Ocsaly Academy
How AI Understands & Processes Our Prompts | Mastering Prompt Engineering
7:05
Ocsaly Academy
How Port Scans Work ? | Hidden Information
17:21
Ocsaly Academy
Analyzing DNS Packets | Whats hidden there ?
16:47
Ocsaly Academy
Capturing & Analyzing Packets with TShark & tcpdump | Master Packet Sniffing!
13:17
Ocsaly Academy
How Critical Infrastructure Gets Hacked | SCADA & ICS Exploitation Explained
17:43
Ocsaly Academy
UDP Packet analysis for DNS Response with Wireshark
16:47
Ocsaly Academy
Extracting RAM Data : Memory Acquisition in Windows
7:12
Ocsaly Academy
Layer 1,2 and 3 | Hubs, Switches and Routers
5:46
Ocsaly Academy
First Steps with Metasploit: Essential Concepts for Ethical Hackers!
15:40
Ocsaly Academy
Port Scanning with Metasploit: A Step-by-Step Guide for Ethical Hackers
15:16
Ocsaly Academy
Mastering Metasploit - Remote Code Execution (RCE)
27:06
Ocsaly Academy
From Kilobits to Gigabits: The Evolution of GSM
16:40
Ocsaly Academy
SDR++ Interface | Beginner Lecture
29:03
Ocsaly Academy
Creating Full Tunable Car AM Receiver | Learning GNU Radio without any Device
33:41
Ocsaly Academy
Discord ONLINE !
0:58
Ocsaly Academy
How Your PC Boots: UEFI, BIOS, GPT, and Legacy Mode Explained
4:58
Ocsaly Academy
Digital Forensics 101 - FTK Imager All you need to know
17:52
Ocsaly Academy
RTL-SDR & HackRF: 20$ vs 40$ vs 100$ vs 150$ SDR Beginner-Friendly Overview & Advanced Tips
15:01
Ocsaly Academy
Mastering Buffer Overflow : Identify and Exploit Applications with Buffer/Stack Overflow
31:17
Ocsaly Academy
Critical Windows Exploits Uncovered: What You Need to Do NOW and How to be Safe
8:26
Ocsaly Academy
0.0.0.0 Day: The 18-Year-Old Browser Flaw That Makes Privacy a Joke
6:45
Ocsaly Academy
PenTesting Industrial Control Systems | Red Teaming
17:43
Ocsaly Academy
Creating PenTest Lab for Industrial Control Systems | Red Teaming
22:09
Ocsaly Academy
Red Teaming | SSH User Enumeration
9:15
Ocsaly Academy
Red Teaming | Finding Vulnerabilities in PHP and Apache
11:05
Ocsaly Academy
Red Teaming | Information Gathering and Finding Exploits of SMB
7:42
Ocsaly Academy
2 Methods to Hack Into FTP Servers | Red Teaming
13:56
Ocsaly Academy
Red Teaming | Information Gathering on TCP and UDP Protocols using Metasploit
14:23
Ocsaly Academy
Red Teaming | Variables in Metasploit Framework
11:24
Ocsaly Academy
Red Teaming | Important Commands in Metasploit
24:46
Ocsaly Academy
Red Teaming | The Mysterious Background of Metasploit
15:59
Ocsaly Academy
Understanding TCP States | Advanced Networking for Hackers
3:57
Ocsaly Academy
Using Wireshark Display Filters | Advanced Networking for Hackers
10:20
Ocsaly Academy
Understanding Signal and Connection Types | Advanced Networking for Hackers
5:29
Ocsaly Academy
Packet Capturing in Practice | Advanced Networking for Hackers
12:30
Ocsaly Academy
IDS, ACL and Firewall | Advanced Networking for Hackers
3:33
Ocsaly Academy
Important Tools and Concepts for Pentesting | Advanced Networking for Hackers
13:20
Ocsaly Academy
Simulating 2 LAN Networks Communicating | Networking for Hackers
4:50
Ocsaly Academy
Using and Understanding Switch and Data Transmission | Networking for Hackers
5:41
Ocsaly Academy
Understanding PDU (Protocol Data Unit) | Networking for Hackers
6:19
Ocsaly Academy
How Emails Sent and Received over Internet | Networking for Hackers
2:29
Ocsaly Academy
Layers of TCP/IP and OSI Model | Networking for Hackers
4:11
Ocsaly Academy
Understanding Protocols | Networking for Hackers
4:16
Ocsaly Academy
Multi-Functions in Assembly | Assembly Language
20:26
Ocsaly Academy
Circle Area Calculator in Assembly | Assembly Language
15:08
Ocsaly Academy
Playing with Stack in Assembly FOR EVERYONE | Assembly Language
25:13
Ocsaly Academy
Assembly Language | Analyzing Output with GDB and creating makefile
17:10
Ocsaly Academy
Assembly Language | Using Strings, Decimal Point and Integers
12:04
Ocsaly Academy
Assembling and Testing our Exploit | Exploit Development | Shellcode
6:36
Ocsaly Academy
Creating ASM Shellcode with Stack Technique | Exploit Development | Shellcode
19:40
Ocsaly Academy
Injecting Shellcode and Creating Exploit | Exploit Development | Shellcode
18:28
Ocsaly Academy
Creating Shellcode with JMP Technique in Assembly and C | Exploit Development
21:34
Ocsaly Academy
Finding Entry Points and Naming Undefined Function Names | Reverse Engineering
4:51
Ocsaly Academy
Extracting SYS file from Malware | Reverse Engineering
11:47
Ocsaly Academy
