Skip to main content

Hacking and InfoSec stuff



rss RSS

1,122
RESULTS


Show sorted alphabetically

Show sorted alphabetically

SHOW DETAILS
up-solid down-solid
eye
Title
Date Archived
Creator
How to Run Kali as a Windows Subsystem for Linux Full Tutorial: http://bit.ly/KaliAsWSL Subscribe to Null Byte: https://goo.gl/J6wEnH Microsoft's Windows Subsystem for Linux (WSL) is a great way to utilize Kali on your Windows computer without the need for a virtual machine. However, it is slightly limited right to what you can do, since security restrictions prevent the use of raw sockets, so tools like Nmap won't work and you won't be able to set your Wi-Fi adapter into promiscuous mode (or...
Topics: Youtube, video, Science & Technology, hacking, wonderhowto, wonder how to, hack, hacker,...
Hacking and InfoSec stuff
by a16z
movies

eye 3,406

favorite 9

comment 0

As a former Department of Justice prosecutor, Katie Haun set up the first-ever “cryptocurrency task force” for the U.S. government. She also led the investigations into the Mt. Gox hack and the corrupt agents on the Silk Road task force -- the first cases of the U.S. government using the bitcoin blockchain to fight fraud, not just against criminals but against their own. Haun -- Coinbase board member, Stanford lecturer, and now general partner on a16z crypto -- shares that story in this...
Topics: Youtube, video, Science & Technology, crypto, Silk Road, payments, unbanked, hyperinflation
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 2,444

favorite 1

comment 0

Sergey Golovanov Igor Soumenkov Kaspersky Lab In 2016 Kaspersky Lab employees participated in incident response cases that took place in dozens of financial institutions around the globe. In most cases we had to provide forensics analysis of ATMs. When Carbanak attack details were announced at #TheSAS2015, criminals also found this information useful. Other criminal groups eagerly adopted the same TTPs. Banks started to suffer from attacks on ATMs including both, malware and physical access....
Topics: Youtube, video, Entertainment, #TheSAS2017, KASPERSKY LAB, cyber security, itsecurity, conference
Hacking and InfoSec stuff
movies

eye 2,989

favorite 1

comment 0

Kim Zetter, Journalist, Author, Speaker, Freelance journalist Gary Brown, Professor of Cyber Security, Marine Corps University Oren Falkowitz, CEO and Co-Founder, Area 1 Security Roy Katmor, Co-Founder and CEO, enSilo Samples of malware in the wild hint how digital weapons today may be more powerful and stealthy than Stuxnet. Cyberwar experts will explore the current state of the art and future of digital weaponry. https://www.rsaconference.com/events/us17 Source:...
Topics: Youtube, video, Science & Technology, Cyber Warfare, Zero Day Vulnerability, Hackers &...
Hacking and InfoSec stuff
movies

eye 5,692

favorite 16

comment 0

How to Crack Weak Wi-Fi Passwords Full Tutorial: http://bit.ly/ParrotAir Subscribe to Null Byte: https://goo.gl/J6wEnH In this edition of Cyber Weapons Lab, we explore hacking Wi-Fi with bad passwords. We'll show you how using bad passwords can let anyone with a simple wireless network adapter and laptop hack a network with almost no resistance. Follow Null Byte on: Twitter: https://twitter.com/nullbytewht Flipboard: http://flip.it/3.Gf_0 Source: https://www.youtube.com/watch?v=ejTPWPGP0GA...
Topics: Youtube, video, People & Blogs, null byte, airgeddon, wifi hacking, wpa, wpa2, cracking,...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 2,007

favorite 15

comment 0

Hello Everyone! This is SaintDruG for Black Hat Ethical Hacking . Todays Hacking Minutes Series, Machines used: Mac OS: Sierra High / Raspberry Pi Runing Parrot OS We will create a backdoor PHP, and then run apache2 to start our webserver hosting a webpage on a raspberry pi. That will be the victim, so after creating the backdoor, we will copy it on that webserver. We will access our backdoor and get a shell! Giving us a lot of power and access on that webserver, basically own the machine....
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 2,620

favorite 5

comment 0

by SaintDruG / Anon for: Blackhatethicalhacking.com This is for Educational Purpose Only! Anything you do with this that creates bad results is your responsibility! Support our work on Patreon: https://www.patreon.com/blackhatethicalhacking Source: https://www.youtube.com/watch?v=R9Ee16XyrEU Uploader: Black Hat Ethical Hacking
Topics: Youtube, video, Education, linux, wifite, hacking, cracking, wifi crack, blackhatlessons, black hat...
How to Phish for WiFi Passwords on Kali with Wifiphisher Full Tutorial: http://bit.ly/WiFiPhish Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie While there are plenty of tools available to hackers to crack passwords, several of which we've covered, sometimes a less direct approach is best. Social engineering attacks can be very successful assuming your target is tech illiterate. On this episode of Cyber Weapons Lab, we'll show you Wifiphisher, a tool...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by Source Code Deleted
movies

eye 1,322

favorite 8

comment 0

This is NOT my work. This is something I found in a back up from my old Server. I want to provide content for new people to become involved . It should be noted , that this is NOT reverse engineering like everyone says. This is intro to cracking software. I think for the most part the content doesn't exist on the internet. I think I still have the binaries too, when I find them I will upload them as well. I also would like to add to this, that the places where you normally can download this for...
Topics: Youtube, video, Education, software cracking, cracking, cracking software, software, hacking, crack...
Hacking and InfoSec stuff
movies

