Skip to main content

Hacking and InfoSec stuff



rss RSS

1,122
RESULTS


Show sorted alphabetically

Show sorted alphabetically

SHOW DETAILS
up-solid down-solid
eye
Title
Date Reviewed
Creator
Hacking and InfoSec stuff
May 5, 2022 Black Hat Ethical Hacking
movies

eye 1,082

favorite 6

comment 1

by SaintDruG / Anon for: Blackhatethicalhacking.com This is for Educational Purpose Only! Anything you do with this that creates bad results is your responsibility! Support our work on Patreon: https://www.patreon.com/blackhatethicalhacking Source: https://www.youtube.com/watch?v=V5TUkRMEW0Q Uploader: Black Hat Ethical Hacking
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
Topics: Youtube, video, Education, linux, blackhatethicalhacking, black hat ethical hacking, hacking,...
Hacking and InfoSec stuff
movies

eye 23

favorite 0

comment 1

Android applications are becoming more and more obfuscated to prevent reverse engineering. The purpose of this talk is to present dynamic binary instrumentation techniques that can help reverse engineers to deal with obfuscated codes... By: Romain Thomas Full Abstract & Presentation Materials: https://www.blackhat.com/asia-20/briefings/schedule/#dynamic-binary-instrumentation-techniques-to-address-native-code-obfuscation-18309 Source: https://www.youtube.com/watch?v=MRku-2fW42w Uploader:...
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
Topics: Youtube, video, Travel & Events
Hacking and InfoSec stuff
Jun 1, 2019 Privacy International
movies

eye 94

favorite 1

comment 1

لمزيد من المعلومات عن الحق في الخصوصية، برجاء الدخول على privacyinternational.org Source: https://www.youtube.com/watch?v=sjhvauht71A Uploader: Privacy International
favoritefavoritefavoritefavorite ( 1 reviews )
Topics: Youtube, video, People & Blogs, privacy, surveillance, privacy international
Hacking and InfoSec stuff
Sep 22, 2017 Zcash
movies

eye 27

favorite 0

comment 1

The fourth episode of the Zcash Show & Tell series will feature two Zcash Company engineers Ariel Gabizon and Jay Graber who have been working on an implementation of XCAT (cross-chain atomic trades) between Zcash and Bitcoin. Atomic cross-chain trading is a concept that has been floating around in the cryptocurrency space for a while now and the work Zcash Company has been doing on XCAT is shaping up to be the first implementation for trades with ZEC and BTC (and eventually ETH). Each Show...
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
Topics: Youtube, video, Science & Technology, zcash, xcat, cryptocurrencies, trading, decentralized,...
Hacking and InfoSec stuff
Sep 22, 2017 aantonop
movies

eye 518

favorite 1

comment 1

This is the first part of a talk which took place on February 22nd 2017 at the inaugural Bloktex Conference pre-event, hosted at Technology Park in Kuala Lumpur, Malaysia: https://antonopoulos.com/event/kualalumpur/ RELATED: A collection of my talks on Bitcoin - https://www.youtube.com/playlist?list=PLPQwGV1aLnTthcG265_FYSaV24hFScvC0 A collection of Q&A on various topics in Bitcoin - https://www.youtube.com/playlist?list=PLPQwGV1aLnTsHvzevl9BAUlfsfwFfU7aP Andreas M. Antonopoulos is a...
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
Topics: Youtube, video, Science & Technology, bitcoin, blockchain, network, internet, money
Hacking and InfoSec stuff
- Real World Crypto
movies

eye 16

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=QML9a_No0Qo Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
We discuss Corporate Ransomware, The TikTok Ban, Dream Homes, Dieting & Workouts, How We Got Started In Infosec + Career Advice, Drovorub Malware, Hacking Us... Source: https://www.youtube.com/watch?v=Tiphi0YNzz8 Uploader: MalwareTech
Topics: Youtube, video
Hacking and InfoSec stuff
- Real World Crypto
movies

