✕ Clear filters
1,407 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 198,250📚 Coursera 18,118🎤 TED 1
SnykCon CTF - "Random Flag Generator" Weak PRNG Seed
🔐 Cybersecurity
SnykCon CTF - "Random Flag Generator" Weak PRNG Seed
John Hammond Intermediate 4y ago
SnykCon CTF - "Invisible Ink" Prototype Pollution
🔐 Cybersecurity
SnykCon CTF - "Invisible Ink" Prototype Pollution
John Hammond Intermediate 4y ago
Snip3 Crypter/RAT Loader - DcRat MALWARE ANALYSIS
🔐 Cybersecurity
Snip3 Crypter/RAT Loader - DcRat MALWARE ANALYSIS
John Hammond Beginner 4y ago
VOD - TryHackMe! Attacking Kerberos
🔐 Cybersecurity
VOD - TryHackMe! Attacking Kerberos
John Hammond Intermediate 4y ago
VOD - TryHackMe! Game Zone - Recreating a Metasploit Exploit in Python
🔐 Cybersecurity
VOD - TryHackMe! Game Zone - Recreating a Metasploit Exploit in Python
John Hammond Intermediate 4y ago
VOD - TryHackMe! Steel Mountain with Metasploit
🔐 Cybersecurity
VOD - TryHackMe! Steel Mountain with Metasploit
John Hammond Intermediate 4y ago
KOVTER Malware Analysis - Fileless Persistence in Registry
🔐 Cybersecurity
KOVTER Malware Analysis - Fileless Persistence in Registry
John Hammond Beginner 4y ago
AES-CFB Cryptography Mistakes - HackTheBox Business CTF "Domain Controller"
🔐 Cybersecurity
AES-CFB Cryptography Mistakes - HackTheBox Business CTF "Domain Controller"
John Hammond Beginner 4y ago
XLM Macros & Unhiding Excel Worksheets - HackTheBox Biz CTF "OldSchool"
🔐 Cybersecurity
XLM Macros & Unhiding Excel Worksheets - HackTheBox Biz CTF "OldSchool"
John Hammond Intermediate 4y ago
BAD RANSOMWARE - HackTheBox Business CTF
🔐 Cybersecurity
BAD RANSOMWARE - HackTheBox Business CTF
John Hammond Intermediate 4y ago
Reverse Engineering Loops - "Syncopation" HackTheBox Business CTF
🔐 Cybersecurity
Reverse Engineering Loops - "Syncopation" HackTheBox Business CTF
John Hammond Intermediate 4y ago
Laravel CVE / PHP Deserialization - "Larablog" HTB Business CTF
🔐 Cybersecurity
Laravel CVE / PHP Deserialization - "Larablog" HTB Business CTF
John Hammond Intermediate 4y ago
JSON Web Keys (JWK & JWT) - "Emergency" - HackTheBox Business CTF
🔐 Cybersecurity
JSON Web Keys (JWK & JWT) - "Emergency" - HackTheBox Business CTF
John Hammond Intermediate 4y ago
GraphQL Introspection - HackTheBox "Business CTF" - NoteQL
🔐 Cybersecurity
GraphQL Introspection - HackTheBox "Business CTF" - NoteQL
John Hammond Beginner 4y ago
HackTheBox "Business CTF" - Time - Command Injection
🔐 Cybersecurity
HackTheBox "Business CTF" - Time - Command Injection
John Hammond Intermediate 4y ago
HackTheBox "Business CTF" - discordvm - Node.js Sandbox Escape
🔐 Cybersecurity
HackTheBox "Business CTF" - discordvm - Node.js Sandbox Escape
John Hammond Intermediate 4y ago
JScript Deobfuscation - More WSHRAT (Malware Analysis)
🔐 Cybersecurity
JScript Deobfuscation - More WSHRAT (Malware Analysis)
John Hammond Intermediate 4y ago
Information Stealer - Malware Analysis (PowerShell to .NET)
🔐 Cybersecurity