eye 2,338

favorite 21

comment 0

Let’s take a journey back to the 1980’s and beyond, to discover the origins of the Cyberpunk movement, in literature, cinema, television, video games, comics and more! In this documentary miniseries, we will discover the wonders of Cyberpunk, dating back to the 1940’s, all the way through 1989, with each successive episode taking on a new decade. Co-written by Shalashaskka https://www.youtube.com/c/Shalashaskka 2:19 - The Origins of Cyberpunk 4:14 - PROTO-PUNK 4:58 - Philip K. Dick 5:30 -...
Topics: Youtube, video, Gaming, neuromancer, william gibson, neuromancer movie, mike pondsmith, akira,...
Hacking and InfoSec stuff
movies

eye 890

favorite 9

comment 0

How to Run an OSINT Investigation on a Phone Number Full Tutorial: http://bit.ly/PhoneOSINT Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie IMPORTANT (JUNE 6, 2019): The OSINT Tools by Mike Bazzel featured in this guide were taken down from his website due to increased DDoS-style attacks, as well as DMCAs and cease-and-desists from some of the tools included. Phoneinfoga will still work in this guide, but for the others, you can try using each...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 504

favorite 2

comment 0

by SaintDruG / Anon for: Blackhatethicalhacking.com This is for Educational Purpose Only! Anything you do with this that creates bad results is your responsibility! Support our work on Patreon: https://www.patreon.com/blackhatethicalhacking Source: https://www.youtube.com/watch?v=BGvPv0A-rcc Uploader: Black Hat Ethical Hacking
Topics: Youtube, video, Education, black hat ethicl hacking, blackhat, blackhatethicalhacking, saintdrug,...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 1,291

favorite 8

comment 0

by SaintDruG / Anon for: Blackhatethicalhacking.com This is for Educational Purpose Only! Anything you do with this that creates bad results is your responsibility! Support our work on Patreon: https://www.patreon.com/blackhatethicalhacking Source: https://www.youtube.com/watch?v=V5TUkRMEW0Q Uploader: Black Hat Ethical Hacking
Topics: Youtube, video, Education, linux, blackhatethicalhacking, black hat ethical hacking, hacking,...
Hacking and InfoSec stuff
movies

eye 1,085

favorite 6

comment 0

by SaintDruG / Anon for: Blackhatethicalhacking.com This is for Educational Purpose Only! Anything you do with this that creates bad results is your responsibility! Support our work on Patreon: https://www.patreon.com/blackhatethicalhacking Source: https://www.youtube.com/watch?v=dJB9NG_hZOo Uploader: Black Hat Ethical Hacking
Topics: Youtube, video, Education, hacking twitter, hacking facebook, blackhat, black hat lessons,...
Hacking and InfoSec stuff
by TheNotSoCivilEngr
movies

eye 338

favorite 0

comment 0

Today we take a look at what I believe is the most versatile and best single key to have. Purchase here: https://redteamtools.com/covert-jiggler-lock-picks Source: https://www.youtube.com/watch?v=qhmJR7aocBA Uploader: TheNotSoCivilEngr
Topics: Youtube, video, People & Blogs, lock, lockpicking, pentesting, physical penetration testing,...
Hacking and InfoSec stuff
movies

eye 763

favorite 0

comment 0

An exclusive Tomorrow Unlocked documentary. One day in May 2017, computers all around the world suddenly shut down. A malware called WannaCry asks for a ransom. The epidemic suddenly stops, because a young, British researcher finds a killswitch, by accident. Source: https://www.youtube.com/watch?v=vveLaA-z3-o Uploader: Tomorrow Unlocked
Topics: Youtube, video, Science & Technology, tomorrowunlocked
Hacking and InfoSec stuff
movies

eye 544

favorite 0

comment 0

Ian Allison, Sr Manager Security Testing/Red Team, Intuit Inc. Join Ian Allison and Javier Godinez as they demonstrate the Red Teaming of Amazon Web Services Identity Access Management Instance roles and how they can be used to compromise an AWS account. https://www.rsaconference.com/events/us17 Source: https://www.youtube.com/watch?v=OkWBHOJr5YQ Uploader: RSA Conference Upload date: 2017-02-22
Topics: Youtube, video, Science & Technology, RSA Conference 2017, DevOps, Security Awareness,...
Hacking and InfoSec stuff
by Source Code Deleted
movies

eye 463

favorite 4

comment 0

This aims to be the first in a series of rootkit development. I hate theory so I will move on as soon as possible! Zayka's Gaming Twitch : Follow her for gaming stuff https://www.twitch.tv/zayka_gamer_girl JOIN OUR DISCORD !: https://discord.gg/wqKQcmK GIT HUB | Source Code https://github.com/SourceCodeDeleted/rootkitdev-linux Source: https://www.youtube.com/watch?v=8dZFJEc-8uI Uploader: Source Code Deleted
Topics: Youtube, video, Education, hacking, learn hacking, ethical hacking, hack, russian hacking, why i...
Hacking and InfoSec stuff
movies

