✕ Clear filters
1,805 lessons

Browse Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 201,098📚 Coursera 18,198🎤 TED 1
VOD - TryHackMe! Steel Mountain with Metasploit
Cybersecurity
VOD - TryHackMe! Steel Mountain with Metasploit
John Hammond Intermediate 4y ago
REvil Ransomware Leak Site RETURNS
AI Safety & Ethics
REvil Ransomware Leak Site RETURNS
John Hammond Intermediate 4y ago
KOVTER Malware Analysis - Fileless Persistence in Registry
Cybersecurity
KOVTER Malware Analysis - Fileless Persistence in Registry
John Hammond Beginner 4y ago
TARGETED Phishing - Fake Outlook Password Harvester
AI Safety & Ethics
TARGETED Phishing - Fake Outlook Password Harvester
John Hammond Intermediate 4y ago
AES-CFB Cryptography Mistakes - HackTheBox Business CTF "Domain Controller"
Cybersecurity
AES-CFB Cryptography Mistakes - HackTheBox Business CTF "Domain Controller"
John Hammond Beginner 4y ago
cmatrix memes
AI Safety & Ethics
cmatrix memes
John Hammond Intermediate 4y ago
Malware Marketplaces - 05 Dark Web Documentary
AI Safety & Ethics
Malware Marketplaces - 05 Dark Web Documentary
John Hammond Intermediate 4y ago
XLM Macros & Unhiding Excel Worksheets - HackTheBox Biz CTF "OldSchool"
Cybersecurity
XLM Macros & Unhiding Excel Worksheets - HackTheBox Biz CTF "OldSchool"
John Hammond Intermediate 4y ago
BAD RANSOMWARE - HackTheBox Business CTF
Cybersecurity
BAD RANSOMWARE - HackTheBox Business CTF
John Hammond Intermediate 4y ago
Reverse Engineering Loops - "Syncopation" HackTheBox Business CTF
Cybersecurity
Reverse Engineering Loops - "Syncopation" HackTheBox Business CTF
John Hammond Intermediate 4y ago
Laravel CVE / PHP Deserialization - "Larablog" HTB Business CTF
Cybersecurity
Laravel CVE / PHP Deserialization - "Larablog" HTB Business CTF
John Hammond Intermediate 4y ago
JSON Web Keys (JWK & JWT) - "Emergency" - HackTheBox Business CTF
Cybersecurity
JSON Web Keys (JWK & JWT) - "Emergency" - HackTheBox Business CTF
John Hammond Intermediate 4y ago
GraphQL Introspection - HackTheBox "Business CTF" - NoteQL
Cybersecurity
GraphQL Introspection - HackTheBox "Business CTF" - NoteQL
John Hammond Beginner 4y ago
HackTheBox "Business CTF" - Time - Command Injection
Cybersecurity
HackTheBox "Business CTF" - Time - Command Injection
John Hammond Intermediate 4y ago
HackTheBox "Business CTF" - discordvm - Node.js Sandbox Escape
Cybersecurity
HackTheBox "Business CTF" - discordvm - Node.js Sandbox Escape
John Hammond Intermediate 4y ago
Discussion: Technical Assessment of AV/EDR Effectiveness
Research Papers Explained
Discussion: Technical Assessment of AV/EDR Effectiveness
John Hammond Advanced 4y ago
JScript Deobfuscation - More WSHRAT (Malware Analysis)
Cybersecurity
JScript Deobfuscation - More WSHRAT (Malware Analysis)
John Hammond Intermediate 4y ago
"Hacker-For-Hire" Services 04 Dark Web Documentary
Large Language Models
"Hacker-For-Hire" Services 04 Dark Web Documentary
John Hammond Intermediate 4y ago
"Hire a Hacker" ??? 03 Dark Web Documentary
AI Safety & Ethics
"Hire a Hacker" ??? 03 Dark Web Documentary
John Hammond Intermediate 4y ago
Tor Search Engines - 02 Dark Web Documentary
AI Safety & Ethics
Tor Search Engines - 02 Dark Web Documentary
John Hammond Beginner 4y ago
Dark Web Documentary 01 Getting Setup with Tails Linux
AI Safety & Ethics
Dark Web Documentary 01 Getting Setup with Tails Linux
John Hammond Intermediate 4y ago
OSED Review - Offensive Security Exploit Developer
AI Tools & Apps
OSED Review - Offensive Security Exploit Developer
John Hammond Beginner 4y ago
Information Stealer - Malware Analysis (PowerShell to .NET)
Cybersecurity
Information Stealer - Malware Analysis (PowerShell to .NET)
John Hammond Beginner 4y ago
Binary Exploitation Deep Dive: Return to LIBC (with Matt)
AI Safety & Ethics
