✕ Clear filters
1,804 lessons

Browse Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 201,026📚 Coursera 18,187🎤 TED 1
Not All ZIP Files Are Equal
Cybersecurity
Not All ZIP Files Are Equal
John Hammond Intermediate 2y ago
How to Hack ArgoCD to Cluster Administrator
AI News & Updates
How to Hack ArgoCD to Cluster Administrator
John Hammond Intermediate 2y ago
Capture the Flag at Blackhat USA 2023!
Cybersecurity
Capture the Flag at Blackhat USA 2023!
John Hammond Intermediate 2y ago
I Scammed Crypto Scammers
AI Safety & Ethics
I Scammed Crypto Scammers
John Hammond Advanced 2y ago
Telegram Cybercrime is INSANE
Cybersecurity
Telegram Cybercrime is INSANE
John Hammond Intermediate 2y ago
I Broke Threads
AI Safety & Ethics
I Broke Threads
John Hammond Intermediate 2y ago
How Hackers & Malware Spoof Processes
AI Safety & Ethics
How Hackers & Malware Spoof Processes
John Hammond Beginner 2y ago
Compromising Terraform & AWS Atlantis Build Jobs
AI Tools & Apps
Compromising Terraform & AWS Atlantis Build Jobs
John Hammond Intermediate 2y ago
Zimbra ZCS 0-day Exploited In The Wild
Cybersecurity
Zimbra ZCS 0-day Exploited In The Wild
John Hammond Beginner 2y ago
"Please Hack My Computer"
Cybersecurity
"Please Hack My Computer"
John Hammond Advanced 2y ago
Hunting Malware with Velociraptor (YARA & Memory Forensics)
AI Safety & Ethics
Hunting Malware with Velociraptor (YARA & Memory Forensics)
John Hammond Intermediate 2y ago
Mass Digital Forensics & Incident Response with Velociraptor
Cybersecurity
Mass Digital Forensics & Incident Response with Velociraptor
John Hammond Intermediate 2y ago
Dependency Confusion with AWS CodeArtifact
AI Tools & Apps
Dependency Confusion with AWS CodeArtifact
John Hammond Beginner 2y ago
Dark Web Dumpster Diving (Hunting Infostealer Malware)
Cybersecurity
Dark Web Dumpster Diving (Hunting Infostealer Malware)
John Hammond Beginner 2y ago
How to Trick Hackers & Web Crawlers with Spidertrap
AI Safety & Ethics
How to Trick Hackers & Web Crawlers with Spidertrap
John Hammond Intermediate 2y ago
How Hackers Write Malware & Evade Antivirus (Nim)
AI Safety & Ethics
How Hackers Write Malware & Evade Antivirus (Nim)
John Hammond Beginner 2y ago
TryHackMe! Finding Computer Artifacts with osquery
Cybersecurity
TryHackMe! Finding Computer Artifacts with osquery
John Hammond Beginner 2y ago
MOVEit Transfer Exploitation (my API presentation recording)
AI Safety & Ethics
MOVEit Transfer Exploitation (my API presentation recording)
John Hammond Intermediate 2y ago
How Hackers Use netsh.exe For Persistence & Code Execution (Sliver C2)
Cybersecurity
How Hackers Use netsh.exe For Persistence & Code Execution (Sliver C2)
John Hammond Intermediate 2y ago
Stealing OAuth Github Tokens with AWS CodeBuild
Large Language Models
Stealing OAuth Github Tokens with AWS CodeBuild
John Hammond Beginner 2y ago
Scale Your Cloud Infrastructure (Hosting CTFs)
Cybersecurity
Scale Your Cloud Infrastructure (Hosting CTFs)
John Hammond Intermediate 2y ago
Fake OnlyFans MALWARE: Remcos Infostealer VBScript Stager
Research Papers Explained
Fake OnlyFans MALWARE: Remcos Infostealer VBScript Stager
John Hammond Advanced 2y ago
Inside a Cybercrime Scam Operation
AI Tools & Apps
Inside a Cybercrime Scam Operation
John Hammond Intermediate 2y ago
How Hackers Evade Program Allowlists with DLLs
Cybersecurity
How Hackers Evade Program Allowlists with DLLs
John Hammond Intermediate 2y ago
Bypassing Branch Protections with Github Actions (CI/CD)