eye 1,737

favorite 2

comment 0

https://blog.torproject.org/blog/releasing-tor-animation See this video in your language: Arabic https://www.youtube.com/watch?v=6v0ga4f2myY English https://www.youtube.com/watch?v=JWII85UlzKw Farsi https://www.youtube.com/watch?v=Y16VGmL5778 French https://www.youtube.com/watch?v=Mnrn3y-Qbyk German https://www.youtube.com/watch?v=fzeBfbHb0ZY Polish https://www.youtube.com/watch?v=Fx7bFE1v5m8 Spanish https://www.youtube.com/watch?v=Sz_J6vJ4MYw Source: https://www.youtube.com/watch?v=JWII85UlzKw...
Topics: Youtube, video, Education, Tor (Software), Online Privacy, Anonymity, Privacy, Surveillance,...
Hacking and InfoSec stuff
movies

eye 341

favorite 3

comment 0

How to Brute-Force Web App Credentials with Hatch Full Tutorial: http://bit.ly/HatchWin Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Brute-forcing is an essential hacking technique that's easier with certain services than others. Website login pages are frequent victims to attack and today we'll show you how easy it can be, even for a beginner, with a Python tool called Hatch, on this episode of Cyber Weapons Lab. Follow Null Byte on: Twitter:...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by TheNotSoCivilEngr
movies

eye 376

favorite 0

comment 0

Today we build a long range rfid card reader which can be used to grab badges in the field from surprisingly far away... Build items: Reader: https://www.amazon.com/gp/product/B00UX03TLO/ref=ppx_yo_dt_b_asin_title_o02_s00?ie=UTF8&psc=1 Battery Pack: https://www.amazon.com/gp/product/B00VE7HBMS/ref=ppx_yo_dt_b_asin_title_o04_s00?ie=UTF8&psc=1 ESPKey: https://redteamtools.com/espkey If you are interested in the HID Maxiprox you can get one here:...
Topics: Youtube, video, People & Blogs, lock, pentesting, physical penetration testing, tubular, key,...
Hacking and InfoSec stuff
by TheNotSoCivilEngr
movies

eye 293

favorite 2

comment 0

Learn the easiest way to get into lock picking which you can do for free! Source: https://www.youtube.com/watch?v=Gh5raNMlisc Uploader: TheNotSoCivilEngr
Topics: Youtube, video, People & Blogs, lock, lockpicking, pentesting, tubular, key, picking, lock...
Hacking and InfoSec stuff
movies

eye 349

favorite 2

comment 0

by SaintDruG / Anon for: Blackhatethicalhacking.com This is for Educational Purpose Only! Anything you do with this that creates bad results is your responsibility! Support our work on Patreon: https://www.patreon.com/blackhatethicalhacking Source: https://www.youtube.com/watch?v=SzeUva9-DmU Uploader: Black Hat Ethical Hacking
Topics: Youtube, video, Education, black hat ethical hacking, black hat, ethical hacking, saintdrug,...
Hacking and InfoSec stuff
by Google Developers
movies

eye 958

favorite 4

comment 0

Google Python Class Day 1 Part 1: Introduction and Strings. By Nick Parlante. Support materials and exercises: https://developers.google.com/edu/python/introduction Source: https://www.youtube.com/watch?v=tKTZoB2Vjuk Uploader: Google Developers Upload date: 2010-03-01
Topics: Youtube, video, Science & Technology, google, programming, languages, python, tutorial
Hacking and InfoSec stuff
movies

eye 210

favorite 1

comment 0

by SaintDruG / Anon for: Blackhatethicalhacking.com This is for Educational Purpose Only! Anything you do with this that creates bad results is your responsibility! Support our work on Patreon: https://www.patreon.com/blackhatethicalhacking Source: https://www.youtube.com/watch?v=io3Z0ztRk1M Uploader: Black Hat Ethical Hacking
Topics: Youtube, video, Education, black hat ethical hacking, blackhat, blackhatethicalhacking, saintdrug,...
Hacking and InfoSec stuff
by FUTANTCOLLECTIVE
movies

eye 613

favorite 15

comment 0

Cyberpunk is a science fiction genre noted for its focus on "high tech and low life." The name is a portmanteau of cybernetics and punk, and was originally coined by Bruce Bethke as the title of his short story "Cyberpunk," published in 1983. I compiled all five parts into one. If you're a fan of the genre, please check out our other videos and music. WWW.FUTANT.NET Source: https://www.youtube.com/watch?v=wbp6G8do2_E Uploader: FUTANTCOLLECTIVE
Topics: Youtube, video, Education, Futant, Dystopia, Psychedelic, Electronica, Timothy Leary, Cyberpunk,...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 815

favorite 5

comment 0

Hello Everyone! This is SaintDruG for Black Hat Ethical Hacking . Todays Hacking Minutes Series, We will See how to take over a machine, dump the hash key from a user, and decrypt by cracking the hash key to reveal in plain text the password. Doing this, we will go through creating a payload, copying the payload remotely to a machine, in this example we will use a kali machine, running on a macbook air, and send it to a raspberry pi since, the rpi, has no 32bit or 64bit architecture, and uses...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr...
Hacking and InfoSec stuff
movies

eye 236

favorite 0

comment 0

Wardrive with Android & Map Vulnerable Networks Full Tutorial: http://bit.ly/WarDrive Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Wardriving has been around for decades, but it's only gotten easier as technology has improved to the point that you can get started with a simple smartphone. In this video, we'll show you how to map and explore the security of every network you walk or drive by on this episode of Cyber Weapons Lab. Follow Null...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 204

