Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

2558
lessons
KaizenCTF 2016 :: Stegosaurus
🔐 Cybersecurity
KaizenCTF 2016 :: Stegosaurus
John Hammond Intermediate 9y ago
KaizenCTF 2016 :: Blackjack
🔐 Cybersecurity
KaizenCTF 2016 :: Blackjack
John Hammond Intermediate 9y ago
int0x80 from DualCore lent me his lockpicking set and I'm a horse - BruCON CTF part 2
🔐 Cybersecurity
int0x80 from DualCore lent me his lockpicking set and I'm a horse - BruCON CTF part 2
LiveOverflow Intermediate 9y ago
Abundant Circle Day 4 - Luxury Mastermind For Location Independent Entrepreneurs
🔐 Cybersecurity
Abundant Circle Day 4 - Luxury Mastermind For Location Independent Entrepreneurs
Miles Beckler Intermediate 9y ago
CS50 VR 2016 - Week 6 - HTTP
🔐 Cybersecurity
CS50 VR 2016 - Week 6 - HTTP
CS50 Intermediate 9y ago
Live Hacking - Internetwache CTF 2016 - exp50, exp70, exp80
🔐 Cybersecurity
Live Hacking - Internetwache CTF 2016 - exp50, exp70, exp80
LiveOverflow Intermediate 9y ago
Mustafa Suleyman – New Ways for Technology to Enhance Patient Care – King's Fund 5th July 2016
🔐 Cybersecurity
Mustafa Suleyman – New Ways for Technology to Enhance Patient Care – King's Fund 5th July 2016
Google DeepMind Intermediate 9y ago
How To Install Kali Linux 2.0 On Virtual Box
🔐 Cybersecurity
How To Install Kali Linux 2.0 On Virtual Box
HackerSploit Intermediate 9y ago
Things You Can Do to Make Security Worse in Your Network - Ignite Style
🔐 Cybersecurity
Things You Can Do to Make Security Worse in Your Network - Ignite Style
Jack Rhysider Intermediate 9y ago
SANS VetSuccess Academy: Hands-on Skills
🔐 Cybersecurity
SANS VetSuccess Academy: Hands-on Skills
SANS Institute Intermediate 9y ago
Privacy, Security, Society - Computer Science for Business Leaders 2016
🔐 Cybersecurity
Privacy, Security, Society - Computer Science for Business Leaders 2016
CS50 Intermediate 10y ago
KaizenCTF 2016 :: Search Leak 1
🔐 Cybersecurity
KaizenCTF 2016 :: Search Leak 1
John Hammond Intermediate 9y ago
KaizenCTF 2016 :: QR Nightmare
🔐 Cybersecurity
KaizenCTF 2016 :: QR Nightmare
John Hammond Intermediate 9y ago
United States Coast Guard Academy Windjammers 2016 Video
🔐 Cybersecurity
United States Coast Guard Academy Windjammers 2016 Video
John Hammond Intermediate 9y ago
SchoolCTF "Let's Play" (Live Recording)
🔐 Cybersecurity
SchoolCTF "Let's Play" (Live Recording)
John Hammond Intermediate 9y ago
Hack The Vote 2016 CTF Warpspeed [forensics150]
🔐 Cybersecurity
Hack The Vote 2016 CTF Warpspeed [forensics150]
John Hammond Intermediate 9y ago
Hack The Vote 2016 CTF: Sander's Fan Club [web100]
🔐 Cybersecurity
Hack The Vote 2016 CTF: Sander's Fan Club [web100]
John Hammond Intermediate 9y ago
misc50 : Hidden inside EKO :: EKOPARTY CTF 2016
🔐 Cybersecurity
misc50 : Hidden inside EKO :: EKOPARTY CTF 2016
John Hammond Intermediate 9y ago
web50 : RFC 7230 :: EKOPARTY CTF 2016
🔐 Cybersecurity
web50 : RFC 7230 :: EKOPARTY CTF 2016
John Hammond Intermediate 9y ago
web25 :: Mr. Robot : EKOPARTY CTF 2016
🔐 Cybersecurity
web25 :: Mr. Robot : EKOPARTY CTF 2016
John Hammond Intermediate 9y ago
Scripting radare2 with python for dynamic analysis - TUMCTF 2016 Zwiebel part 2
🔐 Cybersecurity
Scripting radare2 with python for dynamic analysis - TUMCTF 2016 Zwiebel part 2
LiveOverflow Intermediate 9y ago
Reverse Engineering with Binary Ninja and gdb a key checking algorithm - TUMCTF 2016 Zwiebel part 1
🔐 Cybersecurity
Reverse Engineering with Binary Ninja and gdb a key checking algorithm - TUMCTF 2016 Zwiebel part 1
LiveOverflow Intermediate 9y ago
New Sandbox Bypass in 1.4.7 - XSS with AngularJS 0x3
🔐 Cybersecurity
New Sandbox Bypass in 1.4.7 - XSS with AngularJS 0x3
LiveOverflow Intermediate 9y ago
Previous Bypass is now fixed in version 1.4.7 - XSS with AngularJS 0x2
🔐 Cybersecurity
Previous Bypass is now fixed in version 1.4.7 - XSS with AngularJS 0x2
LiveOverflow Intermediate 9y ago
XSS Contexts and some Chrome XSS Auditor tricks - web 0x03
🔐 Cybersecurity
XSS Contexts and some Chrome XSS Auditor tricks - web 0x03
LiveOverflow Intermediate 9y ago
Homemade CTF Challenge: 06 "I lost my password!"