eye 11

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=ac0MkSkPBcM Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Ron Woerner, President / Chief Trusted Advisor, RWX Security Solutions, LLC This rapid-fire presentation, an update from the hugely popular 2018 talk, will showcase apps used in cybersecurity testing, investigations, administration and just day-to-day work. You’ll experience advanced techniques using security tools such as Kali Linux, Windows SysInternals Suite, VMWare, Wireshark, NMAP and many more. You will get many tricks and techniques to optimize their use based on your need.Learning...
Topics: RSAC, RSA2019, RSA
Hacking and InfoSec stuff
movies

eye 7

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=e_rwG7MA5VU Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
movies

eye 10

favorite 0

comment 0

It's not just home users that are susceptible to targeted attacks, companies are too! In this webcast, our experts will tell you what you can do to protect your corporate network against them. Source: https://www.youtube.com/watch?v=RaQfuQ4j8RE Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, Kaspersky Lab, Lab Matters, Targeted Attacks, Corporate...
A talk about privacy, identity, surveillance, hierarchies and the future of network-centric private and secure money. Source: https://www.youtube.com/watch?v=Vcvl5piGlYg Uploader: aantonop Upload date: 2016-04-12
Topics: Youtube, video, Science & Technology, bitcoin, blockchain, finance, networks
Every year, internet censorship increases globally. From network level blocking to nation-wide internet blackouts, governments and private companies have powerful tools to restrict information and hault connection between people. Many people, groups, and organizations are doing innovative work to study, measure, and fight back against internet censorship--and they are helping millions of people connect more regularly and safely to the internet. Despite these successes, we're faced with...
Topics: Youtube, video, Nonprofits & Activism
Hacking and InfoSec stuff
movies

eye 17

favorite 0

comment 0

In this edition of the Lab Matters webcast, malware researcher Tillman Werner and Ryan Naraine discuss the ongoing battle to control the Conficker botnet and the need for the computer security industry to consider newer approaches to mitigating the botnet epidemic. Source: https://www.youtube.com/watch?v=azuLgVUafL4 Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, mitigating botnets, Conficker, law enforcement, Ryan...
Hacking and InfoSec stuff
movies

eye 19

favorite 0

comment 0

Last year exhibited an unusual mix of consistency amongst general trends and completely unexpected milestone events. Against the background hum of leftover Kido infections, targeted attacks on corporations and industrial enterprises reached an unexpected place in the limelight with Aurora and Stuxnet. This year will present a new class of organizers with a new aim - steal everything. Their methods will include an even "greedier" class of malware - spyware 2.0. The increased volume of...
Topics: Youtube, video, Science & Technology, cyberthreat landscape, Kido, Aurora, Stuxnet, spyware...
Hacking and InfoSec stuff
- Real World Crypto
movies

eye 9

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=sQMm4w23mhw Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=t4caEr9hh98 Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
movies

eye 27

favorite 0

comment 0

Source: https://www.youtube.com/watch?v=x7DEdCh7trU Uploader: Georgia Weidman
Topics: Youtube, video, Education
Hacking and InfoSec stuff
- Kaspersky Lab
movies

eye 24

favorite 1

comment 0

by Roman Unuchek A talk at Kaspersky Lab's Security Analyst Summit #TheSAS2015 Source: https://www.youtube.com/watch?v=6v4mPCQAmQU Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, #TheSAS2015, Kaspersky Lab (Business Operation)
Hacking and InfoSec stuff
- Real World Crypto
movies

eye 12

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=7FeiZQ2BkiA Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
movies

eye 24

favorite 0

comment 0

Kaspersky Lab's CTO, Nikolay Grebennikov, joins Ryan Naraine to discuss the evolution of anti-malware software. Grebennikov talks about the changing face of the malicious threat facing desktop users and the additional components added to Kaspersky's anti-malware products to move beyond signature-based detection of threats. He goes into detail about heuristics and emulation, behavior-based detection and newer proactive technologies to handle real-time malware detection. Source:...
Topics: Youtube, video, Science & Technology, anti-malware, software, evolution, malicious threat,...
Hacking and InfoSec stuff
movies