Information Stealer - Malware Analysis (PowerShell to .NET)
John Hammond Beginner 4y ago
AES-CTR Cryptography: Reused Key Weakness - HackTheBox Cyber Apocalypse CTF
🔐 Cybersecurity
AES-CTR Cryptography: Reused Key Weakness - HackTheBox Cyber Apocalypse CTF
John Hammond Beginner 4y ago
PowerPoint Phishing Malware Analysis - HackTheBox Cyber Apocalypse CTF
🔐 Cybersecurity
PowerPoint Phishing Malware Analysis - HackTheBox Cyber Apocalypse CTF
John Hammond Intermediate 4y ago
Phishing Document "Invitation" - HackTheBox Cyber Apocalypse CTF
🔐 Cybersecurity
Phishing Document "Invitation" - HackTheBox Cyber Apocalypse CTF
John Hammond Intermediate 4y ago
Nodejs Nunjucks Template Injection - HackTheBox Cyber Apocalypse CTF
🔐 Cybersecurity
Nodejs Nunjucks Template Injection - HackTheBox Cyber Apocalypse CTF
John Hammond Intermediate 4y ago
Cloudflare CDN CSP - XSS Bypass / HackTheBox Cyber Apocalypse CTF
🔐 Cybersecurity
Cloudflare CDN CSP - XSS Bypass / HackTheBox Cyber Apocalypse CTF
John Hammond Beginner 4y ago
IFrame Parent XSS - HackTheBox Cyber Apocalypse CTF
🔐 Cybersecurity
IFrame Parent XSS - HackTheBox Cyber Apocalypse CTF
John Hammond Beginner 4y ago
Blind MongoDB NoSQL Injection - HackTheBox Cyber Apocalypse CTF
🔐 Cybersecurity
Blind MongoDB NoSQL Injection - HackTheBox Cyber Apocalypse CTF
John Hammond Intermediate 4y ago
HackTheBox CA CTF - Using Snyk to Find & Fix Vulnerabilities
🔐 Cybersecurity
HackTheBox CA CTF - Using Snyk to Find & Fix Vulnerabilities
John Hammond Beginner 4y ago
XML Object Exfiltration - HackTheBox Cyber Apocalypse CTF "E. Tree"
🔐 Cybersecurity
XML Object Exfiltration - HackTheBox Cyber Apocalypse CTF "E. Tree"
John Hammond Beginner 4y ago
SQLite Blind SQL Injection - HackTheBox Cyber Apocalypse CTF
🔐 Cybersecurity
SQLite Blind SQL Injection - HackTheBox Cyber Apocalypse CTF
John Hammond Beginner 4y ago
HTB Cyber Apocalypse - cURL As a Service
🔐 Cybersecurity
HTB Cyber Apocalypse - cURL As a Service
John Hammond Beginner 4y ago
HTA JScript to PowerShell - Novter Malware Analysis
🔐 Cybersecurity
HTA JScript to PowerShell - Novter Malware Analysis
John Hammond Intermediate 4y ago
TryHackMe - OSCP Voucher GIVEAWAY & Presentation
🔐 Cybersecurity
TryHackMe - OSCP Voucher GIVEAWAY & Presentation
John Hammond Intermediate 4y ago
BEGINNER Capture The Flag - PicoCTF 2021 001 "Obedient Cat"
🔐 Cybersecurity
BEGINNER Capture The Flag - PicoCTF 2021 001 "Obedient Cat"
John Hammond Beginner 4y ago
$2 MILLION DOLLARS STOLEN in Bitcoin/Ethereum - JScript Malware Analysis
🔐 Cybersecurity
$2 MILLION DOLLARS STOLEN in Bitcoin/Ethereum - JScript Malware Analysis
John Hammond Intermediate 4y ago
GuidePoint Security CTF - Custom Base64 Languages - Kirby & Alphabet
🔐 Cybersecurity
GuidePoint Security CTF - Custom Base64 Languages - Kirby & Alphabet
John Hammond Beginner 5y ago
FAKE Antivirus? Malware Analysis of Decoy 'kaspersky.exe'
🔐 Cybersecurity
FAKE Antivirus? Malware Analysis of Decoy 'kaspersky.exe'
John Hammond Intermediate 5y ago
NahamCon is COMING BACK!
