אתרים שיכולים לעזור לנו  :)
Marcotech-CyberAcademy
אתרים שיכולים לעזור לנו :)
6:57
02 Kali Basics - OSCP | Offensive Security Certified Professional
Marcotech-CyberAcademy
02 Kali Basics - OSCP | Offensive Security Certified Professional
8:42
01 Kali Linux - OSCP | עברית
Marcotech-CyberAcademy
01 Kali Linux - OSCP | עברית
8:49
urgent write-up
Marcotech-CyberAcademy
urgent write-up
1:19
hackthebox granny
Marcotech-CyberAcademy
hackthebox granny
1:35
htb Busqueda write up
Marcotech-CyberAcademy
htb Busqueda write up
4:17
Reflected XSS Protected by CSP with Bypass  Understanding and Exploiting
Marcotech-CyberAcademy
Reflected XSS Protected by CSP with Bypass Understanding and Exploiting
8:58
Granting Local Administrator Privileges  A Step by Step Guide
Marcotech-CyberAcademy
Granting Local Administrator Privileges A Step by Step Guide
4:22
Step-by-Step Guide to Adding Local Administrators
Marcotech-CyberAcademy
Step-by-Step Guide to Adding Local Administrators
1:03
Step-by-Step Guide to Adding Local Administrators PART 2
Marcotech-CyberAcademy
Step-by-Step Guide to Adding Local Administrators PART 2
1:09
Subnetting Basics: Part 1 - Understanding the Fundamentals
Marcotech-CyberAcademy
Subnetting Basics: Part 1 - Understanding the Fundamentals
22:43
Subnetting Basics: Part 2 - Understanding the Fundamentals
Marcotech-CyberAcademy
Subnetting Basics: Part 2 - Understanding the Fundamentals
16:00
Static Routing Demo: Hands-On Tutorial
Marcotech-CyberAcademy
Static Routing Demo: Hands-On Tutorial
6:02
SSH Connection Lab: Step-by-Step Guide
Marcotech-CyberAcademy
SSH Connection Lab: Step-by-Step Guide
5:29
SQL Server 2017 Installation: Step-by-Step Guide
Marcotech-CyberAcademy
SQL Server 2017 Installation: Step-by-Step Guide
10:47
Setting Up WebPT Full Lab: Comprehensive Tutorial
Marcotech-CyberAcademy
Setting Up WebPT Full Lab: Comprehensive Tutorial
10:36
Python Strings Demo: Exploring String Manipulation
Marcotech-CyberAcademy
Python Strings Demo: Exploring String Manipulation
16:47
Python Statements: Simple Explanation
Marcotech-CyberAcademy
Python Statements: Simple Explanation
7:01
Python Number Demo: Exploring Numeric Operations
Marcotech-CyberAcademy
Python Number Demo: Exploring Numeric Operations
5:16
Python List and Tuples Demo: Hands-On Exploration
Marcotech-CyberAcademy
Python List and Tuples Demo: Hands-On Exploration
4:58
Python Installation Lab: Step-by-Step Guide
Marcotech-CyberAcademy
Python Installation Lab: Step-by-Step Guide
7:34
Setting Up MobSF Lab: Installation and Configuration Guide
Marcotech-CyberAcademy
Setting Up MobSF Lab: Installation and Configuration Guide
38:16
MongoDB Installation on Kali: Basic Setup and Security Configuration
Marcotech-CyberAcademy
MongoDB Installation on Kali: Basic Setup and Security Configuration
7:29
Installing Docker Desktop, MSFConsole, and Metasploit in Kali WSL: Step-by-Step Guide
Marcotech-CyberAcademy
Installing Docker Desktop, MSFConsole, and Metasploit in Kali WSL: Step-by-Step Guide
20:15
Setting Up Mobile Lab: Requirements and Installation Guide
Marcotech-CyberAcademy
Setting Up Mobile Lab: Requirements and Installation Guide
18:05
Installing Ubuntu GUI: Step-by-Step Tutorial
Marcotech-CyberAcademy
Installing Ubuntu GUI: Step-by-Step Tutorial
13:52
Hack The Box: Beginner's Guide and Overview
Marcotech-CyberAcademy
Hack The Box: Beginner's Guide and Overview
30:35
Visual Studio Code Introduction: Getting Started Guide
Marcotech-CyberAcademy
Visual Studio Code Introduction: Getting Started Guide
4:26
How to Set Up Proxy on Websites: A Beginner's Guide
Marcotech-CyberAcademy
How to Set Up Proxy on Websites: A Beginner's Guide
17:33
Installing Packet Tracer and Basic Switch Configuration: Step-by-Step Tutorial
Marcotech-CyberAcademy
Installing Packet Tracer and Basic Switch Configuration: Step-by-Step Tutorial
