Channel Avatar

Lsecqt @UCFOc80iGpDdO1kMQHeVIFPQ@youtube.com

6.6K subscribers - no pronouns :c

Creating PenTesting / RedTeaming Videos


01:30:52
Malware Development Mythic C2 Agent Development Part 5
22:59
MALWARE DEVELOPMENT - C FUNDAMENTALS (CODE WORKFLOW AND DATA TYPES)
02:40:24
Malware Development - Mythic C2 Agent Development Part 4
10:31
How to Hack with VBA Macros: Bypassing Security and Mark of the Web
06:12
Best Programming Languages for Malware Development: Compiled vs Interpreted Explained
05:46
WHY DO WE EVEN NEED MALWARE DEVELOPMENT?
01:01:48
Malware Development - Creating A Custom C2 Agent Part 3
01:17:18
Malware Development - Creating a Custom C2 Agent Part 2
02:21:58
Malware Development - Creating a Custom C2 Agent Part 1
27:01
How to START Ethical Hacking in 2024 - FULL ROADMAP
16:52
HOW TO CREATE MALWARE IN A WINDOWS SERVICE
01:06:30
Ethical Hacking Guide - Basic Lateral Movement with Mythic C2
33:40
HOW TO SETUP YOUR INTERNAL HACKING NETWORK
11:55
HOW TO HACK INTERNAL NETWORKS WITH THIS CRAZY TOOL
09:10
HOW TO COMPILE WINDOWS MALWARE FROM LINUX
13:17
How To Pivot Through A Network With Mythic C2 And Ligolo-NG
13:53
Practical Penetration Testing Guide For Hacking Databases
14:31
HOW TO EXECUTE MALWARE FROM DLL FILE
07:41
Weaponizing DLL Injection via ICONS has gone CRAZY
15:39
Inject MALICIOUS code into Explorer exe With This CRAZY Tool
13:30
This 0DAY is CRAZY - AMSI Bypass from OFFSEC
11:50
HOW TO CONVERT PYTHON SCRIPT TO EXE | ETHICAL HACKING TUTORIAL
13:46
How To Use DISCORD As C2 Traffic Broker with Mythic C2
13:59
Compromise ANY Windows Computer via This POWERFUL Attack
07:06
Malware Development 101 - Establishing Persistence
14:01
Offensive Coding with C: Bypassing AntiVirus via SMB Staging
07:03
Setup Havoc C2 Redirectors In Just 7 Minutes
05:28
Red Teaming 101 - How to SETUP C2 Redirectors with Sliver C2
11:22
Would You Use This Command And Control Framework - Primus C2 Updated
09:52
Find Vulnerabilities in Active Directory With This BloodHound Alternative
08:11
How To Bypass ANY Anti-Virus With This POWERFUL Technique
13:27
Build Your Own Malware Analysis Tool
11:54
Weaponizing DLL Injection In 12 Minutes
12:59
Red Teaming 101 - Establishing Persistence with Havoc C2 and SharPersist
14:00
Hacking NodeJS Application with EVAL
28:17
Building Active Directory Lab For Hacking
25:09
Red Teaming from Windows | Commando VM Review
15:41
How to CONVERT Executable Programs into Shellcode with DONUT
15:14
C2 Framework Revealed: Primus C2
11:12
How Hackers use PowerShell to EVADE Anti-Virus Software
24:20
How Hackers Move Across Networks - Lateral Movement
19:31
C2 Framework Revealed: Covenant
30:56
C2 Framework Revealed: Mythic
17:46
C2 Framework Revealed: Havoc
12:05
Offensive Coding with C++: DLL Injection
56:20
Live Offensive Tools Code Reviews: Exploring C2 Agent
01:42:51
Mythic C2 Mastery: Hacking Custom Active Directory Lab
18:35
Offensive Coding with C++: Building a Custom Shellcode Downloader
09:34
DLL Proxying: The Secret Weapon for Hackers Exploiting DLL Hijacking
01:46:28
DLL Hijacking Attack: Malicious DLL in C++ | Indicator of Compromise Analysis
09:30
Offensive Coding with C++: Building a Custom Shellcode Runner with Windows APIs
02:07:35
Debugging C/C++ Programs from Scratch with WinDbg: A Beginner's Guide
08:14
From Setback to Success: My Journey of Conquering the OSEP Exam in 2023
14:37
Technical Analysis of Mythic C2's Athena Agent: Is Mythic C2 still a thing?
01:24:07
Breaking a Sweat: Hacking the Sauna Machine on HackTheBox!
29:25
Hacking Red Panda on HackTheBox: A Step-by-Step Guide to Pwning the Machine
38:53
Uncovering the Mind of a Woman Hacktivist: An Exclusive Interview with a Cyber Warrior - WonderGh0st
06:59
Attacking Active Directory: Unleashing the Power of Unconstrained Delegation
43:24
Red Teaming 101: How to Evade HELK Logging with Covenant C2
20:58
Red Teaming 101 - Analyzing Covenant Traffic with Wireshark