Hi, what do you want to do?
Science Buddies
Identify Road Signs with Google's Teachable Machine
Train a machine learning model to identify different road signs in this fun STEM activity! No computer programming is required - you will use a free online tool called Teachable Machine by Google. Written instructions are available on...
Science Buddies
How to Use an Arduino
Learning how to use an Arduino is a great way to get started with electronics and programming. This video series will guide you through setting up an Arduino, programming it, and building circuits so you have all the knowledge you need...
All In One Social Media
Repurpose Your Live Stream into Reels and TikToks SUPER EASY
Reels and Tiktok are the fastest growing ways to grow and get engagement on social media. In this video, I will show you how to repurpose your live streams into Reels or Tiktoks for more reach.
Curated Video
Cracking WPA and WPA2 new 2
This video will explain the difference between two famous wireless protocols, and will show you a technique on cracking the passwords by deauthenticating users connected to a specific SSID
Curated Video
How to Program Quantum Computer?
In this part we build three quantum computers that can process simple commands by manipulating the Energy Operators in Schrodinger Equation. <br/>
Solving NOT gate by quantum computing, Solving Controlled NOT gate by quantum computing
Solving NOT gate by quantum computing, Solving Controlled NOT gate by quantum computing
Curated Video
SE Attack Vectors
This video will explain the various attack vectors used in social engineering
Curated Video
Post-Exploitation Terminologies
This video will teach you the jardong used when it comes to post exploiting a target
Curated Video
Create a $3 Rubber Ducky Key-logger
Rubber ducky is the most famous key logger, but it is expensive. In this video you will learn how to create a similar device by buying an Arduino hardware from AliExpress at a cheap price
Curated Video
Execute a Phishing Attack
In this video, you will learn how to plan and execute a phishing attack using the SET tool
Curated Video
Firewalls and Security Appliances
Any type of server appliance intended to safeguard computer networks from unauthorized traffic is referred to as a security appliance.
Curated Video
Remote Work Security
The video provides you with tips on how to safely work remotely (home, cafe, any place)
Curated Video
Pass the Hash with Mimikatz on Windows
An attacker obtains the password hashes of one or more users on a computer network using various channels. Using Mimikatz the attacker leverages the compromised user’s username and password hash to authenticate to other systems that...
Curated Video
Wi-Fi Security
You will learn how to protect your home WiFi and be vigilant when you are using public Wifi
Curated Video
Install a Backdoor
In this video, you will learn how to maintain a permanent access to a compromised machine by installing a backdoor.
<br<br/>/>
Use this approach ethically !!!
Use this approach ethically !!!
Curated Video
Create a $3 Undetectable Bad USB
In this tutorial, you will learn how to mimic a Rubber Ducky USB and how to upload your payload in order to execute various types of attacks.