Channel Avatar

Hicham El Aaouad @UCG0lzPH3ac6t2YIzerd1LFA@youtube.com

2.9K subscribers - no pronouns :c

Hello guys, My name is Hicham El Aaouad, I am a beginner in


10:15
Exploiting an sql injection in a mobile app | attacking mobile applications
19:49
bypassing windows defender | Malware development
33:00
Don't use Mimikatz 🥝, build your own | Token Impersonation
17:58
Don't use Mimikatz 🥝, build your own | lsass dumper
05:20
attacking Active Directory | GOLDEN TICKET
10:40
GPO enumeration | attacking active directory
19:30
create a bloodhound graph manually | attacking active directory
06:17
Attacking active directory | kerberoasting
13:02
attacking active directory | DCSYNC attack
18:51
attack active directory for beginners with hackthebox | kerberos hacking
11:56
How Hackers Create Malicious Code : python malware analysis
17:29
How to Hack Any Website (LIVE DEMO)
19:16
Create a log4j App and Hack It | CVE-2021-44228
11:02
brute force a login page using python 🙀
06:34
python for Ethical Hackers course | Working with Files #006
05:19
Linux Privilege Escalation via Cron Wildcards
21:45
Web Security | The HTTP Protocol
21:45
python for Ethical Hackers course | OOP #005
04:36
python for Ethical Hackers course | Functions #004
12:51
python for Ethical Hackers course | Conditional Statements if, for, while #003
12:06
python for Ethical Hackers course: data types #002
05:33
python for Ethical Hackers course: Introduction #001
09:02
Bounty Hacker TryHackMe CTF walkthrough
10:11
root me tryhackme - easy challenge ✌
11:40
Tryhackme | Reversing ELF part 2 easy reverse engineering challenges ✌
05:20
Tryhackme | Reversing ELF part 1 easy reverse engineering challenges ✌
16:32
Pickle Trick - easy Tryhackme Challenge ✌
06:21
What is 5G ? How it's work ? is it a trojan Horse ?