✕ Clear filters
501 lessons

Intermediate Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 176,301📚 Coursera 16,118
GraphSpy: Hacker's Tooling Deep Dive (w/ creator @RedByte1337!)
Cybersecurity
GraphSpy: Hacker's Tooling Deep Dive (w/ creator @RedByte1337!)
John Hammond Intermediate 1mo ago
h?ckers a[r]e gl*bbing
Cybersecurity
h?ckers a[r]e gl*bbing
John Hammond Intermediate 1mo ago
NTUSER.MAN
Cybersecurity
NTUSER.MAN
John Hammond Intermediate 2mo ago
JHT Course Launch! Constructing Defense 2026 - AI Assisted
AI News & Updates
JHT Course Launch! Constructing Defense 2026 - AI Assisted
John Hammond Intermediate 3mo ago
Just ServiceUI.exe
AI News & Updates
Just ServiceUI.exe
John Hammond Intermediate 4mo ago
Mostly Stupid Hacks
Cybersecurity
Mostly Stupid Hacks
John Hammond Intermediate 4mo ago
Credentials in URL
AI Safety & Ethics
Credentials in URL
John Hammond Intermediate 4mo ago
Basic Network Segmentation
Computer Vision
Basic Network Segmentation
John Hammond Intermediate 4mo ago
Multi-Factor Authentication?
AI Safety & Ethics
Multi-Factor Authentication?
John Hammond Intermediate 5mo ago
Cybersecurity Awareness for Hackers! with Huntress and Just Hacking Training
Cybersecurity
Cybersecurity Awareness for Hackers! with Huntress and Just Hacking Training
John Hammond Intermediate 5mo ago
Hackers Bruteforce Passwords to Microsoft Online
Cybersecurity
Hackers Bruteforce Passwords to Microsoft Online
John Hammond Intermediate 5mo ago
new capture the flag (hacking competition)
Cybersecurity
new capture the flag (hacking competition)
John Hammond Intermediate 6mo ago
Just Hacking Training Livestream
AI News & Updates
Just Hacking Training Livestream
John Hammond Intermediate 7mo ago
How You Can Impersonate Anyone in Active Directory (with Shikata!)
Cybersecurity
How You Can Impersonate Anyone in Active Directory (with Shikata!)
John Hammond Intermediate 9mo ago
Evading Antivirus Detection in C (with Dahvid Schloss)
Cybersecurity
Evading Antivirus Detection in C (with Dahvid Schloss)
John Hammond Intermediate 9mo ago
Learning to Hack Active Directory Certificate Services (with Shikata!)
Cybersecurity
Learning to Hack Active Directory Certificate Services (with Shikata!)
John Hammond Intermediate 10mo ago
Windows Endpoint Telemetry (ft. Jonny Johnson)
Cybersecurity
Windows Endpoint Telemetry (ft. Jonny Johnson)
John Hammond Intermediate 10mo ago
Malware & Hackers Evade Antivirus with Windows Sandbox
Cybersecurity
Malware & Hackers Evade Antivirus with Windows Sandbox
John Hammond Intermediate 10mo ago
hackers weaponize... really long filenames??
Cybersecurity
hackers weaponize... really long filenames??
