Skip to main content

Hacking and InfoSec stuff



rss RSS

1,122
RESULTS


Show sorted alphabetically

Show sorted alphabetically

SHOW DETAILS
up-solid down-solid
eye
Title
Date Archived
Creator
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 1,593

favorite 3

comment 0

by SaintDruG / Anon for: Blackhatethicalhacking.com This is for Educational Purpose Only! Anything you do with this that creates bad results is your responsibility! Support our work on Patreon: https://www.patreon.com/blackhatethicalhacking Source: https://www.youtube.com/watch?v=R9Ee16XyrEU Uploader: Black Hat Ethical Hacking
Topics: Youtube, video, Education, linux, wifite, hacking, cracking, wifi crack, blackhatlessons, black hat...
Hacking and InfoSec stuff
movies

eye 4,560

favorite 9

comment 0

How to Crack Weak Wi-Fi Passwords Full Tutorial: http://bit.ly/ParrotAir Subscribe to Null Byte: https://goo.gl/J6wEnH In this edition of Cyber Weapons Lab, we explore hacking Wi-Fi with bad passwords. We'll show you how using bad passwords can let anyone with a simple wireless network adapter and laptop hack a network with almost no resistance. Follow Null Byte on: Twitter: https://twitter.com/nullbytewht Flipboard: http://flip.it/3.Gf_0 Source: https://www.youtube.com/watch?v=ejTPWPGP0GA...
Topics: Youtube, video, People & Blogs, null byte, airgeddon, wifi hacking, wpa, wpa2, cracking,...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 1,356

favorite 9

comment 0

Hello Everyone! This is SaintDruG for Black Hat Ethical Hacking . Todays Hacking Minutes Series, Machines used: Mac OS: Sierra High / Raspberry Pi Runing Parrot OS We will create a backdoor PHP, and then run apache2 to start our webserver hosting a webpage on a raspberry pi. That will be the victim, so after creating the backdoor, we will copy it on that webserver. We will access our backdoor and get a shell! Giving us a lot of power and access on that webserver, basically own the machine....
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 847

favorite 3

comment 0

by SaintDruG / Anon for: Blackhatethicalhacking.com This is for Educational Purpose Only! Anything you do with this that creates bad results is your responsibility! Support our work on Patreon: https://www.patreon.com/blackhatethicalhacking Source: https://www.youtube.com/watch?v=V5TUkRMEW0Q Uploader: Black Hat Ethical Hacking
Topics: Youtube, video, Education, linux, blackhatethicalhacking, black hat ethical hacking, hacking,...
How to Run Kali as a Windows Subsystem for Linux Full Tutorial: http://bit.ly/KaliAsWSL Subscribe to Null Byte: https://goo.gl/J6wEnH Microsoft's Windows Subsystem for Linux (WSL) is a great way to utilize Kali on your Windows computer without the need for a virtual machine. However, it is slightly limited right to what you can do, since security restrictions prevent the use of raw sockets, so tools like Nmap won't work and you won't be able to set your Wi-Fi adapter into promiscuous mode (or...
Topics: Youtube, video, Science & Technology, hacking, wonderhowto, wonder how to, hack, hacker,...
How to Phish for WiFi Passwords on Kali with Wifiphisher Full Tutorial: http://bit.ly/WiFiPhish Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie While there are plenty of tools available to hackers to crack passwords, several of which we've covered, sometimes a less direct approach is best. Social engineering attacks can be very successful assuming your target is tech illiterate. On this episode of Cyber Weapons Lab, we'll show you Wifiphisher, a tool...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 484

favorite 0

comment 0

An exclusive Tomorrow Unlocked documentary. One day in May 2017, computers all around the world suddenly shut down. A malware called WannaCry asks for a ransom. The epidemic suddenly stops, because a young, British researcher finds a killswitch, by accident. Source: https://www.youtube.com/watch?v=vveLaA-z3-o Uploader: Tomorrow Unlocked
Topics: Youtube, video, Science & Technology, tomorrowunlocked
Hacking and InfoSec stuff
by cultdeadcow
movies

eye 286

favorite 0

comment 0

CULT OF THE DEAD COW released Back Orifice 2000 at DEF CON 7, held in July 1999 at the Alexis Park Resort in Las Vegas. Withheld from the public for 20 years, this candid footage taken inside the Suite of the Elite provides an eyewitness glimpse of the final hours leading up to this unforgettable point in hacker culture. Back during the days of media demonization of hackers, before industry embraced bug bounties, and before the mainstream adoption of Linux, cDc found a way to raise public...
Topics: Youtube, video, Science & Technology, Cult of the Dead Cow, Ninja Strike Force, Back Orifice...
Hacking and InfoSec stuff
movies

eye 1,913

favorite 17

comment 0

Let’s take a journey back to the 1980’s and beyond, to discover the origins of the Cyberpunk movement, in literature, cinema, television, video games, comics and more! In this documentary miniseries, we will discover the wonders of Cyberpunk, dating back to the 1940’s, all the way through 1989, with each successive episode taking on a new decade. Co-written by Shalashaskka https://www.youtube.com/c/Shalashaskka 2:19 - The Origins of Cyberpunk 4:14 - PROTO-PUNK 4:58 - Philip K. Dick 5:30 -...
Topics: Youtube, video, Gaming, neuromancer, william gibson, neuromancer movie, mike pondsmith, akira,...
Hacking and InfoSec stuff
by a16z
movies