🔐 Cybersecurity
NahamCon is COMING BACK!
John Hammond Intermediate 5y ago
Is THIS a VIRUS? Finding a Remcos RAT - Malware Analysis
🔐 Cybersecurity
Is THIS a VIRUS? Finding a Remcos RAT - Malware Analysis
John Hammond Intermediate 5y ago
MALWARE ANALYSIS - VBScript Decoding & Deobfuscating
🔐 Cybersecurity
MALWARE ANALYSIS - VBScript Decoding & Deobfuscating
John Hammond Intermediate 5y ago
TryHackMe! Skynet - Wildcard Injection
🔐 Cybersecurity
TryHackMe! Skynet - Wildcard Injection
John Hammond Beginner 5y ago
"Advanced" Tips & Tricks for Capture The Flag
🔐 Cybersecurity
"Advanced" Tips & Tricks for Capture The Flag
John Hammond Advanced 5y ago
Help us test our CTF! December is BUSY
🔐 Cybersecurity
Help us test our CTF! December is BUSY
John Hammond Intermediate 5y ago
Nested JavaScript Obfuscation - GuidePoint Security CTF Challenge
🔐 Cybersecurity
Nested JavaScript Obfuscation - GuidePoint Security CTF Challenge
John Hammond Beginner 5y ago
Custom Wordlists & SQL Injection - GuidePoint Security CTF (Belle)
🔐 Cybersecurity
Custom Wordlists & SQL Injection - GuidePoint Security CTF (Belle)
John Hammond Beginner 5y ago
phpMyAdmin Local File Inclusion - GuidePoint Security CTF (Jeffrey)
🔐 Cybersecurity
phpMyAdmin Local File Inclusion - GuidePoint Security CTF (Jeffrey)
John Hammond Beginner 5y ago
Basic Buffer Overflow - VulnServer TRUN
🔐 Cybersecurity
Basic Buffer Overflow - VulnServer TRUN
John Hammond Beginner 5y ago
Audio Spectrogram & StegCracker Passwords - DownUnderCTF
🔐 Cybersecurity
Audio Spectrogram & StegCracker Passwords - DownUnderCTF
John Hammond Intermediate 5y ago
Pwntools ROP Binary Exploitation - DownUnderCTF
🔐 Cybersecurity
Pwntools ROP Binary Exploitation - DownUnderCTF
John Hammond Intermediate 5y ago
Stopping DNS "ANY" Queries - DownUnderCTF
🔐 Cybersecurity
Stopping DNS "ANY" Queries - DownUnderCTF
John Hammond Beginner 5y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Play It Safe: Manage Security Risks
📚 Coursera Course ↗
Self-paced
Play It Safe: Manage Security Risks
Opens on Coursera ↗
Hands-on Hacking
📚 Coursera Course ↗
Self-paced
Hands-on Hacking
Opens on Coursera ↗
AWS: Resilient Solutions and Security Controls
📚 Coursera Course ↗
Self-paced
AWS: Resilient Solutions and Security Controls
Opens on Coursera ↗
IT Risk Assessment Practices
📚 Coursera Course ↗
Self-paced
IT Risk Assessment Practices
Opens on Coursera ↗
Microsoft Azure Management Tools and Security Solutions
📚 Coursera Course ↗
Self-paced
Microsoft Azure Management Tools and Security Solutions
Opens on Coursera ↗
CCNA 200-301 Version 1.1: Unit 6
📚 Coursera Course ↗
Self-paced
CCNA 200-301 Version 1.1: Unit 6
Opens on Coursera ↗