✕ Clear filters
1,802 lessons

Browse Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 198,243📚 Coursera 18,118🎤 TED 1
SaaS apps are vulnerable too!!! (ServiceNow Exploitation)
🔐 Cybersecurity
SaaS apps are vulnerable too!!! (ServiceNow Exploitation)
John Hammond Beginner 1y ago
How Hackers Persist & Privesc in Microsoft 365
🔐 Cybersecurity
How Hackers Persist & Privesc in Microsoft 365
John Hammond Beginner 1y ago
Learn Open-Source Intelligence (OSINT)!
🔐 Cybersecurity
Learn Open-Source Intelligence (OSINT)!
John Hammond Beginner 1y ago
Holiday Hack Challenge   Ed Skoudis Interview
🔐 Cybersecurity
Holiday Hack Challenge Ed Skoudis Interview
John Hammond Beginner 1y ago
Exploring the Wiz Cloud Security Platform
🔐 Cybersecurity
Exploring the Wiz Cloud Security Platform
John Hammond Beginner 1y ago
Windows Servers Can Expose PowerShell on the Web
🔐 Cybersecurity
Windows Servers Can Expose PowerShell on the Web
John Hammond Beginner 1y ago
Hackers Abuse MeshCentral for a RAT
🔐 Cybersecurity
Hackers Abuse MeshCentral for a RAT
John Hammond Beginner 1y ago
Bruteforcing Windows Defender Exclusions
🔐 Cybersecurity
Bruteforcing Windows Defender Exclusions
John Hammond Advanced 1y ago
REAL Ransomware Chat Logs
🔐 Cybersecurity
REAL Ransomware Chat Logs
John Hammond Beginner 1y ago
Github Intentionally Lets You Read Deleted & Private Commits
🔐 Cybersecurity
Github Intentionally Lets You Read Deleted & Private Commits
John Hammond Beginner 1y ago
Three Ways to Hack Mobile Apps
🔐 Cybersecurity
Three Ways to Hack Mobile Apps
John Hammond Beginner 1y ago
They Say This Malware is INSANE
🔐 Cybersecurity
They Say This Malware is INSANE
John Hammond Beginner 1y ago
Hacking from Cloud to Endpoint (and vice versa)
🔐 Cybersecurity
Hacking from Cloud to Endpoint (and vice versa)
John Hammond Beginner 1y ago
Where Does Malware Go On Your Computer?
🔐 Cybersecurity
Where Does Malware Go On Your Computer?
John Hammond Beginner 1y ago
Hacking ALL Levels in this Game!
🔐 Cybersecurity
Hacking ALL Levels in this Game!
John Hammond Beginner 1y ago
Cracking Active Directory Passwords & MFA Fatigue
🔐 Cybersecurity
Cracking Active Directory Passwords & MFA Fatigue
John Hammond Beginner 1y ago
How to Scrape Telegram with Python
🔐 Cybersecurity
How to Scrape Telegram with Python
John Hammond Beginner 1y ago
Fake CAPTCHA Runs Malware
🔐 Cybersecurity
Fake CAPTCHA Runs Malware
John Hammond Beginner 1y ago
Ransomware In Action: MedusaLocker ReadText34
🔐 Cybersecurity
Ransomware In Action: MedusaLocker ReadText34
John Hammond Advanced 1y ago
Chinese Hackers use Visual Studio Code to Target Asian Governments
📰 AI News & Updates
Chinese Hackers use Visual Studio Code to Target Asian Governments
John Hammond Beginner 1y ago
The Hacker with Hardware Implants (interview)
🔐 Cybersecurity
The Hacker with Hardware Implants (interview)
John Hammond Beginner 1y ago
Hacking Games with MelonLoader
🔐 Cybersecurity
Hacking Games with MelonLoader
John Hammond Beginner 1y ago
I Can't Scan This Website
🔐 Cybersecurity
I Can't Scan This Website
