updated 21/06/19
My Entrepreneurial Journey - Episode 1: Quitting My 6 Figure Cybersecurity Job to Start a Businessarrow-up-right (33:30)
My Entrepreneurial Journey - Episode 2: Week One of Business Ownershiparrow-up-right (26:55)
Hacking Live Stream: Episode 1 - Kioptrix Level 1, HackTheBox Jerry, and Career Q&A / AMAarrow-up-right (3:10:33)
Hacking Live Stream: Episode 2 - HackTheBox Active, Vulnserver Buffer Overflow, and Career Q&A / AMAarrow-up-right (1:56:33)
Hacking Live Stream: Episode 3 - Hack The Box Blue, Devel, and Career Q&A / AMAarrow-up-right (1:34:08)
Introductory Exploit Development Live Stream - x86 Assembly Primer and SEH Overflows w/ Ruriarrow-up-right (4:56:19)
Exploit Development Live Stream Part 2- More Assembly and some Egghunting w/ Ruriarrow-up-right (3:33:29)
Drunk Hacking My Own Website (Web App 101)arrow-up-right (2:46:11)
Zero to Hero Pentesting: Episode 1 - Course Introduction, Notekeeping, Introductory Linux, and AMAarrow-up-right (4:08:48)
Zero to Hero Pentesting: Episode 2 - Python 101arrow-up-right (2:49:18)
Zero to Hero Pentesting: Episode 3 - Python 102, Building a Terrible Port Scanner, and a Giveawayarrow-up-right (2:34:07)
Zero to Hero Pentesting: Episode 4 - Five Phases of Hacking + Passive OSINTarrow-up-right (3:04:10)
Zero to Hero Pentesting: Episode 5 - Scanning Tools (Nmap, Nessus, BurpSuite, etc.) & Tacticsarrow-up-right (3:07:43)
Zero to Hero Pentesting: Episode 6 - Enumeration (Kioptrix & Hack The Box)arrow-up-right (2:48:34)
Zero to Hero Pentesting: Episode 7 - Exploitation, Shells, and Some Credential Stuffingarrow-up-right (2:47:50)
Zero to Hero: Week 8 - Building an AD Lab, LLMNR Poisoning, and NTLMv2 Cracking with Hashcatarrow-up-right (2:16:45)
Zero to Hero: Week 9 - NTLM Relay, Token Impersonation, Pass the Hash, PsExec, and morearrow-up-right (2:08:17)
Zero to Hero: Episode 10 - MS17-010/EternalBlue, GPP/cPasswords, and Kerberoastingarrow-up-right (1:32:55)
Zero to Hero: Week 11 - File Transfers, Pivoting, and Reporting Writingarrow-up-right (1:25:47)
Installing Windows Server 2016 on VMWare in 5 Minutesarrow-up-right (4:42)
Active Directory Exploitation - LLMNR/NBT-NS Poisoningarrow-up-right (8:17)
Networking for Ethical Hackers - TCP, UDP, and the Three-Way Handshake (Re-Up)arrow-up-right (7:24)
Networking for Ethical Hackers - Network Subnetting (Re-Up)arrow-up-right (21:06)
Networking for Ethical Hackers - Network Subnetting Part 2: The Challenge (Re-Up)arrow-up-right (6:57)
Networking for Ethical Hackers - Building A Basic Network with Cisco Packet Tracer (Re-Up)arrow-up-right (19:09)
Beginner Linux for Ethical Hackers - Navigating the File Systemarrow-up-right (12:20)
Beginner Linux for Ethical Hackers - Users and Privilegesarrow-up-right (9:40)
Beginner Linux for Ethical Hackers - Common Network Commandsarrow-up-right (6:08)
Beginner Linux for Ethical Hackers - Viewing, Creating, and Editing Filesarrow-up-right (6:16)
Beginner Linux for Ethical Hackers - Installing and Updating Toolsarrow-up-right (7:53)
Beginner Linux for Ethical Hackers - Controlling Kali Servicesarrow-up-right (4:13)
Beginner Linux for Ethical Hackers - Scripting with Basharrow-up-right (19:15)
Buffer Overflows Made Easy - Part 1: Introductionarrow-up-right (8:54)
Buffer Overflows Made Easy - Part 2: Spikingarrow-up-right (10:29)
Buffer Overflows Made Easy - Part 3: Fuzzingarrow-up-right (6:27)
Buffer Overflows Made Easy - Part 4: Finding the Offsetarrow-up-right (5:42)
Buffer Overflows Made Easy - Part 5: Overwriting the EIParrow-up-right (3:41)
Buffer Overflows Made Easy - Part 6: Finding Bad Charactersarrow-up-right (6:25)
Buffer Overflows Made Easy - Part 7: Finding the Right Modulearrow-up-right (8:43)
Buffer Overflows Made Easy - Part 8: Generating Shellcode and Gaining Shellsarrow-up-right (7:12)
Last updated 6 years ago