Instructional Video10:09
Curated Video

Design Effective Wordlists

Higher Ed
Learn how to effectively create wordlists that will aid you in cracking passwords
Instructional Video1:51
Curated Video

Who is Selling Your Email Addresses

Higher Ed
This video will help you identify those companies you sign up to, who in return sell your email addresses to companies who will spam you. You can easily identify those now.
Instructional Video9:29
Curated Video

Getting Started With Powershell Empire

Higher Ed
This video will show you how to install Powershell Empire and install a keylogger on a victim's machine. A jump-start tutorial on how to use this tool.
Instructional Video8:26
Curated Video

Control a Database Server with SQLMap-2 new

Higher Ed
This video will show you how to leverage SQL injection vulnerability to take full control over a Database server
Instructional Video12:59
Curated Video

Analysis of Code4hk APK

Higher Ed
This video will deep dive into the analysis of a malicious APK file named Code4hk, and wil show you how hackers can inject an APK within another APK's resources.
Instructional Video2:01
Curated Video

Master KALI Desktop Environment

Higher Ed
Before crafting attacks, get familiar with the desktop environment of Kali linux
Instructional Video1:05
Curated Video

How to Excel in Cyber Security

Higher Ed
Many advices are in this video that will help you distinguish yourself in the cybersecurity world
Instructional Video3:41
Curated Video

Post-Exploitation Terminologies

Higher Ed
This video will teach you the jardong used when it comes to post exploiting a target
Instructional Video4:28
Curated Video

DKIM Email Security

Higher Ed
In this tutorial, you will learn about DKIM and how to set it up on your DNS server.
Instructional Video4:37
Curated Video

Acquire Malicious Apps1

Higher Ed
This video will describe the methods of acquiring malicious Android applications over the internet. There are few publicly available sites in addition to Github links that will be shared.
Instructional Video5:58
Curated Video

Offline Password Attack on Windows

Higher Ed
In this video, you will learn how to extract the password hashes on a windows machine, then crack the hashes on KALI using John the Ripper. Use this ethically !!!
Instructional Video4:12
Curated Video

Hack Using a Rogue Access Point

Higher Ed
In this tutorial, you will learn how to create a fake wireless access point and use it to hack the users logged on to it. We will use WiFi Pineapple device.
Instructional Video5:21
Curated Video

DNS Poisoning Attack

Higher Ed
In this video, you will use KALI to learn how to cache poison the DNS (Domain Name Server) entries to redirect the requester to a different page.
Instructional Video6:59
Curated Video

Dissecting FTP

Higher Ed
In this tutorial, you will learn the modes FTP functions under as well as their security architecture.
Instructional Video3:10
Curated Video

Create a Simple Ransomware

Higher Ed
This video will show you how easy it is to create a simple ranwonware
Instructional Video3:59
Curated Video

How Does Port Scanning Work

Higher Ed
In this video, you will learn the two main techniques used in port scanning. We will be mainly using NMAP tool
Instructional Video6:54
Curated Video

Easily Hack a WordPress Site

Higher Ed
WPScan is an easy to use tool that is used to hack into wordpress websites. Given that wordpress websites dominate the internet, this tool is priceless.
Instructional Video1:14
Curated Video

Google Security Services

Higher Ed
Google adds various security features on top of the Android platform. This video will help you explore those feaures.
Instructional Video3:42
Curated Video

Analysis of COVID Spy Max APK

Higher Ed
This video will deep dive into the analysis of a spyware APK
Instructional Video1:01
Curated Video

Dangerous Permissions

Higher Ed
A very important part of doing static malware analysis is to check the dangerous permissions acquired by an application. This video will teach you how to spot those dangerous permissions.
Instructional Video1:31
Curated Video

Security Misconfiguration

Higher Ed
Security configuration is one of the new OWASP top 10 vulnerabilities. We will explain this vulnerability in details in this video
Instructional Video6:27
Curated Video

Google Dorks Live Examples

Higher Ed
Spot the vulnerabilities in the wild, leverage Google to hack into web applications and systems that are published over the Internet. You will be surprised by how easy it is.
Instructional Video10:09
Curated Video

Create a $3 Rubber Ducky Key-logger

Higher Ed
Rubber ducky is the most famous key logger, but it is expensive. In this video you will learn how to create a similar device by buying an Arduino hardware from AliExpress at a cheap price
Instructional Video2:58
Curated Video

Welcome Note

Higher Ed
The video explains the importance of cyber security in a connected world