Science Buddies
Identify Road Signs with Google's Teachable Machine
Train a machine learning model to identify different road signs in this fun STEM activity! No computer programming is required - you will use a free online tool called Teachable Machine by Google. Written instructions are available on...
Science Buddies
How to Use an Arduino
Learning how to use an Arduino is a great way to get started with electronics and programming. This video series will guide you through setting up an Arduino, programming it, and building circuits so you have all the knowledge you need...
All In One Social Media
Repurpose Your Live Stream into Reels and TikToks SUPER EASY
Reels and Tiktok are the fastest growing ways to grow and get engagement on social media. In this video, I will show you how to repurpose your live streams into Reels or Tiktoks for more reach.
Curated Video
Cracking WPA and WPA2 new 2
This video will explain the difference between two famous wireless protocols, and will show you a technique on cracking the passwords by deauthenticating users connected to a specific SSID
Curated Video
How to Program Quantum Computer?
In this part we build three quantum computers that can process simple commands by manipulating the Energy Operators in Schrodinger Equation. Solving NOT gate by quantum computing, Solving Controlled NOT gate by quantum computing
Curated Video
Post-Exploitation Terminologies
This video will teach you the jardong used when it comes to post exploiting a target
Curated Video
Create a $3 Rubber Ducky Key-logger
Rubber ducky is the most famous key logger, but it is expensive. In this video you will learn how to create a similar device by buying an Arduino hardware from AliExpress at a cheap price
Curated Video
Execute a Phishing Attack
In this video, you will learn how to plan and execute a phishing attack using the SET tool
Curated Video
Firewalls and Security Appliances
Any type of server appliance intended to safeguard computer networks from unauthorized traffic is referred to as a security appliance.
Curated Video
Remote Work Security
The video provides you with tips on how to safely work remotely (home, cafe, any place)
Curated Video
Pass the Hash with Mimikatz on Windows
An attacker obtains the password hashes of one or more users on a computer network using various channels. Using Mimikatz the attacker leverages the compromised user’s username and password hash to authenticate to other systems that...
Curated Video
Wi-Fi Security
You will learn how to protect your home WiFi and be vigilant when you are using public Wifi
Curated Video
Install a Backdoor
In this video, you will learn how to maintain a permanent access to a compromised machine by installing a backdoor. Use this approach ethically !!!
Curated Video
Create a $3 Undetectable Bad USB
In this tutorial, you will learn how to mimic a Rubber Ducky USB and how to upload your payload in order to execute various types of attacks.
Curated Video
Hack WPA2 Wireless Networks
In this tutorial, you will learn how to crack into WPA and WPA2 wireless networks using various tools like aircrack-ng.
Curated Video
Execute Man-in-the-Middle Attacks
Learn how to execute MITM attacks using Ettercap tool, a very powerful application in Kali
Curated Video
Explore Main Services and Install Necessary Programs
This video will help you get started in setting up your lab
Curated Video
Importance of Cyber Security
The video explains the importance of cyber security in a connected world
Curated Video
Introduction to IT and Cybersecurity: Information Protection
Part 14/16 of Introduction to IT and Cybersecurity series: In this video, the presenter discusses the various approaches and controls that can be implemented to protect information. The video explains how an organization's internal...
Curated Video
Publish Your Weapons Online
This video will teach you how to prepare your lab for a real world attack
Curated Video
How to Exploit Vulnerabilities
Vulnerabilities are weaknesses in a computer system that reduce its overall security. Vulnerabilities might be flaws in the hardware itself or the software that uses it.
Curated Video
Port Scanning
An application called a port scanner scans a server or host for open ports. Administrators may use such an application to check the network security policies, and attackers may use it to discover network services operating on a host and...
Curated Video
Symetric and Assymetric Encryption
This video will differentiate between the two main types of encryption