eye 1,693

favorite 5

comment 0

As a former Department of Justice prosecutor, Katie Haun set up the first-ever “cryptocurrency task force” for the U.S. government. She also led the investigations into the Mt. Gox hack and the corrupt agents on the Silk Road task force -- the first cases of the U.S. government using the bitcoin blockchain to fight fraud, not just against criminals but against their own. Haun -- Coinbase board member, Stanford lecturer, and now general partner on a16z crypto -- shares that story in this...
Topics: Youtube, video, Science & Technology, crypto, Silk Road, payments, unbanked, hyperinflation
Hacking and InfoSec stuff
movies

eye 1,289

favorite 1

comment 0

https://blog.torproject.org/blog/releasing-tor-animation See this video in your language: Arabic https://www.youtube.com/watch?v=6v0ga4f2myY English https://www.youtube.com/watch?v=JWII85UlzKw Farsi https://www.youtube.com/watch?v=Y16VGmL5778 French https://www.youtube.com/watch?v=Mnrn3y-Qbyk German https://www.youtube.com/watch?v=fzeBfbHb0ZY Polish https://www.youtube.com/watch?v=Fx7bFE1v5m8 Spanish https://www.youtube.com/watch?v=Sz_J6vJ4MYw Source: https://www.youtube.com/watch?v=JWII85UlzKw...
Topics: Youtube, video, Education, Tor (Software), Online Privacy, Anonymity, Privacy, Surveillance,...
Hacking and InfoSec stuff
movies

eye 752

favorite 4

comment 0

by SaintDruG / Anon for: Blackhatethicalhacking.com This is for Educational Purpose Only! Anything you do with this that creates bad results is your responsibility! Support our work on Patreon: https://www.patreon.com/blackhatethicalhacking Source: https://www.youtube.com/watch?v=dJB9NG_hZOo Uploader: Black Hat Ethical Hacking
Topics: Youtube, video, Education, hacking twitter, hacking facebook, blackhat, black hat lessons,...
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 839

favorite 1

comment 0

Sergey Golovanov Igor Soumenkov Kaspersky Lab In 2016 Kaspersky Lab employees participated in incident response cases that took place in dozens of financial institutions around the globe. In most cases we had to provide forensics analysis of ATMs. When Carbanak attack details were announced at #TheSAS2015, criminals also found this information useful. Other criminal groups eagerly adopted the same TTPs. Banks started to suffer from attacks on ATMs including both, malware and physical access....
Topics: Youtube, video, Entertainment, #TheSAS2017, KASPERSKY LAB, cyber security, itsecurity, conference
Hacking and InfoSec stuff
movies

eye 1,425

favorite 0

comment 0

Kim Zetter, Journalist, Author, Speaker, Freelance journalist Gary Brown, Professor of Cyber Security, Marine Corps University Oren Falkowitz, CEO and Co-Founder, Area 1 Security Roy Katmor, Co-Founder and CEO, enSilo Samples of malware in the wild hint how digital weapons today may be more powerful and stealthy than Stuxnet. Cyberwar experts will explore the current state of the art and future of digital weaponry. https://www.rsaconference.com/events/us17 Source:...
Topics: Youtube, video, Science & Technology, Cyber Warfare, Zero Day Vulnerability, Hackers &...
Hacking and InfoSec stuff
by GoogleTechTalks
movies

eye 1,937

favorite 6

comment 0

Google Tech Talks February 21, 2007 ABSTRACT The Python language, while object-oriented, is fundamentally different from both C++ and Java. The dynamic and introspective nature of Python allow for language mechanics unlike that of static languages. This talk aims to enlighten programmers new to Python about these fundamentals, the language mechanics that flow from them and how to effectively put those to use. Among the topics covered are duck-typing, interfaces, descriptors, decorators,...
Topics: Youtube, video, Howto & Style, python, google, howto
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 587

favorite 3

comment 0

Hello Everyone! This is SaintDruG for Black Hat Ethical Hacking . Todays Hacking Minutes Series, We will See how to take over a machine, dump the hash key from a user, and decrypt by cracking the hash key to reveal in plain text the password. Doing this, we will go through creating a payload, copying the payload remotely to a machine, in this example we will use a kali machine, running on a macbook air, and send it to a raspberry pi since, the rpi, has no 32bit or 64bit architecture, and uses...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr...
Hacking and InfoSec stuff
by Source Code Deleted
movies

eye 806

favorite 6

comment 0

This is NOT my work. This is something I found in a back up from my old Server. I want to provide content for new people to become involved . It should be noted , that this is NOT reverse engineering like everyone says. This is intro to cracking software. I think for the most part the content doesn't exist on the internet. I think I still have the binaries too, when I find them I will upload them as well. I also would like to add to this, that the places where you normally can download this for...
Topics: Youtube, video, Education, software cracking, cracking, cracking software, software, hacking, crack...
Hacking and InfoSec stuff
by The Modern Rogue
movies

