✕ Clear filters
1,407 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 198,243📚 Coursera 18,118🎤 TED 1
Python Pwntools Hacking: ret2libc GOT & PLT
🔐 Cybersecurity
Python Pwntools Hacking: ret2libc GOT & PLT
John Hammond Intermediate 2y ago
Cybersecurity Labs (FOR FREE) - Linux Backdoor Analysis
🔐 Cybersecurity
Cybersecurity Labs (FOR FREE) - Linux Backdoor Analysis
John Hammond Beginner 2y ago
How FAST Can You Write a Pentest Report?
🔐 Cybersecurity
How FAST Can You Write a Pentest Report?
John Hammond Beginner 2y ago
Password Hacking in Kali Linux
🔐 Cybersecurity
Password Hacking in Kali Linux
John Hammond Intermediate 2y ago
Hackers Bypass Google Two-Factor Authentication (2FA) SMS
🔐 Cybersecurity
Hackers Bypass Google Two-Factor Authentication (2FA) SMS
John Hammond Intermediate 3y ago
CI/CD GOAT: Mad Hatter Capture The Flag
🔐 Cybersecurity
CI/CD GOAT: Mad Hatter Capture The Flag
John Hammond Beginner 3y ago
Free Hacking APIs Course (APISEC University!)
🔐 Cybersecurity
Free Hacking APIs Course (APISEC University!)
John Hammond Beginner 3y ago
Hacking CI/CD (Basic Pipeline Poisoning)
🔐 Cybersecurity
Hacking CI/CD (Basic Pipeline Poisoning)
John Hammond Intermediate 3y ago
Unraveling Discord Token Stealer (python MALWARE)
🔐 Cybersecurity
Unraveling Discord Token Stealer (python MALWARE)
John Hammond Beginner 3y ago
Is This Website LEAKING?
🔐 Cybersecurity
Is This Website LEAKING?
John Hammond Beginner 3y ago
Strange File in Downloads Folder? Gootloader Malware Analysis
🔐 Cybersecurity
Strange File in Downloads Folder? Gootloader Malware Analysis
John Hammond Beginner 3y ago
Carving Exfiltrated Network Data from a Hack (Python & Scapy)
🔐 Cybersecurity
Carving Exfiltrated Network Data from a Hack (Python & Scapy)
John Hammond Beginner 3y ago
I Tried The HackTheBox Certified Pentester Exam
🔐 Cybersecurity
I Tried The HackTheBox Certified Pentester Exam
John Hammond Advanced 3y ago
Evading Filters to Dump Databases (like a hacker)
🔐 Cybersecurity
Evading Filters to Dump Databases (like a hacker)
John Hammond Advanced 3y ago
How Hackers Can Bypass Your Security Defenses
🔐 Cybersecurity
How Hackers Can Bypass Your Security Defenses
John Hammond Intermediate 3y ago
How To Bypass Website File Upload Restrictions
🔐 Cybersecurity
How To Bypass Website File Upload Restrictions
John Hammond Beginner 3y ago
Certified Penetration Testing Specialist! Chat with HackTheBox
🔐 Cybersecurity
Certified Penetration Testing Specialist! Chat with HackTheBox
John Hammond Beginner 3y ago
Filter Evasion in a REVERSE SHELL (no spaces!!)
🔐 Cybersecurity
Filter Evasion in a REVERSE SHELL (no spaces!!)
John Hammond Beginner 3y ago
ROP is DEAD! Kernel Driver Binary Exploitation
🔐 Cybersecurity
ROP is DEAD! Kernel Driver Binary Exploitation
John Hammond Beginner 3y ago
Start Hacking with the HEARTBLEED vulnerability: NahamCon CTF
🔐 Cybersecurity
Start Hacking with the HEARTBLEED vulnerability: NahamCon CTF
John Hammond Beginner 3y ago
Capture The Flag!  NahamCon EU CTF "MMORPG"
🔐 Cybersecurity
Capture The Flag! NahamCon EU CTF "MMORPG"
John Hammond Beginner 3y ago
Hardware Hacking! Day 19 - TryHackMe Advent of Cyber
🔐 Cybersecurity
Hardware Hacking! Day 19 - TryHackMe Advent of Cyber
John Hammond Beginner 3y ago
How To Manage Your Business Technology
🔐 Cybersecurity
How To Manage Your Business Technology
John Hammond Beginner 3y ago
Is this a SECURE laptop?
🔐 Cybersecurity
Is this a SECURE laptop?
John Hammond Beginner 3y ago
Unraveling the IcedID Malware Stager & Phishing Email
🔐 Cybersecurity
Unraveling the IcedID Malware Stager & Phishing Email
John Hammond Beginner 3y ago
Become a Certified Penetration Tester with HackTheBox CPTS!
🔐 Cybersecurity
Become a Certified Penetration Tester with HackTheBox CPTS!
