✕ Clear filters
1,054 lessons

Browse Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 184,764📚 Coursera 16,380
How Hackers Can Bypass Your Security Defenses
Cybersecurity
How Hackers Can Bypass Your Security Defenses
John Hammond Intermediate 3y ago
I Saw 8 MILLION Phishing Scams
AI Safety & Ethics
I Saw 8 MILLION Phishing Scams
John Hammond Intermediate 3y ago
Internet Explorer Forced to Run Malware
AI Safety & Ethics
Internet Explorer Forced to Run Malware
John Hammond Beginner 3y ago
Fake OBS Studio Hack Targeting YouTubers
AI Safety & Ethics
Fake OBS Studio Hack Targeting YouTubers
John Hammond Beginner 3y ago
3 Things You Didn't Know about Windows Command Prompt
AI Safety & Ethics
3 Things You Didn't Know about Windows Command Prompt
John Hammond Beginner 3y ago
How to Proxy Command Execution: "Living Off The Land" Hacks
Data Analytics & Business Intelligence
How to Proxy Command Execution: "Living Off The Land" Hacks
John Hammond Intermediate 3y ago
How To Bypass Website File Upload Restrictions
Cybersecurity
How To Bypass Website File Upload Restrictions
John Hammond Beginner 3y ago
Certified Penetration Testing Specialist! Chat with HackTheBox
Cybersecurity
Certified Penetration Testing Specialist! Chat with HackTheBox
John Hammond Beginner 3y ago
Filter Evasion in a REVERSE SHELL (no spaces!!)
Cybersecurity
Filter Evasion in a REVERSE SHELL (no spaces!!)
John Hammond Beginner 3y ago
ROP is DEAD! Kernel Driver Binary Exploitation
Cybersecurity
ROP is DEAD! Kernel Driver Binary Exploitation
John Hammond Beginner 3y ago
Start Hacking with the HEARTBLEED vulnerability: NahamCon CTF
Cybersecurity
Start Hacking with the HEARTBLEED vulnerability: NahamCon CTF
John Hammond Beginner 3y ago
Capture The Flag!  NahamCon EU CTF "MMORPG"
Cybersecurity
Capture The Flag! NahamCon EU CTF "MMORPG"
John Hammond Beginner 3y ago
Hardware Hacking! Day 19 - TryHackMe Advent of Cyber
Cybersecurity
Hardware Hacking! Day 19 - TryHackMe Advent of Cyber
John Hammond Beginner 3y ago
How To Manage Your Business Technology
Cybersecurity
How To Manage Your Business Technology
John Hammond Beginner 3y ago
Is this a SECURE laptop?
Cybersecurity
Is this a SECURE laptop?
John Hammond Beginner 3y ago
Unraveling the IcedID Malware Stager & Phishing Email
Cybersecurity
Unraveling the IcedID Malware Stager & Phishing Email
John Hammond Beginner 3y ago
Become a Certified Penetration Tester with HackTheBox CPTS!
Cybersecurity
Become a Certified Penetration Tester with HackTheBox CPTS!
John Hammond Beginner 3y ago
Setup EXTREME VULNERABLE Kernel Driver (HEVD)
Cybersecurity
Setup EXTREME VULNERABLE Kernel Driver (HEVD)
John Hammond Beginner 3y ago
Linux Portbending Explained
Cybersecurity
Linux Portbending Explained
John Hammond Beginner 3y ago
run SHELLCODE within BASH!?!
Cybersecurity
run SHELLCODE within BASH!?!
John Hammond Beginner 3y ago
Start KERNEL HACKING with VirtualKD!
Cybersecurity
Start KERNEL HACKING with VirtualKD!
John Hammond Beginner 3y ago
explore a Wordpress PHP BACKDOOR webshell
Cybersecurity
explore a Wordpress PHP BACKDOOR webshell
John Hammond Beginner 3y ago
TryHackMe! Advent of Cyber 2022 Kick-Off
Cybersecurity
TryHackMe! Advent of Cyber 2022 Kick-Off
John Hammond Beginner 3y ago
catch EVERY reverse shell while hacking! (VILLAIN)
Cybersecurity
catch EVERY reverse shell while hacking! (VILLAIN)
John Hammond Beginner 3y ago
Your choices matter… Responsible Red Teaming w/ HuskyHacks
Cybersecurity
Your choices matter… Responsible Red Teaming w/ HuskyHacks
John Hammond Beginner 3y ago
you should be using PODMAN
Cybersecurity
you should be using PODMAN
John Hammond Beginner 3y ago
CUSTOM Java Deserialization Exploit - Serial Snyker
Cybersecurity
CUSTOM Java Deserialization Exploit - Serial Snyker
John Hammond Beginner 3y ago
Cybercrime & Dark Web Conversations (w/ Shmuel!)
