✕ Clear filters
935 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 200,964📚 Coursera 18,180🎤 TED 1
🚨 NPM axios Supply Chain Attack 🚨
Cybersecurity
🚨 NPM axios Supply Chain Attack 🚨
John Hammond Intermediate 1w ago
GraphSpy: Hacker's Tooling Deep Dive (w/ creator @RedByte1337!)
Cybersecurity
GraphSpy: Hacker's Tooling Deep Dive (w/ creator @RedByte1337!)
John Hammond Intermediate 3w ago
h?ckers a[r]e gl*bbing
Cybersecurity
h?ckers a[r]e gl*bbing
John Hammond Intermediate 1mo ago
NTUSER.MAN
Cybersecurity
NTUSER.MAN
John Hammond Intermediate 2mo ago
Mostly Stupid Hacks
Cybersecurity
Mostly Stupid Hacks
John Hammond Intermediate 4mo ago
Cybersecurity Awareness for Hackers! with Huntress and Just Hacking Training
Cybersecurity
Cybersecurity Awareness for Hackers! with Huntress and Just Hacking Training
John Hammond Intermediate 5mo ago
Hackers Bruteforce Passwords to Microsoft Online
Cybersecurity
Hackers Bruteforce Passwords to Microsoft Online
John Hammond Intermediate 5mo ago
new capture the flag (hacking competition)
Cybersecurity
new capture the flag (hacking competition)
John Hammond Intermediate 6mo ago
How You Can Impersonate Anyone in Active Directory (with Shikata!)
Cybersecurity
How You Can Impersonate Anyone in Active Directory (with Shikata!)
John Hammond Intermediate 9mo ago
Evading Antivirus Detection in C (with Dahvid Schloss)
Cybersecurity
Evading Antivirus Detection in C (with Dahvid Schloss)
John Hammond Intermediate 9mo ago
Learning to Hack Active Directory Certificate Services (with Shikata!)
Cybersecurity
Learning to Hack Active Directory Certificate Services (with Shikata!)
John Hammond Intermediate 9mo ago
Windows Endpoint Telemetry (ft. Jonny Johnson)
Cybersecurity
Windows Endpoint Telemetry (ft. Jonny Johnson)
John Hammond Intermediate 10mo ago
Malware & Hackers Evade Antivirus with Windows Sandbox
Cybersecurity
Malware & Hackers Evade Antivirus with Windows Sandbox
John Hammond Intermediate 10mo ago
hackers weaponize... really long filenames??
Cybersecurity
hackers weaponize... really long filenames??
John Hammond Intermediate 10mo ago
golang obfuscated malware goes crazy
Cybersecurity
golang obfuscated malware goes crazy
John Hammond Intermediate 10mo ago
The CVE Foundation Interview
Cybersecurity
The CVE Foundation Interview
John Hammond Intermediate 10mo ago
Team Shellphish AIxCC Interview
Cybersecurity
Team Shellphish AIxCC Interview
John Hammond Intermediate 11mo ago
How Hackers Steal Passwords
Cybersecurity
How Hackers Steal Passwords
John Hammond Intermediate 11mo ago
Blocking EVERYTHING with Windows Firewall
Cybersecurity
Blocking EVERYTHING with Windows Firewall
John Hammond Intermediate 11mo ago
cybersecurity just got f***ed
Cybersecurity
cybersecurity just got f***ed
John Hammond Intermediate 11mo ago
Finding Web App Vulnerabilities with AI
Cybersecurity
Finding Web App Vulnerabilities with AI
John Hammond Intermediate 11mo ago
I Backdoored Cursor AI
Cybersecurity
I Backdoored Cursor AI
John Hammond Intermediate 12mo ago
this MP3 file is malware
Cybersecurity
this MP3 file is malware
John Hammond Intermediate 1y ago
the CRITICAL 9.1 severity Next.js vulnerability
Cybersecurity
the CRITICAL 9.1 severity Next.js vulnerability
John Hammond Intermediate 1y ago
ms teams is now a C2 (command-and-control)
Cybersecurity
ms teams is now a C2 (command-and-control)
John Hammond Intermediate 1y ago
they tried to hack me so i confronted them
Cybersecurity
they tried to hack me so i confronted them
John Hammond Intermediate 1y ago
the tools that real hackers use
Cybersecurity
the tools that real hackers use
John Hammond Intermediate 1y ago
are built-in windows programs vulnerable?
