✕ Clear filters
1,053 lessons

Browse Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 184,526📚 Coursera 16,231
This File Steals Passwords
AI News & Updates
This File Steals Passwords
John Hammond Beginner 1y ago
Hackers Use Github For Malware
AI News & Updates
Hackers Use Github For Malware
John Hammond Beginner 1y ago
Finding WEIRD Devices on the Public Internet
AI News & Updates
Finding WEIRD Devices on the Public Internet
John Hammond Beginner 1y ago
Government Unveils Malware Analysis Tool, But...
Cybersecurity
Government Unveils Malware Analysis Tool, But...
John Hammond Beginner 1y ago
Bypassing SmartScreen on Web Browsers
AI News & Updates
Bypassing SmartScreen on Web Browsers
John Hammond Beginner 1y ago
Telegram Has Been Hacked
AI News & Updates
Telegram Has Been Hacked
John Hammond Beginner 1y ago
I Hacked The Cloud: Azure Managed Identities
AI News & Updates
I Hacked The Cloud: Azure Managed Identities
John Hammond Advanced 2y ago
Scraping Dark Web Sites with Python
Cybersecurity
Scraping Dark Web Sites with Python
John Hammond Beginner 2y ago
How Hackers Can Hide PowerShell in Environment Variables
Cybersecurity
How Hackers Can Hide PowerShell in Environment Variables
John Hammond Beginner 2y ago
Malware & Cybersecurity Threats on the Horizon
Cybersecurity
Malware & Cybersecurity Threats on the Horizon
John Hammond Beginner 2y ago
Hackers Hide with Clever Alternate Data Streams
Cybersecurity
Hackers Hide with Clever Alternate Data Streams
John Hammond Beginner 2y ago
The Apex Legends Hacker: Destroyer2009
AI News & Updates
The Apex Legends Hacker: Destroyer2009
John Hammond Beginner 2y ago
Github Copilot Made My Code More Vulnerable
AI-Assisted Coding
Github Copilot Made My Code More Vulnerable
John Hammond Beginner 2y ago
Malware Analysis & Threat Intel: UAC Bypasses
Cybersecurity
Malware Analysis & Threat Intel: UAC Bypasses
John Hammond Beginner 2y ago
Hackers Can Phish with PLAINTEXT QR Codes
AI News & Updates
Hackers Can Phish with PLAINTEXT QR Codes
John Hammond Beginner 2y ago
How Hackers Compromise BIG Networks (with NetExec)
Cybersecurity
How Hackers Compromise BIG Networks (with NetExec)
John Hammond Intermediate 2y ago
The Apex Legends Hack.
Cybersecurity
The Apex Legends Hack.
John Hammond Intermediate 2y ago
Finding WEIRD Typosquatting Websites
Cybersecurity
Finding WEIRD Typosquatting Websites
John Hammond Intermediate 2y ago
Don't Use CyberChef. Use This Instead.
Cybersecurity
Don't Use CyberChef. Use This Instead.
John Hammond Advanced 2y ago
The Secrets of The Tor Browser
Cybersecurity
The Secrets of The Tor Browser
John Hammond Intermediate 2y ago
Can a PDF File be Malware?
Cybersecurity
Can a PDF File be Malware?
John Hammond Intermediate 2y ago
I Made Malware In Under 20 Minutes
Cybersecurity
I Made Malware In Under 20 Minutes
John Hammond Beginner 2y ago
Free Coding Tool Distributes Malware
Cybersecurity
Free Coding Tool Distributes Malware
John Hammond Intermediate 2y ago
Sweet New Threat Intel Just Dropped
Cybersecurity
Sweet New Threat Intel Just Dropped
John Hammond Beginner 2y ago
Notepad.exe Will Snitch On You (full coding project)
Cybersecurity
Notepad.exe Will Snitch On You (full coding project)
John Hammond Intermediate 2y ago
One Code Mistake Ruined This Website
Cybersecurity
One Code Mistake Ruined This Website
John Hammond Intermediate 2y ago
Tracking Cybercrime on Telegram
Cybersecurity
Tracking Cybercrime on Telegram
John Hammond Intermediate 2y ago
Don't Forget This One Hacking Trick
Cybersecurity
Don't Forget This One Hacking Trick
John Hammond Intermediate 2y ago
Malware Analysis Made Easy: Cloud Investigations
Cybersecurity
Malware Analysis Made Easy: Cloud Investigations
John Hammond Beginner 2y ago
Calculating Smart Contract Vulnerability Impact: Low To Critical
Cybersecurity
Calculating Smart Contract Vulnerability Impact: Low To Critical
John Hammond Beginner 2y ago
SMB Shares & Cronjob to Initial Access (Proving Grounds: Dawn)
Cybersecurity
SMB Shares & Cronjob to Initial Access (Proving Grounds: Dawn)
John Hammond Intermediate 2y ago
Enterprise security one step at a time
Cybersecurity
Enterprise security one step at a time
John Hammond Intermediate 2y ago
I AUTOMATED a Penetration Test!?