eye 200

favorite 1

comment 0

Go to https://getroman.com/rogue for a free online visit and free two-day shipping. Thanks to Roman for sponsoring this video! 🡇 --------------- extra material & accreditation --------------- 🡇 Next time we're going to put on glasses that let you see magnetic influence. Unfortunately it does so by coating your retinas in iron filings, so Jason has to wear two eye patches for the next month to recover. We'll figure it out though, just need a couple more test runs....
Topics: Youtube, video, Entertainment, modern rogue, brian brushwood, jason murphy, credit card...
Hacking and InfoSec stuff
by TheNotSoCivilEngr
movies

eye 112

favorite 0

comment 0

Lets switch gears and instead of picking locks, we will bypass them! I showcase my upgraded Sparrows under door tool (UDT) and show you its various applications. Source: https://www.youtube.com/watch?v=5y4kNsS38F0 Uploader: TheNotSoCivilEngr
Topics: Youtube, video, People & Blogs, lock, lockpicking, pentesting, physical penetration testing,...
Hacking and InfoSec stuff
movies

eye 309

favorite 0

comment 0

by SaintDruG / Anon for: Blackhatethicalhacking.com This is for Educational Purpose Only! Anything you do with this that creates bad results is your responsibility! Support our work on Patreon: https://www.patreon.com/blackhatethicalhacking Source: https://www.youtube.com/watch?v=mLxOVWQhEZ0 Uploader: Black Hat Ethical Hacking
Topics: Youtube, video, Education, owasp, zap, nikto, w3af, blackhatethicalhacking, black hat ethical...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 219

favorite 0

comment 0

Hello everyone! This is Godax, Today, we are going to show you how to setup the honeypot "Conpot" to attract hackers using "docker", what the different templates are made for and how you can detect if someone is accessing (or even attacking) it! For more information about the honeypot you can visit the official site at www.conpot.org or you can take a closer look at it on github: https://github.com/mushorg/conpot GitHub mushorg/conpot conpot - ICS/SCADA honeypot Support our...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr...
Hacking and InfoSec stuff
movies

eye 227

favorite 1

comment 0

by SaintDruG / Anon for: Blackhatethicalhacking.com This is for Educational Purpose Only! Anything you do with this that creates bad results is your responsibility! Support our work on Patreon: https://www.patreon.com/blackhatethicalhacking Source: https://www.youtube.com/watch?v=SzeUva9-DmU Uploader: Black Hat Ethical Hacking
Topics: Youtube, video, Education, black hat ethical hacking, black hat, ethical hacking, saintdrug,...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 216

favorite 0

comment 0

by SaintDruG / Anon for: Blackhatethicalhacking.com This is for Educational Purpose Only! Anything you do with this that creates bad results is your responsibility! Support our work on Patreon: https://www.patreon.com/blackhatethicalhacking Source: https://www.youtube.com/watch?v=rKBHep2-NF8 Uploader: Black Hat Ethical Hacking
Topics: Youtube, video, Education, blackhatethicalhacking, black hat ethical hacking, saintdrug, live...
Hacking and InfoSec stuff
by aantonop
movies

eye 452

favorite 1

comment 1

This is the first part of a talk which took place on February 22nd 2017 at the inaugural Bloktex Conference pre-event, hosted at Technology Park in Kuala Lumpur, Malaysia: https://antonopoulos.com/event/kualalumpur/ RELATED: A collection of my talks on Bitcoin - https://www.youtube.com/playlist?list=PLPQwGV1aLnTthcG265_FYSaV24hFScvC0 A collection of Q&A on various topics in Bitcoin - https://www.youtube.com/playlist?list=PLPQwGV1aLnTsHvzevl9BAUlfsfwFfU7aP Andreas M. Antonopoulos is a...
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
Topics: Youtube, video, Science & Technology, bitcoin, blockchain, network, internet, money
Hacking and InfoSec stuff
movies

eye 169

favorite 2

comment 0

How to Brute-Force Web App Credentials with Hatch Full Tutorial: http://bit.ly/HatchWin Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Brute-forcing is an essential hacking technique that's easier with certain services than others. Website login pages are frequent victims to attack and today we'll show you how easy it can be, even for a beginner, with a Python tool called Hatch, on this episode of Cyber Weapons Lab. Follow Null Byte on: Twitter:...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 51

favorite 0

comment 0

DDoS - Full Course Preview. Subscribe to our online Black Hat Ethical Hacking Lessons with over 1000+ Videos with a very flexible membership! http://www.blackhatethicalhacking.com/courses/ ** This Course is for Educational Purpose Only! What you do with it, is your responsibility and Black Hat Ethical Hacking, Or the Author are not to be held responsible for what motive you do with such info, it is to demonstrate, so you protect** Support our work on Patreon:...
Topics: Youtube, video, Education, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr Robot, Black...
Hacking and InfoSec stuff
movies

eye 51

favorite 1

comment 0

DDoS - Full Course Preview. Subscribe to our online Black Hat Ethical Hacking Lessons with over 1000+ Videos with a very flexible membership! http://www.blackhatethicalhacking.com... ** This Course is for Educational Purpose Only! What you do with it, is your responsibility and Black Hat Ethical Hacking, Or the Author are not to be held responsible for what motive you do with such info, it is to demonstrate, so you protect** Support our work on Patreon:...
Topics: Youtube, video, Education, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr Robot, Black...
Hacking and InfoSec stuff
movies