favorite 1

comment 0

Get Our Premium Ethical Hacking Bundle (90% Off): https://nulb.app/cwlshop How to Exfiltrate Data from a Mac Using Pictures Full Tutorial: https://nulb.app/x4kw8 Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 170 Compromising a computer is usually just the first part of a larger attack. A hacker must then figure out a way to sneak off with any stolen data without being detected. Today, in this Cyber Weapons Lab, we'll...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by cultdeadcow
movies

eye 242

favorite 3

comment 0

This is the very first episode of the Net Cafe series. It was shot on location at a cybercafe in San Francisco called CoffeeNet. It looks at the hacker culture and their influence on the early growth of the internet. Guests include Dan Farmer, author of SATAN and COPS; Elias Levi (aka Aleph 1), webmaster of underground.org and Bugtraq; also "Reid Fleming" and "White Knight" from Cult of the Dead Cow. Originally broadcast in 1996. Source:...
Topics: Youtube, video, Howto & Style, cult, of, the, dead, cow, cDc, PBS, satan, cops, bugtraq,...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 523

favorite 5

comment 0

Hello Everyone! In Today’s Hacking Minutes Series, we will focus on Post Exploitation where Shell is just the beginning. We will see how to take over a machine, dump all the hash keys from the system and decrypt by cracking the hash keys, depending on the hash type that we analyzed, to reveal in plain text the passwords. We used john, comes by default in Kali and it is a very old and known tool. If you want to crack faster and more complicated ones, you can use "crackstation", which...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking,...
Hacking and InfoSec stuff
movies

eye 379

favorite 2

comment 0

How to Automate Wi-Fi Hacking with Wifite2 on Kali Full Tutorial: http://bit.ly/Wifite2 Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Kali Linux comes with an array of tools designed to scan and attack Wi-Fi networks out of the box. We'll show you how to automate this process with Wifite2 on this episode of Cyber Weapons Lab. If you don't have Wifite2 installed, it's easy enough to do so. Wifite2 can target WPS, WPA, and WEP networks. And it uses...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by Source Code Deleted
movies

eye 479

favorite 8

comment 0

This is NOT my work. This is something I found in a back up from my old Server. I want to provide content for new people to become involved . It should be noted , that this is NOT reverse engineering like everyone says. This is intro to cracking software. I think for the most part the content doesn't exist on the internet. I think I still have the binaries too, when I find them I will upload them as well. When I find the binaries for practice I will upload them on the first video of this...
Topics: Youtube, video, Education, hacking, hacking tutorial, hacker, hackers, learn hacking, hack, hacking...
Hacking and InfoSec stuff
movies

eye 716

favorite 3

comment 0

How to Unlock Word & Excel Files That Have Passwords Full Tutorial: https://bit.ly/OfficePass Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie If you like to protect your Microsoft documents with a password, then you already know that the stronger the password, the more protected the file will be. However, on today's episode of Cyber Weapons Lab, we'll show you how to crack those passwords on Microsoft Office files, no matter how strong the...
Topics: Youtube, video, Howto & Style, wonderhowto, nullbyte, null byte, hack, hacking, hacker, hacks,...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 379

favorite 0

comment 0

Hello everyone! This is Godax, Today, we are going to show you how to setup the honeypot "Conpot" to attract hackers using "docker", what the different templates are made for and how you can detect if someone is accessing (or even attacking) it! For more information about the honeypot you can visit the official site at www.conpot.org or you can take a closer look at it on github: https://github.com/mushorg/conpot GitHub mushorg/conpot conpot - ICS/SCADA honeypot Support our...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr...
Hacking and InfoSec stuff
movies

eye 137

favorite 1

comment 0

In this video we take a look at Bellingcat's online investigation toolkit and how we can use it to enhance our OSINT investigations. The toolkit: https://docs.google.com/document/d/1BfLPJpRtyq4RFtHJoNpvWQjmGnyVkfE2HYoICKOGguA/edit# Article on Maritime OSINT techniques: https://medium.com/@raebaker/osint-on-the-ocean-maritime-intelligence-gathering-techniques-2ee39e554fe1 LicensePlateMania: https://www.licenseplatemania.com/ Source: https://www.youtube.com/watch?v=WBx0fo_9meE Uploader:...
Topics: Youtube, video, Education, pentesting, physical penetration testing, picking, lock picking, attack,...
Hacking and InfoSec stuff
by cultdeadcow
movies

eye 263

favorite 3

comment 0

The early days of the web provided an outlet for people who wanted to explore ghosts, vampires, werewolves, and other scary things. This program looks at several such sites. Guests include Lady Carolin (Carrie Carolin) who runs cascade.net, a portal for Gothic sites and links to sites dealing with magic, haunted houses, halloween, the paranormal and the occult. Vinnie Corella and Phil Simon show off their site, stepcross.com and the game Bad Mojo in which you go through life as a cockroach....
Topics: Youtube, video, Howto & Style, cdc, cult, dead, cow, dark, side, web, carrie, carolin, goddess,...
Hacking and InfoSec stuff
by Google Students
movies

eye 911

favorite 6

comment 0

The Python language, while object-oriented, is fundamentally different from both C++ and Java. The dynamic and introspective nature of Python allow for language mechanics unlike that of static languages. This talk aims to enlighten programmers new to Python about these fundamentals, the language mechanics that flow from them and how to effectively put those to use. Among the topics covered are duck-typing, interfaces, descriptors, decorators, metaclasses, reference-counting and the...
Topics: Youtube, video, People & Blogs, Google, Students, Learning, Python
Hacking and InfoSec stuff
movies

