✕ Clear filters
1,054 lessons

Browse Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 184,626📚 Coursera 16,285
How Hackers Can Bypass Your Security Defenses
Cybersecurity
How Hackers Can Bypass Your Security Defenses
John Hammond Intermediate 3y ago
I Saw 8 MILLION Phishing Scams
AI Safety & Ethics
I Saw 8 MILLION Phishing Scams
John Hammond Intermediate 3y ago
Internet Explorer Forced to Run Malware
AI Safety & Ethics
Internet Explorer Forced to Run Malware
John Hammond Beginner 3y ago
Fake OBS Studio Hack Targeting YouTubers
AI Safety & Ethics
Fake OBS Studio Hack Targeting YouTubers
John Hammond Beginner 3y ago
3 Things You Didn't Know about Windows Command Prompt
AI Safety & Ethics
3 Things You Didn't Know about Windows Command Prompt
John Hammond Beginner 3y ago
How to Proxy Command Execution: "Living Off The Land" Hacks
Data Analytics & Business Intelligence
How to Proxy Command Execution: "Living Off The Land" Hacks
John Hammond Intermediate 3y ago
How To Bypass Website File Upload Restrictions
Cybersecurity
How To Bypass Website File Upload Restrictions
John Hammond Beginner 3y ago
Certified Penetration Testing Specialist! Chat with HackTheBox
Cybersecurity
Certified Penetration Testing Specialist! Chat with HackTheBox
John Hammond Beginner 3y ago
Filter Evasion in a REVERSE SHELL (no spaces!!)
Cybersecurity
Filter Evasion in a REVERSE SHELL (no spaces!!)
John Hammond Beginner 3y ago
ROP is DEAD! Kernel Driver Binary Exploitation
Cybersecurity
ROP is DEAD! Kernel Driver Binary Exploitation
John Hammond Beginner 3y ago
Start Hacking with the HEARTBLEED vulnerability: NahamCon CTF
Cybersecurity
Start Hacking with the HEARTBLEED vulnerability: NahamCon CTF
John Hammond Beginner 3y ago
Capture The Flag!  NahamCon EU CTF "MMORPG"
Cybersecurity
Capture The Flag! NahamCon EU CTF "MMORPG"
John Hammond Beginner 3y ago
Hardware Hacking! Day 19 - TryHackMe Advent of Cyber
Cybersecurity
Hardware Hacking! Day 19 - TryHackMe Advent of Cyber
John Hammond Beginner 3y ago
How To Manage Your Business Technology
Cybersecurity
How To Manage Your Business Technology
John Hammond Beginner 3y ago
Is this a SECURE laptop?
Cybersecurity
Is this a SECURE laptop?
John Hammond Beginner 3y ago
Unraveling the IcedID Malware Stager & Phishing Email
Cybersecurity
Unraveling the IcedID Malware Stager & Phishing Email
John Hammond Beginner 3y ago
Become a Certified Penetration Tester with HackTheBox CPTS!
Cybersecurity
Become a Certified Penetration Tester with HackTheBox CPTS!
John Hammond Beginner 3y ago
Setup EXTREME VULNERABLE Kernel Driver (HEVD)
Cybersecurity
Setup EXTREME VULNERABLE Kernel Driver (HEVD)
John Hammond Beginner 3y ago
Linux Portbending Explained
Cybersecurity
Linux Portbending Explained
John Hammond Beginner 3y ago
run SHELLCODE within BASH!?!
Cybersecurity
run SHELLCODE within BASH!?!
John Hammond Beginner 3y ago
Start KERNEL HACKING with VirtualKD!
Cybersecurity
Start KERNEL HACKING with VirtualKD!
John Hammond Beginner 3y ago
explore a Wordpress PHP BACKDOOR webshell
Cybersecurity
explore a Wordpress PHP BACKDOOR webshell
John Hammond Beginner 3y ago
TryHackMe! Advent of Cyber 2022 Kick-Off
Cybersecurity
TryHackMe! Advent of Cyber 2022 Kick-Off
John Hammond Beginner 3y ago
catch EVERY reverse shell while hacking! (VILLAIN)
Cybersecurity
catch EVERY reverse shell while hacking! (VILLAIN)
John Hammond Beginner 3y ago
Your choices matter… Responsible Red Teaming w/ HuskyHacks
Cybersecurity
Your choices matter… Responsible Red Teaming w/ HuskyHacks
John Hammond Beginner 3y ago
you should be using PODMAN
Cybersecurity
you should be using PODMAN
John Hammond Beginner 3y ago
CUSTOM Java Deserialization Exploit - Serial Snyker
Cybersecurity
CUSTOM Java Deserialization Exploit - Serial Snyker
John Hammond Beginner 3y ago
Cybercrime & Dark Web Conversations (w/ Shmuel!)
