✕ Clear filters
501 lessons

Intermediate Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 184,508📚 Coursera 16,205
Not All ZIP Files Are Equal
Cybersecurity
Not All ZIP Files Are Equal
John Hammond Intermediate 2y ago
How to Hack ArgoCD to Cluster Administrator
AI News & Updates
How to Hack ArgoCD to Cluster Administrator
John Hammond Intermediate 2y ago
Capture the Flag at Blackhat USA 2023!
Cybersecurity
Capture the Flag at Blackhat USA 2023!
John Hammond Intermediate 2y ago
Telegram Cybercrime is INSANE
Cybersecurity
Telegram Cybercrime is INSANE
John Hammond Intermediate 2y ago
I Broke Threads
AI Safety & Ethics
I Broke Threads
John Hammond Intermediate 2y ago
Compromising Terraform & AWS Atlantis Build Jobs
AI Tools & Apps
Compromising Terraform & AWS Atlantis Build Jobs
John Hammond Intermediate 2y ago
Hunting Malware with Velociraptor (YARA & Memory Forensics)
AI Safety & Ethics
Hunting Malware with Velociraptor (YARA & Memory Forensics)
John Hammond Intermediate 2y ago
Mass Digital Forensics & Incident Response with Velociraptor
Cybersecurity
Mass Digital Forensics & Incident Response with Velociraptor
John Hammond Intermediate 2y ago
How to Trick Hackers & Web Crawlers with Spidertrap
AI Safety & Ethics
How to Trick Hackers & Web Crawlers with Spidertrap
John Hammond Intermediate 2y ago
MOVEit Transfer Exploitation (my API presentation recording)
AI Safety & Ethics
MOVEit Transfer Exploitation (my API presentation recording)
John Hammond Intermediate 2y ago
How Hackers Use netsh.exe For Persistence & Code Execution (Sliver C2)
Cybersecurity
How Hackers Use netsh.exe For Persistence & Code Execution (Sliver C2)
John Hammond Intermediate 2y ago
Scale Your Cloud Infrastructure (Hosting CTFs)
Cybersecurity
Scale Your Cloud Infrastructure (Hosting CTFs)
John Hammond Intermediate 2y ago
Inside a Cybercrime Scam Operation
AI Tools & Apps
Inside a Cybercrime Scam Operation
John Hammond Intermediate 2y ago
How Hackers Evade Program Allowlists with DLLs
Cybersecurity
How Hackers Evade Program Allowlists with DLLs
John Hammond Intermediate 2y ago
How To Extract Plaintext Google Chrome Passwords
AI News & Updates
How To Extract Plaintext Google Chrome Passwords
John Hammond Intermediate 2y ago
Now Scammers Can RENT Email Addresses for Cybercrime
AI Safety & Ethics
Now Scammers Can RENT Email Addresses for Cybercrime
John Hammond Intermediate 2y ago
Rapid Windows Memory Analysis with Volatility 3
Cybersecurity
Rapid Windows Memory Analysis with Volatility 3
John Hammond Intermediate 2y ago
Exploring the Latest Dark Web Onion Sites
Cybersecurity
Exploring the Latest Dark Web Onion Sites
John Hammond Intermediate 2y ago
Raspberry Pi Malware uses IRC Remote Access Trojan (RAT)
AI Safety & Ethics
Raspberry Pi Malware uses IRC Remote Access Trojan (RAT)
John Hammond Intermediate 2y ago
ChatGPT Analyzes Fake ChatGPT Malware
Large Language Models
ChatGPT Analyzes Fake ChatGPT Malware
John Hammond Intermediate 2y ago
Why Don't People Want Security?
Data Analytics & Business Intelligence
Why Don't People Want Security?
John Hammond Intermediate 2y ago
Hide a Hacker's Reverse Shell in ONE Command
Cybersecurity
Hide a Hacker's Reverse Shell in ONE Command
John Hammond Intermediate 2y ago
How To Setup ELK | Elastic Agents & Sysmon for Cybersecurity
AI Agents & Automation
How To Setup ELK | Elastic Agents & Sysmon for Cybersecurity
John Hammond Intermediate 2y ago
PowerShell CRYPTOSTEALER through DNS
AI Safety & Ethics
PowerShell CRYPTOSTEALER through DNS
John Hammond Intermediate 2y ago
Hacking Complex Passwords with Rules & Munging
Cybersecurity
Hacking Complex Passwords with Rules & Munging
John Hammond Intermediate 2y ago
Living Off The Land - Windows Disk Cleaner Persistence
Cybersecurity
Living Off The Land - Windows Disk Cleaner Persistence
John Hammond Intermediate 2y ago
ChatGPT tries a BASIC Capture The Flag (CTF) Challenge
Large Language Models
ChatGPT tries a BASIC Capture The Flag (CTF) Challenge
John Hammond Intermediate 2y ago
How To Test Your Security with Atomic Red Team
Cybersecurity
How To Test Your Security with Atomic Red Team
John Hammond Intermediate 2y ago
winget: Install ROGUE Software & Packages?
