✕ Clear filters
1,803 lessons

Browse Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 201,014📚 Coursera 18,184🎤 TED 1
Cities Skylines II Malware [FULL REVERSE ENGINEERING ANALYSIS]
Cybersecurity
Cities Skylines II Malware [FULL REVERSE ENGINEERING ANALYSIS]
John Hammond Beginner 1y ago
SaaS apps are vulnerable too!!! (ServiceNow Exploitation)
Cybersecurity
SaaS apps are vulnerable too!!! (ServiceNow Exploitation)
John Hammond Beginner 1y ago
How Hackers Persist & Privesc in Microsoft 365
Cybersecurity
How Hackers Persist & Privesc in Microsoft 365
John Hammond Beginner 1y ago
Learn Open-Source Intelligence (OSINT)!
Cybersecurity
Learn Open-Source Intelligence (OSINT)!
John Hammond Beginner 1y ago
Holiday Hack Challenge   Ed Skoudis Interview
Cybersecurity
Holiday Hack Challenge Ed Skoudis Interview
John Hammond Beginner 1y ago
Exploring the Wiz Cloud Security Platform
Cybersecurity
Exploring the Wiz Cloud Security Platform
John Hammond Beginner 1y ago
Windows Servers Can Expose PowerShell on the Web
Cybersecurity
Windows Servers Can Expose PowerShell on the Web
John Hammond Beginner 1y ago
Hackers Abuse MeshCentral for a RAT
Cybersecurity
Hackers Abuse MeshCentral for a RAT
John Hammond Beginner 1y ago
Bruteforcing Windows Defender Exclusions
Cybersecurity
Bruteforcing Windows Defender Exclusions
John Hammond Advanced 1y ago
REAL Ransomware Chat Logs
Cybersecurity
REAL Ransomware Chat Logs
John Hammond Beginner 1y ago
Github Intentionally Lets You Read Deleted & Private Commits
Cybersecurity
Github Intentionally Lets You Read Deleted & Private Commits
John Hammond Beginner 1y ago
Three Ways to Hack Mobile Apps
Cybersecurity
Three Ways to Hack Mobile Apps
John Hammond Beginner 1y ago
They Say This Malware is INSANE
Cybersecurity
They Say This Malware is INSANE
John Hammond Beginner 1y ago
Hacking from Cloud to Endpoint (and vice versa)
Cybersecurity
Hacking from Cloud to Endpoint (and vice versa)
John Hammond Beginner 1y ago
Where Does Malware Go On Your Computer?
Cybersecurity
Where Does Malware Go On Your Computer?
John Hammond Beginner 1y ago
Hacking ALL Levels in this Game!
Cybersecurity
Hacking ALL Levels in this Game!
John Hammond Beginner 1y ago
Cracking Active Directory Passwords & MFA Fatigue
Cybersecurity
Cracking Active Directory Passwords & MFA Fatigue
John Hammond Beginner 1y ago
How to Scrape Telegram with Python
Cybersecurity
How to Scrape Telegram with Python
John Hammond Beginner 1y ago
Fake CAPTCHA Runs Malware
Cybersecurity
Fake CAPTCHA Runs Malware
John Hammond Beginner 1y ago
Ransomware In Action: MedusaLocker ReadText34
Cybersecurity
Ransomware In Action: MedusaLocker ReadText34
John Hammond Advanced 1y ago
Chinese Hackers use Visual Studio Code to Target Asian Governments
AI News & Updates
Chinese Hackers use Visual Studio Code to Target Asian Governments
John Hammond Beginner 1y ago
The Hacker with Hardware Implants (interview)
Cybersecurity
The Hacker with Hardware Implants (interview)
John Hammond Beginner 1y ago
Hacking Games with MelonLoader
Cybersecurity
Hacking Games with MelonLoader
John Hammond Beginner 1y ago
I Can't Scan This Website
Cybersecurity
I Can't Scan This Website
John Hammond Beginner 1y ago
Unity Game Hacking with dnSpy
Cybersecurity
Unity Game Hacking with dnSpy
John Hammond Beginner 1y ago
Self-Extracting Executables for Hackers
AI News & Updates
Self-Extracting Executables for Hackers
John Hammond Beginner 1y ago
Interactive SQL Injection
Cybersecurity
Interactive SQL Injection
John Hammond Beginner 1y ago
The Moment They Got Hacked
Cybersecurity
The Moment They Got Hacked
John Hammond Beginner 1y ago
Intro to Game Hacking: DEFCON 32
Cybersecurity
Intro to Game Hacking: DEFCON 32
John Hammond Beginner 1y ago
Caesar Ciphers
AI Safety & Ethics
Caesar Ciphers
John Hammond Intermediate 1y ago
Scan QR Codes on Linux
AI Safety & Ethics
Scan QR Codes on Linux
John Hammond Intermediate 1y ago
The Mark Of The Web
AI News & Updates
The Mark Of The Web
John Hammond Beginner 1y ago
QR Codes on Linux
AI Safety & Ethics
QR Codes on Linux
John Hammond Intermediate 1y ago
Decode Hex on Linux
AI Safety & Ethics
Decode Hex on Linux
John Hammond Intermediate 1y ago
Recover Quarantined Malware
AI News & Updates
Recover Quarantined Malware
John Hammond Beginner 1y ago
The Phishing Website that Hacked Linus Tech Tips
Cybersecurity
The Phishing Website that Hacked Linus Tech Tips
John Hammond Beginner 1y ago
Update on LinusTechTips Account Takeover
AI News & Updates
Update on LinusTechTips Account Takeover
John Hammond Beginner 1y ago
LinusTechTips Twitter Account Hacked (and how to secure yourself)
AI News & Updates
LinusTechTips Twitter Account Hacked (and how to secure yourself)
John Hammond Beginner 1y ago
He Passed CISSP At Age 23
Cybersecurity
He Passed CISSP At Age 23
John Hammond Beginner 1y ago
What Their Computer Looked Like Right As They Got Hacked
Cybersecurity
What Their Computer Looked Like Right As They Got Hacked
John Hammond Beginner 1y ago
WhatsApp Messenger Runs Arbitrary Python Code
AI News & Updates
WhatsApp Messenger Runs Arbitrary Python Code
John Hammond Beginner 1y ago
Hacking a Docker Container Registry
Cybersecurity
Hacking a Docker Container Registry
John Hammond Beginner 1y ago
Permission to Hack You: Illicit Consent Grant Attack
Cybersecurity
Permission to Hack You: Illicit Consent Grant Attack
John Hammond Beginner 1y ago
Who Hacked Who? PsExec Forensic Artifacts
AI News & Updates
Who Hacked Who? PsExec Forensic Artifacts
John Hammond Beginner 1y ago
CrowdStrike Outage Recovery with BitLocker
AI Safety & Ethics
CrowdStrike Outage Recovery with BitLocker
John Hammond Intermediate 1y ago
CrowdStrike Blew Up The Internet
AI News & Updates
CrowdStrike Blew Up The Internet
John Hammond Beginner 1y ago
He Sent Me Minecraft Malware (Java Deobfuscation)
AI News & Updates
He Sent Me Minecraft Malware (Java Deobfuscation)
John Hammond Beginner 1y ago
Hacking Windows TrustedInstaller (GOD MODE)
Cybersecurity
Hacking Windows TrustedInstaller (GOD MODE)
John Hammond Beginner 1y ago