Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

2563
lessons
picoCTF 2018 [06] grep2, Aca-Shell-A, Client Side is Still Bad
Cybersecurity
picoCTF 2018 [06] grep2, Aca-Shell-A, Client Side is Still Bad
John Hammond Intermediate 7y ago
picoCTF 2018 [05] strings, pipe & Inspect Me
Cybersecurity
picoCTF 2018 [05] strings, pipe & Inspect Me
John Hammond Intermediate 7y ago
HackTheBox - Olympus
Cybersecurity
HackTheBox - Olympus
IppSec Intermediate 7y ago
The Last Flag (Overachiever) - Pwn Adventure 3
Cybersecurity
The Last Flag (Overachiever) - Pwn Adventure 3
LiveOverflow Intermediate 7y ago
Wakanda 1 CTF Walkthrough - Boot-To-Root
Cybersecurity
Wakanda 1 CTF Walkthrough - Boot-To-Root
HackerSploit Intermediate 7y ago
RSA Implemented in JavaScript (Keygen part 5) - Pwn Adventure 3
Cybersecurity
RSA Implemented in JavaScript (Keygen part 5) - Pwn Adventure 3
LiveOverflow Intermediate 7y ago
picoCTF 2018 [04] Here's Johnny!
Cybersecurity
picoCTF 2018 [04] Here's Johnny!
John Hammond Intermediate 7y ago
picoCTF 2018 [03]  Cryptography Warmups, grep & netcat
Cybersecurity
picoCTF 2018 [03] Cryptography Warmups, grep & netcat
John Hammond Intermediate 7y ago
picoCTF 2018 [02] Resources & Reversing Warmups
Cybersecurity
picoCTF 2018 [02] Resources & Reversing Warmups
John Hammond Intermediate 7y ago
picoCTF 2018 [01] General & Forensics Warmups
Cybersecurity
picoCTF 2018 [01] General & Forensics Warmups
John Hammond Intermediate 7y ago
GETS Buffer Overflow | PicoCTF 2017 [41] "VR Gear Console"
Cybersecurity
GETS Buffer Overflow | PicoCTF 2017 [41] "VR Gear Console"
John Hammond Intermediate 7y ago
BASH Command Injection | PicoCTF 2017 [40] "Flagsay_1"
Cybersecurity
BASH Command Injection | PicoCTF 2017 [40] "Flagsay_1"
John Hammond Intermediate 7y ago
Solving Equations with Sympy | CSAW CTF "Algebra"
Cybersecurity
Solving Equations with Sympy | CSAW CTF "Algebra"
John Hammond Intermediate 7y ago
Single-Byte XOR | CSAW CTF "babycrypto"
Cybersecurity
Single-Byte XOR | CSAW CTF "babycrypto"
John Hammond Intermediate 7y ago
LDAP Injection | CSAW CTF "ldab"
Cybersecurity
LDAP Injection | CSAW CTF "ldab"
John Hammond Intermediate 7y ago
x86 Assembly | CSAW CTF "A Tour of x86"
Cybersecurity
x86 Assembly | CSAW CTF "A Tour of x86"
John Hammond Intermediate 7y ago
PWN Overflow | CSAW CTF "BigBoy"
Cybersecurity
PWN Overflow | CSAW CTF "BigBoy"
John Hammond Intermediate 7y ago
Obscure Vignere Cipher | IceCTF "Garfield"
Cybersecurity
Obscure Vignere Cipher | IceCTF "Garfield"
John Hammond Intermediate 7y ago
Embedded favicon.gif | IceCTF "ilovebees"
Cybersecurity
Embedded favicon.gif | IceCTF "ilovebees"
John Hammond Intermediate 7y ago
WTF is Base65536!? | IceCTF [07] "Rabbit Hole"
Cybersecurity
WTF is Base65536!? | IceCTF [07] "Rabbit Hole"
John Hammond Intermediate 7y ago
ZIP Password Cracking | IceCTF [06] "Hardshells"
Cybersecurity
ZIP Password Cracking | IceCTF [06] "Hardshells"
John Hammond Intermediate 7y ago
GIF Split & Stack | IceCTF [05] "Modern Picasso"
Cybersecurity
GIF Split & Stack | IceCTF [05] "Modern Picasso"
John Hammond Intermediate 7y ago
QR Code Steganography | IceCTF [04] "Drumbone"
Cybersecurity
QR Code Steganography | IceCTF [04] "Drumbone"
John Hammond Intermediate 7y ago
Accidental Laravel Debug Mode | IceCTF [03] "Third Web"
Cybersecurity
Accidental Laravel Debug Mode | IceCTF [03] "Third Web"
John Hammond Intermediate 7y ago
Hiding Content with CSS | IceCTF [02] "Lights Out!"
Cybersecurity
Hiding Content with CSS | IceCTF [02] "Lights Out!"