Cybersecurity
winget: Install ROGUE Software & Packages?
John Hammond Intermediate 2y ago
Kubernetes Hacking: From Weak Applications to Cluster Control
Cybersecurity
Kubernetes Hacking: From Weak Applications to Cluster Control
John Hammond Intermediate 2y ago
Python Pwntools Hacking: ret2libc GOT & PLT
Cybersecurity
Python Pwntools Hacking: ret2libc GOT & PLT
John Hammond Intermediate 3y ago
Password Hacking in Kali Linux
Cybersecurity
Password Hacking in Kali Linux
John Hammond Intermediate 3y ago
You Can BUY This Hacked YouTube Channel
AI Safety & Ethics
You Can BUY This Hacked YouTube Channel
John Hammond Intermediate 3y ago
So Linus Tech Tips Got Hacked...
AI Safety & Ethics
So Linus Tech Tips Got Hacked...
John Hammond Intermediate 3y ago
Hackers Bypass Google Two-Factor Authentication (2FA) SMS
Cybersecurity
Hackers Bypass Google Two-Factor Authentication (2FA) SMS
John Hammond Intermediate 3y ago
Kali Linux for DEFENSE? (Kali Purple 2023.1 Review)
AI Tools & Apps
Kali Linux for DEFENSE? (Kali Purple 2023.1 Review)
John Hammond Intermediate 3y ago
I Found Your Github Secrets
AI Safety & Ethics
I Found Your Github Secrets
John Hammond Intermediate 3y ago
Hacking CI/CD (Basic Pipeline Poisoning)
Cybersecurity
Hacking CI/CD (Basic Pipeline Poisoning)
John Hammond Intermediate 3y ago
How YouTubers Are Getting Hacked
AI Safety & Ethics
How YouTubers Are Getting Hacked
John Hammond Intermediate 3y ago
My Password Was Pwned 13 Times
AI Safety & Ethics
My Password Was Pwned 13 Times
John Hammond Intermediate 3y ago
New IT & Security Event: MSPGEEKCON
AI Safety & Ethics
New IT & Security Event: MSPGEEKCON
John Hammond Intermediate 3y ago
Can You Find Where a Picture was Taken?
AI Safety & Ethics
Can You Find Where a Picture was Taken?
John Hammond Intermediate 3y ago
How Hackers Can Bypass Your Security Defenses
Cybersecurity
How Hackers Can Bypass Your Security Defenses
John Hammond Intermediate 3y ago
I Saw 8 MILLION Phishing Scams
AI Safety & Ethics
I Saw 8 MILLION Phishing Scams
John Hammond Intermediate 3y ago
How to Proxy Command Execution: "Living Off The Land" Hacks
Data Analytics & Business Intelligence
How to Proxy Command Execution: "Living Off The Land" Hacks
John Hammond Intermediate 3y ago
Hacking JavaScript: ELECTRON Applications w/ 7ASecurity
Cybersecurity
Hacking JavaScript: ELECTRON Applications w/ 7ASecurity
John Hammond Intermediate 3y ago
Assigned Access Kiosk - BREAKOUT ("Hard Mode")
AI Safety & Ethics
Assigned Access Kiosk - BREAKOUT ("Hard Mode")
John Hammond Intermediate 4y ago
DON'T call yourself a hacker...
AI Safety & Ethics
DON'T call yourself a hacker...
John Hammond Intermediate 4y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Master ASC 958: Apply & Analyze Not-for-Profit Reporting
📚 Coursera Course ↗
Self-paced
Master ASC 958: Apply & Analyze Not-for-Profit Reporting
Opens on Coursera ↗
Linux on LinuxONE
📚 Coursera Course ↗
Self-paced
Linux on LinuxONE
Opens on Coursera ↗
Python for the Absolute Beginner
📚 Coursera Course ↗
Self-paced
Python for the Absolute Beginner
Opens on Coursera ↗
Design and Optimize User Funnels
📚 Coursera Course ↗
Self-paced
Design and Optimize User Funnels
Opens on Coursera ↗
Professional Skills: Digital Wellness
📚 Coursera Course ↗
Self-paced
Professional Skills: Digital Wellness
Opens on Coursera ↗
Erstelle einen Instagram Business Account
📚 Coursera Course ↗
Self-paced
Erstelle einen Instagram Business Account
Opens on Coursera ↗