1. Cyber Investigation Services ,Cyber Investigators,Certified Ethical Hackers for hire

    05:20

    from Edelman Search Engine Experts / Added

    2 Plays / / 0 Comments

    We provide , Cyber Investigation Services ,highly experienced investigation firm that helps Corporations, Small Businesses, and Individuals address unwanted cyber intrusions and hacking incidents…

    + More details
    • For network surveillance and live electronics

      07:09

      from Ed Fish / Added

      51 Plays / / 0 Comments

      This is an example of a live performance system for the sonification of activity on a local network. The system aims to examine how we value our data and how we leave traces of ourselves throughout…

      + More details
      • Chris Gates appearance on Aluc Radio (Aluc Radio EP0x21.mp4)

        01:01:21

        from carnal0wnage / Added

        1 Play / / 0 Comments

        Chris Gates appearance on Aluc Radio (Aluc Radio EP0x21.mp4)

        + More details
        • Hackit+ | Exploitation Basics

          12:08

          from Hackit+ / Added

          20 Plays / / 0 Comments

          Hackit+ Lesson Ten. More info at www.hackitplus.com

          + More details
          • Hackit+ | Introduction to UNIX and Linux

            12:10

            from Hackit+ / Added

            12 Plays / / 0 Comments

            Hackit+ Lesson One. More info at http://www.hackitplus.com

            + More details
            • Mehis Hakkaja - Manual WebApp Pentesting Fun Stories (with hacking demos)

              59:42

              from devtraining / Added

              594 Plays / / 1 Comment

              We all make mistakes, but when you look at someone else's WebApp from a penetration tester's point of view, you are bound to get a good laugh. Manual penetration testing is the only proper way to…

              + More details
              • Basic Usage ~ pwnCore | Android Cyber Attack Management Tool for Metasploit

                05:11

                from Anwar Mohamed / Added

                247 Plays / / 0 Comments

                These are some of the basic usages of my project "pwnCore". The app will be officially released at Cairo Security Camp during my talk about it. For more info about the talk visit http://www.cairosecuritycamp.com/index.php#nav-speakers…

                + More details
                • DerbyCon 3 2013: Windows Attacks At Is The New Black Rob Fuller And Chris Gates

                  48:19

                  from carnal0wnage / Added

                  57 Plays / / 0 Comments

                  A follow on to the Encyclopedia Of Windows Privilege Escalation published by InsomniaSec at Ruxcon 2011, this talk is aimed at detailing not just escalation from user to admin and admin to system,…

                  + More details
                  • Fun with Metasploit!

                    02:52

                    from d4rk5t4R / Added

                    10 Plays / / 0 Comments

                    Ultimate payload disguised as genuine program...

                    + More details
                    • Big Data Security Challenges and Recommendations!

                      21:00

                      from iviz / Added

                      13 Plays / / 0 Comments

                      Recently, we were pentesting a Data mining and Analytics company. The amount of data that they talked about is phenomenal and they are planning to move to Big Data. They invited me to…

                      + More details

                      What are Tags?

                      Tags

                      Tags are keywords that describe videos. For example, a video of your Hawaiian vacation might be tagged with "Hawaii," "beach," "surfing," and "sunburn."