Channel Avatar

Kandy Phan @UCStw5yRUM4_W4SUqvbDx62A@youtube.com

827 subscribers - no pronouns :c

More from this channel (soon)


09:32
cobalt strike: aggressor scripts intro
03:28
C# compile with csc.exe (ATT&CK T1027.004)
04:55
cobalt strike: beacon object files (NoteThief demo)
08:56
cobalt strike: malleable c2 http get/post
02:54
OSCP: Nishang reverse Powershell
11:56
BinExp: buffer overflow return address for gdb and no gdb
08:37
OSCP: python library hijacking for privilege escalation
12:57
Custom designing Nessus scan templates
10:41
PowerView and Impacket intro for pentesting/OSCP
09:01
watershell: super stealthy shell
13:35
real-time monitoring of log files in Windows and Linux
08:34
ASP code injection to web shell
12:01
Getting started with pwn.college
13:33
deep-dive of Pwnkit (CVE-2021-4034)
14:09
How to Start Reverse Engineering
19:53
Wireshark Tutorial: Decrypting HTTPS Traffic
19:40
Intro to buffer overflow
08:28
Spring OAuth RCE vulnerability (CVE-2016-4977)
18:50
docker container escapes
18:15
Tutorial on SQL injection UNION attacks
16:24
Java exploiting with ysoserial and how gadget chains work
18:06
SQL injection tutorial
16:11
CVE-2021-44228 (Log4Shell) - Exploitation/Detection
14:18
Kubernetes Goat-Online: learning of Kubernetes security
15:20
Advanced SQLi: sqlmap and eval function
08:06
web hacking: python Jinja2 SSTI vulnerability and code execution
04:56
cobalt strike: using SMB beacons
15:27
Goals of our Cobalt strike learning group
07:55
Detecting VBA Macros with Yara Rules
18:21
Joining Linux to Active Directory (Windows Server 2019)
19:16
cobalt strike: mimikatz pass-the-hash and WMI lateral movement
04:32
cobalt strike: no disk .NET execute-assembly
05:04
cobalt strike: regsvr32 payload execution
03:20
cobalt strike: result of artifact kit
06:42
cobalt strike: powershell web delivery
24:07
CFC 2021 Red scoring Pt. 2
35:38
A/V evasion and the CFC red team
17:39
CyberForce Competition 2021: Red Team Scoring
07:45
hacking: UseBasicParsing and COM Objects
21:30
chat about 'cheese strats' in Red-Blue cyber competitions
19:10
how much pentesting needed for CyberForce Competition 2021
20:00
Xml external entity injection
12:46
No module, no RCE. also - Dude, where's my FTP?
16:58
Apache CVE-2021-41773 Path Traversal, what's your real risk?
14:41
Intro to cyber attack chains and Mitre ATT&CK
31:58
Intro to STIGs
11:36
CFC topology: what's my IP address??! Is IP blocking too OP for red/blue competition?
12:39
n00b plays with OMIGOD, will it appear in CFC??
16:26
how to clear windows logs with Atomic Red Team
11:37
ProxyShell and ProxyLogon demo
19:22
CVE-2021-1675 PrintNightmare walk-thru
08:36
Printer Bug & Unconstrained Delegation with Rubeus (n00bz learning 13)
27:39
n00bz learning 12b: Ransomware intro
26:24
n00bz learning 12a: Active Directory enumeration with powershell
28:29
n00bz learning 11b: AWS online wargame
28:04
n00bz learning 11a: PHP extension bypass for file upload
15:23
n00bz learning 10b: Pentesting built into Devsecops
33:13
n00bz learning 10a: journalctl/less/sudoers for PrivEsc
24:14
n00bz learning 9: BloodHound tutorial for Active Directory analysis
20:16
n00bz learning 8b: Credential Guard - Protecting against credential theft in a Windows Domain