Satish C J
VISIT https://codespindle.com to get the following
Code/Commands used in Video Lectures
More Exercises (You will find more exercises /solved problems on the platform)
Follow codespindle social media accounts to get more updates about the platform .
The Channel covers the following concepts
1. Java Programming
2. Database Management Systems.
3. Cyber Security
4. C Programming
5. Python Programming .
6. Advanced Database Management Systems
7. Neo4j Graph Database (NoSQL Databases)
8. REDIS - Key Value Store
9. MongoDB Database
10. Software Engineering
11. Column Store Databases
12. HTML
13. CSS
14. JavaScript
15 PHP
16 nodejs
17 XSS attacks Demo

Reflected Cross Site Scripting (XSS) Attack: An In-Depth Look for Developers

How Cross-Site Request Forgery Attack (CSRF) Works: A Deep Dive

Metasploit Meterpreter in Action: Demo of Remote Code Execution & File Transfer

MAC Flooding Attack Demo: Kali Linux Tutorial

Managing Metasploit Data : A Guide to PostgreSQL Integration

Passive Sniffing with tcpdump: Essential Commands and Techniques

Understanding SQL Injection Attacks - Manual and Automated - How it Works?

UFW (Uncomplicated Firewall) - Step by Step Demo

DNS Enumeration: Mastering Host, Dig, Dnsenum, Dnsmap, & Dnsrecon

Domain Name System (DNS) - How does it work ?

Advanced Nmap: Using Scripts for MySQL, FTP, & SSH Exploitation
![Network File System[NFS] Attack - Demo using Kali Linux 2024 and Metasploitable 2](https://ricktube.ru/thumbnail/ZK2yi7Kwf0A/mqdefault.jpg)
Network File System[NFS] Attack - Demo using Kali Linux 2024 and Metasploitable 2
![Exploiting MySQL Database using MetaSploit Auxiliary Modules [Kaii Linux 2024]](https://ricktube.ru/thumbnail/JmmrKZhLld8/mqdefault.jpg)
Exploiting MySQL Database using MetaSploit Auxiliary Modules [Kaii Linux 2024]

Database Vulnerabilities and Counter Measures

StringBuilder Class in Java - Capacity, Append, Insert, Delete, Substring, Replace, Reverse - Demo

Java ArrayList - Creating subList - sorting and comparing ArrayList - Demo

BufferedReader and BufferedWriter in Java

Java printf - %s, %d, %f, %b, %c and %n - Demo

Reading Input from a File using Scanner Class

Mastering Nessus Scans: A Guide to Host Discovery, Basic Network Scan and Web Application Tests

Password Recovery using Ophcrack - Kali Linux - Demo

Wifi Hacking Using Aircrack-ng -The complete Guide

WEP , WPA , WPA 2 and Four way Handshake
![Nessus Essentials Installation on Kali Linux [2024]](https://ricktube.ru/thumbnail/0AZQ_LG1ADU/mqdefault.jpg)
Nessus Essentials Installation on Kali Linux [2024]

Metasploit for Detecting Null Sessions and Exploiting Samba Server(SMB)

Hydra / Hydra Graphical Password Cracking Tool Demo

Password Cracking with John the Ripper : Single, Wordlist, and Incremental Mode Deep Dive

Ethical Hacking: Using Metasploit to Crack Passwords

Clickjacking Attack - Demo - Web Application Attack

Nikto Web Vulnerability Scanner - Web Penetration Testing