eye 143

favorite 3

comment 0

Zayka's Gaming Twitch : Follow her for gaming stuff https://www.twitch.tv/zayka_gamer_girl JOIN OUR DISCORD !: https://discord.gg/wqKQcmK GIT HUB | Source Code https://github.com/SourceCodeDeleted/rootkitdev-linux Source: https://www.youtube.com/watch?v=D3Mo7Z74Hfs Uploader: Source Code Deleted
Topics: Youtube, video, Education, hacking, ethical hacking, hack, hacker, learn hacking, learn ethical...
Hacking and InfoSec stuff
- Google Developers
movies

eye 320

favorite 2

comment 0

Google Python Class Day 1 Part 2: Lists, Sorting, and Tuples. By Nick Parlante. Support materials and exercises: http://code.google.com/edu/languages/google-python-class Source: https://www.youtube.com/watch?v=EPYupizJYQI Uploader: Google Developers Upload date: 2010-03-01
Topics: Youtube, video, Science & Technology, google, programming, language, python, tutorial
The second episode of the Zcash Show & Tell series will feature whyrusleeping who has created zmsg, a small program for sending messages via zcash encrypted memo fields. (https://github.com/whyrusleeping/zmsg) zmsg uses the encrypted memo field of zcash shielded transactions to send messages to other parties. The sent messages get stored in the zcash blockchain and the recipient can check for messages at any time (no need to be online at the same time). Since the messages get stored in the...
Topics: Youtube, video, Science & Technology, zcash, cryptocurrency, encryption, memo field,...
Hacking and InfoSec stuff
movies

eye 50

favorite 0

comment 0

Note: The audio cuts out at 5:42 and doesn't pick up again until 10:32. It's like this in the source material. Sorry for the inconvenience. We don’t need a Cyber Moonshot; we’ve got enough already. Computing technology is enabling multiple concurrent revolutions, in biotechnology, manufacturing, robotics, AI, and literal rocket engineering. These are our Moonshots, fueled by governments, companies, and tinkerers, powering the growth engine of the global economy and reshaping society. Our...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, firetalks
Hacking and InfoSec stuff
movies

eye 49

favorite 3

comment 0

From the quest for digital money and history of Bitcoin, to the emergence of Ethereum and smart contracts, this short presentation from Linda Xie (co-founder and managing director of Scalar Capital, and former product manager at Coinbase) covers a practical introduction and tour through key terms and concepts in the crypto(currencies, tokens, networks) space. The talk was given at a16z's annual innovation summit, which features invited speakers from various organizations discussing innovation...
Topics: Youtube, video, Science & Technology, crypto, cryptocurrencies, ethereum, bitcoin
How to Use QR Codes to Hack Mobile Phones & Scanners Full Tutorial: https://nulb.app/x4l5g Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie QR Codes are a fun way of scanning information with your mobile device on the go. However, this popular technique can be taken advantage of and used to inject malicious code and commands by a knowledgeable hacker. On this episode of Cyber Weapons Lab, we'll introduce you to a malicious QR code generator called...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Use an RPi for Monitor Mode Without an External Adapter Full Tutorial: http://bit.ly/MMforPi Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie The Raspberry Pi is already a powerful device perfect for on-the-go hacking or war driving. But up until recently, no Pi has been capable of being put into monitor mode or achieve packet injection without a wireless adapter. We'll show you how you can update your Pi to make it an all-in-one hacking device on...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 72