Cybersecurity
I AUTOMATED a Penetration Test!?
John Hammond Intermediate 2y ago
Healthcare Software Exploit: CVE-2023-43208
Cybersecurity
Healthcare Software Exploit: CVE-2023-43208
John Hammond Intermediate 2y ago
Microsoft Entra Training
Cybersecurity
Microsoft Entra Training
John Hammond Advanced 2y ago
Run this script with Eval
Cybersecurity
Run this script with Eval
John Hammond Intermediate 2y ago
Debug with JS-Beautify
Cybersecurity
Debug with JS-Beautify
John Hammond Intermediate 2y ago
Debug with Visual Studio
Cybersecurity
Debug with Visual Studio
John Hammond Intermediate 2y ago
Exploring the BIGGEST SCAMS in the Dark Web
Cybersecurity
Exploring the BIGGEST SCAMS in the Dark Web
John Hammond Intermediate 2y ago
Welcome back, Ryan Chapman
Cybersecurity
Welcome back, Ryan Chapman
John Hammond Intermediate 2y ago
Learning Entra ID (Azure Active Directory)
Cybersecurity
Learning Entra ID (Azure Active Directory)
John Hammond Beginner 2y ago
Network Threat Hunting Made Easy (Finding Hackers)
Cybersecurity
Network Threat Hunting Made Easy (Finding Hackers)
John Hammond Beginner 2y ago
PikaBot Malware Analysis: Debugging in Visual Studio
Cybersecurity
PikaBot Malware Analysis: Debugging in Visual Studio
John Hammond Intermediate 2y ago
Technical Term Tips
Cybersecurity
Technical Term Tips
John Hammond Advanced 2y ago
Make Malware Analysis FASTER with Binary Emulation
Cybersecurity
Make Malware Analysis FASTER with Binary Emulation
John Hammond Intermediate 2y ago
Dig Deeper and Faster with AI
Cybersecurity
Dig Deeper and Faster with AI
John Hammond Intermediate 2y ago
I Made a Custom Threat Intel Feed (Connecting Apps with n8n)
Cybersecurity
I Made a Custom Threat Intel Feed (Connecting Apps with n8n)
John Hammond Intermediate 2y ago
NetworkChuck's Life Hack
Cybersecurity
NetworkChuck's Life Hack
John Hammond Intermediate 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Conceptos imprescindibles - Requisitos para el análisis
📚 Coursera Course ↗
Self-paced
Conceptos imprescindibles - Requisitos para el análisis
Opens on Coursera ↗
Learn Angular Routing by building a Cocktails Application
📚 Coursera Course ↗
Self-paced
Learn Angular Routing by building a Cocktails Application
Opens on Coursera ↗
CISSP Domain 6: Security Assessment and Testing
📚 Coursera Course ↗
Self-paced
CISSP Domain 6: Security Assessment and Testing
Opens on Coursera ↗
TOEFL Test-Taking Strategies
📚 Coursera Course ↗
Self-paced
TOEFL Test-Taking Strategies
Opens on Coursera ↗
Complete SAS Guide - Learn SAS and Become a Data Ninja
📚 Coursera Course ↗
Self-paced
Complete SAS Guide - Learn SAS and Become a Data Ninja
Opens on Coursera ↗
Creating a Virtual Machine
📚 Coursera Course ↗
Self-paced
Creating a Virtual Machine
Opens on Coursera ↗