How FIN6 Exfiltrates Files Over FTP
HackerSploit
How FIN6 Exfiltrates Files Over FTP
24:41
Emulating FIN6 - Active Directory Enumeration Made EASY
HackerSploit
Emulating FIN6 - Active Directory Enumeration Made EASY
20:22
The SECRET to Embedding Metasploit Payloads in VBA Macros
HackerSploit
The SECRET to Embedding Metasploit Payloads in VBA Macros
15:30
Offensive VBA 0x4 - Reverse Shell Macro with Powercat
HackerSploit
Offensive VBA 0x4 - Reverse Shell Macro with Powercat
11:53
Offensive VBA 0x3 - Developing PowerShell Droppers
HackerSploit
Offensive VBA 0x3 - Developing PowerShell Droppers
55:20
Offensive VBA 0x2 - Program & Command Execution
HackerSploit
Offensive VBA 0x2 - Program & Command Execution
45:29
Offensive VBA 0x1 - Your First Macro
HackerSploit
Offensive VBA 0x1 - Your First Macro
43:28
Emulating FIN6 - Gaining Initial Access (Office Word Macro)
HackerSploit
Emulating FIN6 - Gaining Initial Access (Office Word Macro)
32:19
FIN6 Adversary Emulation Plan (TTPs & Tooling)
HackerSploit
FIN6 Adversary Emulation Plan (TTPs & Tooling)
18:04
Developing An Adversary Emulation Plan
HackerSploit
Developing An Adversary Emulation Plan
29:39
Introduction To Advanced Persistent Threats (APTs)
HackerSploit
Introduction To Advanced Persistent Threats (APTs)
29:14
Introduction To Adversary Emulation
HackerSploit
Introduction To Adversary Emulation
24:05
Mastering Persistence: Using an Apache2 Rootkit for Stealth and Defense Evasion
HackerSploit
Mastering Persistence: Using an Apache2 Rootkit for Stealth and Defense Evasion
51:20
Planning Red Team Operations | Scope, ROE & Reporting
HackerSploit
Planning Red Team Operations | Scope, ROE & Reporting
46:19
Mapping APT TTPs With MITRE ATT&CK Navigator
HackerSploit
Mapping APT TTPs With MITRE ATT&CK Navigator
39:54
Introduction To The MITRE ATT&CK Framework
HackerSploit
Introduction To The MITRE ATT&CK Framework
35:48
Red Team Frameworks & Methodologies
HackerSploit
Red Team Frameworks & Methodologies
18:24
Introduction To Red Teaming
HackerSploit
Introduction To Red Teaming
48:26
Pentesting Diaries 0x1 - SQL Injection 101
HackerSploit
Pentesting Diaries 0x1 - SQL Injection 101
1:20:01
HackerSploit Channel Update 2024
HackerSploit
HackerSploit Channel Update 2024
14:30
CyberTalk Live #1 -  Trying Out BlackBuntu & Q&A
HackerSploit
CyberTalk Live #1 - Trying Out BlackBuntu & Q&A
1:53:31
CyberTalk Live #1 -  Trying Out BlackBuntu & Q&A
HackerSploit
CyberTalk Live #1 - Trying Out BlackBuntu & Q&A
3 Year Cybersecurity Career Roadmap
HackerSploit
3 Year Cybersecurity Career Roadmap
54:32
Linux Red Team Defense Evasion Techniques - Hiding Linux Processes
HackerSploit
Linux Red Team Defense Evasion Techniques - Hiding Linux Processes
19:49
Linux Red Team Persistence Techniques - SSH Keys, Web Shells & Cron Jobs
HackerSploit
Linux Red Team Persistence Techniques - SSH Keys, Web Shells & Cron Jobs
54:22
ChatGPT For Cybersecurity
HackerSploit
ChatGPT For Cybersecurity
40:03
Linux Red Team Privilege Escalation Techniques - Kernel Exploits & SUDO Permissions
HackerSploit
Linux Red Team Privilege Escalation Techniques - Kernel Exploits & SUDO Permissions
40:42
LastPass Data Breach - Password Security 101
HackerSploit
LastPass Data Breach - Password Security 101
1:06:19
Windows Red Team Lateral Movement Techniques - PsExec & RDP
HackerSploit
Windows Red Team Lateral Movement Techniques - PsExec & RDP
24:47
Windows Red Team Privilege Escalation Techniques - Bypassing UAC & Kernel Exploits
HackerSploit
Windows Red Team Privilege Escalation Techniques - Bypassing UAC & Kernel Exploits
45:25
Windows Red Team - Dynamic Shellcode Injection & PowerShell Obfuscation
HackerSploit
Windows Red Team - Dynamic Shellcode Injection & PowerShell Obfuscation
36:54
MITRE ATT&CK Framework For Offensive & Defensive Operations
HackerSploit
MITRE ATT&CK Framework For Offensive & Defensive Operations
4:00:35
Updates & Content Schedule - Q4 2022 - Q2 2023
HackerSploit
Updates & Content Schedule - Q4 2022 - Q2 2023
9:38
How To Write A Penetration Testing Report
HackerSploit
How To Write A Penetration Testing Report
37:06
Performing Web Searches From Your Terminal
HackerSploit
Performing Web Searches From Your Terminal
3:10
How I Got Started In Cybersecurity
HackerSploit
