✕ Clear filters
501 lessons

Intermediate Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 184,537📚 Coursera 16,238
310 BITCOIN CHALLENGE ($$$ 2 MILLION DOLLARS) 0.1 & 0.2 BTC VIDEO SOLUTION
Entrepreneurship & Startups
310 BITCOIN CHALLENGE ($$$ 2 MILLION DOLLARS) 0.1 & 0.2 BTC VIDEO SOLUTION
John Hammond Intermediate 7y ago
Solving Equations with Sympy | CSAW CTF "Algebra"
Cybersecurity
Solving Equations with Sympy | CSAW CTF "Algebra"
John Hammond Intermediate 7y ago
Single-Byte XOR | CSAW CTF "babycrypto"
Cybersecurity
Single-Byte XOR | CSAW CTF "babycrypto"
John Hammond Intermediate 7y ago
LDAP Injection | CSAW CTF "ldab"
Cybersecurity
LDAP Injection | CSAW CTF "ldab"
John Hammond Intermediate 7y ago
x86 Assembly | CSAW CTF "A Tour of x86"
Cybersecurity
x86 Assembly | CSAW CTF "A Tour of x86"
John Hammond Intermediate 7y ago
PWN Overflow | CSAW CTF "BigBoy"
Cybersecurity
PWN Overflow | CSAW CTF "BigBoy"
John Hammond Intermediate 7y ago
GIF Split & Stack | IceCTF [05] "Modern Picasso"
Cybersecurity
GIF Split & Stack | IceCTF [05] "Modern Picasso"
John Hammond Intermediate 7y ago
Hiding Content with CSS | IceCTF [02] "Lights Out!"
Cybersecurity
Hiding Content with CSS | IceCTF [02] "Lights Out!"
John Hammond Intermediate 7y ago
Classic robots.txt | IceCTF [01] "Relaunched Toke"
AI News & Updates
Classic robots.txt | IceCTF [01] "Relaunched Toke"
John Hammond Intermediate 7y ago
ECB Encryption / Python Web Hacking | Natas: OverTheWire (Level 28)
Cybersecurity
ECB Encryption / Python Web Hacking | Natas: OverTheWire (Level 28)
John Hammond Intermediate 7y ago
EditThisCookie | CodefestCTF 2018: "Fortune Cookie"
Cybersecurity
EditThisCookie | CodefestCTF 2018: "Fortune Cookie"
John Hammond Intermediate 7y ago
Basic SQL Injection | PicoCTF 2017 [35] My First SQL
Cybersecurity
Basic SQL Injection | PicoCTF 2017 [35] My First SQL
John Hammond Intermediate 7y ago
Reverse Engineering Assembly | PicoCTF 2017 [34] Programmer's Assemble
Cybersecurity
Reverse Engineering Assembly | PicoCTF 2017 [34] Programmer's Assemble
John Hammond Intermediate 7y ago
ERROR-Based BLIND SQL Injection | "TRY HARDER" (HackconCTF 2018)
Cybersecurity
ERROR-Based BLIND SQL Injection | "TRY HARDER" (HackconCTF 2018)
John Hammond Intermediate 7y ago
Ethereum Blockchain | "EtherHide" (Hackcon2018 CTF)
Cybersecurity
Ethereum Blockchain | "EtherHide" (Hackcon2018 CTF)
John Hammond Intermediate 7y ago
Stupid Superman Recon | "Ethical Hacker" (HackconCTF 2018)
Cybersecurity
Stupid Superman Recon | "Ethical Hacker" (HackconCTF 2018)
John Hammond Intermediate 7y ago
ASCII & Regular Expressions | "Find Me ASAP" (Hackcon2018 CTF)
Cybersecurity
ASCII & Regular Expressions | "Find Me ASAP" (Hackcon2018 CTF)
John Hammond Intermediate 7y ago
Vignere Cipher | "Salad Upgrade" (Hackcon2018 CTF)
Cybersecurity
Vignere Cipher | "Salad Upgrade" (Hackcon2018 CTF)
John Hammond Intermediate 7y ago
Caesar Cipher | "Caesar Salad" (Hackcon2018 CTF)
Cybersecurity
Caesar Cipher | "Caesar Salad" (Hackcon2018 CTF)
John Hammond Intermediate 7y ago
Wireshark Decrypting SSL | "Ssleepy" TJCTF 2018
Cybersecurity
Wireshark Decrypting SSL | "Ssleepy" TJCTF 2018
John Hammond Intermediate 7y ago
HTTP Cookies | "Cookie Monster" TJCTF 2018
Cybersecurity
HTTP Cookies | "Cookie Monster" TJCTF 2018
John Hammond Intermediate 7y ago
HTML Source Code | "Blank" TJCTF 2018
Cybersecurity
HTML Source Code | "Blank" TJCTF 2018
John Hammond Intermediate 7y ago
Infinite JavaScript Scrolling | "Moar Horses" TJCTF 2018
Cybersecurity
Infinite JavaScript Scrolling | "Moar Horses" TJCTF 2018
John Hammond Intermediate 7y ago
Uncommon SQL Injection | "Ess Kyoo Ell" TJCTF 2018
Cybersecurity
Uncommon SQL Injection | "Ess Kyoo Ell" TJCTF 2018
John Hammond Intermediate 7y ago
RSA Cryptography | "Classic" TJCTF 2018
Cybersecurity
RSA Cryptography | "Classic" TJCTF 2018
John Hammond Intermediate 7y ago
PicoCTF 2017 [33] A Thing Called the Stack
Cybersecurity
PicoCTF 2017 [33] A Thing Called the Stack
John Hammond Intermediate 7y ago
How Did You Get Into Programming?
