Roguelike video games | Video games using procedural generation

Dungeon Hack

Dungeon Hack is a 1993 role-playing video game developed by DreamForge Intertainment and published by Strategic Simulations for DOS and NEC PC-9801. The game is based in the Advanced Dungeons and Dragons world of Forgotten Realms. It blends gameplay elements of roguelikes and the Eye of the Beholder series. (Wikipedia).

Dungeon Hack
Video thumbnail

HackTheBox Nibbles - Exploiting Arbitrary File Upload

In this video, we will be taking a look at how to obtain initial access to a Linux target by exploiting the arbitrary file upload vulnerability in web applications. The techniques demonstrated in this video were performed on the retired box "Nibbles" on the HackTheBox platform. ----------

From playlist Ethical Hacking & Penetration Testing - Complete Course

Video thumbnail

What Is Ethical Hacking? | Ethical Hacking Tutorial For Beginners | Ethical Hacking | Simplilearn

🔥CEH v12 - Certified Ethical Hacking Course: https://www.simplilearn.com/cyber-security/ceh-certification?utm_campaign=WhatisEthicalHacking-gK73JLEbDs0&utm_medium=DescriptionFirstFold&utm_source=youtube 🔥Caltech Cybersecurity Bootcamp (US Only): https://www.simplilearn.com/cybersecurity-b

From playlist Ethical Hacking Playlist [2023 Updated] 🔥

Video thumbnail

Web App Penetration Testing - #10 - XSS(Reflected, Stored & DOM)

Hey guys! HackerSploit here back again with another video, in this video, I will be demonstrating how to perform XSS attacks. Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur wh

From playlist Web App Penetration Testing Tutorials

Video thumbnail

SearchSploit - Searching For Exploits

Hey guys! HackerSPloit here back again with another video, in this video, I will be showing you how to use SearchSploit to search for exploits. SearchSploit is a command line search tool for Exploit-DB that also allows you to take a copy of Exploit Database with you, everywhere you go. Sea

From playlist Ethical Hacking & Penetration Testing - Complete Course

Video thumbnail

[Rust | nvim] My Own Roguelike - Loading a Custom Font

This is an experiment - instead of uploading the entire twitch session (come see me at https://www.twitch.tv/unclescientist !), I'm breaking it up into smaller sections, and editing out the "fumbling around" bits. In this video, fool around a bit showing a Roguelike game from 1979, and th

From playlist ProgRog

Video thumbnail

Hacker Simulator Walkthrough - Episode 2 - Leveling Up

Become a hacker and build your online reputation to the top by discovering a simplified and enjoyable version of real-life hacking methods. Complete contracts, buy new programs, upgrade your computer, crack networks and infiltrate people's or companies online systems. //LINKS Steam Link:

From playlist Hacker Simulator

Video thumbnail

DEFCON 16: Good Viruses. Evaluating the Risks

Speaker: Dr. Igor Muttik, Sr. Architect McAfee Avert Labs This session will discuss the risks associated with creation of replicating code. A combination of wide availability of virus source code as well as the problem of control over replicating code make these experiments quite risky. T

From playlist DEFCON 16

Video thumbnail

DEFCON 20: The Art of Cyberwar

Speaker: KENNETH GEERS NCIS CYBER SUBJECT MATTER EXPERT The establishment of US Cyber Command in 2010 confirmed that cyberspace is a new domain of warfare. Computers are now both a weapon and a target. Future wars may even be fought over the ownership of IT infrastructure. Therefore, nati

From playlist DEFCON 20

Video thumbnail

the Internet (part 2)

An intro to the core protocols of the Internet, including IPv4, TCP, UDP, and HTTP. Part of a larger series teaching programming. See codeschool.org

From playlist The Internet

Video thumbnail

Open World Design - How to Build Open World Games - Extra Credits

Open world games offer players great opportunities to explore, but developers must figure out how to organize their team to create an immersive experience across so many hours of content. Subscribe for new episodes every Wednesday! http://bit.ly/SubToEC (---More below) _______ Get your Ex

From playlist Extra Credits (ALL EPISODES)

Video thumbnail

HackTheBox Blocky Walkthrough - Linux Privilege Escalation

In this video, we will be taking a look at how to escalate your privileges on Linux systems by leveraging kernel exploits. The techniques in this video were performed on HackTheBox "Blocky". ----------------------------------------------------------------------------------- BLOG ►► http

From playlist Ethical Hacking & Penetration Testing - Complete Course

Video thumbnail

Games You Might Not Have Tried #11 - Find New Games - Extra Credits

If you want to try games that feel different, that always feel new and ambitious even if they're not necessarily the most polished experiences, then check out this list of Games You Might Not Have Tried. We review and recommend interesting but under appreciated games on a variety of genres

From playlist Extra Credits (ALL EPISODES)

Video thumbnail

DEFCON 19: Hacking MMORPGs for Fun and Mostly Profit

Speaker: Josh Phillips Senior Malware Researcher Online games, such as MMORPG's, are the most complex multi-user applications ever created. The security problems that plague these games are universal to all distributed software systems. Online virtual worlds are eventually going to replac

From playlist DEFCON 19

Video thumbnail

Information Gathering With Shodan

Hey guys! In this video, I will be demonstrating how to use shodan for information gathering and reconnaissance in penetration tests. Shodan is a search engine that lets the user find specific types of computers connected to the internet using a variety of filters. Link: Shodan: https://w

From playlist Ethical Hacking & Penetration Testing - Complete Course

Video thumbnail

Channel Update 9.0 - I'm Alive!

What have I been doing for the past months? Why I haven't uploaded any video? Uff...these are tough questions. :: Support Me :: https://www.patreon.com/alecaddd http://www.alecaddd.com/support-me/ https://amzn.to/2Hcp5mo Try SkySilk VPS: http://bit.ly/2xrm79p Check out Elementor: http://

From playlist Vlogs & Updates

Video thumbnail

PowerShell+ 2019 - Dungeons & Dragons & Development: How Playing Games Makes... by Michael Lombardi

Dungeons & Dragons & Development: How Playing Games Makes You a Better IT Pro by Michael Lombardi Dungeons and Dragons, as well as numerous other tabletop roleplaying games (TTRPGs) has a lot to teach us about engineering. I'll cover the very basics of what tabletop roleplaying is, then

From playlist PowerShell + DevOps Global Summit 2019

Video thumbnail

James Recommends - King's Field: The Ancient City - First-Person Dark Souls Predecessor

James Recommends King's Field: The Ancient City, a first-person fantasy game by From Software whose ruthless difficulty laid the groundwork for the phenomenally successful Dark Souls series. Play King's Field: The Ancient City: http://amzn.to/1oprUyk Platform: PS2 ***Subscribe for new ep

From playlist James Recommends: All Episodes

Video thumbnail

AI for Fun!

From playlist other

Video thumbnail

[Twitch] Hacknet walkthrough - part 7 - The Ending and the Finale

Join me on Twitter: http://twitter.com/WhatDaMath Facebook: https://www.facebook.com/whatdamath Hello and welcome to What Da Math. This is an attempt at beating the awesome new game called Hacknet. The video was broadcasted on Twitch. http://www.twitch.tv/whatdamath The game is availabl

From playlist Hacknet

Related pages

Roguelike | Rogue (video game) | Random seed