Channel Avatar

HackerSploit @[email protected]

978K subscribers - no pronouns :c

HackerSploit is the leading provider of free Infosec and cyb


24:41
How FIN6 Exfiltrates Files Over FTP
20:22
Emulating FIN6 - Active Directory Enumeration Made EASY
15:30
The SECRET to Embedding Metasploit Payloads in VBA Macros
11:53
Offensive VBA 0x4 - Reverse Shell Macro with Powercat
55:20
Offensive VBA 0x3 - Developing PowerShell Droppers
45:29
Offensive VBA 0x2 - Program & Command Execution
43:28
Offensive VBA 0x1 - Your First Macro
32:19
Emulating FIN6 - Gaining Initial Access (Office Word Macro)
18:04
FIN6 Adversary Emulation Plan (TTPs & Tooling)
29:39
Developing An Adversary Emulation Plan
29:14
Introduction To Advanced Persistent Threats (APTs)
24:05
Introduction To Adversary Emulation
51:20
Mastering Persistence: Using an Apache2 Rootkit for Stealth and Defense Evasion
46:19
Planning Red Team Operations | Scope, ROE & Reporting
39:54
Mapping APT TTPs With MITRE ATT&CK Navigator
35:48
Introduction To The MITRE ATT&CK Framework
18:24
Red Team Frameworks & Methodologies
48:26
Introduction To Red Teaming
01:20:01
Pentesting Diaries 0x1 - SQL Injection 101
14:30
HackerSploit Channel Update 2024
54:32
3 Year Cybersecurity Career Roadmap
19:49
Linux Red Team Defense Evasion Techniques - Hiding Linux Processes
54:22
Linux Red Team Persistence Techniques - SSH Keys, Web Shells & Cron Jobs
40:03
ChatGPT For Cybersecurity
40:42
Linux Red Team Privilege Escalation Techniques - Kernel Exploits & SUDO Permissions
01:06:19
LastPass Data Breach - Password Security 101
24:47
Windows Red Team Lateral Movement Techniques - PsExec & RDP
45:25
Windows Red Team Privilege Escalation Techniques - Bypassing UAC & Kernel Exploits
36:54
Windows Red Team - Dynamic Shellcode Injection & PowerShell Obfuscation
09:38
Updates & Content Schedule - Q4 2022 - Q2 2023
37:06
How To Write A Penetration Testing Report
03:10
Performing Web Searches From Your Terminal
37:01
How I Got Started In Cybersecurity
35:22
Forwarding Snort Logs To Splunk
12:43
Setting Up Splunk
26:38
Stop Trivializing Cybersecurity
12:20
Introduction To Splunk
18:28
Integrating Suricata With Wazuh For Log Processing
27:16
Installing & Configuring Suricata
11:13
Introduction To Suricata IDS
45:56
Threat Detection & Active Response With Wazuh
27:52
Installing & Configuring Wazuh
17:30
Introduction To Wazuh SIEM
31:53
Intrusion Detection With Snort
20:18
Installing & Configuring Snort
16:21
Introduction To Snort IDS
06:20
Introduction To Intrusion Detection Systems (IDS)
15:49
Decrypting HTTPS Traffic With Wireshark
37:24
Wireshark Display & Capture Filters
25:07
Installing & Configuring Wireshark For Traffic Analysis
14:59
Wireshark For Blue Teams
03:32
Introduction To Blue Team Operations
05:28
Blue Team Training Course - Introduction
28:09
Hacking A Drupal Website | Drupalgeddon2
34:31
Web App Pentesting - HTTP Cookies & Sessions
25:51
Web App Pentesting - URL Structure
47:18
How To Create Your Own Pentesting Distribution
23:20
Dirty Pipe - CVE-2022-0847 - Linux Privilege Escalation
30:14
Windows Privilege Escalation - Token Impersonation With RoguePotato & PrintSpoofer
14:22
Windows Privilege Escalation - Startup Apps