favorite 1

comment 0

Today we take a look at OSINT and how it can be used to glean unintended information from a photo. Big thanks to Ryan and Michael for letting me cover their content. Ryan: https://twitter.com/RyansNotAHacker Michael: https://twitter.com/The4rchangel Twitter thread this video is based on: https://twitter.com/RyansNotAHacker/status/1221611299726979072 The OSINT Framework: https://osintframework.com/ Source: https://www.youtube.com/watch?v=Uud6xapckXk Uploader: TheNotSoCivilEngr
Topics: Youtube, video, People & Blogs, lock, lockpicking, pentesting, physical penetration testing,...
How to Set Up the Ultimate Beginner Arch Linux Hacking Distro Full Tutorial: https://nulb.app/x48dr Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Kali Linux is usually the go-to hacker OS for beginners because of how straightforward it is to use and it's large community of support. Arch Linux is generally used by more advanced users looking for a more minimalistic experience that's still powerful. Today, on this episode of Cyber Weapons Lab, we'll...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Our Premium Ethical Hacking Bundle Is 90% Off: https://nulb.app/cwlshop How to Use Android & Raspberry Pi for Local Voice Comms Full Tutorial: https://nulb.app/x6vtu Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 163 It can be difficult to communicate off the grid when there's no infrastructure. That's also true when you're in situations where there is no cellular service or reliable Wi-Fi hotspots, such as a convoy...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 619

favorite 2

comment 0

How to Unlock Word & Excel Files That Have Passwords Full Tutorial: https://bit.ly/OfficePass Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie If you like to protect your Microsoft documents with a password, then you already know that the stronger the password, the more protected the file will be. However, on today's episode of Cyber Weapons Lab, we'll show you how to crack those passwords on Microsoft Office files, no matter how strong the...
Topics: Youtube, video, Howto & Style, wonderhowto, nullbyte, null byte, hack, hacking, hacker, hacks,...
Hacking and InfoSec stuff
movies

eye 13

favorite 0

comment 0

In this newest edition of Lab Matters, Director of Kaspersky Lab's Global Research and Analysis Team Costin Raiu offers some predictions about what we will see in the second half of 2011. Raiu's predictions include a surge in malicious activity on mobile device app stores. Source: https://www.youtube.com/watch?v=mfMSBzi25SE Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, malicious activity, predictions 2011, Android, Costin...
Hacking and InfoSec stuff
movies

eye 28

favorite 0

comment 0

Speaker: Max Kelly With the current media hype about cyber threats and cyber warfare, Max Kelly - former CSO of Facebook - offers his perspective on the effects of internet militarization and it's relationship to traditional security operations. For presentations, whitepapers or audio version of the Defcon 18 presentations visit: http://defcon.org/html/links/dc-archives/dc-18-archive.html Source: https://www.youtube.com/watch?v=n6xSpIE-lSQ Uploader: Christiaan008 Upload date: 2010-10-27
Topics: Youtube, video, Science & Technology, 10, defcon, 004, clip3
Unrestricted Warfare on Campus: Chinese Information Operations and American Higher Education CYBERWARCON, November 28, 2018, Arlington, VA Presentation by Lauren Cooper, Carnegie Mellon University CERT Recording Sponsored by RiskIQ American colleges and universities serve as reliable sources of both cutting edge research and earnest idealism, and this combination has not gone unnoticed by intelligence and security services from around the world. China, in particular, has been targeting American...
Topics: Youtube, video, People & Blogs
Hacking and InfoSec stuff
movies

eye 57

favorite 0

comment 0

How to Manage Code on Your Local Repo with Git Full Tutorial: http://bit.ly/GitTut Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Most hackers will write some code at some point or other. Knowing how to manage that code in a local repository is an important aspect to software development. Today, we'll show you how to perform basic tasks with Git on this episode of Cyber Weapons Lab. Follow Null Byte on: Twitter: https://twitter.com/nullbytewht...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
- Kaspersky Lab
movies

eye 21

favorite 0

comment 0

John Lambert /Microsoft We've heard that attackers have all the advantages. Defenders are too slow, too disorganized, and too far behind the curve. The physics of cyber favor the offense. Today's modern defenders are changing all of this. The world is in transition and the playbook for network defense is being re- rewritten as a new set of forces take hold. Modern defenders are harnessing the cloud to store data volumes that were economically out-of-reach just a few years ago. Attacker's opsec...
Topics: Youtube, video, Science & Technology, thesas2016, kaspersky lab
How to Test a Wireless Network Card for Kali Linux Compatibility Full Tutorial: http://bit.ly/MmAndPi Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Kali Linux doesn't work with all wireless network adapters on the market. Aside from chipset compatibility, one needs their adapter to be able to be put into monitor mode as well as perform packet injection. Today, we'll guide you through the selection process and show you how to test for these features...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 183