Cybersecurity
Cybercrime & Dark Web Conversations (w/ Shmuel!)
John Hammond Beginner 3y ago
Node.js "Pug" Server-Side Template Injection
Cybersecurity
Node.js "Pug" Server-Side Template Injection
John Hammond Beginner 3y ago
The King Of Malware is Back
Cybersecurity
The King Of Malware is Back
John Hammond Beginner 3y ago
Backup Server Hacked - SUPPLY CHAIN Code Execution
Cybersecurity
Backup Server Hacked - SUPPLY CHAIN Code Execution
John Hammond Beginner 3y ago
I store ALL my Passwords in AWS
Cybersecurity
I store ALL my Passwords in AWS
John Hammond Beginner 3y ago
NEW Python 3.11 !!!
Cybersecurity
NEW Python 3.11 !!!
John Hammond Beginner 3y ago
zip files & hack... (CVE-2022-1271 zgrep/gzip)
Cybersecurity
zip files & hack... (CVE-2022-1271 zgrep/gzip)
John Hammond Beginner 3y ago
How Hackers Hide
Cybersecurity
How Hackers Hide
John Hammond Beginner 3y ago
PASSWORDS LEFT OUT IN THE OPEN (Active Directory #10)
Cybersecurity
PASSWORDS LEFT OUT IN THE OPEN (Active Directory #10)
John Hammond Beginner 3y ago
VULNERABLE File Uploads (Python Django)
Cybersecurity
VULNERABLE File Uploads (Python Django)
John Hammond Beginner 3y ago
ACCESS what you WERE NEVER SUPPOSED TO
Cybersecurity
ACCESS what you WERE NEVER SUPPOSED TO
John Hammond Beginner 3y ago
Reverse Shell UNDETECTED by Microsoft Defender (hoaxshell)
Cybersecurity
Reverse Shell UNDETECTED by Microsoft Defender (hoaxshell)
John Hammond Beginner 3y ago
BEGINNER Golang CSV Quiz Game - Gophercises
Cybersecurity
BEGINNER Golang CSV Quiz Game - Gophercises
John Hammond Beginner 3y ago
a CYBERCRIME UNIVERSITY!?!? ("FREE" hacking courses - Dark Web Documentary #12)
Cybersecurity
a CYBERCRIME UNIVERSITY!?!? ("FREE" hacking courses - Dark Web Documentary #12)
John Hammond Beginner 3y ago
Unraveling a REMOTE ACCESS TROJAN (VBScript Deobfuscation)
Cybersecurity
Unraveling a REMOTE ACCESS TROJAN (VBScript Deobfuscation)
John Hammond Beginner 3y ago
HAVOC C2 - Demon Bypasses Windows 11 Defender
Cybersecurity
HAVOC C2 - Demon Bypasses Windows 11 Defender
John Hammond Beginner 3y ago
IT WAS A SCAM
Cybersecurity
IT WAS A SCAM
John Hammond Beginner 3y ago
PowerShell - Observing Inline C# Compilation with Add-Type
Cybersecurity
PowerShell - Observing Inline C# Compilation with Add-Type
John Hammond Beginner 3y ago
an INSIDE LOOK at Penetration Testing Collaborative Platform (Plextrac)
Cybersecurity
an INSIDE LOOK at Penetration Testing Collaborative Platform (Plextrac)
John Hammond Beginner 3y ago
INSTANT File Downloads with JavaScript
Cybersecurity
INSTANT File Downloads with JavaScript
John Hammond Beginner 3y ago
Starting Cybersecurity Careers (with JRHacka)
Cybersecurity
Starting Cybersecurity Careers (with JRHacka)
John Hammond Beginner 3y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Getting Started with Amazon Timestream
📚 Coursera Course ↗
Self-paced
Getting Started with Amazon Timestream
Opens on Coursera ↗
The History of Modern Israel - Part I: From an Idea to a State
📚 Coursera Course ↗
Self-paced
The History of Modern Israel - Part I: From an Idea to a State
Opens on Coursera ↗
Statistics and Data Analysis with Excel: Essentials
📚 Coursera Course ↗
Self-paced
Statistics and Data Analysis with Excel: Essentials
Opens on Coursera ↗
Advanced Blazor – Security, Payments & Deployment
📚 Coursera Course ↗
Self-paced
Advanced Blazor – Security, Payments & Deployment
Opens on Coursera ↗
Cyber Incident Response
📚 Coursera Course ↗
Self-paced
Cyber Incident Response
Opens on Coursera ↗
Dashboarding and Funnel Analytics for Product Insights
📚 Coursera Course ↗
Self-paced
Dashboarding and Funnel Analytics for Product Insights
Opens on Coursera ↗