Hey guys, so basically this is some of the new Cyber Security content I'll be releasing soon! I've talked a bit about it before in one of my previous posts, but figured I'd give a recap as well as some additional ideas that'll be cooking up. Some of them are already in rotation, so I'll indicate which one's are new, and which ones are already instated.
π Article π Glossary π Catalog π Home π Search ModeHey guys, so basically this is some of the new Cyber Security content I'll be releasing soon! I've talked a bit about it before in one of my previous posts, but figured I'd give a recap as well as some additional ideas that'll be cooking up. Some of them are already in rotation, so I'll indicate which one's are new, and which ones are already instated.
I'll be discussing the following topics in order: π The DANGER! Series π Exploit Guides (Patreon only) π Tool Guides (Patreon only) π Programming Videos (Patreon only) π Electrical Engineering (Patreon only) π Malware Labs (Patreon only) (NEW) π Defensive Coding Puzzles (Patreon only) (NEW) π Mr.Robot (Patreon only) (New) π Labs (Patreon only) π Audibles (FREE) (NEW) You can click on any of the topics to simply check that one out if it interests you! NOTE: Articles are read from LEFT to RIGHT via 2 columns! Read the first column all the way down and then move to the next one!
Here's a quick run down on all the main links that are in the article in case you want to check them out first. π LinkedIn Version
The Danger! Series is I raise more awareness about critical flaws and vulnerabilities that exist within various system infrastructures, including any protocols and data communication methods, and the Dangers of what could happen should they be exploited to the fullest extent. I also go over various mitigation strategies that can be used to prevent them as well. If by chance there is an exploit video for me showing the full potential risk, it will be included in the advance version of this article for PAID patreon members only!
This series includes a FREE 2 page article, the paid version being an additional page along with a long full in depth video (IF one is made for it).
There's a difference between a simulation and the REAL deal! In these videos I cover how to apply what you learn from: HackTheBox, TCM Security, and a lot more on a PRACTICAL and REAL WORLD level.
This series includes a FREE 2 page article, the paid version being an additional page along with a long full in depth video!
Ever seen a tool used for ethical hacking and penetration testing but never understood how it FULLY worked? I cover ADVANCED methodologies and techniques that can be applied with various tools on top of all the basics!
This series includes a FREE 2 page article, the paid version being an additional page along with a long full in depth video!
It's no shocker that programming is one of the most core skill sets a hacker can wield. Nearly EVERY tool or form of security software we have set in place has code behind it. Even injection techniques require you to know how to code, more so once you dive into things on a granular level!
This series includes a FREE 2 page article, the paid version being an additional page along with a long full in depth video!
Ever wanted to dive into electrical engineering but never knew where to start? I cover the core basics, and then teach you how to develop your own custom penetration testing tools you can be proud of!
This series includes a FREE 2 page article, the paid version being an additional page along with a long full in depth video!
It's no shocker.... BUT I LOVE MALWARE!! I love writing it, dissecting it, you get the point!
In this series of content, I'll teach you the art of reverse engineering and malware analysis! You'll also learn some cool programming methodologies along the way which I'll fully explain to you!
This series includes a FREE 2 page article, the paid version being an additional page along with a long full in depth video!
This series is focuses on teaching you how to highlight vulnerabilities that exist in code bases for various software products.
Much like the new malware lab series I'll be introducing, this series will do the exact same thing, EXCEPT, for defensive purposes.
This series includes a FREE 2 page article, the paid version being an additional page along with a long full in depth video!
This one is going to be a SPECIAL one! I'm basically going to go over any core hacking methodologies that Elliot uses over the course of the "Mr.Robot" series and explain it to you!
My goal for this is to also have stuff like watch parties you can join in and ask me questions about in case there's anything you don't understand!
This series includes a FREE 2 page article, the paid version being an additional page along with a long full in depth video!
I've talked about this before, but nearly all of my series, at some point, will have a lab excersize that's FULLY hands on, rather, it's a lab that you do along side a video in order to build REAL skills from all the stuff you're learning from my content over each set of parts they have.
Don't have the time to read all my past articles? No worries! Listen to them on the go via audible style!
Any and all past articles I've done will be featuring voice overs, including all of my past exploit guides!
All of this Sounds fun!?
If you enjoyed this post give it a thumbs up! Iβll be keeping track of whose reacting from now on as there is a βspecialβ reason for it. Just know the more you support my content the more there is in stored!
- The Hacker Who Laughs πΈπΈππΈπΈ