Cybersecurity
are built-in windows programs vulnerable?
John Hammond Intermediate 1y ago
The Snyk Fetch the Flag CTF is LIVE right now!!
Cybersecurity
The Snyk Fetch the Flag CTF is LIVE right now!!
John Hammond Intermediate 1y ago
Pentesting Methodologies & CTF Challenges!
Cybersecurity
Pentesting Methodologies & CTF Challenges!
John Hammond Intermediate 1y ago
Unpacking Code for CTF Challenges: Create Your Dirty Image
Cybersecurity
Unpacking Code for CTF Challenges: Create Your Dirty Image
John Hammond Intermediate 1y ago
Preventing Session Hijacking: Essential Cybersecurity Strategies
Cybersecurity
Preventing Session Hijacking: Essential Cybersecurity Strategies
John Hammond Intermediate 1y ago
Unlocking Secrets: Hacking With InfoStealer Malware
Cybersecurity
Unlocking Secrets: Hacking With InfoStealer Malware
John Hammond Intermediate 1y ago
Hacking a Reddit Account: A Step-by-Step Demonstration
Cybersecurity
Hacking a Reddit Account: A Step-by-Step Demonstration
John Hammond Intermediate 1y ago
Linux Challenges for Holiday Hacking
Cybersecurity
Linux Challenges for Holiday Hacking
John Hammond Intermediate 1y ago
Inside the Registry Challenge: CTF Zone Finals 2024
Cybersecurity
Inside the Registry Challenge: CTF Zone Finals 2024
John Hammond Intermediate 1y ago
From Novice to Pro: Unleashing Hacking Genius
Cybersecurity
From Novice to Pro: Unleashing Hacking Genius
John Hammond Intermediate 1y ago
Unlock Your Cybersecurity Potential with Hands-On Labs
Cybersecurity
Unlock Your Cybersecurity Potential with Hands-On Labs
John Hammond Intermediate 1y ago
Unlocking Privilege Escalation in EntraID: The Essentials
Cybersecurity
Unlocking Privilege Escalation in EntraID: The Essentials
John Hammond Intermediate 1y ago
Exposing Vulnerabilities in EntraID: Ethical Hacking Insights
Cybersecurity
Exposing Vulnerabilities in EntraID: Ethical Hacking Insights
John Hammond Intermediate 1y ago
Hacking Everyday Items: The Truth Behind Suitcase Locks
Cybersecurity
Hacking Everyday Items: The Truth Behind Suitcase Locks
John Hammond Intermediate 1y ago
Collaborative Hacking with HHC 2024
Cybersecurity
Collaborative Hacking with HHC 2024
John Hammond Intermediate 1y ago
A Holiday Hacking Dream
Cybersecurity
A Holiday Hacking Dream
John Hammond Intermediate 1y ago
How Hackers Compromise BIG Networks (with NetExec)
Cybersecurity
How Hackers Compromise BIG Networks (with NetExec)
John Hammond Intermediate 2y ago
The Apex Legends Hack.
Cybersecurity
The Apex Legends Hack.
John Hammond Intermediate 2y ago
Finding WEIRD Typosquatting Websites
Cybersecurity
Finding WEIRD Typosquatting Websites
John Hammond Intermediate 2y ago
The Secrets of The Tor Browser
Cybersecurity
The Secrets of The Tor Browser
John Hammond Intermediate 2y ago
Can a PDF File be Malware?
Cybersecurity
Can a PDF File be Malware?
John Hammond Intermediate 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Advanced Penetration Techniques
📚 Coursera Course ↗
Self-paced
Advanced Penetration Techniques
Opens on Coursera ↗
Database Essentials and Vulnerabilities
📚 Coursera Course ↗
Self-paced
Database Essentials and Vulnerabilities
Opens on Coursera ↗
The Art of Storytelling
📚 Coursera Course ↗
Self-paced
The Art of Storytelling
Opens on Coursera ↗
Cyber Espionage and Counterintelligence
📚 Coursera Course ↗
Self-paced
Cyber Espionage and Counterintelligence
Opens on Coursera ↗
Security Governance & Compliance
📚 Coursera Course ↗
Self-paced
Security Governance & Compliance
Opens on Coursera ↗
Security Operations
📚 Coursera Course ↗
Self-paced
Security Operations
Opens on Coursera ↗