Channel Avatar

Hassan Saad @UClzCbf-F0BnOydXAtVQ9n7A@youtube.com

21K subscribers - no pronouns :c

More from this channel (soon)


08:34
Cyber Security CV Tips
02:15:09
AUC Cyber Security Session | Malware Development
01:08
LinkedIn Vulnerability (Rate Limit Bypass)
01:36:14
Cyber Security Career Mind Map (IEEE Session)
01:14:11
Threat Hunting Using Machine Learning (Arab Security Conference Session)
18:51
41- Password Techniques 1
21:26
31- Metasploit
11:56
27- Client Side Gaining Access 3
24:34
24- Password Techniques - Word List Generation - (Cewl , John The Ripper)
26:25
15- Gaining Access Techniques Part 3
30:32
18- Web Hunting - Cross Site Scripting
18:24
26- Password Techniques - (Offline Techniques)
26:17
25- Password Techniques - (Online Techniques)
03:51
Business Logic Flaw on Souq.com
01:16:12
Closing the gap between Theoretical Study, Machines and CTF Playing, Bug Hunting and Corporate Work.
20:29
4- Linux - Core Commands 3
08:22
1- Lab Setup
17:33
3- Linux - Core Commands 2
10:43
8- Linux - User Management
14:18
15- Windows - Core Commands 2
09:59
7- Linux - Environment Variables
15:50
10- Linux - Boot Process
15:53
13- Linux - Install Software
14:52
5- Linux - Special Characters
11:14
9- Linux - SU & Sudo
17:46
16- Windows - File System & File Permissions
15:11
11- Linux - Services & File System
12:35
18- Windows - UAC & Credentials & Security Policy
14:37
2- Linux - Core Commands 1
11:06
17- Windows - Users & Groups
12:54
14- Windows - Core Commands 1
10:34
12- Linux - File Permissions
11:59
6- Linux - Redirection & Piping
09:42
36- Programming - HTML & PHP Lab
21:58
10- Network Sweeping & Tracing
13:32
20- Windows - Sharing & Services
16:33
33- Programming - Python Labs
17:58
21- Windows - Processes & Scheduling Tasks
28:23
1- General Enumerations
24:41
3- Sub Domains & Reverse Lookups
23:13
26- Network - Routing & NAT
16:02
8- TCPdump
17:14
27- Network - Transport Layer
18:38
28- Network - Layer 5,6 & DNS
16:44
22- Network - Physical Layer
11:47
19- Windows - Registry
20:32
35- Programming - PHP
23:16
6- Google Dorks & Shodan
25:07
30- Programming - C Language 1
25:09
32- Programming - Python Language
09:14
4- Sub Domains Brute Force
15:50
31- Programming - C Language 2
30:10
12- Port Scanning
30:15
5- Emails & Users & Metadata Analysis
12:25
25- Network - Netmasking & DHCP
15:33
23- Network - Data Link Layer
07:22
9- Wireshark
22:55
34- Programming - HTML
09:34
11- Network Behaviour
14:01
7- Scanning Tips