Analyzing Libraries that Malware Uses | Reverse Engineering
3:13
Ocsaly Academy
OSINT for Reverse Engineering | Reverse Engineering
5:42
Ocsaly Academy
Analyzing Suspicious String using Ghidra | Reverse Engineering
11:08
Ocsaly Academy
Starting Real Malware Analysis with Ghidra | Reverse Engineering
7:55
Ocsaly Academy
Getting Familiar with Ghidra | Reverse Engineering
9:05
Ocsaly Academy
Starting Project in Ghidra | Reverse Engineering
14:25
Ocsaly Academy
Volatility for Digital Forensics - Learning more with Volatility Plugins
14:41
Ocsaly Academy
Digital Forensics with Volatility - Analysis of the Malware Using Volatility
5:17
Ocsaly Academy
Volatility for Digital Forensics - Password Extraction and Time Liner Plugin
4:55
Ocsaly Academy
Mastering Volatility Registry Analysis: Unveiling Insights with Hivescan | DFIR
7:51
Ocsaly Academy
Volatility DLL Analysis: Uncovering Secrets with Getsids, Verinfo, and Dlllist
11:03
Ocsaly Academy
Mastering Volatility: Unleashing the Power of Connscan and Sockets Plugin
5:16
Ocsaly Academy
Mastering Volatility Plugins - Part 2: Analyzing System Memory with pstree, imageinfo, and psscan
6:55
Ocsaly Academy
Mastering Volatility: Unleashing the Power of the pslist Plugin - Part 1"
5:25
Ocsaly Academy
Unlocking the Power of Volatility: Downloading and Unraveling Sample Images
13:44
Ocsaly Academy
Mastering Digital Forensics: Unleash the Power of Volatility with Easy Download and Installation
3:43
Ocsaly Academy
Power of Volatility Framework: Downloading Virus-Infected Memory and Storage Samples
6:00
Ocsaly Academy
Wireshark 101: Mastering Captured Data Visualization and Plugins
8:28
Ocsaly Academy
Changing MAC Address without TOOLS and Bypassing MAC Filtering | Real Hacker
6:28
Ocsaly Academy
From Cybercriminal to Cyber Savior:The Journey of Albert Gonzalez #shorts #shorts #shortvideo #short
1:00
Ocsaly Academy
Python Primer: Unveiling the Magic of Coding - A 4.5 Minute Beginner's Guide! - Lecture 1
4:31
Ocsaly Academy
(c0mrade) Jonathan James and how he Hacked NASA ! #shortsfeed #shorts #hacker #short #shortsvideo
1:00
Ocsaly Academy
World of Kotlin Developers: How Much Do They Earn? #shortsfeed #shortvideo #shorts #short #android
1:00
Ocsaly Academy
The Creator of ZEUS Trojan : Kristina Svechinskaya #shortsfeed #shortvideo #shorts #short #hacker
1:00
Ocsaly Academy
Network Protocols 101:Guide to Communication of Digital World in 4 Minutes
4:16
Ocsaly Academy
How to Become a Certified Ethical Hacker: Our Real Course Will Help You Get There
1:49
Ocsaly Academy
Biggest Hacker : Kevin Mitnick's Money #shortvideo #shortsviral #shortsfeed #shorts #short #hacker
1:00
Ocsaly Academy
Top 2 Most Infamous Hackers in History #shortsfeed #shortvideo #shorts #hacker #hackers #short
1:00
Ocsaly Academy
GDI Engines : Advantages of Individual Cylinder Direct Injection
6:03
Ocsaly Academy
Digital Forensics : Storage Acquisition with Bulk_Extractor
12:06
Ocsaly Academy
Stage 4 Tuning Explained 🥴 #jdm #tuning #shortsfeed #shortsvideo #supra #bmw #cars #jdmcars #turbo
1:00
Ocsaly Academy
Stage 2 vs Stage 3 Tuning Explained | #cars #tuning #jdm #jdmcars #mechanic #shortsfeed #shortvideo
1:00
Ocsaly Academy
Car Tuning Stages Explained ! #cars #tuning #jdm #jdmcars #mechanic #shortsfeed #shortvideo #supra
1:00
Ocsaly Academy
Car Tuning Stages : from Stage 1 to Stage 4 Tuning Explained
3:12
Ocsaly Academy
Discover the Hidden World Behind Your Pictures! #shorts #hacker #hack #cybersecurity #kalilinux
1:00
Ocsaly Academy
Android Programming: Understanding the Different Types of Listeners
5:19
Ocsaly Academy
Unlock Your Full Potential: 3 More Tricks to 5X Your Performance in Android Studio!
10:32
Ocsaly Academy
Boost Your Android Studio Skills: 10 Insanely Effective Tricks to 5x Your Performance Today!
9:44
Ocsaly Academy
Power of Linux Permissions: Rule Your System Like a Pro!
19:47
Ocsaly Academy
How to Choose the Best car for Project ? | Do not make these mistakes !
4:42
Ocsaly Academy
Unveiling Offensive OSINT: The Dark Side of Intelligence Gathering
5:18
Ocsaly Academy
FIX Popular Error in 2023: Kotlin could not find the required JDK tools in the Java installation.
4:21
Ocsaly Academy
RAM Acquisition with FTK Imager | Windows Forensics | Ocsaly Academy
6:38
Ocsaly Academy
Guymager | Using Linux GUI Tools for Storage Acquisition | Computer Forensics
7:20
Ocsaly Academy
Memory Acquisition with Magnet | Windows Forensics | RAM Capture
5:57
Ocsaly Academy
10 Practical Examples with Constraint Layout | Ocsaly Academy
9:30