✕ Clear filters
1,802 lessons

Browse Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 198,285📚 Coursera 18,118🎤 TED 1
Capture the Flag at Blackhat USA 2023!
🔐 Cybersecurity
Capture the Flag at Blackhat USA 2023!
John Hammond Intermediate 2y ago
I Scammed Crypto Scammers
🛡️ AI Safety & Ethics
I Scammed Crypto Scammers
John Hammond Advanced 2y ago
Telegram Cybercrime is INSANE
🔐 Cybersecurity
Telegram Cybercrime is INSANE
John Hammond Intermediate 2y ago
I Broke Threads
🛡️ AI Safety & Ethics
I Broke Threads
John Hammond Intermediate 2y ago
How Hackers & Malware Spoof Processes
🛡️ AI Safety & Ethics
How Hackers & Malware Spoof Processes
John Hammond Beginner 2y ago
Compromising Terraform & AWS Atlantis Build Jobs
🛠️ AI Tools & Apps
Compromising Terraform & AWS Atlantis Build Jobs
John Hammond Intermediate 2y ago
Zimbra ZCS 0-day Exploited In The Wild
🔐 Cybersecurity
Zimbra ZCS 0-day Exploited In The Wild
John Hammond Beginner 2y ago
"Please Hack My Computer"
🔐 Cybersecurity
"Please Hack My Computer"
John Hammond Advanced 2y ago
Hunting Malware with Velociraptor (YARA & Memory Forensics)
🛡️ AI Safety & Ethics
Hunting Malware with Velociraptor (YARA & Memory Forensics)
John Hammond Intermediate 2y ago
Mass Digital Forensics & Incident Response with Velociraptor
🔐 Cybersecurity
Mass Digital Forensics & Incident Response with Velociraptor
John Hammond Intermediate 2y ago
Dependency Confusion with AWS CodeArtifact
🛠️ AI Tools & Apps
Dependency Confusion with AWS CodeArtifact
John Hammond Beginner 2y ago
Dark Web Dumpster Diving (Hunting Infostealer Malware)
🔐 Cybersecurity
Dark Web Dumpster Diving (Hunting Infostealer Malware)
John Hammond Beginner 2y ago
How to Trick Hackers & Web Crawlers with Spidertrap
🛡️ AI Safety & Ethics
How to Trick Hackers & Web Crawlers with Spidertrap
John Hammond Intermediate 2y ago
How Hackers Write Malware & Evade Antivirus (Nim)
🛡️ AI Safety & Ethics
How Hackers Write Malware & Evade Antivirus (Nim)
John Hammond Beginner 2y ago
TryHackMe! Finding Computer Artifacts with osquery
🔐 Cybersecurity
TryHackMe! Finding Computer Artifacts with osquery
John Hammond Beginner 2y ago
MOVEit Transfer Exploitation (my API presentation recording)
🛡️ AI Safety & Ethics
MOVEit Transfer Exploitation (my API presentation recording)
John Hammond Intermediate 2y ago
How Hackers Use netsh.exe For Persistence & Code Execution (Sliver C2)
🔐 Cybersecurity
How Hackers Use netsh.exe For Persistence & Code Execution (Sliver C2)
John Hammond Intermediate 2y ago
Stealing OAuth Github Tokens with AWS CodeBuild
🧠 Large Language Models
Stealing OAuth Github Tokens with AWS CodeBuild
John Hammond Beginner 2y ago
Scale Your Cloud Infrastructure (Hosting CTFs)
🔐 Cybersecurity
Scale Your Cloud Infrastructure (Hosting CTFs)
John Hammond Intermediate 2y ago
Fake OnlyFans MALWARE: Remcos Infostealer VBScript Stager
📄 Research Papers Explained
Fake OnlyFans MALWARE: Remcos Infostealer VBScript Stager
John Hammond Advanced 2y ago
Inside a Cybercrime Scam Operation
🛠️ AI Tools & Apps
Inside a Cybercrime Scam Operation
John Hammond Intermediate 2y ago
How Hackers Evade Program Allowlists with DLLs
🔐 Cybersecurity
How Hackers Evade Program Allowlists with DLLs
John Hammond Intermediate 2y ago
Bypassing Branch Protections with Github Actions (CI/CD)
🛡️ AI Safety & Ethics
Bypassing Branch Protections with Github Actions (CI/CD)
John Hammond Beginner 2y ago
Ethical Hacking: Bypass Passwords with Linux PAM Degradation Attack
🔐 Cybersecurity
Ethical Hacking: Bypass Passwords with Linux PAM Degradation Attack
John Hammond Beginner 2y ago
How To Extract Plaintext Google Chrome Passwords
📰 AI News & Updates
How To Extract Plaintext Google Chrome Passwords
John Hammond Intermediate 2y ago
Now Scammers Can RENT Email Addresses for Cybercrime
🛡️ AI Safety & Ethics
Now Scammers Can RENT Email Addresses for Cybercrime
John Hammond Intermediate 2y ago
FAKE Microsoft Login to Hacked Charity Scam
📰 AI News & Updates
FAKE Microsoft Login to Hacked Charity Scam
John Hammond Beginner 2y ago
Hands-on Ransomware: Exploring Cybercrime
🛡️ AI Safety & Ethics
Hands-on Ransomware: Exploring Cybercrime
John Hammond Beginner 2y ago
Threat Emulation & Purple Teaming (with PlexTrac Runbooks)
📊 Data Analytics & Business Intelligence
Threat Emulation & Purple Teaming (with PlexTrac Runbooks)
John Hammond Beginner 2y ago
How Can CI/CD Go Horribly Wrong?
