Instructional Video3:41
Curated Video

Post-Exploitation Terminologies

Higher Ed
This video will teach you the jardong used when it comes to post exploiting a target
Instructional Video4:37
Curated Video

Acquire Malicious Apps1

Higher Ed
This video will describe the methods of acquiring malicious Android applications over the internet. There are few publicly available sites in addition to Github links that will be shared.
Instructional Video3:10
Curated Video

Create a Simple Ransomware

Higher Ed
This video will show you how easy it is to create a simple ranwonware
Instructional Video3:59
Curated Video

How Does Port Scanning Work

Higher Ed
In this video, you will learn the two main techniques used in port scanning. We will be mainly using NMAP tool
Instructional Video6:54
Curated Video

Easily Hack a WordPress Site

Higher Ed
WPScan is an easy to use tool that is used to hack into wordpress websites. Given that wordpress websites dominate the internet, this tool is priceless.
Instructional Video1:14
Curated Video

Google Security Services

Higher Ed
Google adds various security features on top of the Android platform. This video will help you explore those feaures.
Instructional Video3:42
Curated Video

Analysis of COVID Spy Max APK

Higher Ed
This video will deep dive into the analysis of a spyware APK
Instructional Video1:01
Curated Video

Dangerous Permissions

Higher Ed
A very important part of doing static malware analysis is to check the dangerous permissions acquired by an application. This video will teach you how to spot those dangerous permissions.
Instructional Video1:31
Curated Video

Security Misconfiguration

Higher Ed
Security configuration is one of the new OWASP top 10 vulnerabilities. We will explain this vulnerability in details in this video
Instructional Video6:27
Curated Video

Google Dorks Live Examples

Higher Ed
Spot the vulnerabilities in the wild, leverage Google to hack into web applications and systems that are published over the Internet. You will be surprised by how easy it is.
Instructional Video10:09
Curated Video

Create a $3 Rubber Ducky Key-logger

Higher Ed
Rubber ducky is the most famous key logger, but it is expensive. In this video you will learn how to create a similar device by buying an Arduino hardware from AliExpress at a cheap price
Instructional Video5:54
Curated Video

Execute an Offline Password Attack on Windows

Higher Ed
Learn how to plan an execute an offline password attack on Windows using John The Ripper tool
Instructional Video0:48
Curated Video

Components with Known Vulnerabilities

Higher Ed
This video will explain the drawbacks of using off the shelf components on your web application
Instructional Video9:37
Curated Video

All-in-one Metasploit Framework

Higher Ed
This video will explain the powerful metasploit framework
Instructional Video1:45
Curated Video

Keyword Search Tecniques

Higher Ed
This video will guide you on how to use keyword search techniques in spotting malicious code within an APK
Instructional Video1:46
Curated Video

Android Security Features

Higher Ed
This video will highlight the various security features oferred by Android
Instructional Video4:49
Curated Video

Execute a Phishing Attack

Higher Ed
In this video, you will learn how to plan and execute a phishing attack using the SET tool
Instructional Video6:02
Curated Video

Setup a Stealthy Command and Control Center Online

Higher Ed
This video will teach you how to setup a command and control center over the internet to start you actual attacks
Instructional Video3:23
Curated Video

Run an Online Password Attack on Linux

Higher Ed
Learn how to plan an execute an online password attack on Linux machine
Instructional Video4:14
Curated Video

Install KALI (Command Center)

Higher Ed
This video will teach you how to install and setup KALI Linux
Instructional Video4:06
Curated Video

Backdoor Tools Explained

Higher Ed
This video will explain how to create backdoors to attack web applications
Instructional Video5:26
Curated Video

Injecting a Legit APK and Analyze it using MobSF

Higher Ed
MobSF is a powerful setup for analyzing mobile malware. In this video we will learn how to install this framework and analyze malicious applications on it.
Instructional Video5:28
Curated Video

Cross Site Scripting

Higher Ed
This video will explain what CSS is
Instructional Video4:10
Curated Video

SSL Interception

Higher Ed
In this video, we will intercept SSL traffic by decrypting the SSL tunnel between an APK and a server