eye 111

favorite 1

comment 0

Hello Everyone! Todays Hacking Minutes Series, We will see how misconfigurations in Linux can leave you Vulnerable to Attackers. A lot of companies often misconfigure their services and run those applications or frameworks by default without knowing that they can put the company at risk and at the same time the data and information of their clientele that can be a high target for breach. These services are designed to give some remote access to the system but obviously, need to have some...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, Ethical Hacking, Black Hat,...
Hacking and InfoSec stuff
movies

eye 282

favorite 1

comment 0

by SaintDruG / Anon for: Blackhatethicalhacking.com This is for Educational Purpose Only! Anything you do with this that creates bad results is your responsibility! Support our work on Patreon: https://www.patreon.com/blackhatethicalhacking Source: https://www.youtube.com/watch?v=BGvPv0A-rcc Uploader: Black Hat Ethical Hacking
Topics: Youtube, video, Education, black hat ethicl hacking, blackhat, blackhatethicalhacking, saintdrug,...
Hacking and InfoSec stuff
movies

eye 606

favorite 6

comment 0

How to Run an OSINT Investigation on a Phone Number Full Tutorial: http://bit.ly/PhoneOSINT Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie IMPORTANT (JUNE 6, 2019): The OSINT Tools by Mike Bazzel featured in this guide were taken down from his website due to increased DDoS-style attacks, as well as DMCAs and cease-and-desists from some of the tools included. Phoneinfoga will still work in this guide, but for the others, you can try using each...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by BlackOpsPro07
movies

eye 443

favorite 8

comment 0

This video shows how hacking came to be and the logic and what hacking really is. Hacking is not only negative actions but it is divided into 3 categories black hat- illegal (bad) grey hat- both legal and illegal helps the community but at times does things that are illegal and white hat- such as security firms or individuals hacking for the security of others (good) Source: https://www.youtube.com/watch?v=PUf1d-GuK0Q Uploader: BlackOpsPro07
Topics: Youtube, video, Education, Hacker, Hackers, Hacking, guide, How to Hack, History of hacking
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 100

favorite 0

comment 0

Hello Everyone, Today we will show you, how to convert HTTPS requests into basic HTTP requests with SSL strip. In simple words, SSL strip is a type of man in the middle attack technique by which a website secured with HTTPS is downgraded to HTTP. or any traffic generating requests. SSL (Secure socket layer) is a transport layer cryptographic security technique implemented by most websites today , use this cryptographic encryption technique to secure online credentials of users login ID and...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr...
Hacking and InfoSec stuff
by Source Code Deleted
movies

eye 309

favorite 2

comment 0

This aims to be the first in a series of rootkit development. I hate theory so I will move on as soon as possible! Zayka's Gaming Twitch : Follow her for gaming stuff https://www.twitch.tv/zayka_gamer_girl JOIN OUR DISCORD !: https://discord.gg/wqKQcmK GIT HUB | Source Code https://github.com/SourceCodeDeleted/rootkitdev-linux Source: https://www.youtube.com/watch?v=8dZFJEc-8uI Uploader: Source Code Deleted
Topics: Youtube, video, Education, hacking, learn hacking, ethical hacking, hack, russian hacking, why i...
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 30

favorite 0

comment 0

Arbor Networks researcher Jose Nazario talks about new DDoS bot families, most previously unidentified. Nazario provides a tour of recently discovered DDoS bots from around the world showing the proliferation of attack models, adoption of .Net, and new modular functionalities. Source: https://www.youtube.com/watch?v=9uHXGLvWhps Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, DDoS, botnets, Jose Nazario, Ryan Naraine, Lab Matters,...
Hacking and InfoSec stuff
by a16z
movies

eye 210

favorite 1

comment 0

We're surrounded by materials in nature, and we've certainly also been using them for ages. But we've also been operating largely outside of nature on using -- and applying materials -- to the world around us, rather than working from within. In this short talk given at a16z's annual Summit, CEO of Apeel Sciences (and PhD in materials science) James Rogers talks about how we can not just borrow from nature... but use the latest scientific advances in tech to take what we've learned from the...
Topics: Youtube, video, Science & Technology, nature, biology, agriculture, technology, materials...
Hacking and InfoSec stuff
movies

eye 265

favorite 3

comment 0

by SaintDruG / Anon for: Blackhatethicalhacking.com This is for Educational Purpose Only! Anything you do with this that creates bad results is your responsibility! Support our work on Patreon: https://www.patreon.com/blackhatethicalhacking Source: https://www.youtube.com/watch?v=fef6TKs_sQ0 Uploader: Black Hat Ethical Hacking
Topics: Youtube, video, Education, linux, 2.0, linux, metasploit, armitage, mr robot, hacking, setoolkit,...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 73

favorite 0

comment 0

Hello Everyone, Today we will show you, how to configure root SSH on Kali Linux . The SSH protocol (also referred to as Secure Shell) is a method for secure remote login from one computer to another. It provides several alternative options for strong authentication, and it protects the communications security and integrity with strong encryption. Using Linux with different mind set is what sets the difference from a Black Hat, and a traditional Linux user. Let's see how secure shell works ,...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr...
Hacking and InfoSec stuff
movies