eye 279

favorite 0

comment 0

How to Hijack MacOS Machines with EvilOSX Full Tutorial: http://bit.ly/EvilOSX Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie While many people consider macOS (aka Mac OS X) computers to be more secure, some of its most prominent features make it all the more damaging when infiltrated by a skilled attacker. On this episode of Cyber Weapons Lab, we'll teach you how to infiltrate a MacBook or other macOS computer using EvilOSX. Follow Null Byte on:...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by FPS Weapons
movies

eye 444

favorite 5

comment 0

PLEASE SUBSCRIBE AND LEAVE A LIKE :) This is a video on how to build an EMP generator. The device creates an electromagnetic pulse which disrupts electronics from about a meters range. The EMP works by sending an electric current through a magnetic field this being the magnetic coated copper wire. Be very care if making one of these because the high voltage capacitor will deliver a very painful shock when coming in contact with you, also if the device is used for malicious purposes it is seen...
Topics: Youtube, video, Entertainment, fps weapons, emp, emp jammer, how to make an emp jammer, how to make...
Hacking and InfoSec stuff
movies

eye 154

favorite 1

comment 0

Hello Everyone, Part 2 of 3 This is SaintDruG from blackhatethicalhacking.com Happy New year! Been a while, i know, but the wait is worth it, Been busy lately, but we promise, the new website launch will be worth it soon ! Pause + Read Later. Today will show you, how black hats, real fast, what they can do using their skill, just time it, and each second that passes, they are actually flowing through security protocols, gathering info, so they can prepare the right tool, editing it to their...
Topics: Youtube, video, Howto & Style, Black Hat Ethical Hacking, saintdrug, mitm, bettercap,...
Hacking and InfoSec stuff
movies

eye 310

favorite 2

comment 0

Our Premium Ethical Hacking Bundle Is 90% Off: https://nulb.app/cwlshop Besside-ng Is One Reason Wi-Fi Hacking Is Easy Full Tutorial: https://nulb.app/x43sf Subscribe to Null Byte: https://goo.gl/J6wEnH Cyber Weapons Lab, Episode 187 Hackers, pentesters, cybersecurity specialists, and other tech-savvy individuals can hack Wi-Fi passwords fairly easily, and tools like Besside-ng help them do it. Besside-ng is the hidden gem of the Aircrack-ng suite of Wi-Fi hacking tools. To use it, one just...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by TheNotSoCivilEngr
movies

eye 116

favorite 0

comment 0

Everyone should have a borescope in their kit, if a door is giving you trouble, breaking out the borescope can greatly improve your chances of getting around the handle and opening the door. My specific borescope is linked below: https://www.amazon.com/gp/product/B07PBZ5Z66/ref=ppx_yo_dt_b_asin_title_o09_s00?ie=UTF8&psc=1 Bluetooth option: DEPSTECH Wireless Endoscope, IP67 Waterproof WiFi Borescope Inspection 2.0 Megapixels HD Snake Camera for Android and iOS Smartphone, iPhone, Samsung,...
Topics: Youtube, video, People & Blogs, lock, lockpicking, pentesting, physical penetration testing,...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 217

favorite 2

comment 0

Hello Everyone, Today's Learning Linux Series, gives you the opportunity, to see you useful commands for Kali Linux. The commands that we will be looking at today are : pwd command: print working directory ls command: List information about files cd command: Change Directory echo command: Display message on screen mkdir command: Create new folders cp command: Copy one or more files to another location rm command: Remove files rmdir command: Remove folders rm command: Remove files We hope you...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking,...
Hacking and InfoSec stuff
by Tor Project
movies

eye 236

favorite 1

comment 0

https://blog.torproject.org/blog/releasing-tor-animation See this video in your language: Arabic https://www.youtube.com/watch?v=6v0ga4f2myY English https://www.youtube.com/watch?v=JWII85UlzKw Farsi https://www.youtube.com/watch?v=Y16VGmL5778 French https://www.youtube.com/watch?v=Mnrn3y-Qbyk German https://www.youtube.com/watch?v=fzeBfbHb0ZY Polish https://www.youtube.com/watch?v=Fx7bFE1v5m8 Spanish https://www.youtube.com/watch?v=Sz_J6vJ4MYw Source: https://www.youtube.com/watch?v=6v0ga4f2myY...
Topics: Youtube, video, Education, Online Privacy, Anonymity, Tor (Software), Arabic, Surveillance,...
Hacking and InfoSec stuff
movies

eye 151

favorite 1

comment 0

Unlocking Motion-Sensor Secured Doors With Air Duster (Canned Air) by Samy Kamkar (read more...) After testing various methods purportedly used to defeat motion sensors that are used to unlock doors, I found none of the methods documented on the Internet or that I heard about actually work. After performing my own research, I discovered a new technique that actually does work, and is simple and inexpensive -- using air duster (canned air) to set off the PIR (passive infrared) motion sensor from...
Topics: Youtube, video, Science & Technology, applied hacking, samy kamkar, canned air, air duster,...
Hacking and InfoSec stuff
movies