Binary Exploitation Deep Dive: Return to LIBC (with Matt)
John Hammond Intermediate 4y ago
AES-CTR Cryptography: Reused Key Weakness - HackTheBox Cyber Apocalypse CTF
Cybersecurity
AES-CTR Cryptography: Reused Key Weakness - HackTheBox Cyber Apocalypse CTF
John Hammond Beginner 4y ago
PowerPoint Phishing Malware Analysis - HackTheBox Cyber Apocalypse CTF
Cybersecurity
PowerPoint Phishing Malware Analysis - HackTheBox Cyber Apocalypse CTF
John Hammond Intermediate 4y ago
Phishing Document "Invitation" - HackTheBox Cyber Apocalypse CTF
Cybersecurity
Phishing Document "Invitation" - HackTheBox Cyber Apocalypse CTF
John Hammond Intermediate 4y ago
Nodejs Nunjucks Template Injection - HackTheBox Cyber Apocalypse CTF
Cybersecurity
Nodejs Nunjucks Template Injection - HackTheBox Cyber Apocalypse CTF
John Hammond Intermediate 4y ago
Cloudflare CDN CSP - XSS Bypass / HackTheBox Cyber Apocalypse CTF
Cybersecurity
Cloudflare CDN CSP - XSS Bypass / HackTheBox Cyber Apocalypse CTF
John Hammond Beginner 4y ago
IFrame Parent XSS - HackTheBox Cyber Apocalypse CTF
Cybersecurity
IFrame Parent XSS - HackTheBox Cyber Apocalypse CTF
John Hammond Beginner 4y ago
Blind MongoDB NoSQL Injection - HackTheBox Cyber Apocalypse CTF
Cybersecurity
Blind MongoDB NoSQL Injection - HackTheBox Cyber Apocalypse CTF
John Hammond Intermediate 4y ago
HackTheBox CA CTF - Using Snyk to Find & Fix Vulnerabilities
Cybersecurity
HackTheBox CA CTF - Using Snyk to Find & Fix Vulnerabilities
John Hammond Beginner 4y ago
XML Object Exfiltration - HackTheBox Cyber Apocalypse CTF "E. Tree"
Cybersecurity
XML Object Exfiltration - HackTheBox Cyber Apocalypse CTF "E. Tree"
John Hammond Beginner 4y ago
SQLite Blind SQL Injection - HackTheBox Cyber Apocalypse CTF
Cybersecurity
SQLite Blind SQL Injection - HackTheBox Cyber Apocalypse CTF
John Hammond Beginner 4y ago
HTB Cyber Apocalypse - cURL As a Service
Cybersecurity
HTB Cyber Apocalypse - cURL As a Service
John Hammond Beginner 4y ago
TryHackMe! Bypassing Upload Filters & DirtySock
AI Safety & Ethics
TryHackMe! Bypassing Upload Filters & DirtySock
John Hammond Intermediate 4y ago
Plundering AWS S3 Buckets - HackTheBox
AI Safety & Ethics
Plundering AWS S3 Buckets - HackTheBox
John Hammond Intermediate 4y ago
HTA JScript to PowerShell - Novter Malware Analysis
Cybersecurity
HTA JScript to PowerShell - Novter Malware Analysis
John Hammond Intermediate 4y ago
Automation vs. Manual - Going through OSED
AI Safety & Ethics
Automation vs. Manual - Going through OSED
John Hammond Intermediate 4y ago
TryHackMe - OSCP Voucher GIVEAWAY & Presentation
Cybersecurity
TryHackMe - OSCP Voucher GIVEAWAY & Presentation
John Hammond Intermediate 4y ago
BEGINNER Capture The Flag - PicoCTF 2021 001 "Obedient Cat"
Cybersecurity
BEGINNER Capture The Flag - PicoCTF 2021 001 "Obedient Cat"
John Hammond Beginner 4y ago
WTF is C O N T E N T
AI Safety & Ethics
WTF is C O N T E N T
John Hammond Intermediate 4y ago
Gitlab LFI to RCE - HackTheBox "Laboratory"
AI Safety & Ethics
Gitlab LFI to RCE - HackTheBox "Laboratory"
John Hammond Intermediate 4y ago
$2 MILLION DOLLARS STOLEN in Bitcoin/Ethereum - JScript Malware Analysis
Cybersecurity
$2 MILLION DOLLARS STOLEN in Bitcoin/Ethereum - JScript Malware Analysis
John Hammond Intermediate 5y ago
Rick & Morty MALWARE!? - sLoad - PowerShell & VBScript
AI Safety & Ethics
Rick & Morty MALWARE!? - sLoad - PowerShell & VBScript
John Hammond Intermediate 5y ago
VBScript & ILSpy Analysis of a RAT
AI Safety & Ethics
VBScript & ILSpy Analysis of a RAT
John Hammond Intermediate 5y ago
Cryptocoin Miner - Unpeeling Lemon Duck Malware
AI Safety & Ethics
Cryptocoin Miner - Unpeeling Lemon Duck Malware
John Hammond Intermediate 5y ago
Discord Malware - "i hacked MYSELF??"
AI Safety & Ethics
Discord Malware - "i hacked MYSELF??"
John Hammond Intermediate 5y ago