eye 621

favorite 3

comment 0

MagSpoof is a device that can spoof/emulate any magnetic stripe or credit card *wirelessly*. Full details at https://samy.pl/magspoof/ By Samy Kamkar - Allows you to store all of your credit cards and magstripes in one device - Works on traditional magstripe readers wirelessly (no NFC/RFID required) - Can disable Chip-and-PIN - Correctly predicts Amex credit card numbers + expirations from previous card number - Supports all three magnetic stripe tracks, and even supports Track 1+2...
Topics: Youtube, video, Science & Technology, hacking, reverse engineering, coding, samy kamkar,...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 81

favorite 0

comment 0

Learning Linux | mv Command Hello Everyone, Learning Linux | mv Command Hello Everyone, Today's Learning Linux Series offers you the opportunity so we can show you how to use the mv command. As already mentioned in previous videos, the mv command in Linux is used to move or rename files. It's easy to copy and move files in the terminal but there are a number of reasons why you might want to do this from the command line. In this tutorial, we are going to show you the basic usage of this tool...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking,...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 265

favorite 0

comment 0

Hello Everyone! In this video, we will see the usage of the Armitage tool which is the GUI of Metasploit by Rapid 7, and how to setup it up. Armitage is a cyber-attack management tool for the Metasploit Project. It is Java-based GUI frond-end for the Metasploit Framework and is included in Kali. The usage is the same job with Metasploit but Armitage is a different point of view of experience advanced post-exploitation features in the framework because you can perform many jobs at the same time,...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, Ethical Hacking, Black Hat,...
Hacking and InfoSec stuff
by Source Code Deleted
movies

eye 63

favorite 0

comment 0

I am uploading these slowly . The code is done for this part , I am just wanting to make sure that the information is presented well. Zayka's Gaming Twitch : Follow her for gaming stuff https://www.twitch.tv/zayka_gamer_girl JOIN OUR DISCORD !: https://discord.gg/wqKQcmK GIT HUB | Source Code https://github.com/SourceCodeDeleted/rootkitdev-linux Source: https://www.youtube.com/watch?v=6C-mysDhSs8 Uploader: Source Code Deleted
Topics: Youtube, video, Education, rootkit, root kit, development, driver, linux, programming, programmer,...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 216

favorite 1

comment 0

Hello & Welcome to our "How To" Series. Brought to you by BlackHatEthicalHacking.com by SaintDruG. How to Crack a zip file in less than 2 minutes. Machine Used: Raspberry Pi 3 running Latest Parrot OS with custom config Disclaimer: This Video is for Educational Purpose Only, what you do is your responsibility and Black Hat Ethical Hacking, SaintDruG or anyone involved, is not held accounted for if any damage for any reason occurs. Now that we got the disclaimer out of the way,...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr...
Hacking and InfoSec stuff
by Google Developers
movies

eye 270

favorite 1

comment 0

Google Python Class Day 1 Part 2: Lists, Sorting, and Tuples. By Nick Parlante. Support materials and exercises: http://code.google.com/edu/languages/google-python-class Source: https://www.youtube.com/watch?v=EPYupizJYQI Uploader: Google Developers Upload date: 2010-03-01
Topics: Youtube, video, Science & Technology, google, programming, language, python, tutorial
Hacking and InfoSec stuff
movies

eye 201

favorite 1

comment 0

by SaintDruG / Anon for: Blackhatethicalhacking.com This is for Educational Purpose Only! Anything you do with this that creates bad results is your responsibility! Support our work on Patreon: https://www.patreon.com/blackhatethicalhacking Source: https://www.youtube.com/watch?v=eWYCatnBL3E Uploader: Black Hat Ethical Hacking
Topics: Youtube, video, Education, mr robot, setoolkit, social engineering, black hat ethical hacking,...
Hacking and InfoSec stuff
movies

eye 196

favorite 1

comment 0

Hello Everyone, Part 1 of 3 This is SaintDruG from blackhatethicalhacking.com Happy New year! Been a while, i know, but the wait is worth it, Been busy lately, but we promise, the new website launch will be worth it soon ! Pause + Read Later. Today will show you, how black hats, real fast, what they can do using their skill, just time it, and each second that passes, they are actually flowing through security protocols, gathering info, so they can prepare the right tool, editing it to their...
Topics: Youtube, video, Howto & Style, Black Hat Ethical Hacking, SaintDruG, Black Hat, Kevin Mitnick,...
Hacking and InfoSec stuff
by TheNotSoCivilEngr
movies

eye 154

favorite 0

comment 0

Today we build a long range rfid card reader which can be used to grab badges in the field from surprisingly far away... Build items: Reader: https://www.amazon.com/gp/product/B00UX03TLO/ref=ppx_yo_dt_b_asin_title_o02_s00?ie=UTF8&psc=1 Battery Pack: https://www.amazon.com/gp/product/B00VE7HBMS/ref=ppx_yo_dt_b_asin_title_o04_s00?ie=UTF8&psc=1 ESPKey: https://redteamtools.com/espkey If you are interested in the HID Maxiprox you can get one here:...
Topics: Youtube, video, People & Blogs, lock, pentesting, physical penetration testing, tubular, key,...
Hacking and InfoSec stuff
by FPS Weapons
movies

