This repository contains all the teaching material that I have created over the years for hexdump, my english youtube channel.
In terms of content, I cover subjects related to Computer science, Penetration testing and Applied cryptography.
If you are interested in the mateiral you see and you want to support me, you can subscribe to my channel or donate something.
Below you can find a table containing useful metadata for my videos.
ID | Title | Playlist | Pubblication Date | Video | Material |
---|---|---|---|---|---|
102 | Windows Privilege Escalation - Full Course | Windows privilege escalation | 2025-01-02 | link | link |
101 | A Cheatsheet and A Methodology | Windows privilege escalation | 2024-12-30 | link | link |
100 | Apache Tomcat Race Condition To RCE - CVE-2024-50379 | CVEs | 2024-12-27 | link | link |
99 | AMSI Bypass | Windows privilege escalation | 2024-12-23 | link | link |
98 | Useful Tools | Windows privilege escalation | 2024-12-21 | link | link |
97 | Critical Registry Paths | Windows privilege escalation | 2024-12-19 | link | link |
96 | Scheduled Tasks | Windows privilege escalation | 2024-12-16 | link | link |
95 | Stored Credentials and the Windows Vault | Windows privilege escalation | 2024-12-13 | link | link |
94 | Windows Hashes | Windows privilege escalation | 2024-12-09 | link | link |
93 | Files with Sensitive Data | Windows privilege escalation | 2024-12-05 | link | link |
92 | How Computers Capture Meaning | Foundations | 2024-12-01 | link | link |
91 | Always Installed Elevated | Windows privilege escalation | 2024-11-27 | link | link |
90 | Are You Anxious About OSCP? | Thoughts | 2024-11-24 | link | link |
89 | UAC Bypass | Windows privilege escalation | 2024-11-22 | link | link |
88 | DLL Hijacking | Windows privilege escalation | 2024-11-18 | link | link |
87 | Emulate Android Device in Linux! | Android | 2024-11-14 | link | link |
86 | Unquoted Service Path | Windows privilege escalation | 2024-11-11 | link | link |
85 | Learn Reverse Engineering with Flare-On! | Reverse Engineering | 2024-11-08 | link | link |
84 | Weak Service Permissions | Windows privilege escalation | 2024-11-04 | link | link |
83 | Okta Auth Bypass: A Quick Explanation! | news | 2024-11-03 | link | link |
82 | Crypto 101 – Classical Cryptography | Cryptography | 2024-10-31 | link | link |
81 | Windows Services | Windows privilege escalation | 2024-10-27 | link | link |
80 | Explore Linux Kernel Programming with QEMU | Linux Kernel | 2024-10-22 | link | link |
79 | Learn The Command Line with Practical Challenges! | Over The Wire | 2024-10-19 | link | link |
78 | Cross Compilation | Windows privilege escalation | 2024-10-15 | link | link |
77 | HTB Valentine Walkthrough (Easy Linux) | HTB | 2024-10-11 | link | link |
76 | RomHack 2024 | Research | 2024-10-06 | link | link |
75 | Linux Privilege Escalation – Full Free Course | Linux Privilege Escalation | 2024-09-30 | link | link |
74 | Reflecting on the CUPS CVEs | news | 2024-09-27 | link | link |
73 | Linux Kernel Exploitation | Linux privilege escalation | 2024-09-24 | link | link |
72 | Linux Binary Exploitation | Linux privilege escalation | 2024-09-18 | link | link |
71 | Local Service Exploitation | Linux privilege escalation | 2024-09-13 | link | link |
70 | Introduction to the GNU Project Debugger (GDB) | tools | 2024-09-09 | link | link |
69 | Linux Capabilities Enumeration | Linux privilege escalation | 2024-09-05 | link | link |
68 | OSCP Exam is Changing! | news | 2024-08-31 | link | link |
67 | Linux Cronjob Enumeration | Linux privilege escalation | 2024-08-27 | link | link |
66 | New release of Phrack! (Issue n. 71) | Phrack | 2024-08-24 | link | link |
65 | Linux System Enumeration | Linux privilege escalation | 2024-08-22 | link | link |
64 | Scrape Web Data with Python | Python | 2024-08-18 | link | link |
63 | Generate HTTP Requests with Python | Python | 2024-08-14 | link | link |
62 | Unshadow Attack | Linux privilege escalation | 2024-08-02 | link | link |
61 | Reverse Shells in Linux | Linux privilege escalation | 2024-07-28 | link | link |
60 | SeImpersonatePrivilege Exploitation | Windows privilege escalation | 2024-07-25 | link | link |
59 | CrowdStrike's Mistake and Software Fragility | news | 2024-07-21 | link | link |
58 | Base64 Encoder in C From Scratch | From Scratch | 2024-07-20 | link | link |
57 | Wildcard Expansion Exploitation | Linux privilege escalation | 2024-07-15 | link | link |
56 | Reverse Shells in Windows | Windows privilege escalation | 2024-07-10 | link | link |
