Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

2558
lessons
LASACTF: "Shifty Letters" Challenge
🔐 Cybersecurity
LASACTF: "Shifty Letters" Challenge
John Hammond Intermediate 10y ago
05 SOLUTION: Hazy Days
🔐 Cybersecurity
05 SOLUTION: Hazy Days
John Hammond Intermediate 10y ago
Live Hacking - Internetwache CTF 2016 - web50, web60, web80
🔐 Cybersecurity
Live Hacking - Internetwache CTF 2016 - web50, web60, web80
LiveOverflow Intermediate 10y ago
Arbitrary write with House of Force (heap exploit) - BKPCTF cookbook (pwn 6) part 3
🔐 Cybersecurity
Arbitrary write with House of Force (heap exploit) - BKPCTF cookbook (pwn 6) part 3
LiveOverflow Intermediate 10y ago
Running a Buffer Overflow Attack - Computerphile
🔐 Cybersecurity
Running a Buffer Overflow Attack - Computerphile
Computerphile Intermediate 10y ago
SANS VetSuccess Academy: Identifying Top Cyber Talent
🔐 Cybersecurity
SANS VetSuccess Academy: Identifying Top Cyber Talent
SANS Institute Intermediate 10y ago
Brain Scanner - Computerphile
🔐 Cybersecurity
Brain Scanner - Computerphile
Computerphile Intermediate 10y ago
The 2015 SANS Holiday Hack Challenge
🔐 Cybersecurity
The 2015 SANS Holiday Hack Challenge
SANS Institute Intermediate 10y ago
05 CHALLENGE: Hazy Days
🔐 Cybersecurity
05 CHALLENGE: Hazy Days
John Hammond Intermediate 10y ago
04 SOLUTION: Spelling States
🔐 Cybersecurity
04 SOLUTION: Spelling States
John Hammond Intermediate 10y ago
04 CHALLENGE: Spelling States
🔐 Cybersecurity
04 CHALLENGE: Spelling States
John Hammond Intermediate 10y ago
03 SOLUTION: Dog Showdown
🔐 Cybersecurity
03 SOLUTION: Dog Showdown
John Hammond Intermediate 10y ago
03 CHALLENGE: Dog Showdown
🔐 Cybersecurity
03 CHALLENGE: Dog Showdown
John Hammond Intermediate 10y ago
02 SOLUTION: Missing Numbers
🔐 Cybersecurity
02 SOLUTION: Missing Numbers
John Hammond Intermediate 10y ago
02 CHALLENGE: Missing Numbers
🔐 Cybersecurity
02 CHALLENGE: Missing Numbers
John Hammond Intermediate 10y ago
01 SOLUTION: Word Find
🔐 Cybersecurity
01 SOLUTION: Word Find
John Hammond Intermediate 10y ago
01 CHALLENGE: Word Find
🔐 Cybersecurity
01 CHALLENGE: Word Find
John Hammond Intermediate 10y ago
Template BASH Script
🔐 Cybersecurity
Template BASH Script
John Hammond Intermediate 10y ago
Creating a BitBucket Repository
🔐 Cybersecurity
Creating a BitBucket Repository
John Hammond Intermediate 10y ago
LaTeX 01: Text Formatting
🔐 Cybersecurity
LaTeX 01: Text Formatting
John Hammond Intermediate 10y ago
LaTeX 00: Hello World!
🔐 Cybersecurity
LaTeX 00: Hello World!
John Hammond Intermediate 10y ago
Python 04: PEP8 Coding
🔐 Cybersecurity
Python 04: PEP8 Coding
John Hammond Intermediate 10y ago
Leaking Heap and Libc address - BKPCTF cookbook (pwn 6) part 2
🔐 Cybersecurity
Leaking Heap and Libc address - BKPCTF cookbook (pwn 6) part 2
LiveOverflow Intermediate 10y ago
Python 03: Variables and Input
🔐 Cybersecurity
Python 03: Variables and Input
John Hammond Intermediate 10y ago
Python 01: Hello, World!
🔐 Cybersecurity
Python 01: Hello, World!
John Hammond Intermediate 10y ago
Python 02: Data Types
🔐 Cybersecurity
Python 02: Data Types
John Hammond Intermediate 10y ago
Sublime Text 2: PPA Install
🔐 Cybersecurity
Sublime Text 2: PPA Install
John Hammond Intermediate 10y ago
Reverse Engineering and identifying Bugs - BKPCTF cookbook (pwn 6) part 1
🔐 Cybersecurity
Reverse Engineering and identifying Bugs - BKPCTF cookbook (pwn 6) part 1
LiveOverflow Intermediate 10y ago
wget in Python!