John Hammond Beginner 3y ago
Setup EXTREME VULNERABLE Kernel Driver (HEVD)
🔐 Cybersecurity
Setup EXTREME VULNERABLE Kernel Driver (HEVD)
John Hammond Beginner 3y ago
Linux Portbending Explained
🔐 Cybersecurity
Linux Portbending Explained
John Hammond Beginner 3y ago
run SHELLCODE within BASH!?!
🔐 Cybersecurity
run SHELLCODE within BASH!?!
John Hammond Beginner 3y ago
Start KERNEL HACKING with VirtualKD!
🔐 Cybersecurity
Start KERNEL HACKING with VirtualKD!
John Hammond Beginner 3y ago
explore a Wordpress PHP BACKDOOR webshell
🔐 Cybersecurity
explore a Wordpress PHP BACKDOOR webshell
John Hammond Beginner 3y ago
TryHackMe! Advent of Cyber 2022 Kick-Off
🔐 Cybersecurity
TryHackMe! Advent of Cyber 2022 Kick-Off
John Hammond Beginner 3y ago
catch EVERY reverse shell while hacking! (VILLAIN)
🔐 Cybersecurity
catch EVERY reverse shell while hacking! (VILLAIN)
John Hammond Beginner 3y ago
Your choices matter… Responsible Red Teaming w/ HuskyHacks
🔐 Cybersecurity
Your choices matter… Responsible Red Teaming w/ HuskyHacks
John Hammond Beginner 3y ago
you should be using PODMAN
🔐 Cybersecurity
you should be using PODMAN
John Hammond Beginner 3y ago
CUSTOM Java Deserialization Exploit - Serial Snyker
🔐 Cybersecurity
CUSTOM Java Deserialization Exploit - Serial Snyker
John Hammond Beginner 3y ago
Cybercrime & Dark Web Conversations (w/ Shmuel!)
🔐 Cybersecurity
Cybercrime & Dark Web Conversations (w/ Shmuel!)
John Hammond Beginner 3y ago
Node.js "Pug" Server-Side Template Injection
🔐 Cybersecurity
Node.js "Pug" Server-Side Template Injection
John Hammond Beginner 3y ago
The King Of Malware is Back
🔐 Cybersecurity
The King Of Malware is Back
John Hammond Beginner 3y ago
Backup Server Hacked - SUPPLY CHAIN Code Execution
🔐 Cybersecurity
Backup Server Hacked - SUPPLY CHAIN Code Execution
John Hammond Beginner 3y ago
I store ALL my Passwords in AWS
🔐 Cybersecurity
I store ALL my Passwords in AWS
John Hammond Beginner 3y ago
NEW Python 3.11 !!!
🔐 Cybersecurity
NEW Python 3.11 !!!
John Hammond Beginner 3y ago
zip files & hack... (CVE-2022-1271 zgrep/gzip)
🔐 Cybersecurity
zip files & hack... (CVE-2022-1271 zgrep/gzip)
John Hammond Beginner 3y ago
How Hackers Hide
🔐 Cybersecurity
How Hackers Hide
John Hammond Beginner 3y ago
PASSWORDS LEFT OUT IN THE OPEN (Active Directory #10)
🔐 Cybersecurity
PASSWORDS LEFT OUT IN THE OPEN (Active Directory #10)
John Hammond Beginner 3y ago
VULNERABLE File Uploads (Python Django)
🔐 Cybersecurity
VULNERABLE File Uploads (Python Django)
John Hammond Beginner 3y ago
ACCESS what you WERE NEVER SUPPOSED TO
🔐 Cybersecurity
ACCESS what you WERE NEVER SUPPOSED TO
John Hammond Beginner 3y ago
Reverse Shell UNDETECTED by Microsoft Defender (hoaxshell)
🔐 Cybersecurity
Reverse Shell UNDETECTED by Microsoft Defender (hoaxshell)
John Hammond Beginner 3y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Cybersecurity and the X-Factor
📚 Coursera Course ↗
Self-paced
Cybersecurity and the X-Factor
Opens on Coursera ↗
Segurança de TI: defesa contra as artes negras digitais
📚 Coursera Course ↗
Self-paced
Segurança de TI: defesa contra as artes negras digitais
Opens on Coursera ↗
Introduction to the Threat Intelligence Lifecycle
📚 Coursera Course ↗
Self-paced
Introduction to the Threat Intelligence Lifecycle
Opens on Coursera ↗
Hacking Exercise For Health. The surprising new science of fitness.
📚 Coursera Course ↗
Self-paced
Hacking Exercise For Health. The surprising new science of fitness.
Opens on Coursera ↗
Social Engineering Expert
📚 Coursera Course ↗
Self-paced
Social Engineering Expert
Opens on Coursera ↗
Microsoft Copilot for Security
📚 Coursera Course ↗
Self-paced
Microsoft Copilot for Security
Opens on Coursera ↗