12:19 3 Things You Need to Know for Modern Application Hacking Netsec Explained 2.3K views - 2 years ago
6:18 What Time is the 3 O' Clock Parade? | Soft Skills for Hackers Netsec Explained 912 views - 2 years ago
9:52 Pivot Through Multiple Networks | Master Network Pivoting Netsec Explained 7.2K views - 2 years ago
14:12 Tunneling Through Protected Networks | Master Network Pivoting Netsec Explained 7.4K views - 2 years ago
29:37 Full SQL Injection Tutorial | Episode 3: Blind SQL Injection A-Z Netsec Explained 2.9K views - 3 years ago
21:21 Full SQL Injection Tutorial | Episode 2: In-band SQL Injection Netsec Explained 2.3K views - 3 years ago
15:01 Full SQL Injection Tutorial | Episode 1: SQL Basics in 15 Minutes Netsec Explained 2.3K views - 3 years ago
31:31 Cloud Pentesting - IAM Enumeration for Privilege Escalation Netsec Explained 2.5K views - 3 years ago
11:19 Advanced Local and Remote File Inclusion - PHP Wrappers Netsec Explained 13.1K views - 3 years ago
10:11 Exploit Java Deserialization | Exploiting JBoss 6.1.0 Netsec Explained 5.4K views - 4 years ago
11:17 Exploit Java Deserialization | Discovering Insecure Deserialization Netsec Explained 8.8K views - 4 years ago
8:18 Exploit Java Deserialization | Understanding Serialized Data Netsec Explained 8.1K views - 5 years ago
10:37 6 Types of Hackers That Don't Exist (and 5 More That Do) Netsec Explained 864 views - 6 years ago
16:36 Machine Learning for Security Analysts - Part 3: Malicious URL Predictor Netsec Explained 12.3K views - 6 years ago
23:45 Machine Learning for Security Analysts - Part 2: Building a Spam Filter Netsec Explained 2.6K views - 6 years ago
15:02 Machine Learning for Security Analysts - Part 1: The Machine Learning Process Netsec Explained 3.4K views - 6 years ago
7:42 Web Hacker Basics 08 (Blind SQL Injection); featuring SQLmap Netsec Explained 14.4K views - 7 years ago
7:16 Web Hacker Basics 07 (CSRF); chaining attacks together Netsec Explained 1.5K views - 7 years ago
6:37 Web Hacker Basics 06 (Parameter Tampering); featuring Burp Proxy Netsec Explained 8.3K views - 7 years ago
8:37 Web Hacker Basics 05 (Brute Forcing); featuring THC Hydra Netsec Explained 10K views - 7 years ago
9:52 Web Hacker Basics 04 (Local and Remote File Inclusion) Netsec Explained 36.7K views - 7 years ago