🛡️ AI Safety & Ethics
How Can CI/CD Go Horribly Wrong?
John Hammond Beginner 2y ago
Rapid Windows Memory Analysis with Volatility 3
🔐 Cybersecurity
Rapid Windows Memory Analysis with Volatility 3
John Hammond Intermediate 2y ago
Exploring the Latest Dark Web Onion Sites
🔐 Cybersecurity
Exploring the Latest Dark Web Onion Sites
John Hammond Intermediate 2y ago
This Dark Web URL Shortener Sucks
🛡️ AI Safety & Ethics
This Dark Web URL Shortener Sucks
John Hammond Intermediate 2y ago
Raspberry Pi Malware uses IRC Remote Access Trojan (RAT)
🛡️ AI Safety & Ethics
Raspberry Pi Malware uses IRC Remote Access Trojan (RAT)
John Hammond Intermediate 2y ago
ChatGPT Analyzes Fake ChatGPT Malware
🧠 Large Language Models
ChatGPT Analyzes Fake ChatGPT Malware
John Hammond Intermediate 2y ago
Why Don't People Want Security?
📊 Data Analytics & Business Intelligence
Why Don't People Want Security?
John Hammond Intermediate 2y ago
Hide a Hacker's Reverse Shell in ONE Command
🔐 Cybersecurity
Hide a Hacker's Reverse Shell in ONE Command
John Hammond Intermediate 2y ago
Getting Started in Firmware Analysis & IoT Reverse Engineering
🔐 Cybersecurity
Getting Started in Firmware Analysis & IoT Reverse Engineering
John Hammond Beginner 2y ago
How To Setup ELK | Elastic Agents & Sysmon for Cybersecurity
🤖 AI Agents & Automation
How To Setup ELK | Elastic Agents & Sysmon for Cybersecurity
John Hammond Intermediate 2y ago
PowerShell CRYPTOSTEALER through DNS
🛡️ AI Safety & Ethics
PowerShell CRYPTOSTEALER through DNS
John Hammond Intermediate 2y ago
This TikTok User Stole My Content
🛡️ AI Safety & Ethics
This TikTok User Stole My Content
John Hammond Intermediate 2y ago
Hacking Complex Passwords with Rules & Munging
🔐 Cybersecurity
Hacking Complex Passwords with Rules & Munging
John Hammond Intermediate 2y ago
Living Off The Land - Windows Disk Cleaner Persistence
🔐 Cybersecurity
Living Off The Land - Windows Disk Cleaner Persistence
John Hammond Intermediate 2y ago
Hunt for Hackers with Velociraptor
🛡️ AI Safety & Ethics
Hunt for Hackers with Velociraptor
John Hammond Beginner 2y ago
ChatGPT tries a BASIC Capture The Flag (CTF) Challenge
🧠 Large Language Models
ChatGPT tries a BASIC Capture The Flag (CTF) Challenge
John Hammond Intermediate 2y ago
How To Test Your Security with Atomic Red Team
🔐 Cybersecurity
How To Test Your Security with Atomic Red Team
John Hammond Intermediate 2y ago
Quick Forensics of Windows Event Logs (DeepBlueCLI)
🛡️ AI Safety & Ethics
Quick Forensics of Windows Event Logs (DeepBlueCLI)
John Hammond Beginner 2y ago
winget: Install ROGUE Software & Packages?
🔐 Cybersecurity
winget: Install ROGUE Software & Packages?
John Hammond Intermediate 2y ago