How I Got Started In Cybersecurity
37:01
Forwarding Snort Logs To Splunk
HackerSploit
Forwarding Snort Logs To Splunk
35:22
Setting Up Splunk
HackerSploit
Setting Up Splunk
12:43
Stop Trivializing Cybersecurity
HackerSploit
Stop Trivializing Cybersecurity
26:38
Introduction To Splunk
HackerSploit
Introduction To Splunk
12:20
Integrating Suricata With Wazuh For Log Processing
HackerSploit
Integrating Suricata With Wazuh For Log Processing
18:28
Installing & Configuring Suricata
HackerSploit
Installing & Configuring Suricata
27:16
Introduction To Suricata IDS
HackerSploit
Introduction To Suricata IDS
11:13
Threat Detection & Active Response With Wazuh
HackerSploit
Threat Detection & Active Response With Wazuh
45:56
Installing & Configuring Wazuh
HackerSploit
Installing & Configuring Wazuh
27:52
Introduction To Wazuh SIEM
HackerSploit
Introduction To Wazuh SIEM
17:30
Intrusion Detection With Snort
HackerSploit
Intrusion Detection With Snort
31:53
Installing & Configuring Snort
HackerSploit
Installing & Configuring Snort
20:18
Introduction To Snort IDS
HackerSploit
Introduction To Snort IDS
16:21
Introduction To Intrusion Detection Systems (IDS)
HackerSploit
Introduction To Intrusion Detection Systems (IDS)
6:20
Decrypting HTTPS Traffic With Wireshark
HackerSploit
Decrypting HTTPS Traffic With Wireshark
15:49
Wireshark Display & Capture Filters
HackerSploit
Wireshark Display & Capture Filters
37:24
Installing & Configuring Wireshark For Traffic Analysis
HackerSploit
Installing & Configuring Wireshark For Traffic Analysis
25:07
Wireshark For Blue Teams
HackerSploit
Wireshark For Blue Teams
14:59
Introduction To Blue Team Operations
HackerSploit
Introduction To Blue Team Operations
3:32
Blue Team Training Course - Introduction
HackerSploit
Blue Team Training Course - Introduction
5:28
Hacking A Drupal Website | Drupalgeddon2
HackerSploit
Hacking A Drupal Website | Drupalgeddon2
28:09
Web App Pentesting - HTTP Cookies & Sessions
HackerSploit
Web App Pentesting - HTTP Cookies & Sessions
34:31
Web App Pentesting - URL Structure
HackerSploit
Web App Pentesting - URL Structure
25:51
How To Create Your Own Pentesting Distribution
HackerSploit
How To Create Your Own Pentesting Distribution
47:18
Dirty Pipe - CVE-2022-0847 - Linux Privilege Escalation
HackerSploit
Dirty Pipe - CVE-2022-0847 - Linux Privilege Escalation
23:20
Windows Privilege Escalation - Token Impersonation With RoguePotato & PrintSpoofer
HackerSploit
Windows Privilege Escalation - Token Impersonation With RoguePotato & PrintSpoofer
30:14
Windows Privilege Escalation - Startup Apps
HackerSploit
Windows Privilege Escalation - Startup Apps
14:22
Linux Defense Evasion - Apache2 Rootkit
HackerSploit
Linux Defense Evasion - Apache2 Rootkit
28:24
How To Crack ZIP & RAR Files With Hashcat
HackerSploit
How To Crack ZIP & RAR Files With Hashcat
13:20
Web App Pentesting - Setting Up OWASP bWAPP With Docker
HackerSploit
Web App Pentesting - Setting Up OWASP bWAPP With Docker
11:28
Windows Privilege Escalation - Exploiting Insecure GUI Apps
HackerSploit
Windows Privilege Escalation - Exploiting Insecure GUI Apps
5:52
Windows Privilege Escalation - Exploiting Scheduled Tasks
HackerSploit
Windows Privilege Escalation - Exploiting Scheduled Tasks
12:37
Hacker Simulator Walkthrough - Episode 5 - Almost Getting Jailed
HackerSploit
Hacker Simulator Walkthrough - Episode 5 - Almost Getting Jailed
42:36
HEK.SI 2022 - Bypassing UAC With UACMe
HackerSploit
HEK.SI 2022 - Bypassing UAC With UACMe
35:08
Web App Pentesting - HTTP Headers & Methods
HackerSploit
Web App Pentesting - HTTP Headers & Methods
33:39
Web App Penetration Testing - Introduction To HTTP
HackerSploit
Web App Penetration Testing - Introduction To HTTP
26:09
Web App Penetration Testing - Course Introduction
HackerSploit
Web App Penetration Testing - Course Introduction
6:23
EternalBlue - MS17-010 - Manual Exploitation
HackerSploit
EternalBlue - MS17-010 - Manual Exploitation
17:35
Windows Post Exploitation - Dumping & Cracking NTLM Hashes
HackerSploit
Windows Post Exploitation - Dumping & Cracking NTLM Hashes
27:56
Windows Privilege Escalation - Using Stored Credentials
HackerSploit
Windows Privilege Escalation - Using Stored Credentials
13:06
Hacker Simulator Walkthrough - Episode 4 - Joining CloudSec!
