✕ Clear filters
935 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 198,169📚 Coursera 18,118🏛 Archive.org 58🎤 TED 1
🚨 NPM axios Supply Chain Attack 🚨
🔐 Cybersecurity
🚨 NPM axios Supply Chain Attack 🚨
John Hammond Intermediate 8h ago
GraphSpy: Hacker's Tooling Deep Dive (w/ creator @RedByte1337!)
🔐 Cybersecurity
GraphSpy: Hacker's Tooling Deep Dive (w/ creator @RedByte1337!)
John Hammond Intermediate 2w ago
h?ckers a[r]e gl*bbing
🔐 Cybersecurity
h?ckers a[r]e gl*bbing
John Hammond Intermediate 1mo ago
NTUSER.MAN
🔐 Cybersecurity
NTUSER.MAN
John Hammond Intermediate 2mo ago
Mostly Stupid Hacks
🔐 Cybersecurity
Mostly Stupid Hacks
John Hammond Intermediate 4mo ago
Cybersecurity Awareness for Hackers! with Huntress and Just Hacking Training
🔐 Cybersecurity
Cybersecurity Awareness for Hackers! with Huntress and Just Hacking Training
John Hammond Intermediate 5mo ago
Hackers Bruteforce Passwords to Microsoft Online
🔐 Cybersecurity
Hackers Bruteforce Passwords to Microsoft Online
John Hammond Intermediate 5mo ago
new capture the flag (hacking competition)
🔐 Cybersecurity
new capture the flag (hacking competition)
John Hammond Intermediate 6mo ago
How You Can Impersonate Anyone in Active Directory (with Shikata!)
🔐 Cybersecurity
How You Can Impersonate Anyone in Active Directory (with Shikata!)
John Hammond Intermediate 9mo ago
Evading Antivirus Detection in C (with Dahvid Schloss)
🔐 Cybersecurity
Evading Antivirus Detection in C (with Dahvid Schloss)
John Hammond Intermediate 9mo ago
Learning to Hack Active Directory Certificate Services (with Shikata!)
🔐 Cybersecurity
Learning to Hack Active Directory Certificate Services (with Shikata!)
John Hammond Intermediate 9mo ago
Windows Endpoint Telemetry (ft. Jonny Johnson)
🔐 Cybersecurity
Windows Endpoint Telemetry (ft. Jonny Johnson)
John Hammond Intermediate 9mo ago
Malware & Hackers Evade Antivirus with Windows Sandbox
🔐 Cybersecurity
Malware & Hackers Evade Antivirus with Windows Sandbox
John Hammond Intermediate 10mo ago
hackers weaponize... really long filenames??
🔐 Cybersecurity
hackers weaponize... really long filenames??
John Hammond Intermediate 10mo ago
golang obfuscated malware goes crazy
🔐 Cybersecurity
golang obfuscated malware goes crazy
John Hammond Intermediate 10mo ago
The CVE Foundation Interview
🔐 Cybersecurity
The CVE Foundation Interview
John Hammond Intermediate 10mo ago
Team Shellphish AIxCC Interview
🔐 Cybersecurity
Team Shellphish AIxCC Interview
John Hammond Intermediate 10mo ago
How Hackers Steal Passwords
🔐 Cybersecurity
How Hackers Steal Passwords
John Hammond Intermediate 10mo ago
Blocking EVERYTHING with Windows Firewall
🔐 Cybersecurity
Blocking EVERYTHING with Windows Firewall
John Hammond Intermediate 10mo ago
cybersecurity just got f***ed
🔐 Cybersecurity
cybersecurity just got f***ed
John Hammond Intermediate 11mo ago
Finding Web App Vulnerabilities with AI
🔐 Cybersecurity
Finding Web App Vulnerabilities with AI
John Hammond Intermediate 11mo ago
I Backdoored Cursor AI
🔐 Cybersecurity
I Backdoored Cursor AI
John Hammond Intermediate 11mo ago
this MP3 file is malware
🔐 Cybersecurity
this MP3 file is malware
John Hammond Intermediate 1y ago
the CRITICAL 9.1 severity Next.js vulnerability
🔐 Cybersecurity
the CRITICAL 9.1 severity Next.js vulnerability
John Hammond Intermediate 1y ago
ms teams is now a C2 (command-and-control)
🔐 Cybersecurity
ms teams is now a C2 (command-and-control)
John Hammond Intermediate 1y ago
they tried to hack me so i confronted them
🔐 Cybersecurity
they tried to hack me so i confronted them
John Hammond Intermediate 1y ago
the tools that real hackers use
🔐 Cybersecurity
the tools that real hackers use
John Hammond Intermediate 1y ago
are built-in windows programs vulnerable?
