✕ Clear filters
1,802 lessons

Browse Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 198,250📚 Coursera 18,118🎤 TED 1
What SECRETS are in your Clipboard?
🔐 Cybersecurity
What SECRETS are in your Clipboard?
John Hammond Beginner 2y ago
Kubernetes Hacking: From Weak Applications to Cluster Control
🔐 Cybersecurity
Kubernetes Hacking: From Weak Applications to Cluster Control
John Hammond Intermediate 2y ago
Python Pwntools Hacking: ret2libc GOT & PLT
🔐 Cybersecurity
Python Pwntools Hacking: ret2libc GOT & PLT
John Hammond Intermediate 2y ago
Cybersecurity Labs (FOR FREE) - Linux Backdoor Analysis
🔐 Cybersecurity
Cybersecurity Labs (FOR FREE) - Linux Backdoor Analysis
John Hammond Beginner 2y ago
Most ChatGPT Extensions Are Just Malware
🧠 Large Language Models
Most ChatGPT Extensions Are Just Malware
John Hammond Advanced 2y ago
How FAST Can You Write a Pentest Report?
🔐 Cybersecurity
How FAST Can You Write a Pentest Report?
John Hammond Beginner 2y ago
Password Hacking in Kali Linux
🔐 Cybersecurity
Password Hacking in Kali Linux
John Hammond Intermediate 2y ago
The Latest YouTube Malware Scam
🖊️ Copywriting & Content Strategy
The Latest YouTube Malware Scam
John Hammond Beginner 2y ago
3CX VOIP Compromised & Supply Chain Threat
📰 AI News & Updates
3CX VOIP Compromised & Supply Chain Threat
John Hammond Beginner 3y ago
You Can BUY This Hacked YouTube Channel
🛡️ AI Safety & Ethics
You Can BUY This Hacked YouTube Channel
John Hammond Intermediate 3y ago
So Linus Tech Tips Got Hacked...
🛡️ AI Safety & Ethics
So Linus Tech Tips Got Hacked...
John Hammond Intermediate 3y ago
Hackers Bypass Google Two-Factor Authentication (2FA) SMS
🔐 Cybersecurity
Hackers Bypass Google Two-Factor Authentication (2FA) SMS
John Hammond Intermediate 3y ago
CI/CD GOAT: Mad Hatter Capture The Flag
🔐 Cybersecurity
CI/CD GOAT: Mad Hatter Capture The Flag
John Hammond Beginner 3y ago
Kali Linux for DEFENSE? (Kali Purple 2023.1 Review)
🛠️ AI Tools & Apps
Kali Linux for DEFENSE? (Kali Purple 2023.1 Review)
John Hammond Intermediate 3y ago
I Found Your Github Secrets
🛡️ AI Safety & Ethics
I Found Your Github Secrets
John Hammond Intermediate 3y ago
Free Hacking APIs Course (APISEC University!)
🔐 Cybersecurity
Free Hacking APIs Course (APISEC University!)
John Hammond Beginner 3y ago
Hacking CI/CD (Basic Pipeline Poisoning)
🔐 Cybersecurity
Hacking CI/CD (Basic Pipeline Poisoning)
John Hammond Intermediate 3y ago
How YouTubers Are Getting Hacked
🛡️ AI Safety & Ethics
How YouTubers Are Getting Hacked
John Hammond Intermediate 3y ago
a Hacker's Backdoor: Service Control Manager
📰 AI News & Updates
a Hacker's Backdoor: Service Control Manager
John Hammond Beginner 3y ago
Unraveling Discord Token Stealer (python MALWARE)
🔐 Cybersecurity
Unraveling Discord Token Stealer (python MALWARE)
John Hammond Beginner 3y ago
My Password Was Pwned 13 Times
🛡️ AI Safety & Ethics
My Password Was Pwned 13 Times
John Hammond Intermediate 3y ago
New IT & Security Event: MSPGEEKCON
🛡️ AI Safety & Ethics
New IT & Security Event: MSPGEEKCON
John Hammond Intermediate 3y ago
Is This Website LEAKING?
🔐 Cybersecurity
Is This Website LEAKING?
John Hammond Beginner 3y ago
Strange File in Downloads Folder? Gootloader Malware Analysis
🔐 Cybersecurity
Strange File in Downloads Folder? Gootloader Malware Analysis
John Hammond Beginner 3y ago
Carving Exfiltrated Network Data from a Hack (Python & Scapy)
🔐 Cybersecurity
Carving Exfiltrated Network Data from a Hack (Python & Scapy)
John Hammond Beginner 3y ago
I Tried The HackTheBox Certified Pentester Exam
🔐 Cybersecurity
I Tried The HackTheBox Certified Pentester Exam
John Hammond Advanced 3y ago
Can You Find Where a Picture was Taken?
🛡️ AI Safety & Ethics
Can You Find Where a Picture was Taken?
