Metasploit Basics for Hackers, Part 1: Getting Started with Metasploit



- 3 min
Open Source Intelligence (OSINT): Finding Vulnerable Systems Across the Internet with Netlas.io

- 6 min
Digital Forensics, Part 8: Live Analysis with sysinternals


- 6 min
The Brief History of Russian Cyberattacks Against Ukraine and the Risks they Pose to the West


- 1 min
Master OTW on Youtube

- 1 min
Google Hacking: The Ultimate List of Google Dorks to find Unsecured Web Cams


- 5 min
Networking Basics for Hackers, Part 2


- 5 min
Introduction to Regular Expressions (regex)


- 4 min
Basics of Hexadecimal


- 4 min
The Hacker Methodology

- 4 min
Netcat, the All- Powerful


- 7 min
Cryptography Basics for the Aspiring Hacker


- 4 min
Basics of XORing


- 3 min
Round 2 of the Great Cyberwar of 2022: Attacking Russia's Schneider Electric SCADA/ICS Sites


- 3 min
Building a Honeypot to Capture Zero-day Malware, Part 2


- 4 min
Building a Honeypot to Capture Zero-Day Exploits, Part 1


- 4 min
Evading AV with shellter


- 5 min
Working with Exploits: Using Exploit-DB to find Exploits


- 3 min
Cracking WPS Pin with Bully


- 4 min
How Elliot and f/society made their Hacks Untraceable


- 4 min
Getting Started with Bluetooth Hacking

- 5 min
Wi-Fi (802.11) Hacking Strategies


- 4 min
Creating a Custom Wordlist with Crunch


- 3 min
Using MultiBlue to Control Any Bluetooth Mobile Device