55 | Windows Permissions | Windows privilege escalation | 2024-07-06 | link | link |
54 | Differences between WAPTs and CTFs | Security Industry | 2024-07-02 | link | link |
53 | SUDO Exploitation | Linux privilege escalation | 2024-06-28 | link | link |
52 | What is Base64? | General | 2024-06-24 | link | link |
51 | Introduction to the Windows Shells | Windows privilege escalation | 2024-06-19 | link | link |
50 | SUID Exploitation | Linux privilege escalation | 2024-06-13 | link | link |
49 | Linux File System Permissions | Linux privilege escalation | 2024-06-06 | link | link |
48 | Introduction to the Linux Shell | Linux privilege escalation | 2024-05-31 | link | link |
47 | Web Exploitation – Full Free Course | Web Exploitation | 2024-05-19 | link | link |
46 | Web Enumeration – DNS Zone Transfer Attacks | Web Exploitation | 2024-05-17 | link | link |
45 | Web Enumeration – Brute Force Attacks | Web Exploitation | 2024-05-13 | link | link |
44 | Web Enumeration – HTTP Parameters | Web Exploitation | 2024-05-06 | link | link |
43 | Web Enumeration – Virtual Hosts | Web Exploitation | 2024-04-30 | link | link |
42 | Do you really need a VPN? | Cryptography | 2024-04-27 | link | link |
41 | Web Enumeration – Files and Directories | Web Exploitation | 2024-04-23 | link | link |
40 | Cross Site Scripting (Stored, Reflected and DOM) | Web Exploitation | 2024-04-16 | link | link |
39 | Command Injections | Web Exploitation | 2024-04-09 | link | link |
38 | File Upload Vulnerabilities | Web Exploitation | 2024-04-03 | link | link |
37 | New RSS Feed | Channel | 2024-03-23 | link | link |
36 | File Inclusion (Local + Remote) | Web Exploitation | 2024-03-16 | link | link |
35 | Directory Traversals | Web Exploitation | 2024-03-09 | link | link |
34 | SQL Injections | Web Exploitation | 2024-03-03 | link | link |
33 | Enigma Machine in C – Part 2/3 – Core Implementation | From Scratch | 2024-02-25 | link | link |
32 | Getting used to BurpSuite | Web Exploitation | 2024-02-18 | link | link |
31 | Introduction to Web Exploitation | Web Exploitation | 2024-02-14 | link | link |
30 | Enigma Machine in C – Part 1/3 – Overview | From Scratch | 2024-02-10 | link | link |
29 | Pseudo-Randomness – Breaking LCG | Pseudo-Randomness | 2024-02-07 | link | link |
28 | PATH Hijacking | Linux privilege escalation | 2024-01-31 | link | link |
27 | HTB Active 2/2 – Report | HTB | 2024-01-24 | link | link |
26 | Teaching material | Channel | 2024-01-19 | link | link |
25 | From Scratch – Caesar Cipher in Python | From Scratch | 2024-01-11 | link | link |
24 | HTB Active 1/2 – Walkthrough | HTB | 2024-01-05 | link | link |
23 | OSCP Guide – Full Free Course | OSCP Guide | 2023-12-30 | link | link |
22 | HTB Bashed 2/2 – Report | HTB | 2023-12-26 | link | link |
21 | HTB Bashed 1/2 – Boot2Root Walkthrough | HTB | 2023-12-20 | link | link |
20 | Conference Review – M0lecon 2023 | Research | 2023-12-17 | link | link |
19 | Scientific Review – The Impact of Code Patterns on the Security Testing of Web Applications | Research | 2023-12-13 | link | link |
18 | OSCP Guide: Expectations and Methodologies for Exam | OSCP Guide | 2023-12-08 | link | link |
17 | OSCP Guide: Report Writing | OSCP Guide | 2023-12-02 | link | link |
16 | The Pillars of the Digital World | Foundations | 2023-11-28 | link | link |
15 | OSCP Guide: Active Directory | OSCP Guide | 2023-11-23 | link | link |
14 | OSCP Guide: Client-Side Attacks | OSCP Guide | 2023-11-19 | link | link |
13 | OSCP Guide: Port Forwarding and Pivoting | OSCP Guide | 2023-11-13 | link | link |
12 | From Scratch – Hexdump in C | From Scratch | 2023-11-08 | link | link |
11 | OSCP Guide: Using Existing Exploits | OSCP Guide | 2023-11-04 | link | link |
10 | The Perfect Containers of Meaning | Foundations | 2023-10-30 | link | link |
9 | Emacs – A Gentle Introduction | Emacs | 2023-10-24 | link | link |
8 | OSCP Guide: Password Attacks | OSCP Guide | 2023-10-20 | link | link |
7 | OSCP Guide: Windows | OSCP Guide | 2023-10-17 | link | link |
6 | OSCP Guide: Linux | OSCP Guide | 2023-10-12 | link | link |
5 | Breaking Pseudo-Randomness – On Linear Congruential Generators | Lecture | 2023-10-11 | link | link |
4 | OSCP Guide: Web | OSCP Guide | 2023-10-05 | link | link |
3 | OSCP Guide: Pre-Requisites | OSCP Guide | 2023-09-27 | link | link |
2 | Introduction to TLS | TLS | 2023-09-20 | link | link |
1 | OSCP Guide: My Exam Experience | OSCP Guide | 2023-09-19 | link | link |