John Hammond Intermediate 3y ago
Evading Filters to Dump Databases (like a hacker)
🔐 Cybersecurity
Evading Filters to Dump Databases (like a hacker)
John Hammond Advanced 3y ago
How Hackers Can Bypass Your Security Defenses
🔐 Cybersecurity
How Hackers Can Bypass Your Security Defenses
John Hammond Intermediate 3y ago
I Saw 8 MILLION Phishing Scams
🛡️ AI Safety & Ethics
I Saw 8 MILLION Phishing Scams
John Hammond Intermediate 3y ago
Internet Explorer Forced to Run Malware
🛡️ AI Safety & Ethics
Internet Explorer Forced to Run Malware
John Hammond Beginner 3y ago
Fake OBS Studio Hack Targeting YouTubers
🛡️ AI Safety & Ethics
Fake OBS Studio Hack Targeting YouTubers
John Hammond Beginner 3y ago
3 Things You Didn't Know about Windows Command Prompt
🛡️ AI Safety & Ethics
3 Things You Didn't Know about Windows Command Prompt
John Hammond Beginner 3y ago
How to Proxy Command Execution: "Living Off The Land" Hacks
📊 Data Analytics & Business Intelligence
How to Proxy Command Execution: "Living Off The Land" Hacks
John Hammond Intermediate 3y ago
How To Bypass Website File Upload Restrictions
🔐 Cybersecurity
How To Bypass Website File Upload Restrictions
John Hammond Beginner 3y ago
Certified Penetration Testing Specialist! Chat with HackTheBox
🔐 Cybersecurity
Certified Penetration Testing Specialist! Chat with HackTheBox
John Hammond Beginner 3y ago
Filter Evasion in a REVERSE SHELL (no spaces!!)
🔐 Cybersecurity
Filter Evasion in a REVERSE SHELL (no spaces!!)
John Hammond Beginner 3y ago
ROP is DEAD! Kernel Driver Binary Exploitation
🔐 Cybersecurity
ROP is DEAD! Kernel Driver Binary Exploitation
John Hammond Beginner 3y ago
Start Hacking with the HEARTBLEED vulnerability: NahamCon CTF
🔐 Cybersecurity
Start Hacking with the HEARTBLEED vulnerability: NahamCon CTF
John Hammond Beginner 3y ago
Capture The Flag!  NahamCon EU CTF "MMORPG"
🔐 Cybersecurity
Capture The Flag! NahamCon EU CTF "MMORPG"
John Hammond Beginner 3y ago
Hardware Hacking! Day 19 - TryHackMe Advent of Cyber
🔐 Cybersecurity
Hardware Hacking! Day 19 - TryHackMe Advent of Cyber
John Hammond Beginner 3y ago
How To Manage Your Business Technology
🔐 Cybersecurity
How To Manage Your Business Technology
John Hammond Beginner 3y ago
Is this a SECURE laptop?
🔐 Cybersecurity
Is this a SECURE laptop?
John Hammond Beginner 3y ago
Unraveling the IcedID Malware Stager & Phishing Email
🔐 Cybersecurity
Unraveling the IcedID Malware Stager & Phishing Email
John Hammond Beginner 3y ago
Become a Certified Penetration Tester with HackTheBox CPTS!
🔐 Cybersecurity
Become a Certified Penetration Tester with HackTheBox CPTS!
John Hammond Beginner 3y ago
Setup EXTREME VULNERABLE Kernel Driver (HEVD)
🔐 Cybersecurity
Setup EXTREME VULNERABLE Kernel Driver (HEVD)
John Hammond Beginner 3y ago
Linux Portbending Explained
🔐 Cybersecurity
Linux Portbending Explained
John Hammond Beginner 3y ago
run SHELLCODE within BASH!?!
🔐 Cybersecurity
run SHELLCODE within BASH!?!
John Hammond Beginner 3y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
R: Design & Evaluate Random Forests for Attrition
📚 Coursera Course ↗
Self-paced
R: Design & Evaluate Random Forests for Attrition
Opens on Coursera ↗
Build a Data Warehouse Using BigQuery
📚 Coursera Course ↗
Self-paced
Build a Data Warehouse Using BigQuery
Opens on Coursera ↗
Surveillance Systems: Analysis, Dissemination, and Special Systems
📚 Coursera Course ↗
Self-paced
Surveillance Systems: Analysis, Dissemination, and Special Systems
Opens on Coursera ↗
Introduction to Self-Driving Cars
📚 Coursera Course ↗
Self-paced
Introduction to Self-Driving Cars
Opens on Coursera ↗
AWS Services
📚 Coursera Course ↗
Self-paced
AWS Services
Opens on Coursera ↗
Build, Train and Deploy ML Models with Keras on Google Cloud - Italiano
📚 Coursera Course ↗
Self-paced
Build, Train and Deploy ML Models with Keras on Google Cloud - Italiano
Opens on Coursera ↗