Cybersecurity
Cybercrime & Dark Web Conversations (w/ Shmuel!)
John Hammond Beginner 3y ago
Node.js "Pug" Server-Side Template Injection
Cybersecurity
Node.js "Pug" Server-Side Template Injection
John Hammond Beginner 3y ago
The King Of Malware is Back
Cybersecurity
The King Of Malware is Back
John Hammond Beginner 3y ago
Backup Server Hacked - SUPPLY CHAIN Code Execution
Cybersecurity
Backup Server Hacked - SUPPLY CHAIN Code Execution
John Hammond Beginner 3y ago
I store ALL my Passwords in AWS
Cybersecurity
I store ALL my Passwords in AWS
John Hammond Beginner 3y ago
NEW Python 3.11 !!!
Cybersecurity
NEW Python 3.11 !!!
John Hammond Beginner 3y ago
zip files & hack... (CVE-2022-1271 zgrep/gzip)
Cybersecurity
zip files & hack... (CVE-2022-1271 zgrep/gzip)
John Hammond Beginner 3y ago
How Hackers Hide
Cybersecurity
How Hackers Hide
John Hammond Beginner 3y ago
PASSWORDS LEFT OUT IN THE OPEN (Active Directory #10)
Cybersecurity
PASSWORDS LEFT OUT IN THE OPEN (Active Directory #10)
John Hammond Beginner 3y ago
VULNERABLE File Uploads (Python Django)
Cybersecurity
VULNERABLE File Uploads (Python Django)
John Hammond Beginner 3y ago
ACCESS what you WERE NEVER SUPPOSED TO
Cybersecurity
ACCESS what you WERE NEVER SUPPOSED TO
John Hammond Beginner 3y ago
Reverse Shell UNDETECTED by Microsoft Defender (hoaxshell)
Cybersecurity
Reverse Shell UNDETECTED by Microsoft Defender (hoaxshell)
John Hammond Beginner 3y ago
BEGINNER Golang CSV Quiz Game - Gophercises
Cybersecurity
BEGINNER Golang CSV Quiz Game - Gophercises
John Hammond Beginner 3y ago
a CYBERCRIME UNIVERSITY!?!? ("FREE" hacking courses - Dark Web Documentary #12)
Cybersecurity
a CYBERCRIME UNIVERSITY!?!? ("FREE" hacking courses - Dark Web Documentary #12)
John Hammond Beginner 3y ago
Unraveling a REMOTE ACCESS TROJAN (VBScript Deobfuscation)
Cybersecurity
Unraveling a REMOTE ACCESS TROJAN (VBScript Deobfuscation)
John Hammond Beginner 3y ago
HAVOC C2 - Demon Bypasses Windows 11 Defender
Cybersecurity
HAVOC C2 - Demon Bypasses Windows 11 Defender
John Hammond Beginner 3y ago
IT WAS A SCAM
Cybersecurity
IT WAS A SCAM
John Hammond Beginner 3y ago
PowerShell - Observing Inline C# Compilation with Add-Type
Cybersecurity
PowerShell - Observing Inline C# Compilation with Add-Type
John Hammond Beginner 3y ago
an INSIDE LOOK at Penetration Testing Collaborative Platform (Plextrac)
Cybersecurity
an INSIDE LOOK at Penetration Testing Collaborative Platform (Plextrac)
John Hammond Beginner 3y ago
INSTANT File Downloads with JavaScript
Cybersecurity
INSTANT File Downloads with JavaScript
John Hammond Beginner 3y ago
Starting Cybersecurity Careers (with JRHacka)
Cybersecurity
Starting Cybersecurity Careers (with JRHacka)
John Hammond Beginner 3y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Korean 101: Essential Expressions
📚 Coursera Course ↗
Self-paced
Korean 101: Essential Expressions
Opens on Coursera ↗
Introduction to Hardware and Operating Systems
📚 Coursera Course ↗
Self-paced
Introduction to Hardware and Operating Systems
Opens on Coursera ↗
Adobe Dreamweaver CC (2017): Part 1
📚 Coursera Course ↗
Self-paced
Adobe Dreamweaver CC (2017): Part 1
Opens on Coursera ↗
Reclaiming the Street for Livable Urban Spaces
📚 Coursera Course ↗
Self-paced
Reclaiming the Street for Livable Urban Spaces
Opens on Coursera ↗
Build Your First Game in Unity
📚 Coursera Course ↗
Self-paced
Build Your First Game in Unity
Opens on Coursera ↗
Generative AI Database Design & Management with ChatGPT
📚 Coursera Course ↗
Self-paced
Generative AI Database Design & Management with ChatGPT
Opens on Coursera ↗