Roguelike video games | Video games using procedural generation
Dungeon Hack is a 1993 role-playing video game developed by DreamForge Intertainment and published by Strategic Simulations for DOS and NEC PC-9801. The game is based in the Advanced Dungeons and Dragons world of Forgotten Realms. It blends gameplay elements of roguelikes and the Eye of the Beholder series. (Wikipedia).
HackTheBox Nibbles - Exploiting Arbitrary File Upload
In this video, we will be taking a look at how to obtain initial access to a Linux target by exploiting the arbitrary file upload vulnerability in web applications. The techniques demonstrated in this video were performed on the retired box "Nibbles" on the HackTheBox platform. ----------
From playlist Ethical Hacking & Penetration Testing - Complete Course
What Is Ethical Hacking? | Ethical Hacking Tutorial For Beginners | Ethical Hacking | Simplilearn
🔥CEH v12 - Certified Ethical Hacking Course: https://www.simplilearn.com/cyber-security/ceh-certification?utm_campaign=WhatisEthicalHacking-gK73JLEbDs0&utm_medium=DescriptionFirstFold&utm_source=youtube 🔥Caltech Cybersecurity Bootcamp (US Only): https://www.simplilearn.com/cybersecurity-b
From playlist Ethical Hacking Playlist [2023 Updated] 🔥
Web App Penetration Testing - #10 - XSS(Reflected, Stored & DOM)
Hey guys! HackerSploit here back again with another video, in this video, I will be demonstrating how to perform XSS attacks. Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur wh
From playlist Web App Penetration Testing Tutorials
SearchSploit - Searching For Exploits
Hey guys! HackerSPloit here back again with another video, in this video, I will be showing you how to use SearchSploit to search for exploits. SearchSploit is a command line search tool for Exploit-DB that also allows you to take a copy of Exploit Database with you, everywhere you go. Sea
From playlist Ethical Hacking & Penetration Testing - Complete Course
[Rust | nvim] My Own Roguelike - Loading a Custom Font
This is an experiment - instead of uploading the entire twitch session (come see me at https://www.twitch.tv/unclescientist !), I'm breaking it up into smaller sections, and editing out the "fumbling around" bits. In this video, fool around a bit showing a Roguelike game from 1979, and th
From playlist ProgRog
Hacker Simulator Walkthrough - Episode 2 - Leveling Up
Become a hacker and build your online reputation to the top by discovering a simplified and enjoyable version of real-life hacking methods. Complete contracts, buy new programs, upgrade your computer, crack networks and infiltrate people's or companies online systems. //LINKS Steam Link:
From playlist Hacker Simulator
DEFCON 16: Good Viruses. Evaluating the Risks
Speaker: Dr. Igor Muttik, Sr. Architect McAfee Avert Labs This session will discuss the risks associated with creation of replicating code. A combination of wide availability of virus source code as well as the problem of control over replicating code make these experiments quite risky. T
From playlist DEFCON 16
DEFCON 20: The Art of Cyberwar
Speaker: KENNETH GEERS NCIS CYBER SUBJECT MATTER EXPERT The establishment of US Cyber Command in 2010 confirmed that cyberspace is a new domain of warfare. Computers are now both a weapon and a target. Future wars may even be fought over the ownership of IT infrastructure. Therefore, nati
From playlist DEFCON 20
An intro to the core protocols of the Internet, including IPv4, TCP, UDP, and HTTP. Part of a larger series teaching programming. See codeschool.org
From playlist The Internet
Open World Design - How to Build Open World Games - Extra Credits
Open world games offer players great opportunities to explore, but developers must figure out how to organize their team to create an immersive experience across so many hours of content. Subscribe for new episodes every Wednesday! http://bit.ly/SubToEC (---More below) _______ Get your Ex
From playlist Extra Credits (ALL EPISODES)
HackTheBox Blocky Walkthrough - Linux Privilege Escalation
In this video, we will be taking a look at how to escalate your privileges on Linux systems by leveraging kernel exploits. The techniques in this video were performed on HackTheBox "Blocky". ----------------------------------------------------------------------------------- BLOG ►► http
From playlist Ethical Hacking & Penetration Testing - Complete Course
Games You Might Not Have Tried #11 - Find New Games - Extra Credits
If you want to try games that feel different, that always feel new and ambitious even if they're not necessarily the most polished experiences, then check out this list of Games You Might Not Have Tried. We review and recommend interesting but under appreciated games on a variety of genres
From playlist Extra Credits (ALL EPISODES)
DEFCON 19: Hacking MMORPGs for Fun and Mostly Profit
Speaker: Josh Phillips Senior Malware Researcher Online games, such as MMORPG's, are the most complex multi-user applications ever created. The security problems that plague these games are universal to all distributed software systems. Online virtual worlds are eventually going to replac
From playlist DEFCON 19
Information Gathering With Shodan
Hey guys! In this video, I will be demonstrating how to use shodan for information gathering and reconnaissance in penetration tests. Shodan is a search engine that lets the user find specific types of computers connected to the internet using a variety of filters. Link: Shodan: https://w
From playlist Ethical Hacking & Penetration Testing - Complete Course
Channel Update 9.0 - I'm Alive!
What have I been doing for the past months? Why I haven't uploaded any video? Uff...these are tough questions. :: Support Me :: https://www.patreon.com/alecaddd http://www.alecaddd.com/support-me/ https://amzn.to/2Hcp5mo Try SkySilk VPS: http://bit.ly/2xrm79p Check out Elementor: http://
From playlist Vlogs & Updates
PowerShell+ 2019 - Dungeons & Dragons & Development: How Playing Games Makes... by Michael Lombardi
Dungeons & Dragons & Development: How Playing Games Makes You a Better IT Pro by Michael Lombardi Dungeons and Dragons, as well as numerous other tabletop roleplaying games (TTRPGs) has a lot to teach us about engineering. I'll cover the very basics of what tabletop roleplaying is, then
From playlist PowerShell + DevOps Global Summit 2019
James Recommends - King's Field: The Ancient City - First-Person Dark Souls Predecessor
James Recommends King's Field: The Ancient City, a first-person fantasy game by From Software whose ruthless difficulty laid the groundwork for the phenomenally successful Dark Souls series. Play King's Field: The Ancient City: http://amzn.to/1oprUyk Platform: PS2 ***Subscribe for new ep
From playlist James Recommends: All Episodes
From playlist other
[Twitch] Hacknet walkthrough - part 7 - The Ending and the Finale
Join me on Twitter: http://twitter.com/WhatDaMath Facebook: https://www.facebook.com/whatdamath Hello and welcome to What Da Math. This is an attempt at beating the awesome new game called Hacknet. The video was broadcasted on Twitch. http://www.twitch.tv/whatdamath The game is availabl
From playlist Hacknet