Instructional Video4:09
Curated Video

Why a Regular Domain User Can be a Real Security Threat

Higher Ed
In this video you will learn about the reasons why a regular domain user can be a real danger to your environment, and why those generic and shared Active Directory accounts should not exist.
Instructional Video6:50
Curated Video

Hack an Android Phone

Higher Ed
In this video, you will learn how to hack into an android phone by deploying a malicious application. Gain total control over the mobile phone and manage it through Armitage on KALI.
Instructional Video9:09
Curated Video

Hidden Tear Ransomware Setup

Higher Ed
In this tutorial, you will learn how to customize one of the publicly available forks of the Hidden Tear Ransomware, and how to deploy it.
<
br/>
Use this only for learning
p
urposes.

Use this only in t
e
st VM...
Instructional Video8:11
Curated Video

Create Your First Trojan

Higher Ed
In this video, you will learn how to create your first Trojan file, and how to use this file once it is invoked by the victim. The Trojan file is moved to the victim's machine by using various social engineering techniques.
Instructional Video8:26
Curated Video

Takeover a Database Server

Higher Ed
In this tutorial, you will learn how to exploit a web application using SQLMAP in order to control a Database Server fully. <br<br/>/>

Use this technique ethically.
Instructional Video5:34
Curated Video

Hashing in a Nutshell

Higher Ed
In this video, you will learn the basics of hashing and the various ways it can be used for password storage, file verification, and indexing.
Instructional Video4:55
Curated Video

Bloodhound and Sharphound

Higher Ed
Learn how attackers use Bloodhound and Sharphound to Get Active Directory Domain Admin Access.
Instructional Video1:34
Curated Video

Display WiFi Passwords in Clear Text

Higher Ed
Display WiFi Passwords in Clear Text
Instructional Video3:05
Curated Video

Hide a Payload in an Image

Higher Ed
In this video, you will learn how to hide a payload in a JPEG image.
Instructional Video1:13
Curated Video

God Mode on Windows 10

Higher Ed
redpython.{ED7BA470-8E54-465E-825C-99712043E01C}
Instructional Video6:13
Curated Video

Install a Backdoor

Higher Ed
In this video, you will learn how to maintain a permanent access to a compromised machine by installing a backdoor. <br<br/>/>

Use this approach ethically !!!
Instructional Video1:57
Curated Video

Attack a Router Using Medusa

Higher Ed
In this video, you will learn how to run an online password attack on a router using Medusa on KALI. <br<br/>/>

Use this ethically !!!
Instructional Video4:13
Curated Video

Hack a Website in a Few Seconds

Higher Ed
In this video, you will learn how to install a backdoor on websites in order to deface them.
Instructional Video10:09
Curated Video

Create a $3 Undetectable Bad USB

Higher Ed
In this tutorial, you will learn how to mimic a Rubber Ducky USB and how to upload your payload in order to execute various types of attacks.
Instructional Video10:45
Curated Video

Netcat on KALI and Windows Simplified

Higher Ed
In this video, you will learn how to easily use all the features of the powerful independent networking utility, NETCAT on Kali Linux. <b<br/>r/>

Use this ethically !!!
Instructional Video2:16
Curated Video

Install Kali on Windows 10

Higher Ed
How to Install Kali on Windows 10
Instructional Video6:21
Curated Video

Hack WPA2 Wireless Networks

Higher Ed
In this tutorial, you will learn how to crack into WPA and WPA2 wireless networks using various tools like aircrack-ng.
Instructional Video7:01
Curated Video

Importance of Cyber Security

Higher Ed
The video explains the importance of cyber security in a connected world
Instructional Video3:10
Curated Video

Run a Simple Ransomware

Higher Ed
In this tutorial, you will learn how to create a very simple Ransomware to encrypt files, and how to use a Decrypter to gain access to these files again.
<
br/>
THIS VIDEO IS FOR EDUCATIONAL PURPOSES ONLY. I AM NOT RESPONSIBLE FOR...
Instructional Video15:13
Curated Video

ISO 27001- 2022 Organizational controls

Higher Ed
In this video, we will be discussing the ISO 27001-2022 organizational controls. ISO 27001 is an international standard that outlines the requirements for an information security management system (ISMS). The 2022 version of the standard...
Instructional Video25:03
Curated Video

How can ISO 27005:2022 support your ISMS certification

Higher Ed
In this video, we will explore how ISO 27005:2022 can support your ISMS certification. ISO 27005:2022 is a risk management standard that provides guidelines for information security risk management. By implementing ISO 27005:2022, you...
Instructional Video2:22
Curated Video

Information security for use of cloud services control

Higher Ed
In this video, we will be discussing the importance of information security when using cloud services. With the rise of cloud computing, it is crucial to understand the potential risks and how to mitigate them. We will cover topics such...
Instructional Video5:27
Curated Video

Mapping ISO 27001- 2013 and ISO 27001- 2022 ANNEX A controls

Higher Ed
In this video, we will be discussing the process of mapping ISO 27001-2013 and ISO 27001-2022 ANNEX A controls. ISO 27001 is a globally recognized standard for information security management systems, and it provides a framework for...
Instructional Video3:55
Curated Video

Five attributes in ISO 27002

Higher Ed
In this video, we will be discussing the five key attributes outlined in ISO 27002. ISO 27002 is a globally recognized standard for information security management systems. These attributes include confidentiality, integrity,...