AI Safety & Ethics
Bypassing Branch Protections with Github Actions (CI/CD)
John Hammond Beginner 2y ago
Ethical Hacking: Bypass Passwords with Linux PAM Degradation Attack
Cybersecurity
Ethical Hacking: Bypass Passwords with Linux PAM Degradation Attack
John Hammond Beginner 2y ago
How To Extract Plaintext Google Chrome Passwords
AI News & Updates
How To Extract Plaintext Google Chrome Passwords
John Hammond Intermediate 2y ago
Now Scammers Can RENT Email Addresses for Cybercrime
AI Safety & Ethics
Now Scammers Can RENT Email Addresses for Cybercrime
John Hammond Intermediate 2y ago
FAKE Microsoft Login to Hacked Charity Scam
AI News & Updates
FAKE Microsoft Login to Hacked Charity Scam
John Hammond Beginner 2y ago
Hands-on Ransomware: Exploring Cybercrime
AI Safety & Ethics
Hands-on Ransomware: Exploring Cybercrime
John Hammond Beginner 2y ago
Threat Emulation & Purple Teaming (with PlexTrac Runbooks)
Data Analytics & Business Intelligence
Threat Emulation & Purple Teaming (with PlexTrac Runbooks)
John Hammond Beginner 2y ago
How Can CI/CD Go Horribly Wrong?
AI Safety & Ethics
How Can CI/CD Go Horribly Wrong?
John Hammond Beginner 2y ago
Rapid Windows Memory Analysis with Volatility 3
Cybersecurity
Rapid Windows Memory Analysis with Volatility 3
John Hammond Intermediate 2y ago
Exploring the Latest Dark Web Onion Sites
Cybersecurity
Exploring the Latest Dark Web Onion Sites
John Hammond Intermediate 2y ago
This Dark Web URL Shortener Sucks
AI Safety & Ethics
This Dark Web URL Shortener Sucks
John Hammond Intermediate 2y ago
Raspberry Pi Malware uses IRC Remote Access Trojan (RAT)
AI Safety & Ethics
Raspberry Pi Malware uses IRC Remote Access Trojan (RAT)
John Hammond Intermediate 2y ago
ChatGPT Analyzes Fake ChatGPT Malware
Large Language Models
ChatGPT Analyzes Fake ChatGPT Malware
John Hammond Intermediate 2y ago
Why Don't People Want Security?
Data Analytics & Business Intelligence
Why Don't People Want Security?
John Hammond Intermediate 2y ago
Hide a Hacker's Reverse Shell in ONE Command
Cybersecurity
Hide a Hacker's Reverse Shell in ONE Command
John Hammond Intermediate 2y ago
Getting Started in Firmware Analysis & IoT Reverse Engineering
Cybersecurity
Getting Started in Firmware Analysis & IoT Reverse Engineering
John Hammond Beginner 2y ago
How To Setup ELK | Elastic Agents & Sysmon for Cybersecurity
AI Agents & Automation
How To Setup ELK | Elastic Agents & Sysmon for Cybersecurity
John Hammond Intermediate 2y ago
PowerShell CRYPTOSTEALER through DNS
AI Safety & Ethics
PowerShell CRYPTOSTEALER through DNS
John Hammond Intermediate 2y ago
This TikTok User Stole My Content
AI Safety & Ethics
This TikTok User Stole My Content
John Hammond Intermediate 2y ago
Hacking Complex Passwords with Rules & Munging
Cybersecurity
Hacking Complex Passwords with Rules & Munging
John Hammond Intermediate 2y ago
Living Off The Land - Windows Disk Cleaner Persistence
Cybersecurity
Living Off The Land - Windows Disk Cleaner Persistence
John Hammond Intermediate 2y ago
Hunt for Hackers with Velociraptor
AI Safety & Ethics
Hunt for Hackers with Velociraptor
John Hammond Beginner 2y ago
ChatGPT tries a BASIC Capture The Flag (CTF) Challenge
Large Language Models
ChatGPT tries a BASIC Capture The Flag (CTF) Challenge
John Hammond Intermediate 2y ago
How To Test Your Security with Atomic Red Team
Cybersecurity
How To Test Your Security with Atomic Red Team
John Hammond Intermediate 2y ago