favorite 0

comment 0

Hello Everyone, Part 3 of 3 This is SaintDruG from blackhatethicalhacking.com Happy New year! Been a while, i know, but the wait is worth it, Been busy lately, but we promise, the new website launch will be worth it soon ! Pause + Read Later. Today will show you, how black hats, real fast, what they can do using their skill, just time it, and each second that passes, they are actually flowing through security protocols, gathering info, so they can prepare the right tool, editing it to their...
Topics: Youtube, video, Howto & Style, Black Hat Ethical Hacking, saintdrug, mitm, bettercap,...
Hacking and InfoSec stuff
movies

eye 20

favorite 0

comment 0

by Trey Ford A talk at Kaspersky Lab's Security Analyst Summit #TheSAS2015 Source: https://www.youtube.com/watch?v=bAv3Whgw5PI Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, #TheSAS2015, Kaspersky Lab (Business Operation)
How to Create a Test Hacking Computer with a Raspberry Pi Full Tutorial: http://bit.ly/DV-Pi Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Every hacker needs to practice their skills, and finding a vulnerable device can be pretty hit and miss. In this video, we'll show you how to turn a Raspberry Pi into a deliberately vulnerable server for all your hacking needs on this episode of Cyber Weapons Lab. Recommended Raspberry Pi Kit:...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 37

favorite 0

comment 0

In this video we take a look at one of my newest creations, a half door which has hot swappable hardware for quick and easy under door tool practice for a variety of situations. Link to my dimensional sketches: https://drive.google.com/file/d/1pJbsdbja5GzQf9Tg2pgc6Rech9ivRYP7/view?usp=sharing Source: https://www.youtube.com/watch?v=hUTm8pk4g6g Uploader: TheNotSoCivilEngr
Topics: Youtube, video, People & Blogs, lock, lockpicking, pentesting, physical penetration testing,...
Hacking and InfoSec stuff
- Google Developers
movies

eye 249

favorite 0

comment 0

Google Python Class Day 2 Part 1: Regular Expressions. By Nick Parlante. Support materials and exercises: http://code.google.com/edu/languages/google-python-class Source: https://www.youtube.com/watch?v=kWyoYtvJpe4 Uploader: Google Developers Upload date: 2010-03-01
Topics: Youtube, video, Science & Technology, google, programming, language, python, tutorial
Hacking and InfoSec stuff
movies

eye 2,166

favorite 18

comment 0

Let’s take a journey back to the 1980’s and beyond, to discover the origins of the Cyberpunk movement, in literature, cinema, television, video games, comics and more! In this documentary miniseries, we will discover the wonders of Cyberpunk, dating back to the 1940’s, all the way through 1989, with each successive episode taking on a new decade. Co-written by Shalashaskka https://www.youtube.com/c/Shalashaskka 2:19 - The Origins of Cyberpunk 4:14 - PROTO-PUNK 4:58 - Philip K. Dick 5:30 -...
Topics: Youtube, video, Gaming, neuromancer, william gibson, neuromancer movie, mike pondsmith, akira,...
Hacking and InfoSec stuff
movies

eye 14

favorite 1

comment 0

The HTTP Alternative Services header (Alt-Svc, RFC 7838) was introduced in 2013 by seasoned developers with good intentions in a bid to streamline load balancing, protocol optimizations, and client segmentation... By: David Starobinski, Trishita Tiwari & Ari Trachtenberg Full Abstract & Presentation Materials: https://www.blackhat.com/asia-20/briefings/schedule/#the-evil-alt-ego-abusing-http-alternative-services-18822 Source: https://www.youtube.com/watch?v=u-PVpQ2xr-I Uploader: Black...
Topics: Youtube, video, Travel & Events
Hacking and InfoSec stuff
movies

