Hi, what do you want to do?
Curated Video
29 Buck Converter Introductory Basics | Power Electronics
29 Buck Converter Introductory Basics | Power Electronics
Curated Video
Android Dynamic Malware Analysis
In this tutorial, you will learn how to perform dynamic malware analysis for an APK file using MobSF or Mobile Security Framework, which is a super handy tool for analyzing Android applications.
Curated Video
AWS Security Boiled Down
A general overview about AWS security architecture and tools. Learn more about VPC, EC2, S3, AIM, Security Groups, and NACLs. This video will give you a quick jump into cloud security.
Curated Video
16 Switching Losses and LTSpice | Power Electronics
Basics of Power Electronics - Walid Issa<br/>
16 Switching Losses and LTSpice | Power Electronics
16 Switching Losses and LTSpice | Power Electronics
Curated Video
Hack Facebook, Twitter, and Gmail Accounts
We will use the SET tool to setup a phishing campaign in order to hack social media accounts
Curated Video
14 Thermal Calculations using LTSpice
Electronics Thermal Heatsink Design Tutorial<br/>
Thermal Calculations us<br/>ing LTSpice
Basics of Power Electronics - Walid Issa
Thermal Calculations us<br/>ing LTSpice
Basics of Power Electronics - Walid Issa
Curated Video
Lab 1 Task 1 Building First circuit in LTSpice
Lab 1 Task 1 Building First circuit<br/>
Basics of Power Electronics - Walid Issa
Basics of Power Electronics - Walid Issa
Curated Video
Create a Simple SIEM
Learn the basic feature of SIEM solutions; logs aggregation using Powershell commands.
Curated Video
Who is Selling Your Email Addresses
This video will help you identify those companies you sign up to, who in return sell your email addresses to companies who will spam you. You can easily identify those now.
Curated Video
Hack Using Google ONLY
You will learn how to easily perform hacking using search engines and publicly available information. Find passwords, confidential files, and gain access to systems with minimum efforts.
Curated Video
DKIM Email Security
In this tutorial, you will learn about DKIM and how to set it up on your DNS server.
Curated Video
Audit Windows Servers With a Press of a Button
Automate the process of auditing your Windows Servers by using this batch file.
Curated Video
Offline Password Attack on Windows
In this video, you will learn how to extract the password hashes on a windows machine, then crack the hashes on KALI using John the Ripper.
<br<br/>/>
Use this ethically !!!
Use this ethically !!!
Curated Video
Hack Using a Rogue Access Point
In this tutorial, you will learn how to create a fake wireless access point and use it to hack the users logged on to it. We will use WiFi Pineapple device.
Curated Video
DNS Poisoning Attack
In this video, you will use KALI to learn how to cache poison the DNS (Domain Name Server) entries to redirect the requester to a different page.
Curated Video
Hack Active Directory Database
Hack the NTDS.DIT database using shadow copies, registry command, and powershell commands
Curated Video
18 Which Switch to Choose ? | Power Electronics
Basics of Power Electronics - Walid Issa<br/>
18 Which Switch to Choose ? | Power Electronics
18 Which Switch to Choose ? | Power Electronics
Curated Video
Execute an Offline Password Attack on Windows
Learn how to plan an execute an offline password attack on Windows using John The Ripper tool
Curated Video
Hidden Tear Ransomware Setup
In this tutorial, you will learn how to customize one of the publicly available forks of the Hidden Tear Ransomware, and how to deploy it.
<
br/>
Use this only for learning
p
urposes.
Use this only in t
e
st VM...
<
br/>
Use this only for learning
p
urposes.
Use this only in t
e
st VM...
Curated Video
Create Your First Trojan
In this video, you will learn how to create your first Trojan file, and how to use this file once it is invoked by the victim. The Trojan file is moved to the victim's machine by using various social engineering techniques.
Curated Video
Takeover a Database Server
In this tutorial, you will learn how to exploit a web application using SQLMAP in order to control a Database Server fully.
<br<br/>/>
Use this technique ethically.
Use this technique ethically.
Curated Video
Hashing in a Nutshell
In this video, you will learn the basics of hashing and the various ways it can be used for password storage, file verification, and indexing.
Curated Video
Bloodhound and Sharphound
Learn how attackers use Bloodhound and Sharphound to Get Active Directory Domain Admin Access.