✕ Clear filters
1,054 lessons

Browse Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 184,615📚 Coursera 16,270
TryHackMe! Advent of Cyber 3 - HTTP Cookies & Authentication Bypasses - "Day 2"
AI Safety & Ethics
TryHackMe! Advent of Cyber 3 - HTTP Cookies & Authentication Bypasses - "Day 2"
John Hammond Intermediate 4y ago
ZipSlip w/ TAR & Server-Side Template Injection - HackTheBox University CTF - "Slippy"
Cybersecurity
ZipSlip w/ TAR & Server-Side Template Injection - HackTheBox University CTF - "Slippy"
John Hammond Beginner 4y ago
2022 OSCP EXAM CHANGES - Goodbye Buffer Overflow, Hello Active Directory
AI News & Updates
2022 OSCP EXAM CHANGES - Goodbye Buffer Overflow, Hello Active Directory
John Hammond Advanced 4y ago
TryHackMe! Advent of Cyber - 2021 KICKOFF: 25 Days of Learning CYBERSECURITY
Cybersecurity
TryHackMe! Advent of Cyber - 2021 KICKOFF: 25 Days of Learning CYBERSECURITY
John Hammond Beginner 4y ago
COBALT STRIKE Forensics: PCAP & Memdump - "Strike Back" HackTheBox University CTF 2021
Cybersecurity
COBALT STRIKE Forensics: PCAP & Memdump - "Strike Back" HackTheBox University CTF 2021
John Hammond Beginner 4y ago
SnykCon CTF - Sauerkraut - Python Pickle Vulnerabilities
Cybersecurity
SnykCon CTF - Sauerkraut - Python Pickle Vulnerabilities
John Hammond Beginner 4y ago
SnykCon CTF - "Random Flag Generator" Weak PRNG Seed
Cybersecurity
SnykCon CTF - "Random Flag Generator" Weak PRNG Seed
John Hammond Intermediate 4y ago
SnykCon CTF - "Invisible Ink" Prototype Pollution
Cybersecurity
SnykCon CTF - "Invisible Ink" Prototype Pollution
John Hammond Intermediate 4y ago
VOD - TryHackMe! Ultratech & Golang
AI Safety & Ethics
VOD - TryHackMe! Ultratech & Golang
John Hammond Intermediate 4y ago
Snip3 Crypter/RAT Loader - DcRat MALWARE ANALYSIS
Cybersecurity
Snip3 Crypter/RAT Loader - DcRat MALWARE ANALYSIS
John Hammond Beginner 4y ago
VOD - Proving Grounds - "FunBoxEasy"
AI Safety & Ethics
VOD - Proving Grounds - "FunBoxEasy"
John Hammond Beginner 4y ago
VOD - TryHackMe! Attacking Kerberos
Cybersecurity
VOD - TryHackMe! Attacking Kerberos
John Hammond Intermediate 4y ago
VOD - TryHackMe! "Intro to Active Directory" Room
AI Safety & Ethics
VOD - TryHackMe! "Intro to Active Directory" Room
John Hammond Beginner 4y ago
VOD - TryHackMe! Buffer Overflow Prep
AI Safety & Ethics
VOD - TryHackMe! Buffer Overflow Prep
John Hammond Intermediate 4y ago
VOD - TryHackMe! Game Zone - Recreating a Metasploit Exploit in Python
Cybersecurity
VOD - TryHackMe! Game Zone - Recreating a Metasploit Exploit in Python
John Hammond Intermediate 4y ago
VOD - TryHackMe! Steel Mountain with Metasploit
Cybersecurity
VOD - TryHackMe! Steel Mountain with Metasploit
John Hammond Intermediate 4y ago
KOVTER Malware Analysis - Fileless Persistence in Registry
Cybersecurity
KOVTER Malware Analysis - Fileless Persistence in Registry
John Hammond Beginner 4y ago
TARGETED Phishing - Fake Outlook Password Harvester
AI Safety & Ethics
TARGETED Phishing - Fake Outlook Password Harvester
John Hammond Intermediate 4y ago
AES-CFB Cryptography Mistakes - HackTheBox Business CTF "Domain Controller"
Cybersecurity
AES-CFB Cryptography Mistakes - HackTheBox Business CTF "Domain Controller"
John Hammond Beginner 4y ago
cmatrix memes
AI Safety & Ethics
cmatrix memes
John Hammond Intermediate 4y ago
Malware Marketplaces - 05 Dark Web Documentary
AI Safety & Ethics
Malware Marketplaces - 05 Dark Web Documentary
John Hammond Intermediate 4y ago
XLM Macros & Unhiding Excel Worksheets - HackTheBox Biz CTF "OldSchool"
Cybersecurity
XLM Macros & Unhiding Excel Worksheets - HackTheBox Biz CTF "OldSchool"
John Hammond Intermediate 4y ago
BAD RANSOMWARE - HackTheBox Business CTF
Cybersecurity
BAD RANSOMWARE - HackTheBox Business CTF
John Hammond Intermediate 4y ago
Reverse Engineering Loops - "Syncopation" HackTheBox Business CTF
Cybersecurity
Reverse Engineering Loops - "Syncopation" HackTheBox Business CTF
John Hammond Intermediate 4y ago
Laravel CVE / PHP Deserialization - "Larablog" HTB Business CTF
Cybersecurity
Laravel CVE / PHP Deserialization - "Larablog" HTB Business CTF
John Hammond Intermediate 4y ago
JSON Web Keys (JWK & JWT) - "Emergency" - HackTheBox Business CTF
Cybersecurity
JSON Web Keys (JWK & JWT) - "Emergency" - HackTheBox Business CTF
John Hammond Intermediate 4y ago
GraphQL Introspection - HackTheBox "Business CTF" - NoteQL
Cybersecurity
GraphQL Introspection - HackTheBox "Business CTF" - NoteQL
