Video games using procedural generation
Hack 'n' Slash is a video game developed by Double Fine Productions. Prototyped during Double Fine's open Amnesia Fortnight 2012, Hack 'n' Slash is a top-down action-adventure game similar to The Legend of Zelda, though with in-game weapons and objects that allow the player to hack the game's world to achieve victory. The game was released to Steam's Early Access on May 6, 2014 for Microsoft Windows, OS X, and Linux computers. It left early access status and became a full release on September 9, 2014. (Wikipedia).
[Twitch] Hacknet walkthrough - part 7 - The Ending and the Finale
Join me on Twitter: http://twitter.com/WhatDaMath Facebook: https://www.facebook.com/whatdamath Hello and welcome to What Da Math. This is an attempt at beating the awesome new game called Hacknet. The video was broadcasted on Twitch. http://www.twitch.tv/whatdamath The game is availabl
From playlist Hacknet
[Twitch] Hacknet walkthrough - part 2 - Learning the ropes
Join me on Twitter: http://twitter.com/WhatDaMath Facebook: https://www.facebook.com/whatdamath Hello and welcome to What Da Math. This is an attempt at beating the awesome new game called Hacknet. The video was broadcasted on Twitch. http://www.twitch.tv/whatdamath The game is availabl
From playlist Hacknet
[Twitch] Hacknet walkthrough - part 5 - The megahacker
Join me on Twitter: http://twitter.com/WhatDaMath Facebook: https://www.facebook.com/whatdamath Hello and welcome to What Da Math. This is an attempt at beating the awesome new game called Hacknet. The video was broadcasted on Twitch. http://www.twitch.tv/whatdamath The game is availabl
From playlist Hacknet
[Twitch] Hacknet walkthrough - part 3 - Getting stuck
Join me on Twitter: http://twitter.com/WhatDaMath Facebook: https://www.facebook.com/whatdamath Hello and welcome to What Da Math. This is an attempt at beating the awesome new game called Hacknet. The video was broadcasted on Twitch. http://www.twitch.tv/whatdamath The game is availabl
From playlist Hacknet
An intro to the core protocols of the Internet, including IPv4, TCP, UDP, and HTTP. Part of a larger series teaching programming. See codeschool.org
From playlist The Internet
[Twitch] Hacknet walkthrough - part 1 - Let's get to hacking
Join me on Twitter: http://twitter.com/WhatDaMath Facebook: https://www.facebook.com/whatdamath Hello and welcome to What Da Math. This is an attempt at beating the awesome new game called Hacknet. The video was broadcasted on Twitch. http://www.twitch.tv/whatdamath The game is availabl
From playlist Hacknet
Hacknet review - GAMES IN EDUCATION (Computer Science/Technology)
Join me on Twitter: http://twitter.com/WhatDaMath Facebook: https://www.facebook.com/whatdamath Hello and welcome to What Da Math. This is a short review of an original and somewhat educational game called Hacknet. This hacking simulator is an excellent tool to learn the command line, in
From playlist Educational Games Review
Creating an i3 Auto Ricing Script
Matt works on some bash scripting with the ultimate goal of creating an auto ricing script for i3wm. Here is the script I created during this video. It is very rough, so if you have errors, that's probably expected. https://github.com/mtwb47/i3ricer
From playlist Live Streams
Pentesting for n00bs: Episode 1 - Legacy (hackthebox)
Get my: 25 hour Practical Ethical Hacking Course: https://www.udemy.com/course/practical-ethical-hacking/?referralCode=4A7D5EE973AFBCAD11C6 Windows Privilege Escalation for Beginners Course: https://www.udemy.com/course/windows-privilege-escalation-for-beginners/?referralCode=7CADEAA4AA3D
From playlist Pentesting for n00bs
How To Use Netcat In Ethical Hacking | Session 02 | #cybersecurity
Don’t forget to subscribe! This project series is about how to use Netcat in ethical hacking. Netcat is a versatile and easy-to-use tool to "read and write to a TCP/UDP port with using an application layer software". This project is intended to use Netcat for ethical hacking purposes.
From playlist Netcat In Ethical Hacking
Linux for Ethical Hackers (Kali Linux Tutorial)
In this course, you will learn the basics of Kali Linux. The course covers installation, using the terminal / command line, bash scripting, tools and features for ethical hacking, and more. The course focuses on Kali Linux but much of the content applies to other versions of Linux as well.
From playlist Ethical Hacking
Linux for Ethical Hackers (2022 - Full Kali Linux Course)
0:00 - Introduction 4:12 - Installing VMWare or VirtualBox 10:27 - Installing Linux 16:00 - Configuring VirtualBox 19:15 - Kali Linux Overview 22:45 - Sudo Overview 27:58 - Navigating the File System 46:10 - Users and Privileges 1:03:05 - Common Network Commands 1:11:32 - Viewing, Creating
From playlist Full-Length Hacking Courses
Ethical Hacking in 15 Hours - 2023 Edition - Learn to Hack! (Part 1)
0:00 - Introduction/whoami 6:43 - A Day in the Life of an Ethical Hacker 27:44 - Effective Notekeeping 34:27 - Important Tools 39:51 - Networking Refresher: Introduction 41:06 - IP Addresses 54:18 - MAC Addresses 57:35 - TCP, UDP, & the Three-Way Handshake 1:02:51 - Common Ports & Protocol
From playlist Full-Length Hacking Courses
How To Attack Using SQL Injection | Session 02 | #cybersecurity
Don’t forget to subscribe! In this series, you will learn how to attack using SQL injection. SQL Injection also called SQLi is World's 10 Ten Web Application Vulnerability and very deadly when it comes to attacking it. Introduction: https://www.youtube.com/watch?v=VNIx-fE3eVg&list=PLQ
From playlist Metasploit Framework For Ethical Hacking
R & Python - Processing Raw Text Part 2
Lecturer: Dr. Erin M. Buchanan Summer 2020 https://www.patreon.com/statisticsofdoom This video is part of my Natural Language Processing course. This video covers different facets of language text cleanup that you should consider before analysis. You will learn tokenization, lemmatizati
From playlist Natural Language Processing
Research Tips - Still Untitled: The Adam Savage Project - 6/23/2015
This week, Adam, Will, and Norm share their favorite sites, tools, and sources for researching the many things they're interested in.
From playlist The Adam Savage Project
HackTheBox Nibbles - Exploiting Arbitrary File Upload
In this video, we will be taking a look at how to obtain initial access to a Linux target by exploiting the arbitrary file upload vulnerability in web applications. The techniques demonstrated in this video were performed on the retired box "Nibbles" on the HackTheBox platform. ----------
From playlist Ethical Hacking & Penetration Testing - Complete Course
DEFCON 18: ChaosVPN for Playing CTFs 1/3
Speakers: mc.fly, ryd, vyrus, no_maam ChaosVPN - the American name is AgoraLink - is a tinc based, fully meshed VPN to connect hackerspaces and other hacker related networks for fun, sharing, learning and competition with each other. Its purpose is to provide a trusted, private and s
From playlist DEFCON 18-3