Cybersecurity
How Did You Get Into Programming?
John Hammond Intermediate 7y ago
USB Devices in Wireshark | PicoCTF 2017 [29] Just Keyp Trying
Cybersecurity
USB Devices in Wireshark | PicoCTF 2017 [29] Just Keyp Trying
John Hammond Intermediate 7y ago
Port Knocking Attack | Ryan's CTF [17] Knock-Knock FINALE
Cybersecurity
Port Knocking Attack | Ryan's CTF [17] Knock-Knock FINALE
John Hammond Intermediate 7y ago
PCAP Manipulation | Ryan's CTF [16] Custom Encoded Data
Cybersecurity
PCAP Manipulation | Ryan's CTF [16] Custom Encoded Data
John Hammond Intermediate 7y ago
Sudo ltrace | Ryan's CTF [15] Strings wont help you
Cybersecurity
Sudo ltrace | Ryan's CTF [15] Strings wont help you
John Hammond Intermediate 7y ago
Embedded GZIP | Ryan's CTF [14] Mystery File
Cybersecurity
Embedded GZIP | Ryan's CTF [14] Mystery File
John Hammond Intermediate 7y ago
BASIC Buffer Overflow | Ryan's CTF [13] Everyday I'm Bufferin
Cybersecurity
BASIC Buffer Overflow | Ryan's CTF [13] Everyday I'm Bufferin
John Hammond Intermediate 7y ago
Command Injection | Ryan's CTF [12] Input Validation
Cybersecurity
Command Injection | Ryan's CTF [12] Input Validation
John Hammond Intermediate 7y ago
ALIAS Commands | Ryan's CTF [11] Find Flag Again
Cybersecurity
ALIAS Commands | Ryan's CTF [11] Find Flag Again
John Hammond Intermediate 7y ago
Reversing Android APK | Ryan's CTF [10] These are not the droids
Cybersecurity
Reversing Android APK | Ryan's CTF [10] These are not the droids
John Hammond Intermediate 7y ago
Binary ltrace | Ryan's CTF [08] What's the password?
Cybersecurity
Binary ltrace | Ryan's CTF [08] What's the password?
John Hammond Intermediate 7y ago
Image Strings | Ryan's CTF [07] "Stenography"
Cybersecurity
Image Strings | Ryan's CTF [07] "Stenography"
John Hammond Intermediate 7y ago
VIM Shell | Ryan's CTF [06] Escape the Jail
Cybersecurity
VIM Shell | Ryan's CTF [06] Escape the Jail
John Hammond Intermediate 7y ago
MySQL Password Administration | Ryan's CTF [05] Database Password
Data Analytics & Business Intelligence
MySQL Password Administration | Ryan's CTF [05] Database Password
John Hammond Intermediate 7y ago
HTTP Authentication | Ryan's CTF [04] Encoded Credentials
Cybersecurity
HTTP Authentication | Ryan's CTF [04] Encoded Credentials
John Hammond Intermediate 7y ago
PATH Environment Variable | Ryan's CTF [09] Find the Flag
Cybersecurity
PATH Environment Variable | Ryan's CTF [09] Find the Flag
John Hammond Intermediate 7y ago
Ryan's CTF [02] FTP File Transfer
Cybersecurity
Ryan's CTF [02] FTP File Transfer
John Hammond Intermediate 7y ago
Ryan's CTF [01] Hidden Web Flag
Cybersecurity
Ryan's CTF [01] Hidden Web Flag
John Hammond Intermediate 7y ago
FULL 2 HOUR Ryan's CTF
Cybersecurity
FULL 2 HOUR Ryan's CTF
John Hammond Intermediate 7y ago
Ryan's CTF TIMELAPSE
Cybersecurity
Ryan's CTF TIMELAPSE
John Hammond Intermediate 7y ago
Git/Linux Hacking | Bandit: OverTheWire (Level 32)
Cybersecurity
Git/Linux Hacking | Bandit: OverTheWire (Level 32)
John Hammond Intermediate 7y ago
Git/Linux Hacking | Bandit: OverTheWire (Level 31)
Cybersecurity
Git/Linux Hacking | Bandit: OverTheWire (Level 31)
John Hammond Intermediate 7y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Use Basecamp for Project Management
📚 Coursera Course ↗
Self-paced
Use Basecamp for Project Management
Opens on Coursera ↗
Artificial Intelligence in Government
📚 Coursera Course ↗
Self-paced
Artificial Intelligence in Government
Opens on Coursera ↗
Build Customer Loyalty
📚 Coursera Course ↗
Self-paced
Build Customer Loyalty
Opens on Coursera ↗
Fundamentals of Financial Planning, with Goldman Sachs 10,000 Women
📚 Coursera Course ↗
Self-paced
Fundamentals of Financial Planning, with Goldman Sachs 10,000 Women
Opens on Coursera ↗
Cybersecurity and the Internet of Things
📚 Coursera Course ↗
Self-paced
Cybersecurity and the Internet of Things
Opens on Coursera ↗
Fundamentals of Teradata: Architecture, Storage & Operations
📚 Coursera Course ↗
Self-paced
Fundamentals of Teradata: Architecture, Storage & Operations
Opens on Coursera ↗