✕ Clear filters
1,056 lessons

Browse Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 185,110📚 Coursera 16,537
Redacted Image File
AI News & Updates ⚡ AI Lesson
Redacted Image File
John Hammond Beginner 1y ago
No Tools in a CTF
Cybersecurity
No Tools in a CTF
John Hammond Beginner 1y ago
Hackers Abuse Zero-Day Exploit for CrushFTP
Cybersecurity
Hackers Abuse Zero-Day Exploit for CrushFTP
John Hammond Beginner 1y ago
This File Steals Passwords
AI News & Updates
This File Steals Passwords
John Hammond Beginner 1y ago
Hackers Use Github For Malware
AI News & Updates ⚡ AI Lesson
Hackers Use Github For Malware
John Hammond Beginner 1y ago
Finding WEIRD Devices on the Public Internet
AI News & Updates
Finding WEIRD Devices on the Public Internet
John Hammond Beginner 1y ago
Government Unveils Malware Analysis Tool, But...
Cybersecurity
Government Unveils Malware Analysis Tool, But...
John Hammond Beginner 2y ago
Bypassing SmartScreen on Web Browsers
AI News & Updates
Bypassing SmartScreen on Web Browsers
John Hammond Beginner 2y ago
Telegram Has Been Hacked
AI News & Updates
Telegram Has Been Hacked
John Hammond Beginner 2y ago
I Hacked The Cloud: Azure Managed Identities
AI News & Updates
I Hacked The Cloud: Azure Managed Identities
John Hammond Advanced 2y ago
Scraping Dark Web Sites with Python
Cybersecurity
Scraping Dark Web Sites with Python
John Hammond Beginner 2y ago
How Hackers Can Hide PowerShell in Environment Variables
Cybersecurity
How Hackers Can Hide PowerShell in Environment Variables
John Hammond Beginner 2y ago
Malware & Cybersecurity Threats on the Horizon
Cybersecurity ⚡ AI Lesson
Malware & Cybersecurity Threats on the Horizon
John Hammond Beginner 2y ago
Hackers Hide with Clever Alternate Data Streams
Cybersecurity
Hackers Hide with Clever Alternate Data Streams
John Hammond Beginner 2y ago
The Apex Legends Hacker: Destroyer2009
AI News & Updates ⚡ AI Lesson
The Apex Legends Hacker: Destroyer2009
John Hammond Beginner 2y ago
Github Copilot Made My Code More Vulnerable
AI-Assisted Coding
Github Copilot Made My Code More Vulnerable
John Hammond Beginner 2y ago
Malware Analysis & Threat Intel: UAC Bypasses
Cybersecurity ⚡ AI Lesson
Malware Analysis & Threat Intel: UAC Bypasses
John Hammond Beginner 2y ago
Hackers Can Phish with PLAINTEXT QR Codes
AI News & Updates
Hackers Can Phish with PLAINTEXT QR Codes
John Hammond Beginner 2y ago
How Hackers Compromise BIG Networks (with NetExec)
Cybersecurity
How Hackers Compromise BIG Networks (with NetExec)
John Hammond Intermediate 2y ago
The Apex Legends Hack.
Cybersecurity ⚡ AI Lesson
The Apex Legends Hack.
John Hammond Intermediate 2y ago
Finding WEIRD Typosquatting Websites
Cybersecurity
Finding WEIRD Typosquatting Websites
John Hammond Intermediate 2y ago
Don't Use CyberChef. Use This Instead.
Cybersecurity ⚡ AI Lesson
Don't Use CyberChef. Use This Instead.
John Hammond Advanced 2y ago
The Secrets of The Tor Browser
Cybersecurity
The Secrets of The Tor Browser
John Hammond Intermediate 2y ago
Can a PDF File be Malware?
Cybersecurity
Can a PDF File be Malware?
John Hammond Intermediate 2y ago
I Made Malware In Under 20 Minutes
Cybersecurity ⚡ AI Lesson
I Made Malware In Under 20 Minutes
John Hammond Beginner 2y ago
Free Coding Tool Distributes Malware
Cybersecurity
Free Coding Tool Distributes Malware
John Hammond Intermediate 2y ago
Sweet New Threat Intel Just Dropped
Cybersecurity
Sweet New Threat Intel Just Dropped
John Hammond Beginner 2y ago
Notepad.exe Will Snitch On You (full coding project)
Cybersecurity
Notepad.exe Will Snitch On You (full coding project)
John Hammond Intermediate 2y ago
One Code Mistake Ruined This Website
Cybersecurity ⚡ AI Lesson
One Code Mistake Ruined This Website
John Hammond Intermediate 2y ago
Tracking Cybercrime on Telegram
Cybersecurity ⚡ AI Lesson
Tracking Cybercrime on Telegram
John Hammond Intermediate 2y ago
Don't Forget This One Hacking Trick
Cybersecurity
Don't Forget This One Hacking Trick
John Hammond Intermediate 2y ago
Malware Analysis Made Easy: Cloud Investigations
Cybersecurity ⚡ AI Lesson
Malware Analysis Made Easy: Cloud Investigations
John Hammond Beginner 2y ago
Calculating Smart Contract Vulnerability Impact: Low To Critical
Cybersecurity
Calculating Smart Contract Vulnerability Impact: Low To Critical
John Hammond Beginner 2y ago
SMB Shares & Cronjob to Initial Access (Proving Grounds: Dawn)
Cybersecurity ⚡ AI Lesson
SMB Shares & Cronjob to Initial Access (Proving Grounds: Dawn)
John Hammond Intermediate 2y ago
Enterprise security one step at a time
Cybersecurity ⚡ AI Lesson
Enterprise security one step at a time
John Hammond Intermediate 2y ago
I AUTOMATED a Penetration Test!?
Cybersecurity ⚡ AI Lesson
I AUTOMATED a Penetration Test!?
John Hammond Intermediate 2y ago
Healthcare Software Exploit: CVE-2023-43208
Cybersecurity ⚡ AI Lesson
Healthcare Software Exploit: CVE-2023-43208
John Hammond Intermediate 2y ago
Microsoft Entra Training
Cybersecurity
Microsoft Entra Training
John Hammond Advanced 2y ago
Run this script with Eval
Cybersecurity
Run this script with Eval
John Hammond Intermediate 2y ago
Debug with JS-Beautify
Cybersecurity
Debug with JS-Beautify
John Hammond Intermediate 2y ago
Debug with Visual Studio
Cybersecurity
Debug with Visual Studio
John Hammond Intermediate 2y ago
Exploring the BIGGEST SCAMS in the Dark Web
Cybersecurity ⚡ AI Lesson
Exploring the BIGGEST SCAMS in the Dark Web
John Hammond Intermediate 2y ago
Welcome back, Ryan Chapman
Cybersecurity
Welcome back, Ryan Chapman
John Hammond Intermediate 2y ago
Learning Entra ID (Azure Active Directory)
Cybersecurity
Learning Entra ID (Azure Active Directory)
John Hammond Beginner 2y ago
Network Threat Hunting Made Easy (Finding Hackers)
Cybersecurity
Network Threat Hunting Made Easy (Finding Hackers)
John Hammond Beginner 2y ago
PikaBot Malware Analysis: Debugging in Visual Studio
Cybersecurity
PikaBot Malware Analysis: Debugging in Visual Studio
John Hammond Intermediate 2y ago
Technical Term Tips
Cybersecurity
Technical Term Tips
John Hammond Advanced 2y ago
Make Malware Analysis FASTER with Binary Emulation
Cybersecurity
Make Malware Analysis FASTER with Binary Emulation
John Hammond Intermediate 2y ago