✕ Clear filters
1,409 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 201,026📚 Coursera 18,187🎤 TED 1
ACCESS what you WERE NEVER SUPPOSED TO
Cybersecurity
ACCESS what you WERE NEVER SUPPOSED TO
John Hammond Beginner 3y ago
Reverse Shell UNDETECTED by Microsoft Defender (hoaxshell)
Cybersecurity
Reverse Shell UNDETECTED by Microsoft Defender (hoaxshell)
John Hammond Beginner 3y ago
BEGINNER Golang CSV Quiz Game - Gophercises
Cybersecurity
BEGINNER Golang CSV Quiz Game - Gophercises
John Hammond Beginner 3y ago
a CYBERCRIME UNIVERSITY!?!? ("FREE" hacking courses - Dark Web Documentary #12)
Cybersecurity
a CYBERCRIME UNIVERSITY!?!? ("FREE" hacking courses - Dark Web Documentary #12)
John Hammond Beginner 3y ago
Unraveling a REMOTE ACCESS TROJAN (VBScript Deobfuscation)
Cybersecurity
Unraveling a REMOTE ACCESS TROJAN (VBScript Deobfuscation)
John Hammond Beginner 3y ago
HAVOC C2 - Demon Bypasses Windows 11 Defender
Cybersecurity
HAVOC C2 - Demon Bypasses Windows 11 Defender
John Hammond Beginner 3y ago
IT WAS A SCAM
Cybersecurity
IT WAS A SCAM
John Hammond Beginner 3y ago
PowerShell - Observing Inline C# Compilation with Add-Type
Cybersecurity
PowerShell - Observing Inline C# Compilation with Add-Type
John Hammond Beginner 3y ago
an INSIDE LOOK at Penetration Testing Collaborative Platform (Plextrac)
Cybersecurity
an INSIDE LOOK at Penetration Testing Collaborative Platform (Plextrac)
John Hammond Beginner 3y ago
INSTANT File Downloads with JavaScript
Cybersecurity
INSTANT File Downloads with JavaScript
John Hammond Beginner 3y ago
Starting Cybersecurity Careers (with JRHacka)
Cybersecurity
Starting Cybersecurity Careers (with JRHacka)
John Hammond Beginner 3y ago
Markdown to PDF Code Injection (CSAW CTF 2022)
Cybersecurity
Markdown to PDF Code Injection (CSAW CTF 2022)
John Hammond Beginner 3y ago
Inside Cybercrime Markets: Buying & Selling Malware (Dark Web Documentary #11)
Cybersecurity
Inside Cybercrime Markets: Buying & Selling Malware (Dark Web Documentary #11)
John Hammond Beginner 3y ago
Be a more EFFICIENT Penetration Tester (with Dan!)
Cybersecurity
Be a more EFFICIENT Penetration Tester (with Dan!)
John Hammond Beginner 3y ago
$100 RANSOMWARE on the Dark Web (Documentary #10)
Cybersecurity
$100 RANSOMWARE on the Dark Web (Documentary #10)
John Hammond Beginner 3y ago
Docker Container Forensics - CSAW CTF 2022
Cybersecurity
Docker Container Forensics - CSAW CTF 2022
John Hammond Beginner 3y ago
Avoid PowerShell Invoke-Expression with DNS Records
Cybersecurity
Avoid PowerShell Invoke-Expression with DNS Records
John Hammond Beginner 3y ago
Babuk RANSOMWARE Leak Site (Dark Web Documentary #09)
Cybersecurity
Babuk RANSOMWARE Leak Site (Dark Web Documentary #09)
John Hammond Beginner 3y ago
DANGEROUS Python Flask Debug Mode Vulnerabilities
Cybersecurity
DANGEROUS Python Flask Debug Mode Vulnerabilities
John Hammond Beginner 3y ago
Navigating Tor Hidden Services (Dark Web Documentary #08)
Cybersecurity
Navigating Tor Hidden Services (Dark Web Documentary #08)
John Hammond Beginner 3y ago
Industrial Spy - Ransomware Leak Market (Dark Web Documentary #07)
Cybersecurity
Industrial Spy - Ransomware Leak Market (Dark Web Documentary #07)
John Hammond Beginner 3y ago
PHP 8.1.0-dev BACKDOOR Hack (Easy RCE)
Cybersecurity
PHP 8.1.0-dev BACKDOOR Hack (Easy RCE)
John Hammond Beginner 3y ago
Cybersecurity for the Blockchain? HALBORN+SANS Security Summit
Cybersecurity
Cybersecurity for the Blockchain? HALBORN+SANS Security Summit
John Hammond Beginner 3y ago
Compromising WINDOWS Hosts w/ Impacket (Active Directory #09)
Cybersecurity
Compromising WINDOWS Hosts w/ Impacket (Active Directory #09)
John Hammond Beginner 3y ago
He tried to hack me...
Cybersecurity
He tried to hack me...