8:07
Introduction to GitHub: Getting Started Guide
Marcotech-CyberAcademy
Introduction to GitHub: Getting Started Guide
20:42
BURP Proxy Explained: Understanding How Proxies Work
Marcotech-CyberAcademy
BURP Proxy Explained: Understanding How Proxies Work
11:48
Exporting VM in VirtualBox: Step-by-Step Tutorial
Marcotech-CyberAcademy
Exporting VM in VirtualBox: Step-by-Step Tutorial
1:01
Installing Kali on VirtualBox: Easy Guide
Marcotech-CyberAcademy
Installing Kali on VirtualBox: Easy Guide
4:17
Installing Kali on VirtualBox: Easy Guide Part 2
Marcotech-CyberAcademy
Installing Kali on VirtualBox: Easy Guide Part 2
5:35
Wireshark Basics: Simple Lab Tutorial
Marcotech-CyberAcademy
Wireshark Basics: Simple Lab Tutorial
10:35
Linux Basics: Simple Lab Training
Marcotech-CyberAcademy
Linux Basics: Simple Lab Training
19:13
Customizing Code in VS Code: Quick Guide
Marcotech-CyberAcademy
Customizing Code in VS Code: Quick Guide
5:47
Cisco Academy: Introduction to Packet Tracer
Marcotech-CyberAcademy
Cisco Academy: Introduction to Packet Tracer
3:42
Comparative Basic Network Scanning: Kali Linux vs. Metapreter part 2
Marcotech-CyberAcademy
Comparative Basic Network Scanning: Kali Linux vs. Metapreter part 2
4:06
Creating a Penetration Testing Environment on AWS: Installing Kali Linux on EC2
Marcotech-CyberAcademy
Creating a Penetration Testing Environment on AWS: Installing Kali Linux on EC2
24:43
Azure Linux VM Setup: SSH Access with Private Key and Web Server Installation
Marcotech-CyberAcademy
Azure Linux VM Setup: SSH Access with Private Key and Web Server Installation
4:59
Creating Your First Android App: Basic Programming Tutorial
Marcotech-CyberAcademy
Creating Your First Android App: Basic Programming Tutorial
8:34
Getting Started with Docker on Windows: Easy Setup Guide
Marcotech-CyberAcademy
Getting Started with Docker on Windows: Easy Setup Guide
42:45
Metasploit Lab: vsftpd to Meterpreter Upgrade Tutorial
Marcotech-CyberAcademy
Metasploit Lab: vsftpd to Meterpreter Upgrade Tutorial
22:38
Installing Nethunter: Easy Guide for Android Devices
Marcotech-CyberAcademy
Installing Nethunter: Easy Guide for Android Devices
3:15
Kali Linux 2020.2 Installation Guide: Step-by-Step Tutorial
Marcotech-CyberAcademy
Kali Linux 2020.2 Installation Guide: Step-by-Step Tutorial
7:17
Azure Demo: Introduction and Terraform Walkthrough
Marcotech-CyberAcademy
Azure Demo: Introduction and Terraform Walkthrough
21:57
PowerCat Live Demo: Practical Guide and Tutoria
Marcotech-CyberAcademy
PowerCat Live Demo: Practical Guide and Tutoria
20:06
Mobile ADB Lab Demo: Hands-On Tutorial
Marcotech-CyberAcademy
Mobile ADB Lab Demo: Hands-On Tutorial
11:59
Demystifying DevOps Architecture
Marcotech-CyberAcademy
Demystifying DevOps Architecture
22:28
Deploying Jenkins on AWS EC2: Step-by-Step Guide
Marcotech-CyberAcademy
Deploying Jenkins on AWS EC2: Step-by-Step Guide
9:29
Metasploit Evasion Module: Hands-On Lab
Marcotech-CyberAcademy
Metasploit Evasion Module: Hands-On Lab
14:26
Basic Nmap Scanning: Kali vs Metasploit 2 Comparison
Marcotech-CyberAcademy
Basic Nmap Scanning: Kali vs Metasploit 2 Comparison
4:06
Subnetting Simplified: Easy Tutorial
Marcotech-CyberAcademy
Subnetting Simplified: Easy Tutorial
5:53
Android Studio Demo: Hands-On Introduction
Marcotech-CyberAcademy
Android Studio Demo: Hands-On Introduction
8:40
MITM Filezilla Lab Review: Practical Examination
Marcotech-CyberAcademy
MITM Filezilla Lab Review: Practical Examination
17:16
Linux PE Demo: Practical Walkthrough
Marcotech-CyberAcademy
Linux PE Demo: Practical Walkthrough
9:38
Flare VM Installation: Step-by-Step Demo
Marcotech-CyberAcademy
Flare VM Installation: Step-by-Step Demo
9:51
Windows 10 Defender Evasion: Practical Demonstration
Marcotech-CyberAcademy
Windows 10 Defender Evasion: Practical Demonstration
5:29
