✕ Clear filters
1,053 lessons

Browse Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 184,535📚 Coursera 16,235
Hackers Are Exploiting Critical Vulnerabilities in File Transfer Software
Cybersecurity
Hackers Are Exploiting Critical Vulnerabilities in File Transfer Software
John Hammond Beginner 2y ago
VULNERABLE Kernel Drivers for Security Research
Cybersecurity
VULNERABLE Kernel Drivers for Security Research
John Hammond Advanced 2y ago
New "Dark Web" Generative AI Chatbots?!
Cybersecurity
New "Dark Web" Generative AI Chatbots?!
John Hammond Intermediate 2y ago
Exploring the Latest Malware Samples
Cybersecurity
Exploring the Latest Malware Samples
John Hammond Advanced 2y ago
Run ANY Linux Program In Memory
AI Safety & Ethics
Run ANY Linux Program In Memory
John Hammond Intermediate 2y ago
Which Visual Studio Code Extensions Can Be Hacked?
AI News & Updates
Which Visual Studio Code Extensions Can Be Hacked?
John Hammond Intermediate 2y ago
I Explored Ransomware Cybercrime on the Dark Web
Cybersecurity
I Explored Ransomware Cybercrime on the Dark Web
John Hammond Beginner 2y ago
The Mysterious "Office Hotkey"..
AI Safety & Ethics
The Mysterious "Office Hotkey"..
John Hammond Intermediate 2y ago
How To Pivot Through a Network with Chisel
Cybersecurity
How To Pivot Through a Network with Chisel
John Hammond Intermediate 2y ago
Classify Malware with YARA
Cybersecurity
Classify Malware with YARA
John Hammond Intermediate 2y ago
AT&T Email List Exposed
AI Safety & Ethics
AT&T Email List Exposed
John Hammond Intermediate 2y ago
Learn Active Directory Kerberoasting
Cybersecurity
Learn Active Directory Kerberoasting
John Hammond Beginner 2y ago
Trick Hackers with a Fake User
AI Safety & Ethics
Trick Hackers with a Fake User
John Hammond Advanced 2y ago
The FBI Disrupted a HUGE Malware Strain
AI News & Updates
The FBI Disrupted a HUGE Malware Strain
John Hammond Intermediate 2y ago
Your Computer could be For Sale on the Dark Web
Cybersecurity
Your Computer could be For Sale on the Dark Web
John Hammond Intermediate 2y ago
How Does Malware Know It's Being Monitored?
AI Safety & Ethics
How Does Malware Know It's Being Monitored?
John Hammond Beginner 2y ago
We Hacked An AWS Account. Again.
Large Language Models
We Hacked An AWS Account. Again.
John Hammond Beginner 2y ago
I Had ChatGPT Analyze My Code
Large Language Models
I Had ChatGPT Analyze My Code
John Hammond Intermediate 2y ago
Spoof Your Computer
AI Safety & Ethics
Spoof Your Computer
John Hammond Advanced 2y ago
Not All ZIP Files Are Equal
Cybersecurity
Not All ZIP Files Are Equal
John Hammond Intermediate 2y ago
How to Hack ArgoCD to Cluster Administrator
AI News & Updates
How to Hack ArgoCD to Cluster Administrator
John Hammond Intermediate 2y ago
Capture the Flag at Blackhat USA 2023!
Cybersecurity
Capture the Flag at Blackhat USA 2023!