🔐 Cybersecurity
Homemade CTF Challenge: 06 "I lost my password!"
John Hammond Intermediate 9y ago
Capturing & Analyzing Packets with Saleae Logic Pro 8 - Reverse Engineering A/C Remote part 2
🔐 Cybersecurity
Capturing & Analyzing Packets with Saleae Logic Pro 8 - Reverse Engineering A/C Remote part 2
LiveOverflow Intermediate 9y ago
Homemade CTF Challenge: 06 "A Brisk Stroll"
🔐 Cybersecurity
Homemade CTF Challenge: 06 "A Brisk Stroll"
John Hammond Intermediate 9y ago
Sandbox Bypass in Version 1.0.8 - XSS with AngularJS 0x1
🔐 Cybersecurity
Sandbox Bypass in Version 1.0.8 - XSS with AngularJS 0x1
LiveOverflow Intermediate 9y ago
Homemade CTF Challenge: 05 "The Assumption Song"
🔐 Cybersecurity
Homemade CTF Challenge: 05 "The Assumption Song"
John Hammond Intermediate 9y ago
Homemade CTF Challenge: 04 "UPX"
🔐 Cybersecurity
Homemade CTF Challenge: 04 "UPX"
John Hammond Intermediate 9y ago
Homemade CTF Challenge: 03 "Web Hunt"
🔐 Cybersecurity
Homemade CTF Challenge: 03 "Web Hunt"
John Hammond Intermediate 9y ago
Homemade CTF Challenge: 02 "Bae's Base"
🔐 Cybersecurity
Homemade CTF Challenge: 02 "Bae's Base"
John Hammond Intermediate 9y ago
Homemade CTF Challenge: 01 "Orchestra"
🔐 Cybersecurity
Homemade CTF Challenge: 01 "Orchestra"
John Hammond Intermediate 9y ago
Building Poor Man's Logic Analyzer with an Arduino - Reverse Engineering A/C Remote part 1
🔐 Cybersecurity
Building Poor Man's Logic Analyzer with an Arduino - Reverse Engineering A/C Remote part 1
LiveOverflow Intermediate 9y ago
LASACTF: "Postman" Challenge
🔐 Cybersecurity
LASACTF: "Postman" Challenge
John Hammond Intermediate 10y ago
LASACTF: "Pixels" Challenge
🔐 Cybersecurity
LASACTF: "Pixels" Challenge
John Hammond Intermediate 10y ago
LASACTF: "Client Side" Challenge
🔐 Cybersecurity
LASACTF: "Client Side" Challenge
John Hammond Intermediate 10y ago
LASACTF: "Lost Extensions" Challenge
🔐 Cybersecurity
LASACTF: "Lost Extensions" Challenge
John Hammond Intermediate 10y ago
Python Challenge! 18 What's the difference?!
🔐 Cybersecurity
Python Challenge! 18 What's the difference?!
John Hammond Intermediate 10y ago
LASACTF: "Grep Request" (Script)
🔐 Cybersecurity
LASACTF: "Grep Request" (Script)
John Hammond Intermediate 10y ago
Internet Technologies - Computer Science for Business Leaders 2016
🔐 Cybersecurity
Internet Technologies - Computer Science for Business Leaders 2016
CS50 Intermediate 10y ago
Live Hacking - Internetwache CTF 2016 - crypto60, crypto70, crypto90
🔐 Cybersecurity
Live Hacking - Internetwache CTF 2016 - crypto60, crypto70, crypto90
LiveOverflow Intermediate 10y ago
Python Challenge! 17 COOKIES
🔐 Cybersecurity
Python Challenge! 17 COOKIES
John Hammond Intermediate 10y ago
LASACTF: "Grep Request" Challenge
🔐 Cybersecurity
LASACTF: "Grep Request" Challenge
John Hammond Intermediate 10y ago
LASACTF: "Four Oh Four" Challenge
🔐 Cybersecurity
LASACTF: "Four Oh Four" Challenge
John Hammond Intermediate 10y ago
Python Challenge! 16: MOZART
🔐 Cybersecurity
Python Challenge! 16: MOZART
John Hammond Intermediate 10y ago
LASACTF: "R3ndom Eye" Challenge
🔐 Cybersecurity
LASACTF: "R3ndom Eye" Challenge
John Hammond Intermediate 10y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Case-Based Frameworks for Mastering Management Consulting
📚 Coursera Course ↗
Self-paced
Case-Based Frameworks for Mastering Management Consulting
Opens on Coursera ↗
TOTAL - CompTIA CySA+ Cybersecurity Analyst (CS0-003)
📚 Coursera Course ↗
Self-paced
TOTAL - CompTIA CySA+ Cybersecurity Analyst (CS0-003)
Opens on Coursera ↗
Cross-Cultural Communication in the Hospitality Sector
📚 Coursera Course ↗
Self-paced
Cross-Cultural Communication in the Hospitality Sector
Opens on Coursera ↗
Social Engineering Expert
📚 Coursera Course ↗
Self-paced
Social Engineering Expert
Opens on Coursera ↗
Web Hacker's Toolbox - Tools Used by Successful Hackers
📚 Coursera Course ↗
Self-paced
Web Hacker's Toolbox - Tools Used by Successful Hackers
Opens on Coursera ↗
Security Architecture & Operations
📚 Coursera Course ↗
Self-paced
Security Architecture & Operations
Opens on Coursera ↗