Leet Cipher
I make security and programming-related videos.
This Malware Has No Code...
I Built a Self-Destructing Malware
Why Use Keyloggers When You Can Turn Text Files into Malware
Your Linux Server/Machine might be Backdoored...
Integer Underflow Explained As Quick As Possible
Why 0 is equal to 4,294,967,296 in programming
How Pirated Video Games DESTROY Your PC (With Demo)
Game Hacking 101: Your First Ever Game Hack
Malware development 102: Hiding Malware inside images
Основы разработки вредоносных программ: ваш первый DLL-инжектор
Основы разработки вредоносных программ: создание вашего первого ВРЕДОНОСНОГО ПО
50 unix/bash commands explained in less than 5 minutes
The Emotet Malware Family Explained in Pi minutes
Hacking an organization with one of the most stealthy and dangerous web attacks
Ditch LastPass and build your own password manager in python
How hackers crack software // Reverse engineering a program and writing a keygen for it
4 of the Best live jeopardy style CTF sites.
Bug Bounty | $1870 for blind command injection
Обратное проектирование и деобфускация файлов Javascript с использованием инструментов разработчи...
Cyber Security platforms to learn about hacking #Shorts
Награда за обнаружение ошибки | 2000 долларов за обход SSRF с помощью перепривязки DNS
How trojans work // A simple trojan malware in python with a command and control server ( C2 )
Bug Bounty | $750 for Admin Dashboard Disclosure bug
Bug Bounty | A story of a $1000 IDOR bug
ransomware decryptor // writing the decryptor for the python ransomware
Как работает программа-вымогатель // Кодирование простого вируса-вымогателя на Python с сервером ...
How to fix openvpn connection issues // openvpn over UDP for tryhackme and hackthebox
tryhackme | overpass writeup - walkthrough
tryhackme | lazyAdmin writeup - walkthrough
tryhackme | pickle rick writeup - walkthrough