Instructional Video9:37
Curated Video

Introduction to Metasploit

Higher Ed
In this video, you will learn the building blocks and the basics of the powerful Metasploit framework, developed by Rapid7. Use Metasploit ethically !!!
Instructional Video4:13
Curated Video

Hack a Website in a Few Seconds

Higher Ed
In this video, you will learn how to install a backdoor on websites in order to deface them.
Instructional Video1:57
Curated Video

Run an Online Password Attack on a Router

Higher Ed
Learn how to plan an execute an online password attack on a router
Instructional Video10:09
Curated Video

Create a $3 Undetectable Bad USB

Higher Ed
In this tutorial, you will learn how to mimic a Rubber Ducky USB and how to upload your payload in order to execute various types of attacks.
Instructional Video10:45
Curated Video

Netcat on KALI and Windows Simplified

Higher Ed
In this video, you will learn how to easily use all the features of the powerful independent networking utility, NETCAT on Kali Linux. Use this ethically !!!
Instructional Video2:16
Curated Video

Install Kali on Windows 10

Higher Ed
How to Install Kali on Windows 10
Instructional Video1:41
Curated Video

Why KALI

Higher Ed
Kali is a powerful pentest box, in this video we will explain the reasons behind its fame
Instructional Video6:21
Curated Video

Hack WPA2 Wireless Networks

Higher Ed
In this tutorial, you will learn how to crack into WPA and WPA2 wireless networks using various tools like aircrack-ng.
Instructional Video5:30
Curated Video

Coolest Way to Attack a Network

Higher Ed
This video will show you how to acquire the NTLMv2 hashes of users on any Windows network, just by plugging your hacking box into that network that doesn't have any kind of NAC solution.
Instructional Video5:11
Curated Video

Explore Main Services and Install Necessary Programs

Higher Ed
This video will help you get started in setting up your lab
Instructional Video8:35
Curated Video

Execute Man-in-the-Middle Attacks

Higher Ed
Learn how to execute MITM attacks using Ettercap tool, a very powerful application in Kali
Instructional Video4:13
Curated Video

Deface a Website in Few Seconds

Higher Ed
Learn how to plan a backdoor and control a website in a minute
Instructional Video8:11
Curated Video

Create Your First Trojan and Infiltrate a Target

Higher Ed
This video wil show you the baby steps on how to create your first trojan file in Kali Linux. We will put his file into action and start infiltrating data from the victim's machine
Instructional Video3:54
Curated Video

Stay Anonymous Online

Higher Ed
This video will show you how to conceal your identity online
Instructional Video2:21
Curated Video

Plan DOS and DDOS Attacks

Higher Ed
This video will teach you how to use Ettercap to perform DDOS attacks
Instructional Video5:21
Curated Video

Perform a DNS Spoofing Attack

Higher Ed
This video will teach you how to perform a DNS spoofing attack, and how to take user's URL request to a crafted web application of your own
Instructional Video6:50
Curated Video

Hack an Android Phone with Armitage

Higher Ed
In this video, we will actually hack an Android phone by deploying our payload using Armitage, which is a GUI for metasploit framework.
Instructional Video9:58
Curated Video

Create an IoT WIFI Jammer

Higher Ed
This video will show you how to create a hardware WiFi jammer to disrupt the wireless connetivity in a certain area
Instructional Video2:28
Curated Video

Create a Malicious APK with One Command

Higher Ed
Learn how to use KALI Linux to create a phony Android application that you can use to have full access to a smartphone.
Instructional Video4:02
Curated Video

WPS Cracking

Higher Ed
In this video you will learn how to take over a router with enabled WPS protocol
Instructional Video3:20
Curated Video

Publish Your Weapons Online

Higher Ed
This video will teach you how to prepare your lab for a real world attack
Instructional Video3:35
Curated Video

Broken Authentication

Higher Ed
This video will explain the broken authentication on web applications and how can attackers leverage this vulnerability to gain unauthorized access
Instructional Video1:20
Curated Video

XML External Entity

Higher Ed
XXE is one of the new OWASP top 10 vulnerabilities. We will explain this vulnerability in details in this video
Instructional Video10:45
Curated Video

Netcat Simplified

Higher Ed
Netcat is a simple networking utility, however it can be leveraged to powerfully exploit victims. In this video you will learn how to set it up and use it