eye 295

favorite 3

comment 0

PLEASE SUBSCRIBE AND LEAVE A LIKE :) This is a video on how to build an EMP generator. The device creates an electromagnetic pulse which disrupts electronics from about a meters range. The EMP works by sending an electric current through a magnetic field this being the magnetic coated copper wire. Be very care if making one of these because the high voltage capacitor will deliver a very painful shock when coming in contact with you, also if the device is used for malicious purposes it is seen...
Topics: Youtube, video, Entertainment, fps weapons, emp, emp jammer, how to make an emp jammer, how to make...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 72

favorite 0

comment 0

Hello Everyone, Today we will show you, How to change your Mac Address. Each network card has a physical static address assigned by the card manufacturer called MAC address (Media Access Control). This MAC address is actually written on your card and its physical, your Wi-Fi card it will never change. This address is used between devices to identify each other and to transfer packets to the right destination. Each packet has a source MAC address and destination MAC address. Now because the MAC...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 53

favorite 1

comment 0

Hello Everyone, Today we will show you, how to Split Session over SSH. Behind this fancy term hides a simple concept: Within one terminal window you can open multiple windows and split-views, how if you use remote computer using ssh and you want to open a new terminal tab to start a development server. When you open a new tab, it won’t be connected to the remote machine, which means you would have to ssh and navigate to the appropriate directory each time. Furthermore, if your Internet...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr...
Hacking and InfoSec stuff
movies

eye 134

favorite 0

comment 0

Hello Everyone! In today's Armitage Series Part (3), we offer you an opportunity showing you how Armitage is used in general. In the previous video we saw how you can exploit a host, you will have a meterpreter session on that host using Armitage. Running NMAP scans with Armitage we will find all open ports and the service version on Target. Shell is the beginning because there are some exploits which provide directly to the victim’s command shell instead of meterpreter session, we have tried...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, Ethical Hacking, Black Hat,...
Hacking and InfoSec stuff
movies

eye 108

favorite 2

comment 0

With the US leading the AI revolution for decades, it would almost seem inconceivable that China could catch up. But China is rapidly catching up with the US in AI applications. Kai-Fu Lee discusses the five key factors that enabled this rapid ascension: tenacious entrepreneurs, speed and execution, tremendous capital, a big market and bigger data, and techno-utilitarian government policies. Subscribe to O'Reilly on YouTube: http://goo.gl/n3QSYi Follow O'Reilly on: Twitter:...
Topics: Youtube, video, Science & Technology, O'Reilly Media (Publisher), O'Reilly, OReilly, OReilly...
Hacking and InfoSec stuff
by TheNotSoCivilEngr
movies

eye 245

favorite 0

comment 0

Today we take a look at what I believe is the most versatile and best single key to have. Purchase here: https://redteamtools.com/covert-jiggler-lock-picks Source: https://www.youtube.com/watch?v=qhmJR7aocBA Uploader: TheNotSoCivilEngr
Topics: Youtube, video, People & Blogs, lock, lockpicking, pentesting, physical penetration testing,...
Hacking and InfoSec stuff
by cultdeadcow
movies

eye 204

favorite 2

comment 0

The early days of the web provided an outlet for people who wanted to explore ghosts, vampires, werewolves, and other scary things. This program looks at several such sites. Guests include Lady Carolin (Carrie Carolin) who runs cascade.net, a portal for Gothic sites and links to sites dealing with magic, haunted houses, halloween, the paranormal and the occult. Vinnie Corella and Phil Simon show off their site, stepcross.com and the game Bad Mojo in which you go through life as a cockroach....
Topics: Youtube, video, Howto & Style, cdc, cult, dead, cow, dark, side, web, carrie, carolin, goddess,...
Hacking and InfoSec stuff
by 13Cubed
movies

eye 93

favorite 0

comment 0

As a continuation of the "Introduction to Malware Analysis" series, this episode covers another tool that will help us extract embedded content from within a PDF. We’ll first run the tool against evil.pdf from the last episode, and we’ll find that it can easily extract the embedded Word document that we were able to manually extract using pdf-parser. Then, we’ll run the tool against another sample PDF that contains embedded images. You may be surprised by the results. *** If you...
Topics: Youtube, video, Science & Technology, forensics, digital forensics, DFIR, malware analysis,...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 108

favorite 2

comment 0

Hello Everyone! This is SaintDruG for Black Hat Ethical Hacking . Todays Hows To Mini Series, involves recon using Nmap Part 2 of 2 Disclaimer: This Video is for Educational Purpose Only, what you do is your responsibility and Black Hat Ethical Hacking, SaintDruG or anyone involved, is not held accounted for if any damage for any reason occurs. The Black Hat Way, See, Reconnaissance, is time consuming. Its the only way to attack without it, you cannot do much. Techniques used by Black Hat, for...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr...
Hacking and InfoSec stuff
by Google Students
movies

eye 835

favorite 3

comment 0

The Python language, while object-oriented, is fundamentally different from both C++ and Java. The dynamic and introspective nature of Python allow for language mechanics unlike that of static languages. This talk aims to enlighten programmers new to Python about these fundamentals, the language mechanics that flow from them and how to effectively put those to use. Among the topics covered are duck-typing, interfaces, descriptors, decorators, metaclasses, reference-counting and the...
Topics: Youtube, video, People & Blogs, Google, Students, Learning, Python
Hacking and InfoSec stuff
movies