eye 56

favorite 0

comment 0

Today we take a look at how we can use the credentials we received from the ESPKey in the previous video to then clone to a new card to have persistent access. Purchase the Proxmark3: https://redteamtools.com/Proxmark3-RDV4.0 Purchase the ESPKey: https://redteamtools.com/espkey Source: https://www.youtube.com/watch?v=vfRC-ijIg6s Uploader: TheNotSoCivilEngr
Topics: Youtube, video, People & Blogs, lock, lockpicking, pentesting, physical penetration testing,...
Hacking and InfoSec stuff
- RSA Conference
movies

eye 58

favorite 0

comment 0

Jay Beale, CTO, COO, InGuardians Adam Crompton, Senior Security Analyst, InGuardians With microservices’ rise, Kubernetes gain adopters every day. It’s time for information security specialists to learn how to attack and defend container orchestration systems. This talk will demonstrate attacks on Kubernetes clusters, then defenses that break those attacks. Attendees will be able to download the cluster used in the demos, as well as the YAML files used to break the attacks.Learning...
Topics: RSAC, RSA2019, RSA
Hacking and InfoSec stuff
- FUTANTCOLLECTIVE
movies

eye 550

favorite 15

comment 0

Cyberpunk is a science fiction genre noted for its focus on "high tech and low life." The name is a portmanteau of cybernetics and punk, and was originally coined by Bruce Bethke as the title of his short story "Cyberpunk," published in 1983. I compiled all five parts into one. If you're a fan of the genre, please check out our other videos and music. WWW.FUTANT.NET Source: https://www.youtube.com/watch?v=wbp6G8do2_E Uploader: FUTANTCOLLECTIVE
Topics: Youtube, video, Education, Futant, Dystopia, Psychedelic, Electronica, Timothy Leary, Cyberpunk,...
How to Run Kali Linux on any Android Device Without Rooting Full Tutorial: http://bit.ly/KaliAndroid Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie For a beginner, Kali Linux is the best OS to learn simple hacking tools on, but not everyone has access to a machine that can run it. However, with over 2 billion Android smartphones around the world, chances are you already have a device capable of running Kali. Today, we'll show you how to download and...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 53

favorite 0

comment 0

In this video I take you through how I was able to use nothing more than a bag of fast food to get into a restricted-access facility. Source: https://www.youtube.com/watch?v=zgcP_mj9dJE Uploader: TheNotSoCivilEngr
Topics: Youtube, video, Education, lock, lockpicking, pentesting, physical penetration testing, picking,...
Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=-FZ2f1S_7mQ Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
- Kaspersky Lab
movies

eye 13

favorite 0

comment 0

Sergey Gordeychik, Positive Hack Days A talk at Kaspersky Lab's Security Analyst Summit #TheSAS2015 Source: https://www.youtube.com/watch?v=FreoHdDCe8o Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology
Hacking and InfoSec stuff
movies

eye 35

favorite 0

comment 0

Infosec 1930 CYBERWARCON, November 28, 2018, Arlington, VA Presentation by Thomas Rid, Johns Hopkins SAIS Recording Sponsored by RiskIQ SAVE THE DATE FOR CYBERWARCON 2! November 21, 2019 Arlington, Virginia Source: https://www.youtube.com/watch?v=Fx5od5ucQao Uploader: CYBERWARCON
Topics: Youtube, video, People & Blogs
Hacking and InfoSec stuff
- Real World Crypto
movies

eye 16

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=-IXJ7Q01gpY Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
- The Tor Project
movies

eye 12

favorite 0

comment 0

Join us for the (virtual) State of the Onion at on Nov 16, 2020 @ 16:00 - 18:00 UTC.* Resist the surveillance pandemic, support Tor: https://donate.torproject.org The Tor Project is building usable free software to fight surveillance and censorship across the globe. In this talk we'll give an update on what we got up to during 2020, what happened in the wider Tor ecosystem, and what lies ahead of us. https://blog.torproject.org/state-of-the-onion-2020 Source:...
Topics: Youtube, video, Entertainment
Hacking and InfoSec stuff
movies

