2:11 Abusing Constrained delegation in 2 minutes | Attacking Active Directory Hicham El Aaouad 970 views - 4 months ago
3:30 Exploiting ESC3 to compromise the domain | Attacking ADCS full course Hicham El Aaouad 638 views - 1 year ago
2:37 ما هو PIKINIT؟ | دورة كاملة في مهاجمة أنظمة التحكم في الوصول إلى البيانات (ADCS) Hicham El Aaouad 814 views - 1 year ago
3:48 Installing a CA in our domain using ADCS | Attacking ADCS full course Hicham El Aaouad 670 views - 1 year ago
10:15 Exploiting an sql injection in a mobile app | attacking mobile applications Hicham El Aaouad 2K views - 1 year ago
33:00 Don't use Mimikatz 🥝, build your own | Token Impersonation Hicham El Aaouad 2.4K views - 2 years ago
17:58 لا تستخدم Mimikatz 🥝، ابنِ نسختك الخاصة | أداة تفريغ ملفات lsass Hicham El Aaouad 9.8K views - 2 years ago
19:30 create a bloodhound graph manually | attacking active directory Hicham El Aaouad 2.9K views - 2 years ago
18:52 attack active directory for beginners with hackthebox | kerberos hacking Hicham El Aaouad 15.7K views - 2 years ago
11:56 How Hackers Create Malicious Code : python malware analysis Hicham El Aaouad 1.2K views - 2 years ago
6:34 python for Ethical Hackers course | Working with Files #006 Hicham El Aaouad 192 views - 4 years ago
12:51 python for Ethical Hackers course | Conditional Statements if, for, while #003 Hicham El Aaouad 109 views - 4 years ago