HackerSploit
Hacker Simulator Walkthrough - Episode 4 - Joining CloudSec!
53:26
Windows Privilege Escalation - Searching For Passwords In Windows Registry
HackerSploit
Windows Privilege Escalation - Searching For Passwords In Windows Registry
14:07
Windows Privilege Escalation - Exploiting AlwaysInstallElevated
HackerSploit
Windows Privilege Escalation - Exploiting AlwaysInstallElevated
12:50
Windows Privilege Escalation - Exploiting AutoRun Programs
HackerSploit
Windows Privilege Escalation - Exploiting AutoRun Programs
23:07
Revisiting Parrot OS
HackerSploit
Revisiting Parrot OS
29:23
Hacker Simulator Walkthrough - Episode 3 - Phi$hing Frenzy!
HackerSploit
Hacker Simulator Walkthrough - Episode 3 - Phi$hing Frenzy!
32:00
Windows Privilege Escalation - Insecure Service Executables
HackerSploit
Windows Privilege Escalation - Insecure Service Executables
13:26
Hacker Simulator Walkthrough - Episode 2 - Leveling Up
HackerSploit
Hacker Simulator Walkthrough - Episode 2 - Leveling Up
30:15
Hacker Simulator Walkthrough - Episode 1 - The Journey Begins
HackerSploit
Hacker Simulator Walkthrough - Episode 1 - The Journey Begins
25:59
Windows Privilege Escalation - Weak Registry Permissions
HackerSploit
Windows Privilege Escalation - Weak Registry Permissions
12:06
Windows Privilege Escalation - Unquoted Service Paths
HackerSploit
Windows Privilege Escalation - Unquoted Service Paths
14:55
Log4J - CVE 2021-44228 (Log4Shell) - Exploitation & Mitigation
HackerSploit
Log4J - CVE 2021-44228 (Log4Shell) - Exploitation & Mitigation
45:40
Windows Privilege Escalation - Exploiting Insecure Service Permissions
HackerSploit
Windows Privilege Escalation - Exploiting Insecure Service Permissions
18:05
Windows Enumeration With winPEAS
HackerSploit
Windows Enumeration With winPEAS
27:37
Windows Post Exploitation - Persistence With Metasploit
HackerSploit
Windows Post Exploitation - Persistence With Metasploit
12:23
Active Directory Enumeration With Server Manager
HackerSploit
Active Directory Enumeration With Server Manager
19:49
Cybersecurity Career Roadmap
HackerSploit
Cybersecurity Career Roadmap
23:42
Windows Red Team Credential Access Techniques | Mimikatz & WCE
HackerSploit
Windows Red Team Credential Access Techniques | Mimikatz & WCE
42:18
Windows Red Team Persistence Techniques | Persistence With PowerShell Empire
HackerSploit
Windows Red Team Persistence Techniques | Persistence With PowerShell Empire
44:41
Linux Red Team Exploitation Techniques | Exploiting WordPress & MySQL
HackerSploit
Linux Red Team Exploitation Techniques | Exploiting WordPress & MySQL
33:08
Windows Red Team Exploitation Techniques | Luckystrike & PowerShell Empire
HackerSploit
Windows Red Team Exploitation Techniques | Luckystrike & PowerShell Empire
48:58
Red Team Reconnaissance Techniques
HackerSploit
Red Team Reconnaissance Techniques
1:27:09
Red Team Adversary Emulation With Caldera
HackerSploit
Red Team Adversary Emulation With Caldera
1:37:58
BOOK RELEASE - Privilege Escalation Techniques
HackerSploit
BOOK RELEASE - Privilege Escalation Techniques
8:03