eye 200

favorite 0

comment 0

Millions of people are working remotely – and attackers are taking advantage. As more workers log into residential WiFi networks, cybercriminals have plenty of opportunities to launch attacks. Varonis security researcher Kody Kinzie created this video to show how easy it is for an attacker to launch an attack using an off-the-shelf hacking tool and trick an unsuspecting user into giving up their WiFi password. Source: https://www.youtube.com/watch?v=nHaJUjhfjjI Uploader: SecurityFWD
Topics: Youtube, video, Science & Technology, Hacking, Hacking WiFi, Airgeddon, Data Security, Varonis,...
Hacking and InfoSec stuff
by Source Code Deleted
movies

eye 113

favorite 1

comment 0

Hello World of our Rootkit. JOIN OUR DISCORD!: https://discord.gg/wqKQcmK Zayka's gaming stream Join her army and help the bunnies! https://www.twitch.tv/zayka_gamer_girl Source: https://www.youtube.com/watch?v=nWezK0ydgFA Uploader: Source Code Deleted
Topics: Youtube, video, Education, rootkit, rootkit virus, rootkit - dreams, rootkit removal, rootkit...
Hacking and InfoSec stuff
movies

eye 265

favorite 2

comment 0

Airgeddon Used for an Evil Twin AP with Captive Portal Full Video: https://nulb.app/x4a3p Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 010 (Recut - Partial Episode) Wi-Fi networks can be set up by smart IT people, but that doesn't mean the users of the network are similarly tech-savvy. We'll demonstrate how bad actors can use am evil twin attack to steal Wi-Fi passwords. Essentially, they kick a user off their trusted...
Topics: Youtube, video, Howto & Style, wht, nullbyte, hacker, hacks, hackers, how to hack, howto, how...
Hacking and InfoSec stuff
movies

eye 208

favorite 2

comment 0

Why Your Wi-Fi Passwords Aren't Safe Full Video: https://nulb.app/x4kmc Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 133 (Recut - Partial Episode) The WPA and WPA2 Wi-Fi security standards are incredibly easy to crack if the password used isn't strong. That's why it's important to always use a strong password, something you should use for any site or device you log in to, not just your Wi-Fi network. The process of...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by Ethereum
movies

eye 621

favorite 0

comment 0

Presented by Stephan Tual, CCO - (Twitter: @stephantual) Companion Document: https://medium.com/@ethereumproject/4790bf5f7743 Ethereum is a platform that makes it possible for any developer to write and distribute next-generation decentralized applications. Borrowing the concept of distributed consensus and cryptographic proof that makes cryptocurrencies such as Bitcoin so effective in trustless payments, Ethereum extends the use of these technologies to trustless agreements. This allows...
Topics: Youtube, video, Science & Technology, ethereum, smart contracts, decentralized applications,...
Hacking and InfoSec stuff
by Source Code Deleted
movies

eye 165

favorite 3

comment 0

Zayka's Gaming Twitch : Follow her for gaming stuff https://www.twitch.tv/zayka_gamer_girl JOIN OUR DISCORD !: https://discord.gg/wqKQcmK GIT HUB | Source Code https://github.com/SourceCodeDeleted/rootkitdev-linux Source: https://www.youtube.com/watch?v=D3Mo7Z74Hfs Uploader: Source Code Deleted
Topics: Youtube, video, Education, hacking, ethical hacking, hack, hacker, learn hacking, learn ethical...
Hacking and InfoSec stuff
movies

eye 352

favorite 4

comment 0

How to Use Wireshark to See Phone Traffic Full Tutorial: https://nulb.app/z4m2t Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 131 Ever wonder what someone across the room is doing on their phone? With Wireshark, a pentester, white hat hacker, etc. can analyze the packets flowing through a network and provide an alarming amount of information about a target. We'll show you how to spy on network traffic, on this episode of...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 468

favorite 1

comment 0

by SaintDruG / Anon for: Blackhatethicalhacking.com This is for Educational Purpose Only! Anything you do with this that creates bad results is your responsibility! Support our work on Patreon: https://www.patreon.com/blackhatethicalhacking Source: https://www.youtube.com/watch?v=mLxOVWQhEZ0 Uploader: Black Hat Ethical Hacking
Topics: Youtube, video, Education, owasp, zap, nikto, w3af, blackhatethicalhacking, black hat ethical...
Hacking and InfoSec stuff
by Source Code Deleted
movies

eye 113

favorite 0

comment 0

Zayka's Gaming Twitch : Follow her for gaming stuff https://www.twitch.tv/zayka_gamer_girl JOIN OUR DISCORD !: https://discord.gg/wqKQcmK GIT HUB | Source Code https://github.com/SourceCodeDeleted/rootkitdev-linux Source: https://www.youtube.com/watch?v=q5I8B6b-BoY Uploader: Source Code Deleted
Topics: Youtube, video, Education, hacking, ethical hacking, hack, wifi hacking, learn hacking, learn...
Hacking and InfoSec stuff
movies

eye 118

favorite 0

comment 0

JOIN OUR DISCORD!: https://discord.gg/wqKQcmK Zayka's gaming stream Join her army and help the bunnies! https://www.twitch.tv/zayka_gamer_girl GIT HUB | Source Code https://github.com/SourceCodeDeleted/rootkitdev-linux Source: https://www.youtube.com/watch?v=jdPS_qcxS10 Uploader: Source Code Deleted
Topics: Youtube, video, Education, hacking, hack, hacker, learn hacking, mobile hacking, why i quit...
Hacking and InfoSec stuff
by 13Cubed
movies