🔐 Cybersecurity
are built-in windows programs vulnerable?
John Hammond Intermediate 1y ago
The Snyk Fetch the Flag CTF is LIVE right now!!
🔐 Cybersecurity
The Snyk Fetch the Flag CTF is LIVE right now!!
John Hammond Intermediate 1y ago
Pentesting Methodologies & CTF Challenges!
🔐 Cybersecurity
Pentesting Methodologies & CTF Challenges!
John Hammond Intermediate 1y ago
Unpacking Code for CTF Challenges: Create Your Dirty Image
🔐 Cybersecurity
Unpacking Code for CTF Challenges: Create Your Dirty Image
John Hammond Intermediate 1y ago
Preventing Session Hijacking: Essential Cybersecurity Strategies
🔐 Cybersecurity
Preventing Session Hijacking: Essential Cybersecurity Strategies
John Hammond Intermediate 1y ago
Unlocking Secrets: Hacking With InfoStealer Malware
🔐 Cybersecurity
Unlocking Secrets: Hacking With InfoStealer Malware
John Hammond Intermediate 1y ago
Hacking a Reddit Account: A Step-by-Step Demonstration
🔐 Cybersecurity
Hacking a Reddit Account: A Step-by-Step Demonstration
John Hammond Intermediate 1y ago
Linux Challenges for Holiday Hacking
🔐 Cybersecurity
Linux Challenges for Holiday Hacking
John Hammond Intermediate 1y ago
Inside the Registry Challenge: CTF Zone Finals 2024
🔐 Cybersecurity
Inside the Registry Challenge: CTF Zone Finals 2024
John Hammond Intermediate 1y ago
From Novice to Pro: Unleashing Hacking Genius
🔐 Cybersecurity
From Novice to Pro: Unleashing Hacking Genius
John Hammond Intermediate 1y ago
Unlock Your Cybersecurity Potential with Hands-On Labs
🔐 Cybersecurity
Unlock Your Cybersecurity Potential with Hands-On Labs
John Hammond Intermediate 1y ago
Unlocking Privilege Escalation in EntraID: The Essentials
🔐 Cybersecurity
Unlocking Privilege Escalation in EntraID: The Essentials
John Hammond Intermediate 1y ago
Exposing Vulnerabilities in EntraID: Ethical Hacking Insights
🔐 Cybersecurity
Exposing Vulnerabilities in EntraID: Ethical Hacking Insights
John Hammond Intermediate 1y ago
Hacking Everyday Items: The Truth Behind Suitcase Locks
🔐 Cybersecurity
Hacking Everyday Items: The Truth Behind Suitcase Locks
John Hammond Intermediate 1y ago
Collaborative Hacking with HHC 2024
🔐 Cybersecurity
Collaborative Hacking with HHC 2024
John Hammond Intermediate 1y ago
A Holiday Hacking Dream
🔐 Cybersecurity
A Holiday Hacking Dream
John Hammond Intermediate 1y ago
How Hackers Compromise BIG Networks (with NetExec)
🔐 Cybersecurity
How Hackers Compromise BIG Networks (with NetExec)
John Hammond Intermediate 2y ago
The Apex Legends Hack.
🔐 Cybersecurity
The Apex Legends Hack.
John Hammond Intermediate 2y ago
Finding WEIRD Typosquatting Websites
🔐 Cybersecurity
Finding WEIRD Typosquatting Websites
John Hammond Intermediate 2y ago
The Secrets of The Tor Browser
🔐 Cybersecurity
The Secrets of The Tor Browser
John Hammond Intermediate 2y ago
Can a PDF File be Malware?
🔐 Cybersecurity
Can a PDF File be Malware?
John Hammond Intermediate 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Hands-On Web App Pentesting
📚 Coursera Course ↗
Self-paced
Hands-On Web App Pentesting
Opens on Coursera ↗
Rust Secret Cipher CLI
📚 Coursera Course ↗
Self-paced
Rust Secret Cipher CLI
Opens on Coursera ↗
Introduction to Penetration Testing and Ethical Hacking
📚 Coursera Course ↗
Self-paced
Introduction to Penetration Testing and Ethical Hacking
Opens on Coursera ↗
TOTAL - CompTIA CySA+ Cybersecurity Analyst (CS0-003)
📚 Coursera Course ↗
Self-paced
TOTAL - CompTIA CySA+ Cybersecurity Analyst (CS0-003)
Opens on Coursera ↗
Intermediate Ethical Hacking Techniques
📚 Coursera Course ↗
Self-paced
Intermediate Ethical Hacking Techniques
Opens on Coursera ↗
Linux Security Techniques
📚 Coursera Course ↗
Self-paced
Linux Security Techniques
Opens on Coursera ↗