Instructional Video0:33
All In One Social Media

The Gold Standard of Online Graphics

Higher Ed
The Gold Standard of Online Graphics
Instructional Video0:59
All In One Social Media

Make Clips From Live Streams SUPER EASY!!

Higher Ed
Make Clips From Live Streams SUPER EASY!!
Instructional Video0:46
All In One Social Media

Don't Create Another Piece Of Social Media Content WITHOUT these 3 Tools!

Higher Ed
Don't Create Another Piece Of Social Media Content WITHOUT these 3 Tools!
Instructional Video7:53
All In One Social Media

This social media scheduling tool is a game changer!

Higher Ed
When we are talking about simplifying our social media life being able to schedule our content is vital. So when you combine amazing social graphics and the ability to publish all in the same place for a really great price, I am all...
Instructional Video15:47
Religion for Breakfast

Why Humans Evolved to Play Music

12th - Higher Ed
Why Humans Evolved to Play Music
Instructional Video21:29
Curated Video

AWS Security Boiled Down

Higher Ed
A general overview about AWS security architecture and tools. Learn more about VPC, EC2, S3, AIM, Security Groups, and NACLs. This video will give you a quick jump into cloud security.
Instructional Video6:52
Curated Video

Hack Facebook, Twitter, and Gmail Accounts

Higher Ed
We will use the SET tool to setup a phishing campaign in order to hack social media accounts
Instructional Video1:01
Curated Video

Tools Explained

Higher Ed
In this video, we will explain the various tools needed to start reverse engineering an Android application and analyzing the malware. Tools such as APKTool in Kali Linux, Android Studio, various emulators, and other GUI tools for...
Instructional Video3:10
Curated Video

Create a Simple Ransomware

Higher Ed
This video will show you how easy it is to create a simple ranwonware
Instructional Video3:59
Curated Video

How Does Port Scanning Work

Higher Ed
In this video, you will learn the two main techniques used in port scanning. We will be mainly using NMAP tool
Instructional Video4:06
Curated Video

Backdoor Tools Explained

Higher Ed
This video will explain how to create backdoors to attack web applications
Instructional Video2:48
Curated Video

Wireshark D1 V1 - Master Wireshark Overview

Higher Ed
DAY ONE - We will introduce Wireshark and setup our environment - Video 1: Overview
Instructional Video5:26
Curated Video

Injecting a Legit APK and Analyze it using MobSF

Higher Ed
MobSF is a powerful setup for analyzing mobile malware. In this video we will learn how to install this framework and analyze malicious applications on it.
Instructional Video5:43
Curated Video

No Password !! No Issue, You Can Still Hack

Higher Ed
No Password !! No Issue, You Can Still Hack
Instructional Video15:20
Curated Video

Hacking with Termux

Higher Ed
A simple tool for ethical hacking is Termux. There are numerous tools for Termux available online, so we've compiled a list of the top hacking tools for Termux along with instructions on how to use each one.
Instructional Video6:17
Curated Video

Wireshark Simplified

Higher Ed
In this video, you will learn about the famous packet capturing tool, Wireshark. The tutorial demonstrates the capabilities of the application on KALI, while inspecting traffic between the KALI machine and a cloud windows server. Use...
Instructional Video7:56
Curated Video

Discover Vulnerabilities in Websites

Higher Ed
In this video, you will learn about various tools used to discover vulberabilities in web applications.
Instructional Video2:22
Curated Video

Reverse Engineer an APK in KALI

Higher Ed
In practice, it means working with a translator with a specific background who understands the original document.
Instructional Video7:39
Curated Video

Intercept_ Analyze_ and Replay Web Traffic

Higher Ed
Learn how to leverage the powerful Burp suite in analyzing web traffic and crafting attacks
Instructional Video5:30
Curated Video

Coolest Way to Attack a Network

Higher Ed
This video will show you how to acquire the NTLMv2 hashes of users on any Windows network, just by plugging your hacking box into that network that doesn't have any kind of NAC solution.
Instructional Video3:01
Curated Video

Decode and Decompile an APK

Higher Ed
This is a hands on tutorial on how to reverse engineer an Android application
Instructional Video2:58
Curated Video

Decode and Decompile Android Apps

Higher Ed
This is a hands on tutorial on how to reverse engineer an Android application
Instructional Video2:33
Curated Video

Understand NETBIOS and SMB Attacks

Higher Ed
This video will teach you how to perform NETBIOS and SMB attacks using various tools in Kali
Instructional Video4:25
Curated Video

Wireshark D2 V5 - Toolbars

Higher Ed
DAY TWO - We will explore Wireshark interface in details - Video 5: Toolbars