eye 23

favorite 0

comment 0

Kaspersky Lab is paying a lot of attention to IT security education & literacy development sharing its knowledge & experience actively through its educational program "Kaspersky Academy" which offers unique opportunities for students & young professionals to improve their knowledge of IT security, gain new experience and communicate with industry experts, realize their scientific potential as well as get exciting career opportunities & open the door to the professional...
Topics: Youtube, video, Science & Technology, Kaspersky Academy, IT Security, education, Ram...
Hacking and InfoSec stuff
movies

eye 16

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=Y99ry-m5R9I Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
movies

eye 54

favorite 0

comment 0

In this video we take a look at EXIF data and how we can use it to learn more about the contents of a photo. Unfortunately after about a month the facebook profile was deleted by facebook, as a result the challenge is no longer active. Source: https://www.youtube.com/watch?v=RRViySt-T4c Uploader: TheNotSoCivilEngr
Topics: Youtube, video, People & Blogs, lock, lockpicking, pentesting, physical penetration testing,...
Hacking and InfoSec stuff
- TheNotSoCivilEngr
movies

eye 23

favorite 0

comment 0

In this video we will take a look at using retractable key ring holders as UDT strings, something which I first introduced in video #2 and which I have since improved upon. Source: https://www.youtube.com/watch?v=EB0LLO_Dvpo Uploader: TheNotSoCivilEngr
Topics: Youtube, video, People & Blogs
Hacking and InfoSec stuff
- RSA Conference
movies

eye 21

favorite 0

comment 0

Zulfikar Ramzan, Ph.D., Chief Technology Officer, RSA Whitfield Diffie, Cryptographer and Security Expert, Cryptomathic Shafi Goldwasser, Director, Simons Institute for the Theory of Computing Paul Kocher, Independent Tal Rabin, Distinguished Researcher and the Manager of the Cryptographic Research Group, IBM Research Ronald Rivest, Professor, Massachusetts Institute of Technology Humans have been using cryptographic techniques since the dawn of time to safeguard their data and achieve...
Topics: RSAC, RSA2019, RSA
Hacking and InfoSec stuff
movies

eye 53

favorite 2

comment 0

Git is a widely-used Version Control System for software development projects. Because of the way Git works, “deleted” secrets don’t disappear from the filesystem. That means when a developer commits encryption keys, production passwords, or other secrets to the repository, removing them in a later commit won’t scrub them from the history. They live on in compressed plaintext on every developers’ machine, unless the history is rewritten. Grawler is a command line utility written in...
Topics: Youtube, video, Science & Technology, shmoocon, hacking, shmoocon 2018, AWS, Git hacking,...
Hacking and InfoSec stuff
- Kaspersky Lab
movies

eye 16

favorite 0

comment 0

The world is turning… But SAS will always be the same... Tenerife, Spain, February 7-11, 2016. #TheSAS2016 Source: https://www.youtube.com/watch?v=zbXpQyZRi8o Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, #TheSAS2016, Kaspersky Lab (Business Operation),...
Hacking and InfoSec stuff
movies

eye 46

favorite 0

comment 0

Hackerspace Design Patterns 2.0 The presentation of the Hackerspace Design Patterns at CCCamp 2007 / 24C3 started the international hackerspace movement! These patterns described what has worked well, and not worked well, for the 40 or so hackerspaces existing at the time. Now that over 2,000 have blossomed all over the planet, it is time to add Patterns from this collective experience. In 2007 there were about 40 hackerspaces in the world, mostly in Germany. From their research of what worked...
Topics: Youtube, video, Education, Chaos Communication Camp 2015, cccamp15, CCC, Chaos Computer Club,...
Hacking and InfoSec stuff
- Kaspersky Lab
movies

eye 23

favorite 0

comment 0

Inbar Raz PerimeterX First, there was the perimeter. Then came the the firewall, the IPS and sandboxing. More and more tools were being used to look at the traffic coming into the organization from the Internet, and eventually also traffic going out. But all that didn’t help, and soon enough it was clear that guarding the gate was just not going to be enough and the attackers were going to get it, one way or another. Prevention, equal to the Border Police, has failed. Then, came the premises....
Topics: Youtube, video, Science & Technology
Hacking and InfoSec stuff
movies

