Hi, what do you want to do?
Curated Video
Hide a Payload in an Image
In this video, you will learn how to hide a payload in a JPEG image.
Curated Video
Wireshark Simplified
In this video, you will learn about the famous packet capturing tool, Wireshark. The tutorial demonstrates the capabilities of the application on KALI, while inspecting traffic between the KALI machine and a cloud windows...
Curated Video
Reverse Engineer an APK in KALI
In practice, it means working with a translator with a specific background who understands the original document.
Curated Video
Install a Backdoor
In this video, you will learn how to maintain a permanent access to a compromised machine by installing a backdoor.
<br<br/>/>
Use this approach ethically !!!
Use this approach ethically !!!
Curated Video
Offline Password Attack on Linux
In this video, you will learn how to extract and identify password hashes on a Linux machine. Use the powerful Hashcat tool to crack those hashes.
Curated Video
Hack a Website in a Few Seconds
In this video, you will learn how to install a backdoor on websites in order to deface them.
Curated Video
Create a $3 Undetectable Bad USB
In this tutorial, you will learn how to mimic a Rubber Ducky USB and how to upload your payload in order to execute various types of attacks.
Curated Video
Netcat on KALI and Windows Simplified
In this video, you will learn how to easily use all the features of the powerful independent networking utility, NETCAT on Kali Linux.
<b<br/>r/>
Use this ethically !!!
Use this ethically !!!
Curated Video
21 Diodes in Series & Parallel | Power Electronics
Basics of Power Electronics - Walid Issa<br/>
21 Diodes in Series & Parallel | Power Electronics
21 Diodes in Series & Parallel | Power Electronics
Curated Video
Hack WPA2 Wireless Networks
In this tutorial, you will learn how to crack into WPA and WPA2 wireless networks using various tools like aircrack-ng.
Curated Video
Coolest Way to Attack a Network
This video will show you how to acquire the NTLMv2 hashes of users on any Windows network, just by plugging your hacking box into that network that doesn't have any kind of NAC solution.
Curated Video
Create a Malicious APK with One Command
Learn how to use KALI Linux to create a phony Android application that you can use to have full access to a smartphone.
Curated Video
20 ASL Signs For Spring Break With Kate & Lane
In this video, Meredith teaches Kate and Lane 20 American Sign Language signs related to Spring Break. Whether you are planning a trip or just enjoying the season, these signs will come in handy. Meredith also includes sentences at the...
Curated Video
AWS Certified Data Analytics Specialty 2021 – Hands-On - IoT Overview
This video provides an overview of IoT.
<
br/>
This clip is from the chapter "Domain 1: Collection" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you will learn to build up a system to...
<
br/>
This clip is from the chapter "Domain 1: Collection" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you will learn to build up a system to...
Curated Video
Learn ASP.NET MVC and Entity Framework (Database First) - Understanding Authentication Functionality
This video explains the concept of authentication functionality in detail.
<
br/>
This clip is from the chapter "User Authentication" of the series "Learn ASP.NET MVC and Entity Framework (Database First)".In this section, you will...
<
br/>
This clip is from the chapter "User Authentication" of the series "Learn ASP.NET MVC and Entity Framework (Database First)".In this section, you will...
Curated Video
23 Power Mosfet Transistors | Power Electronics
23 Power Mosfet Transistors | Power Electronics
Curated Video
Run a Simple Ransomware
In this tutorial, you will learn how to create a very simple Ransomware to encrypt files, and how to use a Decrypter to gain access to these files again.
<
br/>
THIS VIDEO IS FOR EDUCATIONAL PURPOSES ONLY. I AM NOT RESPONSIBLE FOR...
<
br/>
THIS VIDEO IS FOR EDUCATIONAL PURPOSES ONLY. I AM NOT RESPONSIBLE FOR...
Curated Video
22 Power BJT Transistors| Power Electronics
22 Power BJT Transistors| Power Electronics
Curated Video
Bluetooth Devices Recon
In this tutorial, you will learn how to recon BT devices and enumerate its services.
Professor Dave Explains
The Roots of Logic in the Ancient World
I did promise that this playlist would include logic in addition to philosophy, so it's time to get rolling with that. How did logic emerge, and how did it evolve over time? Let's focus first on its origins and its status leading up to...
Professor Dave Explains
11 Types of Taxes: Sales, Income, Capital Gains, and More
We know that government spending is funded by taxes. But how are these taxes collected? What should be taxed? Essentially there are three types of taxes. Taxes on what you buy, taxes on what you own, and taxes on what you earn. But more...