John Hammond Beginner 3y ago
PHP Data Exfiltration - Leaking Sensitive Filenames
Cybersecurity
PHP Data Exfiltration - Leaking Sensitive Filenames
John Hammond Beginner 3y ago
Active Directory PowerShell #08 Generating Local Admins across Hosts
Cybersecurity
Active Directory PowerShell #08 Generating Local Admins across Hosts
John Hammond Beginner 3y ago
Setting Up Whonix for ANONYMOUS Tor Browsing (Dark Web Documentary #06)
Cybersecurity
Setting Up Whonix for ANONYMOUS Tor Browsing (Dark Web Documentary #06)
John Hammond Beginner 3y ago
WHO IS REAL?!?
Cybersecurity
WHO IS REAL?!?
John Hammond Beginner 3y ago
In The Trenches of Cybersecurity (with Todd!)
Cybersecurity
In The Trenches of Cybersecurity (with Todd!)
John Hammond Beginner 3y ago
Red Team Ops 2 is FINALLY HERE
Cybersecurity
Red Team Ops 2 is FINALLY HERE
John Hammond Beginner 3y ago
PERMANENTLY TURN OFF Windows Defender on Windows 11
Cybersecurity
PERMANENTLY TURN OFF Windows Defender on Windows 11
John Hammond Beginner 3y ago
Can you DISABLE Windows Defender Antivirus?
Cybersecurity
Can you DISABLE Windows Defender Antivirus?
John Hammond Beginner 3y ago
ETHEREUM Protocol Security Assessments (w/ HALBORN!)
Cybersecurity
ETHEREUM Protocol Security Assessments (w/ HALBORN!)
John Hammond Beginner 3y ago
POWERSHELL - Automating RANDOM Local Admins (Active Directory #07)
Cybersecurity
POWERSHELL - Automating RANDOM Local Admins (Active Directory #07)
John Hammond Beginner 3y ago
Hacking WORDLE ?! x64 "pwn" Binary Exploitation - RET2 WarGames Platform
Cybersecurity
Hacking WORDLE ?! x64 "pwn" Binary Exploitation - RET2 WarGames Platform
John Hammond Beginner 3y ago
BLOODHOUND Domain Enumeration (Active Directory #06)
Cybersecurity
BLOODHOUND Domain Enumeration (Active Directory #06)
John Hammond Beginner 3y ago
an ACTUALLY GOOD cybersecurity BOOTCAMP??
Cybersecurity
an ACTUALLY GOOD cybersecurity BOOTCAMP??
John Hammond Beginner 3y ago
SOLANA Protocol Security Assessments (w/ HALBORN)
Cybersecurity
SOLANA Protocol Security Assessments (w/ HALBORN)
John Hammond Beginner 3y ago
BRUTEFORCING DOMAIN PASSWORDS (AD #05)
Cybersecurity
BRUTEFORCING DOMAIN PASSWORDS (AD #05)
John Hammond Beginner 3y ago
TEARING DOWN the DOMAIN CONTROLLER (Active Directory #04)
Cybersecurity
TEARING DOWN the DOMAIN CONTROLLER (Active Directory #04)
John Hammond Beginner 3y ago
POWERSHELL: Random Users & Weak Passwords (Active Directory #03)
Cybersecurity
POWERSHELL: Random Users & Weak Passwords (Active Directory #03)
John Hammond Beginner 3y ago
Return Oriented #shorts
Cybersecurity
Return Oriented #shorts
John Hammond Beginner 3y ago
Unpacking UPX #shorts
Cybersecurity
Unpacking UPX #shorts
John Hammond Beginner 3y ago
Automating DOMAIN USERS (Active Directory #02)
Cybersecurity
Automating DOMAIN USERS (Active Directory #02)
John Hammond Beginner 3y ago
Unpacking UPX #shorts
Cybersecurity
Unpacking UPX #shorts
John Hammond Beginner 3y ago
Format String #shorts
Cybersecurity
Format String #shorts
John Hammond Beginner 3y ago
Creating Content HELPS #shorts
Cybersecurity
Creating Content HELPS #shorts
John Hammond Beginner 3y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Cybersecurity Solutions and Microsoft Defender
📚 Coursera Course ↗
Self-paced
Cybersecurity Solutions and Microsoft Defender
Opens on Coursera ↗
Network Security Support Engineer
📚 Coursera Course ↗
Self-paced
Network Security Support Engineer
Opens on Coursera ↗
CompTIA Cloud CV0-003: Unit 4
📚 Coursera Course ↗
Self-paced
CompTIA Cloud CV0-003: Unit 4
Opens on Coursera ↗
Linux Security Techniques
📚 Coursera Course ↗
Self-paced
Linux Security Techniques
Opens on Coursera ↗
Security Fundamentals & Network Automation
📚 Coursera Course ↗
Self-paced
Security Fundamentals & Network Automation
Opens on Coursera ↗
Cybersecurity Threat Vectors and Mitigation
📚 Coursera Course ↗
Self-paced
Cybersecurity Threat Vectors and Mitigation
Opens on Coursera ↗