John Hammond Intermediate 2y ago
I Scammed Crypto Scammers
AI Safety & Ethics
I Scammed Crypto Scammers
John Hammond Advanced 2y ago
Telegram Cybercrime is INSANE
Cybersecurity
Telegram Cybercrime is INSANE
John Hammond Intermediate 2y ago
I Broke Threads
AI Safety & Ethics
I Broke Threads
John Hammond Intermediate 2y ago
How Hackers & Malware Spoof Processes
AI Safety & Ethics
How Hackers & Malware Spoof Processes
John Hammond Beginner 2y ago
Compromising Terraform & AWS Atlantis Build Jobs
AI Tools & Apps
Compromising Terraform & AWS Atlantis Build Jobs
John Hammond Intermediate 2y ago
Zimbra ZCS 0-day Exploited In The Wild
Cybersecurity
Zimbra ZCS 0-day Exploited In The Wild
John Hammond Beginner 2y ago
"Please Hack My Computer"
Cybersecurity
"Please Hack My Computer"
John Hammond Advanced 2y ago
Hunting Malware with Velociraptor (YARA & Memory Forensics)
AI Safety & Ethics
Hunting Malware with Velociraptor (YARA & Memory Forensics)
John Hammond Intermediate 2y ago
Mass Digital Forensics & Incident Response with Velociraptor
Cybersecurity
Mass Digital Forensics & Incident Response with Velociraptor
John Hammond Intermediate 2y ago
Dependency Confusion with AWS CodeArtifact
AI Tools & Apps
Dependency Confusion with AWS CodeArtifact
John Hammond Beginner 2y ago
Dark Web Dumpster Diving (Hunting Infostealer Malware)
Cybersecurity
Dark Web Dumpster Diving (Hunting Infostealer Malware)
John Hammond Beginner 2y ago
How to Trick Hackers & Web Crawlers with Spidertrap
AI Safety & Ethics
How to Trick Hackers & Web Crawlers with Spidertrap
John Hammond Intermediate 2y ago
How Hackers Write Malware & Evade Antivirus (Nim)
AI Safety & Ethics
How Hackers Write Malware & Evade Antivirus (Nim)
John Hammond Beginner 2y ago
TryHackMe! Finding Computer Artifacts with osquery
Cybersecurity
TryHackMe! Finding Computer Artifacts with osquery
John Hammond Beginner 2y ago
MOVEit Transfer Exploitation (my API presentation recording)
AI Safety & Ethics
MOVEit Transfer Exploitation (my API presentation recording)
John Hammond Intermediate 2y ago
How Hackers Use netsh.exe For Persistence & Code Execution (Sliver C2)
Cybersecurity
How Hackers Use netsh.exe For Persistence & Code Execution (Sliver C2)
John Hammond Intermediate 2y ago
Stealing OAuth Github Tokens with AWS CodeBuild
Large Language Models
Stealing OAuth Github Tokens with AWS CodeBuild
John Hammond Beginner 2y ago
Scale Your Cloud Infrastructure (Hosting CTFs)
Cybersecurity
Scale Your Cloud Infrastructure (Hosting CTFs)
John Hammond Intermediate 2y ago
Fake OnlyFans MALWARE: Remcos Infostealer VBScript Stager
Research Papers Explained
Fake OnlyFans MALWARE: Remcos Infostealer VBScript Stager
John Hammond Advanced 2y ago
Inside a Cybercrime Scam Operation
AI Tools & Apps
Inside a Cybercrime Scam Operation
John Hammond Intermediate 2y ago
How Hackers Evade Program Allowlists with DLLs
Cybersecurity
How Hackers Evade Program Allowlists with DLLs
John Hammond Intermediate 2y ago
Bypassing Branch Protections with Github Actions (CI/CD)
AI Safety & Ethics
Bypassing Branch Protections with Github Actions (CI/CD)
John Hammond Beginner 2y ago
Ethical Hacking: Bypass Passwords with Linux PAM Degradation Attack
Cybersecurity
Ethical Hacking: Bypass Passwords with Linux PAM Degradation Attack
John Hammond Beginner 2y ago
How To Extract Plaintext Google Chrome Passwords
AI News & Updates
How To Extract Plaintext Google Chrome Passwords
John Hammond Intermediate 2y ago
Now Scammers Can RENT Email Addresses for Cybercrime
AI Safety & Ethics
Now Scammers Can RENT Email Addresses for Cybercrime
John Hammond Intermediate 2y ago
FAKE Microsoft Login to Hacked Charity Scam
AI News & Updates
FAKE Microsoft Login to Hacked Charity Scam
John Hammond Beginner 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Tech Support Career Guide and Interview Preparation
📚 Coursera Course ↗
Self-paced
Tech Support Career Guide and Interview Preparation
Opens on Coursera ↗
Introduction to Relational Databases
📚 Coursera Course ↗
Self-paced
Introduction to Relational Databases
Opens on Coursera ↗
Contemporary Biology
📚 Coursera Course ↗
Self-paced
Contemporary Biology
Opens on Coursera ↗
Cisco Software-Defined Wan for Enterprise & Cloud: Unit 1
📚 Coursera Course ↗
Self-paced
Cisco Software-Defined Wan for Enterprise & Cloud: Unit 1
Opens on Coursera ↗
Secure Against Network Intrusions
📚 Coursera Course ↗
Self-paced
Secure Against Network Intrusions
Opens on Coursera ↗
Advanced Android Game Development in Unity
📚 Coursera Course ↗
Self-paced
Advanced Android Game Development in Unity
Opens on Coursera ↗