eye 53

favorite 0

comment 0

The previous episode of “Introduction to Hashcat” proved to be quite popular, so my colleague Mike Peterson and I decided to create part two. In this episode, we’re going to perform a brief introduction of one of the new features available in Hashcat 4.0, cover an optional flag you may find especially useful, and lastly, look at the PRINCE attack and a variation of that attack dubbed PRINCEPTION. If you haven’t yet watched Introduction to Hashcat, it is recommended you do so prior to...
Topics: Youtube, video, Science & Technology, Hashcat, crack password, crack passwords, crack...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 155

favorite 2

comment 0

Hello Everyone! This is SaintDruG for Black Hat Ethical Hacking . Todays Hows To Mini Series, involves recon using Nmap Part 2 of 2 Disclaimer: This Video is for Educational Purpose Only, what you do is your responsibility and Black Hat Ethical Hacking, SaintDruG or anyone involved, is not held accounted for if any damage for any reason occurs. The Black Hat Way, See, Reconnaissance, is time consuming. Its the only way to attack without it, you cannot do much. Techniques used by Black Hat, for...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr...
Hacking and InfoSec stuff
by aantonop
movies

eye 581

favorite 1

comment 1

This is the first part of a talk which took place on February 22nd 2017 at the inaugural Bloktex Conference pre-event, hosted at Technology Park in Kuala Lumpur, Malaysia: https://antonopoulos.com/event/kualalumpur/ RELATED: A collection of my talks on Bitcoin - https://www.youtube.com/playlist?list=PLPQwGV1aLnTthcG265_FYSaV24hFScvC0 A collection of Q&A on various topics in Bitcoin - https://www.youtube.com/playlist?list=PLPQwGV1aLnTsHvzevl9BAUlfsfwFfU7aP Andreas M. Antonopoulos is a...
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
Topics: Youtube, video, Science & Technology, bitcoin, blockchain, network, internet, money
Hacking and InfoSec stuff
movies

eye 119

favorite 1

comment 0

Get Our Premium Ethical Hacking Bundle (90% Off): https://nulb.app/cwlshop How to Use Sparrow-wifi to Conduct Wireless Reconnoissance Full Tutorial: https://nulb.app/z51lg Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 182 Recon is an important step in various hacking scenarios. Gathering data on the network environment around you can give you an edge in finding and exploiting vulnerabilities in the devices you're...
Topics: Youtube, video, Howto & Style, nullbyte, null byte, hack, hacking, hacker, hacks, hackers, how...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 381

favorite 2

comment 0

Hello Everyone! In today's Armitage Series Part (4), we offer you the opportunity to show you how Armitage is used in general focusing on bruteforcing techniques via SSH. In the previous video we saw how to Elevate from Shell to a Meterpreter Session. In this Hacking Minutes Series we will be talking about BruteForcing Via SSH and how you can do it. There are a few methods of performing an SSH brute-force attack that will ultimately lead to the discovery of valid login credentials, many...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, Ethical Hacking, Black Hat,...
Hacking and InfoSec stuff
by a16z
movies

eye 81

favorite 1

comment 0

Aging has always been inevitable -- and mysterious in when and how it happens. But now, we're finally beginning to understand the processes behind the deterioration of tissues, cells, functions -- collectively described as "aging" -- that is also the greatest single cause of countless chronic diseases. If we can understand aging, we can perhaps begin to slow it. So in this short talk first delivered at a16z's annual Summit, BIOAGE CEO Kristen Fortney (and PhD in medical biophysics as...
Topics: Youtube, video, Science & Technology, biology, aging, chronic disease, technology, longevity,...
Hacking and InfoSec stuff
movies

eye 108

favorite 0

comment 0

Back with another OSINT story and challenge! There are two challenges to this weeks photo: 1. The building with the red arrow 2. The site the photo was taken from The thread this episode was based on: https://twitter.com/EmilyGorcenski/status/1239306776153071618 A high res version of this weeks challenge: https://drive.google.com/file/d/1hgejC5U8k9O4NqZc9GB0dA2C_dUs2z1_/view?usp=sharing Source: https://www.youtube.com/watch?v=RrVNR2l8QUs Uploader: TheNotSoCivilEngr
Topics: Youtube, video, People & Blogs, lock, lockpicking, pentesting, physical penetration testing,...
Hacking and InfoSec stuff
movies

eye 95

favorite 0

comment 0

Zayka's Gaming Twitch : Follow her for gaming stuff https://www.twitch.tv/zayka_gamer_girl JOIN OUR DISCORD !: https://discord.gg/wqKQcmK GIT HUB | Source Code https://github.com/SourceCodeDeleted/rootkitdev-linux Source: https://www.youtube.com/watch?v=XJ2w98nRe7Q Uploader: Source Code Deleted
Topics: Youtube, video, Education, hacking, learn hacking, learn ethical hacking for free, hacking course,...
Hacking and InfoSec stuff
movies

eye 92

favorite 0

comment 0

How to Find Vulnerable Devices Online with Shodan Full Tutorial: https://nulb.app/x3ldp Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Shodan is a search engine that indexes nearly every device connected to the internet. This makes it much easier to search for devices poorly set up and easy to infiltrate. On this episode of Cyber Weapons Lab, we'll show you how to use Shodan to search for vulnerable devices around the world, including webcams and...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 213