eye 21

favorite 0

comment 0

Source: https://www.youtube.com/watch?v=0xhC3n4CDrs Uploader: BSides Belfast
Topics: Youtube, video, Education
Hacking and InfoSec stuff
movies

eye 37

favorite 0

comment 0

by Artem Semenchenko A talk at Kaspersky Lab's Security Analyst Summit #TheSAS2015 Source: https://www.youtube.com/watch?v=4aVihpUFqiY Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, #TheSAS2015, Kaspersky Lab (Business Operation)
Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=6O8LTwVfTVs Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
movies

eye 6

favorite 0

comment 0

Help us make 2015 a great year for privacy, anonymity, and censorship resistance! https://www.torproject.org/donate/donate.html.en Your support is critical to our success. The Tor Project is a US 501(c)(3) non-profit dedicated to research, development, and education about online anonymity and privacy. Donations to The Tor Project may be tax deductible to persons who are in the US; or who pay taxes in countries with reciprocity with the US on charitable donations. Source:...
Topics: Youtube, video, Nonprofits & Activism
Hacking and InfoSec stuff
movies

eye 22

favorite 0

comment 0

https://creativecommons.org/licenses/by-nc-sa/4.0/ Source: https://www.youtube.com/watch?v=Djv2R2muHCg Uploader: 0xdade
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking
Hacking and InfoSec stuff
movies

eye 14

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=K0EOPddWpsE Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
https://blog.torproject.org/blog/releasing-tor-animation See this video in your language: Arabic https://www.youtube.com/watch?v=6v0ga4f2myY English https://www.youtube.com/watch?v=JWII85UlzKw Farsi https://www.youtube.com/watch?v=Y16VGmL5778 French https://www.youtube.com/watch?v=Mnrn3y-Qbyk German https://www.youtube.com/watch?v=fzeBfbHb0ZY Polish https://www.youtube.com/watch?v=Fx7bFE1v5m8 Spanish https://www.youtube.com/watch?v=Sz_J6vJ4MYw Creative Commons License "CC-BY-SA"...
Topics: Youtube, video, Education, Tor (Software), Online Privacy, Anonymity, Privacy, Surveillance,...
Hacking and InfoSec stuff
movies

eye 14

favorite 0

comment 0

Source: https://www.youtube.com/watch?v=6K5EWHGPxXE Uploader: Georgia Weidman
Topics: Youtube, video, Education
Hacking and InfoSec stuff
movies

eye 215

favorite 0

comment 0

USBdriveby (http://samy.pl/usbdriveby) is a device you stylishly wear around your neck which can quickly and covertly install a backdoor and override DNS settings on any unlocked machine via USB in a matter of seconds. It does this by emulating a keyboard and mouse, blindly typing things, flailing the mouse pointer around and weaponizing mouse clicks. It also evades several security measures in OS X, including hacking the accessibility settings, window positioning, overriding network settings,...
Topics: Youtube, video, Science & Technology, hacking, usbdriveby, samy kamkar, reverse engineering,...
Hacking and InfoSec stuff
movies

eye 133

favorite 2

comment 0

Ethereum is a decentralized platform that runs smart contracts: applications that run exactly as programmed without any possibility of downtime, fraud or third party interference. Ethereum is how the Internet was supposed to work: it's a censorship-proof planetary scale computer, where users always stay in control of their funds and personal data. Ethereum was crowdfunded during August 2014 by fans all around the world. It is developed by ETH/DEV with contributions from great minds across the...
Topics: Youtube, video, Science & Technology, ethereum, smart contracts, dapp, decentralization
Hacking and InfoSec stuff
movies

eye 141

favorite 1

comment 0

by SaintDruG / Anon for: Blackhatethicalhacking.com This is for Educational Purpose Only! Anything you do with this that creates bad results is your responsibility! Support our work on Patreon: https://www.patreon.com/blackhatethicalhacking Source: https://www.youtube.com/watch?v=ja60U2K5dsk Uploader: Black Hat Ethical Hacking
Topics: Youtube, video, Education, blackhatethicalhacking, black hat ethical hacking, maltego, hacking, mr...