-
Introduction 4
-
Lecture1.1
-
Lecture1.2
-
Lecture1.305 min
-
Lecture1.402 min
-
-
Basics 5
-
Lecture2.1
-
Lecture2.204 min
-
Lecture2.309 min
-
Lecture2.406 min
-
Lecture2.510 min
-
-
Phishing 10
-
Lecture3.1
-
Lecture3.209 min
-
Lecture3.308 min
-
Lecture3.405 min
-
Lecture3.507 min
-
Lecture3.610 min
-
Lecture3.709 min
-
Lecture3.807 min
-
Lecture3.906 min
-
Lecture3.1008 min
-
-
Phishing - Bypassing 2 / Multi Factor Authentication (2FA / MFA) 3
-
Lecture4.107 min
-
Lecture4.206 min
-
Lecture4.309 min
-
-
Accessing Cloud Server Desktop 2
-
Lecture5.104 min
-
Lecture5.210 min
-
-
BitB - Browser In Browser Attack 6
-
Lecture6.108 min
-
Lecture6.205 min
-
Lecture6.308 min
-
Lecture6.405 min
-
Lecture6.507 min
-
Lecture6.6
-
-
Mobile BitB - Mobile Friendly Phishing & 2FA Bypass 4
-
Lecture7.109 min
-
Lecture7.209 min
-
Lecture7.307 min
-
Lecture7.407 min
-
-
Multi-BitB Attack 3
-
Lecture8.109 min
-
Lecture8.207 min
-
Lecture8.309 min
-
-
Hacking Web Browsers 8
-
Lecture9.1
-
Lecture9.213 min
-
Lecture9.310 min
-
Lecture9.412 min
-
Lecture9.505 min
-
Lecture9.607 min
-
Lecture9.713 min
-
Lecture9.805 min
-
-
Command & Control Servers (C2 / C&C) 2
-
Lecture10.102 min
-
Lecture10.207 min
-
-
Hacking Windows, Linux & Apple Mac OS 5
-
Lecture11.108 min
-
Lecture11.206 min
-
Lecture11.310 min
-
Lecture11.407 min
-
Lecture11.505 min
-
-
Post Exploitation With StarKiller 6
-
Lecture12.109 min
-
Lecture12.207 min
-
Lecture12.306 min
-
Lecture12.405 min
-
Lecture12.505 min
-
Lecture12.6
-
-
Hacking Windows Using Discord as a C2 4
-
Lecture13.105 min
-
Lecture13.206 min
-
Lecture13.304 min
-
Lecture13.408 min
-
-
Windows Post Exploitation via Discord 4
-
Lecture14.106 min
-
Lecture14.208 min
-
Lecture14.306 min
-
Lecture14.4
-
-
Creating Windows Trojans 3
-
Lecture15.1
-
Lecture15.209 min
-
Lecture15.303 min
-
-
Creating Apple Mac OS & Linux Trojans 3
-
Lecture16.106 min
-
Lecture16.212 min
-
Lecture16.311 min
-
-
Advanced Malware Delivery 7
-
Lecture17.1
-
Lecture17.206 min
-
Lecture17.306 min
-
Lecture17.408 min
-
Lecture17.503 min
-
Lecture17.607 min
-
Lecture17.709 min
-
-
Bonus Section 1
-
Lecture18.1
-
Launching a Ransomeware Attack
This lecture will introduce you to run Ransomware attack and will teach you how to simulate one from within the cloud after hacking a computer using StarKiller.