favorite 1

comment 0

Emily Wilson, Director of Analysis, Terbium Labs The reality of the dark web goes against industry reports. Most of the dark web is legal, even ridiculous activity amidst drugs, fraud and other crimes. This session will look at the funny and absurd. https://www.rsaconference.com/events/us17 Source: https://www.youtube.com/watch?v=sCaiWFyKVBY Uploader: RSA Conference Upload date: 2017-02-22
Topics: Youtube, video, Science & Technology, rsa, rsaconference, rsac, data security, identity theft,...
Hacking and InfoSec stuff
by Source Code Deleted
movies

eye 100

favorite 0

comment 0

I am uploading these slowly . The code is done for this part , I am just wanting to make sure that the information is presented well. Zayka's Gaming Twitch : Follow her for gaming stuff https://www.twitch.tv/zayka_gamer_girl JOIN OUR DISCORD !: https://discord.gg/wqKQcmK GIT HUB | Source Code https://github.com/SourceCodeDeleted/rootkitdev-linux Source: https://www.youtube.com/watch?v=6C-mysDhSs8 Uploader: Source Code Deleted
Topics: Youtube, video, Education, rootkit, root kit, development, driver, linux, programming, programmer,...
Hacking and InfoSec stuff
by 13Cubed
movies

eye 135

favorite 0

comment 0

An introduction to Hashcat, a cross-platform CPU and GPU password “recovery” tool. We will start with a basic overview of the minimum required arguments necessary to use Hashcat, and then walk through a series of exercises to recover (crack) NT hashes, starting with a dictionary/wordlist attack, a rule-based variation of that attack, a brute-force attack, and lastly, a combinator attack. The resources used in the video are listed below, in order of appearance. Wordlists (RockYou, et al.):...
Topics: Youtube, video, Science & Technology, Hashcat, oclHashcat, cudaHashcat, crack password, crack...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 306

favorite 1

comment 0

Hello Everyone, SaintDruG with another Hacking Minutes Episode for Black Hat Ethical Hacking. We will see how after having access to a website, or exploiting a cpanel, or credentials and you can transfer files, using a modified custom web shell that you can download for testing purposes only, how fast Black Hats work, escalate, and easy they can perform post exploitations, the power of uploading any file, to hackers has a different mindset, they can put code in a file, rename it to an extension...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 232

favorite 0

comment 0

Hello & Welcome to our "Learning Linux" Series. Brought to you by BlackHatEthicalHacking.com by Godax. How to Successfully Update, Upgrade and Dist Upgrade your Kali Linux Disclaimer: This Video is for Educational Purpose Only, what you do is your responsibility and Black Hat Ethical Hacking, Godax or anyone involved, is not held accounted for if any damage for any reason occurs. Now that we got the disclaimer out of the way, lets begin. In this demo, what you will see is: Stay...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr...
Hacking and InfoSec stuff
movies

eye 85

favorite 2

comment 0

How to Install Homebrew & Sshtrix on macOS Full Tutorial: http://bit.ly/MacHomebrew Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Homebrew is a convenient package manager for macOS systems every hacker should be aware of. Although Macs aren't thought of as hacking machines, they can be turned into one with just a couple simple commands. Today, we'll show you how to crack SSH with your Mac using Sshtrix and Homebrew on this episode of Cyber...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by TheNotSoCivilEngr
movies

eye 66

favorite 1

comment 0

Today we are going to use the ESP Key to read and replay a credential on a card reader. Purchase the ESP Key here: https://redteamtools.com/electronic-attacks/espkey Purchase the Punch Down tool here: https://redteamtools.com/avx-9176-1-4-inch-hex-punch-down-tool Source: https://www.youtube.com/watch?v=uSNLBh-4jRo Uploader: TheNotSoCivilEngr
Topics: Youtube, video, People & Blogs, lock, lockpicking, pentesting, physical penetration testing,...
Hacking and InfoSec stuff
by Google Developers
movies

eye 348

favorite 2

comment 0

Google Python Class Day 1 Part 2: Lists, Sorting, and Tuples. By Nick Parlante. Support materials and exercises: http://code.google.com/edu/languages/google-python-class Source: https://www.youtube.com/watch?v=EPYupizJYQI Uploader: Google Developers Upload date: 2010-03-01
Topics: Youtube, video, Science & Technology, google, programming, language, python, tutorial
Hacking and InfoSec stuff
movies

eye 239

favorite 0

comment 0

How to Run Kali Linux on any Android Device Without Rooting Full Tutorial: http://bit.ly/KaliAndroid Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie For a beginner, Kali Linux is the best OS to learn simple hacking tools on, but not everyone has access to a machine that can run it. However, with over 2 billion Android smartphones around the world, chances are you already have a device capable of running Kali. Today, we'll show you how to download and...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 223

favorite 0

comment 0

Hello Everyone, Part 3 of 3 This is SaintDruG from blackhatethicalhacking.com Happy New year! Been a while, i know, but the wait is worth it, Been busy lately, but we promise, the new website launch will be worth it soon ! Pause + Read Later. Today will show you, how black hats, real fast, what they can do using their skill, just time it, and each second that passes, they are actually flowing through security protocols, gathering info, so they can prepare the right tool, editing it to their...
Topics: Youtube, video, Howto & Style, Black Hat Ethical Hacking, saintdrug, mitm, bettercap,...