eye 124

favorite 0

comment 0

by SaintDruG / Anon for: Blackhatethicalhacking.com This is for Educational Purpose Only! Anything you do with this that creates bad results is your responsibility! Support our work on Patreon: https://www.patreon.com/blackhatethicalhacking Source: https://www.youtube.com/watch?v=io3Z0ztRk1M Uploader: Black Hat Ethical Hacking
Topics: Youtube, video, Education, black hat ethical hacking, blackhat, blackhatethicalhacking, saintdrug,...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 252

favorite 1

comment 0

Hello Everyone! In today's Armitage Series Part (4), we offer you the opportunity to show you how Armitage is used in general focusing on bruteforcing techniques via SSH. In the previous video we saw how to Elevate from Shell to a Meterpreter Session. In this Hacking Minutes Series we will be talking about BruteForcing Via SSH and how you can do it. There are a few methods of performing an SSH brute-force attack that will ultimately lead to the discovery of valid login credentials, many...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, Ethical Hacking, Black Hat,...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 82

favorite 1

comment 0

Hello Everyone! This is SaintDruG for Black Hat Ethical Hacking . Todays Hows To Mini Series, involves recon using Nmap Part 1 of 2 Disclaimer: This Video is for Educational Purpose Only, what you do is your responsibility and Black Hat Ethical Hacking, SaintDruG or anyone involved, is not held accounted for if any damage for any reason occurs. The Black Hat Way, See, Reconnaissance, is time consuming. Its the only way to attack without it, you cannot do much. Techniques used by Black Hat, for...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr...
Hacking and InfoSec stuff
by Source Code Deleted
movies

eye 110

favorite 0

comment 0

In this video we will hook syscall_read. This is critical thing you must understand for making a Rootkit and interacting with the system calls. Like and Click the bell. Zayka's Gaming Twitch : Follow her for gaming stuff https://www.twitch.tv/zayka_gamer_girl JOIN OUR DISCORD !: https://discord.gg/wqKQcmK GIT HUB | Source Code https://github.com/SourceCodeDeleted/rootkitdev-linux Source: https://www.youtube.com/watch?v=qFA3kFj4uwY Uploader: Source Code Deleted
Topics: Youtube, video, Education, rootkit, hacking, rootkits, ethical hacking, hacker, installing rootkit,...
Hacking and InfoSec stuff
movies

eye 170

favorite 0

comment 0

Recommended Tasks for a New Kali Linux Installation Full Tutorial: http://bit.ly/Kali10 Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Kali Linux is one of the best operating systems to use as a hacker. However, it doesn't come perfectly configured right out of the box. Today, we'll share our list of the top 10 things you should do after installing Kali Linux, on this episode of Cyber Weapons Lab. 1:28 - Install Git 2:40 - Configure Bash Aliases...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by Black Hills Information Security
movies

eye 94

favorite 0

comment 0

Deviant Ollam, from The Core Group, gives a presentation on physical penetration testing and the emotional impact on stakeholders that must be considered when scoping and conducting an engagement. This is a must see for any penetration testing professional or security team considering hiring someone to test their physical security. Download slides: https://deviating.net/lockpicking/slides.html Direct link: https://deviating.net/lockpicking/slides/pen_testing_and_emotional_work.pdf The CORE...
Topics: Youtube, video, Education, Physical Penetration Testing, Pentesting, Pentester, Ethical Hacker,...
Hacking and InfoSec stuff
by aantonop
movies

eye 336

favorite 1

comment 0

In this talk, Andreas examines the sensationalist debate over "fake news," the rising tide of faith-based nation states declaring bitcoin as "fake money," and alternative mechanisms we can build to fill the void left by retired fact-checking departments & central bank authorities. This talk took place at the Silicon Valley Bitcoin meetup on April 11th 2017 at the Plug and Play Tech Center (@PlugandPlayTC) in Sunnyvale, California:...
Topics: Youtube, video, Science & Technology, bitcoin, blockchain, finance, internet, money, network,...
Hacking and InfoSec stuff
movies

eye 160

favorite 0

comment 0

Hello Everyone, Part 3 of 3 This is SaintDruG from blackhatethicalhacking.com Happy New year! Been a while, i know, but the wait is worth it, Been busy lately, but we promise, the new website launch will be worth it soon ! Pause + Read Later. Today will show you, how black hats, real fast, what they can do using their skill, just time it, and each second that passes, they are actually flowing through security protocols, gathering info, so they can prepare the right tool, editing it to their...
Topics: Youtube, video, Howto & Style, Black Hat Ethical Hacking, saintdrug, mitm, bettercap,...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 150

favorite 0

comment 0

by SaintDruG / Anon for: Blackhatethicalhacking.com This is for Educational Purpose Only! Anything you do with this that creates bad results is your responsibility! Support our work on Patreon: https://www.patreon.com/blackhatethicalhacking Source: https://www.youtube.com/watch?v=_Uic7mRuvVQ Uploader: Black Hat Ethical Hacking
Topics: Youtube, video, Education, kali 2.0, saintdrug, setoolkit, linux, hacking, cyprus, credential...
Hacking and InfoSec stuff
by Source Code Deleted
movies

