Instructional Video3:51
Vlogbrothers

Do I Have ADHD?

6th - 11th
Just something I've been thinking about for a while.
Instructional Video4:59
Science Buddies

Identify Road Signs with Google's Teachable Machine

K - 5th
Train a machine learning model to identify different road signs in this fun STEM activity! No computer programming is required - you will use a free online tool called Teachable Machine by Google. Written instructions are available on...
Instructional Video4:53
Science Buddies

How to Use an Arduino

K - 5th
Learning how to use an Arduino is a great way to get started with electronics and programming. This video series will guide you through setting up an Arduino, programming it, and building circuits so you have all the knowledge you need...
Instructional Video7:11
All In One Social Media

Repurpose Your Live Stream into Reels and TikToks SUPER EASY

Higher Ed
Reels and Tiktok are the fastest growing ways to grow and get engagement on social media. In this video, I will show you how to repurpose your live streams into Reels or Tiktoks for more reach.
Instructional Video6:21
Curated Video

Cracking WPA and WPA2 new 2

Higher Ed
This video will explain the difference between two famous wireless protocols, and will show you a technique on cracking the passwords by deauthenticating users connected to a specific SSID
Instructional Video13:24
Curated Video

How to Program Quantum Computer?

9th - Higher Ed
In this part we build three quantum computers that can process simple commands by manipulating the Energy Operators in Schrodinger Equation. <br/>
Solving NOT gate by quantum computing, Solving Controlled NOT gate by quantum computing
Instructional Video3:57
Curated Video

SE Attack Vectors

Higher Ed
This video will explain the various attack vectors used in social engineering
Instructional Video3:41
Curated Video

Post-Exploitation Terminologies

Higher Ed
This video will teach you the jardong used when it comes to post exploiting a target
Instructional Video10:09
Curated Video

Create a $3 Rubber Ducky Key-logger

Higher Ed
Rubber ducky is the most famous key logger, but it is expensive. In this video you will learn how to create a similar device by buying an Arduino hardware from AliExpress at a cheap price
Instructional Video4:49
Curated Video

Execute a Phishing Attack

Higher Ed
In this video, you will learn how to plan and execute a phishing attack using the SET tool
Instructional Video3:41
Curated Video

Firewalls and Security Appliances

Higher Ed
Any type of server appliance intended to safeguard computer networks from unauthorized traffic is referred to as a security appliance.
Instructional Video1:20
Curated Video

Remote Work Security

Higher Ed
The video provides you with tips on how to safely work remotely (home, cafe, any place)
Instructional Video6:32
Curated Video

Pass the Hash with Mimikatz on Windows

Higher Ed
An attacker obtains the password hashes of one or more users on a computer network using various channels. Using Mimikatz the attacker leverages the compromised user’s username and password hash to authenticate to other systems that...
Instructional Video3:56
Curated Video

Wi-Fi Security

Higher Ed
You will learn how to protect your home WiFi and be vigilant when you are using public Wifi
Instructional Video6:13
Curated Video

Install a Backdoor

Higher Ed
In this video, you will learn how to maintain a permanent access to a compromised machine by installing a backdoor. <br<br/>/>

Use this approach ethically !!!
Instructional Video10:09
Curated Video

Create a $3 Undetectable Bad USB

Higher Ed
In this tutorial, you will learn how to mimic a Rubber Ducky USB and how to upload your payload in order to execute various types of attacks.