Video games using procedural generation

Hack 'n' Slash

Hack 'n' Slash is a video game developed by Double Fine Productions. Prototyped during Double Fine's open Amnesia Fortnight 2012, Hack 'n' Slash is a top-down action-adventure game similar to The Legend of Zelda, though with in-game weapons and objects that allow the player to hack the game's world to achieve victory. The game was released to Steam's Early Access on May 6, 2014 for Microsoft Windows, OS X, and Linux computers. It left early access status and became a full release on September 9, 2014. (Wikipedia).

Hack 'n' Slash
Video thumbnail

[Twitch] Hacknet walkthrough - part 7 - The Ending and the Finale

Join me on Twitter: http://twitter.com/WhatDaMath Facebook: https://www.facebook.com/whatdamath Hello and welcome to What Da Math. This is an attempt at beating the awesome new game called Hacknet. The video was broadcasted on Twitch. http://www.twitch.tv/whatdamath The game is availabl

From playlist Hacknet

Video thumbnail

[Twitch] Hacknet walkthrough - part 2 - Learning the ropes

Join me on Twitter: http://twitter.com/WhatDaMath Facebook: https://www.facebook.com/whatdamath Hello and welcome to What Da Math. This is an attempt at beating the awesome new game called Hacknet. The video was broadcasted on Twitch. http://www.twitch.tv/whatdamath The game is availabl

From playlist Hacknet

Video thumbnail

[Twitch] Hacknet walkthrough - part 5 - The megahacker

Join me on Twitter: http://twitter.com/WhatDaMath Facebook: https://www.facebook.com/whatdamath Hello and welcome to What Da Math. This is an attempt at beating the awesome new game called Hacknet. The video was broadcasted on Twitch. http://www.twitch.tv/whatdamath The game is availabl

From playlist Hacknet

Video thumbnail

[Twitch] Hacknet walkthrough - part 3 - Getting stuck

Join me on Twitter: http://twitter.com/WhatDaMath Facebook: https://www.facebook.com/whatdamath Hello and welcome to What Da Math. This is an attempt at beating the awesome new game called Hacknet. The video was broadcasted on Twitch. http://www.twitch.tv/whatdamath The game is availabl

From playlist Hacknet

Video thumbnail

the Internet (part 2)

An intro to the core protocols of the Internet, including IPv4, TCP, UDP, and HTTP. Part of a larger series teaching programming. See codeschool.org

From playlist The Internet

Video thumbnail

[Twitch] Hacknet walkthrough - part 1 - Let's get to hacking

Join me on Twitter: http://twitter.com/WhatDaMath Facebook: https://www.facebook.com/whatdamath Hello and welcome to What Da Math. This is an attempt at beating the awesome new game called Hacknet. The video was broadcasted on Twitch. http://www.twitch.tv/whatdamath The game is availabl

From playlist Hacknet

Video thumbnail

Hacknet review - GAMES IN EDUCATION (Computer Science/Technology)

Join me on Twitter: http://twitter.com/WhatDaMath Facebook: https://www.facebook.com/whatdamath Hello and welcome to What Da Math. This is a short review of an original and somewhat educational game called Hacknet. This hacking simulator is an excellent tool to learn the command line, in

From playlist Educational Games Review

Video thumbnail

Creating an i3 Auto Ricing Script

Matt works on some bash scripting with the ultimate goal of creating an auto ricing script for i3wm. Here is the script I created during this video. It is very rough, so if you have errors, that's probably expected. https://github.com/mtwb47/i3ricer

From playlist Live Streams

Video thumbnail

Pentesting for n00bs: Episode 1 - Legacy (hackthebox)

Get my: 25 hour Practical Ethical Hacking Course: https://www.udemy.com/course/practical-ethical-hacking/?referralCode=4A7D5EE973AFBCAD11C6 Windows Privilege Escalation for Beginners Course: https://www.udemy.com/course/windows-privilege-escalation-for-beginners/?referralCode=7CADEAA4AA3D

From playlist Pentesting for n00bs

Video thumbnail

How To Use Netcat In Ethical Hacking | Session 02 | #cybersecurity

Don’t forget to subscribe! This project series is about how to use Netcat in ethical hacking. ​​Netcat is a versatile and easy-to-use tool to "read and write to a TCP/UDP port with using an application layer software". This project is intended to use Netcat for ethical hacking purposes.

From playlist Netcat In Ethical Hacking

Video thumbnail

Linux for Ethical Hackers (Kali Linux Tutorial)

In this course, you will learn the basics of Kali Linux. The course covers installation, using the terminal / command line, bash scripting, tools and features for ethical hacking, and more. The course focuses on Kali Linux but much of the content applies to other versions of Linux as well.

From playlist Ethical Hacking

Video thumbnail

Linux for Ethical Hackers (2022 - Full Kali Linux Course)

0:00 - Introduction 4:12 - Installing VMWare or VirtualBox 10:27 - Installing Linux 16:00 - Configuring VirtualBox 19:15 - Kali Linux Overview 22:45 - Sudo Overview 27:58 - Navigating the File System 46:10 - Users and Privileges 1:03:05 - Common Network Commands 1:11:32 - Viewing, Creating

From playlist Full-Length Hacking Courses

Video thumbnail

Ethical Hacking in 15 Hours - 2023 Edition - Learn to Hack! (Part 1)

0:00 - Introduction/whoami 6:43 - A Day in the Life of an Ethical Hacker 27:44 - Effective Notekeeping 34:27 - Important Tools 39:51 - Networking Refresher: Introduction 41:06 - IP Addresses 54:18 - MAC Addresses 57:35 - TCP, UDP, & the Three-Way Handshake 1:02:51 - Common Ports & Protocol

From playlist Full-Length Hacking Courses

Video thumbnail

How To Attack Using SQL Injection | Session 02 | #cybersecurity

Don’t forget to subscribe! In this series, you will learn how to attack using SQL injection. SQL Injection also called SQLi is World's 10 Ten Web Application Vulnerability and very deadly when it comes to attacking it. Introduction: https://www.youtube.com/watch?v=VNIx-fE3eVg&list=PLQ

From playlist Metasploit Framework For Ethical Hacking

Video thumbnail

R & Python - Processing Raw Text Part 2

Lecturer: Dr. Erin M. Buchanan Summer 2020 https://www.patreon.com/statisticsofdoom This video is part of my Natural Language Processing course. This video covers different facets of language text cleanup that you should consider before analysis. You will learn tokenization, lemmatizati

From playlist Natural Language Processing

Video thumbnail

Research Tips - Still Untitled: The Adam Savage Project - 6/23/2015

This week, Adam, Will, and Norm share their favorite sites, tools, and sources for researching the many things they're interested in.

From playlist The Adam Savage Project

Video thumbnail

HackTheBox Nibbles - Exploiting Arbitrary File Upload

In this video, we will be taking a look at how to obtain initial access to a Linux target by exploiting the arbitrary file upload vulnerability in web applications. The techniques demonstrated in this video were performed on the retired box "Nibbles" on the HackTheBox platform. ----------

From playlist Ethical Hacking & Penetration Testing - Complete Course

Video thumbnail

DEFCON 18: ChaosVPN for Playing CTFs 1/3

Speakers: mc.fly, ryd, vyrus, no_maam ChaosVPN - the American name is AgoraLink - is a tinc based, fully meshed VPN to connect hackerspaces and other hacker related networks for fun, sharing, learning and competition with each other. Its purpose is to provide a trusted, private and s

From playlist DEFCON 18-3

Related pages

Learning curve