John Hammond Beginner 1y ago
Unity Game Hacking with dnSpy
🔐 Cybersecurity
Unity Game Hacking with dnSpy
John Hammond Beginner 1y ago
Self-Extracting Executables for Hackers
📰 AI News & Updates
Self-Extracting Executables for Hackers
John Hammond Beginner 1y ago
Interactive SQL Injection
🔐 Cybersecurity
Interactive SQL Injection
John Hammond Beginner 1y ago
The Moment They Got Hacked
🔐 Cybersecurity
The Moment They Got Hacked
John Hammond Beginner 1y ago
Intro to Game Hacking: DEFCON 32
🔐 Cybersecurity
Intro to Game Hacking: DEFCON 32
John Hammond Beginner 1y ago
Caesar Ciphers
🛡️ AI Safety & Ethics
Caesar Ciphers
John Hammond Intermediate 1y ago
Scan QR Codes on Linux
🛡️ AI Safety & Ethics
Scan QR Codes on Linux
John Hammond Intermediate 1y ago
The Mark Of The Web
📰 AI News & Updates
The Mark Of The Web
John Hammond Beginner 1y ago
QR Codes on Linux
🛡️ AI Safety & Ethics
QR Codes on Linux
John Hammond Intermediate 1y ago
Decode Hex on Linux
🛡️ AI Safety & Ethics
Decode Hex on Linux
John Hammond Intermediate 1y ago
Recover Quarantined Malware
📰 AI News & Updates
Recover Quarantined Malware
John Hammond Beginner 1y ago
The Phishing Website that Hacked Linus Tech Tips
🔐 Cybersecurity
The Phishing Website that Hacked Linus Tech Tips
John Hammond Beginner 1y ago
Update on LinusTechTips Account Takeover
📰 AI News & Updates
Update on LinusTechTips Account Takeover
John Hammond Beginner 1y ago
LinusTechTips Twitter Account Hacked (and how to secure yourself)
📰 AI News & Updates
LinusTechTips Twitter Account Hacked (and how to secure yourself)
John Hammond Beginner 1y ago
He Passed CISSP At Age 23
🔐 Cybersecurity
He Passed CISSP At Age 23
John Hammond Beginner 1y ago
What Their Computer Looked Like Right As They Got Hacked
🔐 Cybersecurity
What Their Computer Looked Like Right As They Got Hacked
John Hammond Beginner 1y ago
WhatsApp Messenger Runs Arbitrary Python Code
📰 AI News & Updates
WhatsApp Messenger Runs Arbitrary Python Code
John Hammond Beginner 1y ago
Hacking a Docker Container Registry
🔐 Cybersecurity
Hacking a Docker Container Registry
John Hammond Beginner 1y ago
Permission to Hack You: Illicit Consent Grant Attack
🔐 Cybersecurity
Permission to Hack You: Illicit Consent Grant Attack
John Hammond Beginner 1y ago
Who Hacked Who? PsExec Forensic Artifacts
📰 AI News & Updates
Who Hacked Who? PsExec Forensic Artifacts
John Hammond Beginner 1y ago
CrowdStrike Outage Recovery with BitLocker
🛡️ AI Safety & Ethics
CrowdStrike Outage Recovery with BitLocker
John Hammond Intermediate 1y ago
CrowdStrike Blew Up The Internet
📰 AI News & Updates
CrowdStrike Blew Up The Internet
John Hammond Beginner 1y ago
He Sent Me Minecraft Malware (Java Deobfuscation)
📰 AI News & Updates
He Sent Me Minecraft Malware (Java Deobfuscation)
John Hammond Beginner 1y ago
Hacking Windows TrustedInstaller (GOD MODE)
🔐 Cybersecurity
Hacking Windows TrustedInstaller (GOD MODE)
John Hammond Beginner 1y ago
Speed Up Pentest Report Writing
🔐 Cybersecurity
Speed Up Pentest Report Writing
John Hammond Beginner 1y ago