John Hammond Beginner 4y ago
HackTheBox "Business CTF" - Time - Command Injection
Cybersecurity
HackTheBox "Business CTF" - Time - Command Injection
John Hammond Intermediate 4y ago
HackTheBox "Business CTF" - discordvm - Node.js Sandbox Escape
Cybersecurity
HackTheBox "Business CTF" - discordvm - Node.js Sandbox Escape
John Hammond Intermediate 4y ago
Discussion: Technical Assessment of AV/EDR Effectiveness
Research Papers Explained
Discussion: Technical Assessment of AV/EDR Effectiveness
John Hammond Advanced 4y ago
JScript Deobfuscation - More WSHRAT (Malware Analysis)
Cybersecurity
JScript Deobfuscation - More WSHRAT (Malware Analysis)
John Hammond Intermediate 4y ago
"Hacker-For-Hire" Services 04 Dark Web Documentary
Large Language Models
"Hacker-For-Hire" Services 04 Dark Web Documentary
John Hammond Intermediate 4y ago
"Hire a Hacker" ??? 03 Dark Web Documentary
AI Safety & Ethics
"Hire a Hacker" ??? 03 Dark Web Documentary
John Hammond Intermediate 4y ago
Tor Search Engines - 02 Dark Web Documentary
AI Safety & Ethics
Tor Search Engines - 02 Dark Web Documentary
John Hammond Beginner 4y ago
Dark Web Documentary 01 Getting Setup with Tails Linux
AI Safety & Ethics
Dark Web Documentary 01 Getting Setup with Tails Linux
John Hammond Intermediate 4y ago
OSED Review - Offensive Security Exploit Developer
AI Tools & Apps
OSED Review - Offensive Security Exploit Developer
John Hammond Beginner 4y ago
Information Stealer - Malware Analysis (PowerShell to .NET)
Cybersecurity
Information Stealer - Malware Analysis (PowerShell to .NET)
John Hammond Beginner 4y ago
Binary Exploitation Deep Dive: Return to LIBC (with Matt)
AI Safety & Ethics
Binary Exploitation Deep Dive: Return to LIBC (with Matt)
John Hammond Intermediate 4y ago
AES-CTR Cryptography: Reused Key Weakness - HackTheBox Cyber Apocalypse CTF
Cybersecurity
AES-CTR Cryptography: Reused Key Weakness - HackTheBox Cyber Apocalypse CTF
John Hammond Beginner 4y ago
PowerPoint Phishing Malware Analysis - HackTheBox Cyber Apocalypse CTF
Cybersecurity
PowerPoint Phishing Malware Analysis - HackTheBox Cyber Apocalypse CTF
John Hammond Intermediate 4y ago
Phishing Document "Invitation" - HackTheBox Cyber Apocalypse CTF
Cybersecurity
Phishing Document "Invitation" - HackTheBox Cyber Apocalypse CTF
John Hammond Intermediate 4y ago
Nodejs Nunjucks Template Injection - HackTheBox Cyber Apocalypse CTF
Cybersecurity
Nodejs Nunjucks Template Injection - HackTheBox Cyber Apocalypse CTF
John Hammond Intermediate 4y ago
Cloudflare CDN CSP - XSS Bypass / HackTheBox Cyber Apocalypse CTF
Cybersecurity
Cloudflare CDN CSP - XSS Bypass / HackTheBox Cyber Apocalypse CTF
John Hammond Beginner 4y ago
IFrame Parent XSS - HackTheBox Cyber Apocalypse CTF
Cybersecurity
IFrame Parent XSS - HackTheBox Cyber Apocalypse CTF
John Hammond Beginner 4y ago
Blind MongoDB NoSQL Injection - HackTheBox Cyber Apocalypse CTF
Cybersecurity
Blind MongoDB NoSQL Injection - HackTheBox Cyber Apocalypse CTF
John Hammond Intermediate 4y ago
HackTheBox CA CTF - Using Snyk to Find & Fix Vulnerabilities
Cybersecurity
HackTheBox CA CTF - Using Snyk to Find & Fix Vulnerabilities
John Hammond Beginner 4y ago
XML Object Exfiltration - HackTheBox Cyber Apocalypse CTF "E. Tree"
Cybersecurity
XML Object Exfiltration - HackTheBox Cyber Apocalypse CTF "E. Tree"
John Hammond Beginner 4y ago
SQLite Blind SQL Injection - HackTheBox Cyber Apocalypse CTF
Cybersecurity
SQLite Blind SQL Injection - HackTheBox Cyber Apocalypse CTF
John Hammond Beginner 4y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Creating a Gmail Add-on
📚 Coursera Course ↗
Self-paced
Creating a Gmail Add-on
Opens on Coursera ↗
Clinical Natural Language Processing
📚 Coursera Course ↗
Self-paced
Clinical Natural Language Processing
Opens on Coursera ↗
Business intelligence and data analytics: Generate insights
📚 Coursera Course ↗
Self-paced
Business intelligence and data analytics: Generate insights
Opens on Coursera ↗
Advanced Data Handling and Reactive Programming Concepts
📚 Coursera Course ↗
Self-paced
Advanced Data Handling and Reactive Programming Concepts
Opens on Coursera ↗
DeFi Introduction: Decentralized Finance With Cryptocurrency
📚 Coursera Course ↗
Self-paced
DeFi Introduction: Decentralized Finance With Cryptocurrency
Opens on Coursera ↗
Functional Programming with Java and Threads
📚 Coursera Course ↗
Self-paced
Functional Programming with Java and Threads
Opens on Coursera ↗