John Hammond Intermediate 10mo ago
golang obfuscated malware goes crazy
Cybersecurity
golang obfuscated malware goes crazy
John Hammond Intermediate 10mo ago
The CVE Foundation Interview
Cybersecurity
The CVE Foundation Interview
John Hammond Intermediate 11mo ago
Team Shellphish AIxCC Interview
Cybersecurity
Team Shellphish AIxCC Interview
John Hammond Intermediate 11mo ago
How Hackers Steal Passwords
Cybersecurity
How Hackers Steal Passwords
John Hammond Intermediate 11mo ago
Blocking EVERYTHING with Windows Firewall
Cybersecurity
Blocking EVERYTHING with Windows Firewall
John Hammond Intermediate 11mo ago
cybersecurity just got f***ed
Cybersecurity
cybersecurity just got f***ed
John Hammond Intermediate 12mo ago
Finding Web App Vulnerabilities with AI
Cybersecurity
Finding Web App Vulnerabilities with AI
John Hammond Intermediate 12mo ago
I Backdoored Cursor AI
Cybersecurity
I Backdoored Cursor AI
John Hammond Intermediate 1y ago
this MP3 file is malware
Cybersecurity
this MP3 file is malware
John Hammond Intermediate 1y ago
the CRITICAL 9.1 severity Next.js vulnerability
Cybersecurity
the CRITICAL 9.1 severity Next.js vulnerability
John Hammond Intermediate 1y ago
ms teams is now a C2 (command-and-control)
Cybersecurity
ms teams is now a C2 (command-and-control)
John Hammond Intermediate 1y ago
they tried to hack me so i confronted them
Cybersecurity
they tried to hack me so i confronted them
John Hammond Intermediate 1y ago
the tools that real hackers use
Cybersecurity
the tools that real hackers use
John Hammond Intermediate 1y ago
are built-in windows programs vulnerable?
Cybersecurity
are built-in windows programs vulnerable?
John Hammond Intermediate 1y ago
The Snyk Fetch the Flag CTF is LIVE right now!!
Cybersecurity
The Snyk Fetch the Flag CTF is LIVE right now!!
John Hammond Intermediate 1y ago
Pentesting Methodologies & CTF Challenges!
Cybersecurity
Pentesting Methodologies & CTF Challenges!
John Hammond Intermediate 1y ago
Revolutionary Tool to Combat Session Hijacking Risks
AI Safety & Ethics
Revolutionary Tool to Combat Session Hijacking Risks
John Hammond Intermediate 1y ago
Transform Your HTTP Server with index.html!
AI Safety & Ethics
Transform Your HTTP Server with index.html!
John Hammond Intermediate 1y ago
Creating a New Tar Archive for Docker: Step-by-Step
AI Safety & Ethics
Creating a New Tar Archive for Docker: Step-by-Step
John Hammond Intermediate 1y ago
How Hackers Use InfoStealer Malware to Impersonate You
UI/UX Design
How Hackers Use InfoStealer Malware to Impersonate You
John Hammond Intermediate 1y ago
Exploring Alpine Docker: Manipulating User Files Securely
AI Safety & Ethics
Exploring Alpine Docker: Manipulating User Files Securely
John Hammond Intermediate 1y ago
Understanding Cookies: Netscape Format & Malware Insights
AI Safety & Ethics
Understanding Cookies: Netscape Format & Malware Insights
John Hammond Intermediate 1y ago
Unmasking Session Hijacking: Defend Your Accounts Now
AI Safety & Ethics
Unmasking Session Hijacking: Defend Your Accounts Now
John Hammond Intermediate 1y ago
Mastering Python: Monitor Cookie Leaks with Poetry
AI Safety & Ethics
Mastering Python: Monitor Cookie Leaks with Poetry
John Hammond Intermediate 1y ago
Protect Your Business: Flare's New Cookie Security Feature
AI Safety & Ethics
Protect Your Business: Flare's New Cookie Security Feature
John Hammond Intermediate 1y ago
Session Hijacking: Hack Reddit with GoLogin Tools
AI Safety & Ethics
Session Hijacking: Hack Reddit with GoLogin Tools
John Hammond Intermediate 1y ago
Streamline Your Alpine Container with Target.tar Transformation
AI Safety & Ethics
Streamline Your Alpine Container with Target.tar Transformation
John Hammond Intermediate 1y ago
Stop Session Hijacking: How to Secure Your Cookies Now
AI Safety & Ethics
Stop Session Hijacking: How to Secure Your Cookies Now
John Hammond Intermediate 1y ago
Unpacking Code for CTF Challenges: Create Your Dirty Image
Cybersecurity
Unpacking Code for CTF Challenges: Create Your Dirty Image
John Hammond Intermediate 1y ago