PowerShell Hyper-V Commands and Scripts: Practical Guide
Marcotech-CyberAcademy
PowerShell Hyper-V Commands and Scripts: Practical Guide
11:40
Office Attack Macro Demo: Live Demonstration
Marcotech-CyberAcademy
Office Attack Macro Demo: Live Demonstration
5:28
Eternal Blue Payload Lab - Full Demo (Hebrew): Comprehensive Tutorial
Marcotech-CyberAcademy
Eternal Blue Payload Lab - Full Demo (Hebrew): Comprehensive Tutorial
25:37
Android Reverse Engineering Demo: Practical Guide
Marcotech-CyberAcademy
Android Reverse Engineering Demo: Practical Guide
16:27
Building a Cyber Lab for Mobile Android: Step-by-Step Guide
Marcotech-CyberAcademy
Building a Cyber Lab for Mobile Android: Step-by-Step Guide
28:35
Meterpreter: Metasploit Payload Full Demo
Marcotech-CyberAcademy
Meterpreter: Metasploit Payload Full Demo
29:40
Domain Controller Promotion (DC Promote): Comprehensive Guide
Marcotech-CyberAcademy
Domain Controller Promotion (DC Promote): Comprehensive Guide
20:15
Mimikatz SAM File: Pass-the-Hash Attack Demo
Marcotech-CyberAcademy
Mimikatz SAM File: Pass-the-Hash Attack Demo
17:14
Kali vs Ubuntu Server: NMAP Scan Comparison
Marcotech-CyberAcademy
Kali vs Ubuntu Server: NMAP Scan Comparison
4:06
Basic Linux Lab: Hands-On Tutorial
Marcotech-CyberAcademy
Basic Linux Lab: Hands-On Tutorial
19:13
Folina Zero-Day Attack POC: Practical Demonstration
Marcotech-CyberAcademy
Folina Zero-Day Attack POC: Practical Demonstration
4:11
Metasploit Shodan API Demo: Practical Guide
Marcotech-CyberAcademy
Metasploit Shodan API Demo: Practical Guide
14:25
Ransomware Demo: Python Attack on Linode Server
Marcotech-CyberAcademy
Ransomware Demo: Python Attack on Linode Server
23:17
Microsoft Office Macro Payload Demo
Marcotech-CyberAcademy
Microsoft Office Macro Payload Demo
5:28
Deleting and Disabling Windows Defender: Step-by-Step Guide
Marcotech-CyberAcademy
Deleting and Disabling Windows Defender: Step-by-Step Guide
4:28
CVE-2022-0847 DirtyPipe Privilege Exploit Attack: In-depth Overview
Marcotech-CyberAcademy
CVE-2022-0847 DirtyPipe Privilege Exploit Attack: In-depth Overview
1:35
Send Message Python Script: Social Engineering Attack Vector
Marcotech-CyberAcademy
Send Message Python Script: Social Engineering Attack Vector
8:32
Bluekeep Exploit: Vulnerability Overview and Exploitation Guide
Marcotech-CyberAcademy
Bluekeep Exploit: Vulnerability Overview and Exploitation Guide
12:49
DNS Zone Transfer: Understanding and Performing
Marcotech-CyberAcademy
DNS Zone Transfer: Understanding and Performing
12:21
PayPal Phishing Demo: Practical Illustration
Marcotech-CyberAcademy
PayPal Phishing Demo: Practical Illustration
8:09
Phishing Attack Demo - Netflix vector
Marcotech-CyberAcademy
Phishing Attack Demo - Netflix vector
10:00
User ID Controlled by Request Parameter: Security Implications
Marcotech-CyberAcademy
User ID Controlled by Request Parameter: Security Implications
3:35
Modifying User Roles in Profile: Step-by-Step Tutorial
Marcotech-CyberAcademy
Modifying User Roles in Profile: Step-by-Step Tutorial
9:58
Escalating Privileges: Transitioning from User to Admin via Control Parameter Vector
Marcotech-CyberAcademy
Escalating Privileges: Transitioning from User to Admin via Control Parameter Vector
3:59
WinPEAS: Windows OS Enumeration Tool Overview and Usage
Marcotech-CyberAcademy
WinPEAS: Windows OS Enumeration Tool Overview and Usage
8:18
Sending Ransomware to Target and Activation: Step-by-Step Guide
Marcotech-CyberAcademy
Sending Ransomware to Target and Activation: Step-by-Step Guide
6:00
Keylogger Delivery via Email: Stealthy Attack Vector Explained
Marcotech-CyberAcademy
Keylogger Delivery via Email: Stealthy Attack Vector Explained
6:11
Mimikatz Installation: Bypassing Windows Defender Safeguards
Marcotech-CyberAcademy
Mimikatz Installation: Bypassing Windows Defender Safeguards
3:39