🔐 Cybersecurity
wget in Python!
John Hammond Intermediate 10y ago
pwnable.kr - Levels: fd, collision, bof, flag
🔐 Cybersecurity
pwnable.kr - Levels: fd, collision, bof, flag
LiveOverflow Intermediate 10y ago
Live Hacking - EFF-CTF 2016 - Level 0-4 (Enigma Conference)
🔐 Cybersecurity
Live Hacking - EFF-CTF 2016 - Level 0-4 (Enigma Conference)
LiveOverflow Intermediate 10y ago
Live Hacking - Twitch Recording overthewire.org - Vortex 0x01-0x03 (3h)
🔐 Cybersecurity
Live Hacking - Twitch Recording overthewire.org - Vortex 0x01-0x03 (3h)
LiveOverflow Intermediate 10y ago
Man in the Middle Attacks & Superfish - Computerphile
🔐 Cybersecurity
Man in the Middle Attacks & Superfish - Computerphile
Computerphile Intermediate 10y ago
Zig Zag Decryption - Computerphile
🔐 Cybersecurity
Zig Zag Decryption - Computerphile
Computerphile Intermediate 10y ago
Inside a Data Centre - Computerphile
🔐 Cybersecurity
Inside a Data Centre - Computerphile
Computerphile Intermediate 10y ago
USCGA Windjammers Ultimate Frisbee
🔐 Cybersecurity
USCGA Windjammers Ultimate Frisbee
John Hammond Intermediate 10y ago
Building "Quote" Functions in Python! [urllib] 06
🔐 Cybersecurity
Building "Quote" Functions in Python! [urllib] 06
John Hammond Intermediate 10y ago
Python URL "Utility functions" [urllib] 05
🔐 Cybersecurity
Python URL "Utility functions" [urllib] 05
John Hammond Intermediate 10y ago
Downloading Web Content with Python [urllib] 02
🔐 Cybersecurity
Downloading Web Content with Python [urllib] 02
John Hammond Intermediate 10y ago
Could We Ban Encryption? - Computerphile
🔐 Cybersecurity
Could We Ban Encryption? - Computerphile
Computerphile Intermediate 10y ago
Getting Web Content with Python! [urllib] 01
🔐 Cybersecurity
Getting Web Content with Python! [urllib] 01
John Hammond Intermediate 10y ago
LiveOverflow - Trailer
🔐 Cybersecurity
LiveOverflow - Trailer
LiveOverflow Intermediate 10y ago
Python [npyscreen] 09 Form Menus
🔐 Cybersecurity
Python [npyscreen] 09 Form Menus
John Hammond Intermediate 10y ago
Python [npyscreen] 08 Messages and Choices
🔐 Cybersecurity
Python [npyscreen] 08 Messages and Choices
John Hammond Intermediate 10y ago
Python [npyscreen] 06 Forms Functionality
🔐 Cybersecurity
Python [npyscreen] 06 Forms Functionality
John Hammond Intermediate 10y ago
Python [npyscreen] 05 Beginning Widgets
🔐 Cybersecurity
Python [npyscreen] 05 Beginning Widgets
John Hammond Intermediate 10y ago
Wearables and Augmented Reality - Computerphile
🔐 Cybersecurity
Wearables and Augmented Reality - Computerphile
Computerphile Intermediate 11y ago
Python [npyscreen] 04 NEXT_ACTIVE_FORM
🔐 Cybersecurity
Python [npyscreen] 04 NEXT_ACTIVE_FORM
John Hammond Intermediate 11y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Hacking COVID-19: Metabolic Pathway Analysis Yields SARS-CoV-2 Drug Targets
📚 Coursera Course ↗
Self-paced
Hacking COVID-19: Metabolic Pathway Analysis Yields SARS-CoV-2 Drug Targets
Opens on Coursera ↗
Deception As a Defense
📚 Coursera Course ↗
Self-paced
Deception As a Defense
Opens on Coursera ↗
CompTIA PenTest+ (PT0-003)
📚 Coursera Course ↗
Self-paced
CompTIA PenTest+ (PT0-003)
Opens on Coursera ↗
Incident Response and Risk Management
📚 Coursera Course ↗
Self-paced
Incident Response and Risk Management
Opens on Coursera ↗
Penetration Testing and Vulnerability Scanning
📚 Coursera Course ↗
Self-paced
Penetration Testing and Vulnerability Scanning
Opens on Coursera ↗
Digital Identity & Security – Introduction to PKI
📚 Coursera Course ↗
Self-paced
Digital Identity & Security – Introduction to PKI
Opens on Coursera ↗