eye 337

favorite 5

comment 0

This is NOT my work. This is something I found in a back up from my old Server. I want to provide content for new people to become involved . It should be noted , that this is NOT reverse engineering like everyone says. This is intro to cracking software. I think for the most part the content doesn't exist on the internet. I think I still have the binaries too, when I find them I will upload them as well. When I find the binaries for practice I will upload them on the first video of this...
Topics: Youtube, video, Education, hacking, hacking tutorial, hacker, hackers, learn hacking, hack, hacking...
Hacking and InfoSec stuff
movies

eye 519

favorite 2

comment 0

How to Unlock Word & Excel Files That Have Passwords Full Tutorial: https://bit.ly/OfficePass Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie If you like to protect your Microsoft documents with a password, then you already know that the stronger the password, the more protected the file will be. However, on today's episode of Cyber Weapons Lab, we'll show you how to crack those passwords on Microsoft Office files, no matter how strong the...
Topics: Youtube, video, Howto & Style, wonderhowto, nullbyte, null byte, hack, hacking, hacker, hacks,...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 152

favorite 1

comment 0

Hello & Welcome to our "How To" Series. Brought to you by BlackHatEthicalHacking.com This How to os performed by SaintDruG. How to do a Denial of Service Attack Fast Machine Used: MacBook Air Running Kali Target: Raspberry Pi 3 Running Parrot OS & Apache 2 Web Server Disclaimer: This Video is for Educational Purpose Only, what you do is your responsibility and Black Hat Ethical Hacking, SaintDruG or anyone involved, is not held accounted for if any damage for any reason...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr...
Hacking and InfoSec stuff
movies

eye 182

favorite 2

comment 0

Best Hacker Browser Extensions for Chrome & Firefox Full Tutorial: http://bit.ly/OSINTaddons Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Any hacker and OSINT researcher should strive to get the most out of their browser experience. We've heard (or read) your comments, and on this episode of Cyber Weapons Lab, we'll break down the top 10 browser extensions for hackers and researchers. Some of them will be on Mozilla Firefox, while others work...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 156

favorite 0

comment 0

Hello Everyone! Today's Armitage Series, offers you an opportunity showing you how Armitage is used in general. In the previous video we saw what is Armitage and how to setup it up. Armitage organizes Metasploit's capabilities around the hacking process. There are features for discovery, access and post-exploitation. When you exploit a host, you will have a session on that host. Armitage knows how to interact with shell and meterpreter sessions. To use Armitage, it helps to understand...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, Ethical Hacking, Black Hat,...
Hacking and InfoSec stuff
movies

eye 112

favorite 0

comment 0

Hello Everyone, Part 2 of 3 This is SaintDruG from blackhatethicalhacking.com Happy New year! Been a while, i know, but the wait is worth it, Been busy lately, but we promise, the new website launch will be worth it soon ! Pause + Read Later. Today will show you, how black hats, real fast, what they can do using their skill, just time it, and each second that passes, they are actually flowing through security protocols, gathering info, so they can prepare the right tool, editing it to their...
Topics: Youtube, video, Howto & Style, Black Hat Ethical Hacking, saintdrug, mitm, bettercap,...
Hacking and InfoSec stuff
movies

eye 52

favorite 0

comment 0

In this video we look at intercepting Syscall_Connect to monitor connections. In the next video we will See how we can control these to our will. Like and Click the bell. Zayka's Gaming Twitch : Follow her for gaming stuff https://www.twitch.tv/zayka_gamer_girl JOIN OUR DISCORD !: https://discord.gg/wqKQcmK GIT HUB | Source Code https://github.com/SourceCodeDeleted/rootkitdev-linux Source: https://www.youtube.com/watch?v=P3uOyoBIDxI Uploader: Source Code Deleted
Topics: Youtube, video, Education
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 91

favorite 0

comment 0

Executeu Greets You ! This is for Black Hat Ethical Hacking . Today's Learning Linux Series, gives you the opportunity to learn how to Boot in Kali Linux from a USB Storage Device. The process will be implemented in Kali Linux OS which is also achievable in Apple IOS via a Terminal. It will be disseminated into 2 parts. The first will show you how to configure the USB to boot on any machine. The second part will be how to add another layer of security with Encryption. More over we will show you...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr...
Hacking and InfoSec stuff
movies

eye 57

favorite 0

comment 0

DDoS - Full Course Preview. Subscribe to our online Black Hat Ethical Hacking Lessons with over 1000+ Videos with a very flexible membership! http://www.blackhatethicalhacking.com/courses/ ** This Course is for Educational Purpose Only! What you do with it, is your responsibility and Black Hat Ethical Hacking, Or the Author are not to be held responsible for what motive you do with such info, it is to demonstrate, so you protect** Support our work on Patreon:...
Topics: Youtube, video, Education, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr Robot, Black...
Hacking and InfoSec stuff
by TheNotSoCivilEngr
movies

eye 212

favorite 2

comment 0

Learn the easiest way to get into lock picking which you can do for free! Source: https://www.youtube.com/watch?v=Gh5raNMlisc Uploader: TheNotSoCivilEngr
Topics: Youtube, video, People & Blogs, lock, lockpicking, pentesting, tubular, key, picking, lock...