John Hammond Intermediate 7y ago
JPG Steganography | CodefestCTF 2018 "Hidden Agenda"
Cybersecurity
JPG Steganography | CodefestCTF 2018 "Hidden Agenda"
John Hammond Intermediate 7y ago
Whitespace Stego | CodefestCTF 2018: "Polyglot"
Cybersecurity
Whitespace Stego | CodefestCTF 2018: "Polyglot"
John Hammond Intermediate 7y ago
PCAP File Carving | CodefestCTF 2018: "Thunder"
Cybersecurity
PCAP File Carving | CodefestCTF 2018: "Thunder"
John Hammond Intermediate 7y ago
ECB Encryption / Python Web Hacking | Natas: OverTheWire (Level 28)
Cybersecurity
ECB Encryption / Python Web Hacking | Natas: OverTheWire (Level 28)
John Hammond Intermediate 7y ago
Nonce Signing | CodefestCTF 2018: "Ghost Protocol"
Cybersecurity
Nonce Signing | CodefestCTF 2018: "Ghost Protocol"
John Hammond Intermediate 7y ago
PRNG & Modulus | CodefestCTF 2018: "Access Denied"
Cybersecurity
PRNG & Modulus | CodefestCTF 2018: "Access Denied"
John Hammond Intermediate 7y ago
Web Scraping | CodefestCTF 2018: "Web Book"
Cybersecurity
Web Scraping | CodefestCTF 2018: "Web Book"
John Hammond Intermediate 7y ago
EditThisCookie | CodefestCTF 2018: "Fortune Cookie"
Cybersecurity
EditThisCookie | CodefestCTF 2018: "Fortune Cookie"
John Hammond Intermediate 7y ago
Pwntools | CodefestCTF 2018: "Freebies" & "Typing Master"
Cybersecurity
Pwntools | CodefestCTF 2018: "Freebies" & "Typing Master"
John Hammond Intermediate 7y ago
RSA Implemented in Assembler (Keygen part 4) - Pwn Adventure 3
Cybersecurity
RSA Implemented in Assembler (Keygen part 4) - Pwn Adventure 3
LiveOverflow Intermediate 7y ago
Two's Complement | PicoCTF 2017 [38] Guess The Number
Cybersecurity
Two's Complement | PicoCTF 2017 [38] Guess The Number
John Hammond Intermediate 7y ago
Injecting Shellcode | PicoCTF [37] Shellz
Cybersecurity
Injecting Shellcode | PicoCTF [37] Shellz
John Hammond Intermediate 7y ago
Crafting Shellcode | PicoCTF [36] Shells
Cybersecurity
Crafting Shellcode | PicoCTF [36] Shells
John Hammond Intermediate 7y ago
Basic SQL Injection | PicoCTF 2017 [35] My First SQL
Cybersecurity
Basic SQL Injection | PicoCTF 2017 [35] My First SQL
John Hammond Intermediate 7y ago
Reverse Engineering Assembly | PicoCTF 2017 [34] Programmer's Assemble
Cybersecurity
Reverse Engineering Assembly | PicoCTF 2017 [34] Programmer's Assemble
John Hammond Intermediate 7y ago
ERROR-Based BLIND SQL Injection | "TRY HARDER" (HackconCTF 2018)
Cybersecurity
ERROR-Based BLIND SQL Injection | "TRY HARDER" (HackconCTF 2018)
John Hammond Intermediate 7y ago
Understanding the Key Verification Algorithm (Keygen part 3) - Pwn Adventure 3
Cybersecurity
Understanding the Key Verification Algorithm (Keygen part 3) - Pwn Adventure 3
LiveOverflow Intermediate 7y ago
Number Bases | "Diversity" (HackconCTF 2018)
Cybersecurity
Number Bases | "Diversity" (HackconCTF 2018)
John Hammond Intermediate 7y ago
QR Code Stegangography | "Steg it Up" (HackconCTF 2018)
Cybersecurity
QR Code Stegangography | "Steg it Up" (HackconCTF 2018)
John Hammond Intermediate 7y ago
Text Steganography | "Twins" (HackconCTF 2018)
Cybersecurity
Text Steganography | "Twins" (HackconCTF 2018)
John Hammond Intermediate 7y ago
Ethereum Blockchain | "EtherHide" (Hackcon2018 CTF)
Cybersecurity
Ethereum Blockchain | "EtherHide" (Hackcon2018 CTF)
John Hammond Intermediate 7y ago
Stupid Superman Recon | "Ethical Hacker" (HackconCTF 2018)
Cybersecurity
Stupid Superman Recon | "Ethical Hacker" (HackconCTF 2018)
John Hammond Intermediate 7y ago
Telegram Support | "Join Us" (HackconCTF 2018)
Cybersecurity
Telegram Support | "Join Us" (HackconCTF 2018)
John Hammond Intermediate 7y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Leaders Leap: Transformational Leadership Mindset
📚 Coursera Course ↗
Self-paced
Leaders Leap: Transformational Leadership Mindset
Opens on Coursera ↗
Security and Auditing in Ethereum
📚 Coursera Course ↗
Self-paced
Security and Auditing in Ethereum
Opens on Coursera ↗
Cybersecurity: Overlooked Threats to Your Strategy
📚 Coursera Course ↗
Self-paced
Cybersecurity: Overlooked Threats to Your Strategy
Opens on Coursera ↗
NIST 800-171
📚 Coursera Course ↗
Self-paced
NIST 800-171
Opens on Coursera ↗
Microsoft Azure Management Tools and Security Solutions
📚 Coursera Course ↗
Self-paced
Microsoft Azure Management Tools and Security Solutions
Opens on Coursera ↗
Cisco Collaboration Edge Services
📚 Coursera Course ↗
Self-paced
Cisco Collaboration Edge Services
Opens on Coursera ↗