Category: Video Resources
Copying Keys from Photos, Molds & More
Hack Yourself Building A Pentesting Lab David Boyd
How to build a hack lab using a spare machine and virtualization. Computer i5+ 16GB RAM+ 250+GB HDD Virtualization Software VMWare Fusion VMWare Player
A Google Event You Won’t Forget
This video talks about a couple potential vulnerabilities that can be used in gsuite apps for social engineering attacks. You can add invites without
Vibing Your Way Through an Enterprise How Attackers are Becoming More Sneaky
Contains dinosaurs and pivoting through windows environments https://github.com/Tylous/Vibe