Hi, what do you want to do?
Curated Video
Why a Regular Domain User Can be a Real Security Threat
In this video you will learn about the reasons why a regular domain user can be a real danger to your environment, and why those generic and shared Active Directory accounts should not exist.
Curated Video
Hack an Android Phone
In this video, you will learn how to hack into an android phone by deploying a malicious application. Gain total control over the mobile phone and manage it through Armitage on KALI.
Curated Video
Hidden Tear Ransomware Setup
In this tutorial, you will learn how to customize one of the publicly available forks of the Hidden Tear Ransomware, and how to deploy it.
<
br/>
Use this only for learning
p
urposes.
Use this only in t
e
st VM...
<
br/>
Use this only for learning
p
urposes.
Use this only in t
e
st VM...
Curated Video
Create Your First Trojan
In this video, you will learn how to create your first Trojan file, and how to use this file once it is invoked by the victim. The Trojan file is moved to the victim's machine by using various social engineering techniques.
Curated Video
Takeover a Database Server
In this tutorial, you will learn how to exploit a web application using SQLMAP in order to control a Database Server fully.
<br<br/>/>
Use this technique ethically.
Use this technique ethically.
Curated Video
Hashing in a Nutshell
In this video, you will learn the basics of hashing and the various ways it can be used for password storage, file verification, and indexing.
Curated Video
Bloodhound and Sharphound
Learn how attackers use Bloodhound and Sharphound to Get Active Directory Domain Admin Access.
Curated Video
Hide a Payload in an Image
In this video, you will learn how to hide a payload in a JPEG image.
Curated Video
Install a Backdoor
In this video, you will learn how to maintain a permanent access to a compromised machine by installing a backdoor.
<br<br/>/>
Use this approach ethically !!!
Use this approach ethically !!!
Curated Video
Attack a Router Using Medusa
In this video, you will learn how to run an online password attack on a router using Medusa on KALI.
<br<br/>/>
Use this ethically !!!
Use this ethically !!!
Curated Video
Hack a Website in a Few Seconds
In this video, you will learn how to install a backdoor on websites in order to deface them.
Curated Video
Create a $3 Undetectable Bad USB
In this tutorial, you will learn how to mimic a Rubber Ducky USB and how to upload your payload in order to execute various types of attacks.
Curated Video
Netcat on KALI and Windows Simplified
In this video, you will learn how to easily use all the features of the powerful independent networking utility, NETCAT on Kali Linux.
<b<br/>r/>
Use this ethically !!!
Use this ethically !!!
Curated Video
Hack WPA2 Wireless Networks
In this tutorial, you will learn how to crack into WPA and WPA2 wireless networks using various tools like aircrack-ng.
Curated Video
Importance of Cyber Security
The video explains the importance of cyber security in a connected world
Curated Video
Run a Simple Ransomware
In this tutorial, you will learn how to create a very simple Ransomware to encrypt files, and how to use a Decrypter to gain access to these files again.
<
br/>
THIS VIDEO IS FOR EDUCATIONAL PURPOSES ONLY. I AM NOT RESPONSIBLE FOR...
<
br/>
THIS VIDEO IS FOR EDUCATIONAL PURPOSES ONLY. I AM NOT RESPONSIBLE FOR...
Curated Video
ISO 27001- 2022 Organizational controls
In this video, we will be discussing the ISO 27001-2022 organizational controls. ISO 27001 is an international standard that outlines the requirements for an information security management system (ISMS). The 2022 version of the standard...
Curated Video
How can ISO 27005:2022 support your ISMS certification
In this video, we will explore how ISO 27005:2022 can support your ISMS certification. ISO 27005:2022 is a risk management standard that provides guidelines for information security risk management. By implementing ISO 27005:2022, you...
Curated Video
Information security for use of cloud services control
In this video, we will be discussing the importance of information security when using cloud services. With the rise of cloud computing, it is crucial to understand the potential risks and how to mitigate them. We will cover topics such...
Curated Video
Mapping ISO 27001- 2013 and ISO 27001- 2022 ANNEX A controls
In this video, we will be discussing the process of mapping ISO 27001-2013 and ISO 27001-2022 ANNEX A controls. ISO 27001 is a globally recognized standard for information security management systems, and it provides a framework for...
Curated Video
Five attributes in ISO 27002
In this video, we will be discussing the five key attributes outlined in ISO 27002. ISO 27002 is a globally recognized standard for information security management systems. These attributes include confidentiality, integrity,...