing data in R.<br<br/>/>
This clip is from the chapter "Data Frames" of the series "R Programming for Statistics and Data Science".This section explains data frames.
This clip is from the chapter "Data Frames" of the series "R Programming for Statistics and Data Science".This section explains data frames.
Curated Video
R Programming for Statistics and Data Science - Data Import in R
This video explains data import in R.<br<br/>/>
This clip is from the chapter "Data Frames" of the series "R Programming for Statistics and Data Science".This section explains data frames.
This clip is from the chapter "Data Frames" of the series "R Programming for Statistics and Data Science".This section explains data frames.
Curated Video
Linux Fundamentals - Where do Process Data Streams Send Data by Default?
This video explores where process data streams send data by default.
<
br/>
This clip is from the chapter "Data Streams and Piping in Linux" of the series "Linux Fundamentals".This section will introduce you to the data streams and...
<
br/>
This clip is from the chapter "Data Streams and Piping in Linux" of the series "Linux Fundamentals".This section will introduce you to the data streams and...