Channel Avatar

Cyber Ryan | Cyber Security @UCgsHdn0SnYCd9s_iS5EH4Hg@youtube.com

6.9K subscribers

Cybersecurity analyst talking about cybersecurity and stuff.


This is how Hackers abuse the Backup Operators Group to Take Over AD! How to Grab Credentials from an LSASS Memory Dump #cybersecurity #ethicalhacking Privilege Escalation in Active Directory with ForceChangePassword How to Download all files on an SMB Share lookupsid.py — SID bruteforce explained (Ethical Hacking) How Hackers Use Meterpreter’s Keylogger 👀💻 Kerbrute in 50s — Fast Kerberos User Enumeration Never Send Logins Over HTTP — Here’s Why What is WinRM? | How Hackers Abuse Windows Remote Management Is this the biggest worm of 2025? Shai Hulud NPM Worm Explained Basic Binary Reverse Engineering with Strings! Find hidden text in binaries #cybersecurity #hacking Reverse Engineering Made EASY with Ghidra! 🔍 | Beginner Tutorial How Hackers Take Over Active Directory with ESC7! ⚡#cybersecurity #ethicalhacking Checking for ADCS Vulnerabilities with Certipy! DO THIS before Attacking Active Directory! - Sync Clock to Domain Controller (clock skew too great) Crack Windows Passwords with ASREPRoasting 🧠💀 Find Windows Usernames with SMB Null Sessions Using Anonymous LDAP to Enumerate Active Directory How Hackers Steal Session Cookies w/ Cross Site Scripting #cybersecurity #ethicalhacking #bugbounty Exploiting a Stored Cross-Site Scripting Vulnerability Example Cross Site Scripting (XSS) Explained #CyberSecurity#BugBounty #XSS #infosec How was rockyou.txt created? rockyou.txt explained #cybersecurity #securitybreach #leak #rockyou Enumerating VHosts (Internal Subdomains) with Fffuf #cybersecurity#linux #kali #ffuf #hacking How to Fuzz Subdomains (real world example) #ffuf #cybersecurity #ethicalhacking #linux #coding How to Perform Recursive Fuzzing #cybersecurity #enumeration #hackingtutorial #hacking #hacker #ffuf Discovering Hidden Webpages with FFUF #cybersecurity #enumeration #hackingtutorial #hacking #hacker Fuzzing a Website's Backend Language (Web Extension Fuzzing) #cybersecurity #ffuf Complete Website Enumeration with FFUF (Full Tutorial for Beginners) How to RDP onto a Windows machine from Linux #cybersecurity #linux #informationtechnology Evade Detection when Scanning with Nmap #cybersecurity #infosec #redteam #stealthmode #nmap How to Adjust the Performance of your NMAP Scans #cybersecurity#infosec #redteam Learn the Basics of Nmap Scripting #cybersecurity#infosec #redteam How to enumerate services and their versions running on open ports #cybersecurity #infosec #redteam how to scan all TCP ports on a host #nmap #cybersecurity #hacking #ethicalhacking #kali #infosec Scanning Subnets for Live Hosts with Nmap #nmap #cybersecurity #hacking #cybersec #ethicalhacking Nmap for Beginners: How to Use Nmap Make your Kali OS look like Windows 10! #kali #windows #cybersecurity #undercover #hacking #infosec Google Hacking Database Explained #InformationSecurity #CybersecurityCourse #LearnCybersecurity #fyp Learn Google Dorking - Text Filters #Cybersecurity #CybersecurityCourse #LearnCybersecurity #fyp Learn Google Dorking - Link & Related #Cybersecurity #CybersecurityCourse #LearnCybersecurity #fyp Learn Google Dorking - Site & Filetype #Cybersecurity #CybersecurityCourse #LearnCybersecurity #fyp What is Google Dorking? (Google Hacking) #cybersecurity #googledorking #google #computerscience Create Meterpreter Payloads with MSFVenom #cybersecurity #infosec #ethicalhacking #cyberattack How to Use Payloads in Metasploit #cybersecurity #ethicalhacking #cyberawareness #metasploit What is a Web Shell?#cybersecurity #infosec #ethicalhacking #cyberattack #pentesting #websecurity Windows Reverse Shell Using PowerShell #cybersecurity #infosec #cyberawareness #PenTesting #windows Linux Reverse Shell Using NetCat #infosec #ethicalhacking #cyberattack #cyberawareness What is a Reverse Shell? And How Can I Make One? #CyberSecurity #infosec #cyberattack #Hacking