How AI Understands & Processes Our Prompts | Mastering Prompt Engineering
Ocsaly Academy
How AI Understands & Processes Our Prompts | Mastering Prompt Engineering
7:05
How Port Scans Work ? | Hidden Information
Ocsaly Academy
How Port Scans Work ? | Hidden Information
17:21
Analyzing DNS Packets | Whats hidden there ?
Ocsaly Academy
Analyzing DNS Packets | Whats hidden there ?
16:47
Capturing & Analyzing Packets with TShark & tcpdump | Master Packet Sniffing!
Ocsaly Academy
Capturing & Analyzing Packets with TShark & tcpdump | Master Packet Sniffing!
13:17
How Critical Infrastructure Gets Hacked | SCADA & ICS Exploitation Explained
Ocsaly Academy
How Critical Infrastructure Gets Hacked | SCADA & ICS Exploitation Explained
17:43
UDP Packet analysis for DNS Response with Wireshark
Ocsaly Academy
UDP Packet analysis for DNS Response with Wireshark
16:47
Extracting RAM Data : Memory Acquisition in Windows
Ocsaly Academy
Extracting RAM Data : Memory Acquisition in Windows
7:12
Layer 1,2 and 3 | Hubs, Switches and Routers
Ocsaly Academy
Layer 1,2 and 3 | Hubs, Switches and Routers
5:46
First Steps with Metasploit: Essential Concepts for Ethical Hackers!
Ocsaly Academy
First Steps with Metasploit: Essential Concepts for Ethical Hackers!
15:40
Port Scanning with Metasploit: A Step-by-Step Guide for Ethical Hackers
Ocsaly Academy
Port Scanning with Metasploit: A Step-by-Step Guide for Ethical Hackers
15:16
Mastering Metasploit - Remote Code Execution (RCE)
Ocsaly Academy
Mastering Metasploit - Remote Code Execution (RCE)
27:06
From Kilobits to Gigabits: The Evolution of GSM
Ocsaly Academy
From Kilobits to Gigabits: The Evolution of GSM
16:40
SDR++ Interface | Beginner Lecture
Ocsaly Academy
SDR++ Interface | Beginner Lecture
29:03
Creating Full Tunable Car AM Receiver | Learning GNU Radio without any Device
Ocsaly Academy
Creating Full Tunable Car AM Receiver | Learning GNU Radio without any Device
33:41
Discord ONLINE !
Ocsaly Academy
Discord ONLINE !
0:58
How Your PC Boots: UEFI, BIOS, GPT, and Legacy Mode Explained
Ocsaly Academy
How Your PC Boots: UEFI, BIOS, GPT, and Legacy Mode Explained
4:58
Digital Forensics 101 - FTK Imager All you need to know
Ocsaly Academy
Digital Forensics 101 - FTK Imager All you need to know
17:52
RTL-SDR & HackRF: 20$ vs 40$ vs 100$ vs 150$ SDR Beginner-Friendly Overview & Advanced Tips
Ocsaly Academy
RTL-SDR & HackRF: 20$ vs 40$ vs 100$ vs 150$ SDR Beginner-Friendly Overview & Advanced Tips
15:01
Mastering Buffer Overflow : Identify and Exploit Applications with Buffer/Stack Overflow
Ocsaly Academy
Mastering Buffer Overflow : Identify and Exploit Applications with Buffer/Stack Overflow
31:17
Critical Windows Exploits Uncovered: What You Need to Do NOW and How to be Safe
Ocsaly Academy
Critical Windows Exploits Uncovered: What You Need to Do NOW and How to be Safe
8:26
0.0.0.0 Day: The 18-Year-Old Browser Flaw That Makes Privacy a Joke
Ocsaly Academy
0.0.0.0 Day: The 18-Year-Old Browser Flaw That Makes Privacy a Joke
6:45
PenTesting Industrial Control Systems | Red Teaming
Ocsaly Academy
PenTesting Industrial Control Systems | Red Teaming
17:43
Creating PenTest Lab for Industrial Control Systems | Red Teaming
Ocsaly Academy
Creating PenTest Lab for Industrial Control Systems | Red Teaming
22:09
Red Teaming | SSH User Enumeration
Ocsaly Academy
Red Teaming | SSH User Enumeration
9:15
Red Teaming | Finding Vulnerabilities in PHP and Apache
Ocsaly Academy
Red Teaming | Finding Vulnerabilities in PHP and Apache
11:05
Red Teaming | Information Gathering and Finding Exploits of SMB
Ocsaly Academy
Red Teaming | Information Gathering and Finding Exploits of SMB
7:42
2 Methods to Hack Into FTP Servers | Red Teaming
Ocsaly Academy
2 Methods to Hack Into FTP Servers | Red Teaming
13:56
Red Teaming | Information Gathering on TCP and UDP Protocols using Metasploit
Ocsaly Academy
Red Teaming | Information Gathering on TCP and UDP Protocols using Metasploit
14:23
Red Teaming | Variables in Metasploit Framework
Ocsaly Academy
Red Teaming | Variables in Metasploit Framework
11:24
Red Teaming | Important Commands in Metasploit
Ocsaly Academy
Red Teaming | Important Commands in Metasploit
24:46
Red Teaming | The Mysterious Background of Metasploit
Ocsaly Academy
Red Teaming | The Mysterious Background of Metasploit
15:59
Understanding TCP States | Advanced Networking for Hackers
Ocsaly Academy
Understanding TCP States | Advanced Networking for Hackers
3:57
Using Wireshark Display Filters | Advanced Networking for Hackers
Ocsaly Academy
Using Wireshark Display Filters | Advanced Networking for Hackers
10:20
Understanding Signal and Connection Types | Advanced Networking for Hackers
Ocsaly Academy
Understanding Signal and Connection Types | Advanced Networking for Hackers
5:29
Packet Capturing in Practice | Advanced Networking for Hackers
Ocsaly Academy
Packet Capturing in Practice | Advanced Networking for Hackers
12:30
IDS, ACL and Firewall | Advanced Networking for Hackers
Ocsaly Academy
IDS, ACL and Firewall | Advanced Networking for Hackers
3:33
Important Tools and Concepts for Pentesting | Advanced Networking for Hackers
Ocsaly Academy
Important Tools and Concepts for Pentesting | Advanced Networking for Hackers
13:20
Simulating 2 LAN Networks Communicating | Networking for Hackers
Ocsaly Academy
Simulating 2 LAN Networks Communicating | Networking for Hackers
4:50
Using and Understanding Switch and Data Transmission | Networking for Hackers
Ocsaly Academy
Using and Understanding Switch and Data Transmission | Networking for Hackers
5:41
Understanding PDU (Protocol Data Unit) | Networking for Hackers
Ocsaly Academy
Understanding PDU (Protocol Data Unit) | Networking for Hackers
6:19
How Emails Sent and Received over Internet | Networking for Hackers
Ocsaly Academy
How Emails Sent and Received over Internet | Networking for Hackers
2:29
Layers of TCP/IP and OSI Model | Networking for Hackers
Ocsaly Academy
Layers of TCP/IP and OSI Model | Networking for Hackers
4:11
Understanding Protocols | Networking for Hackers
Ocsaly Academy
Understanding Protocols | Networking for Hackers
4:16
Multi-Functions in Assembly | Assembly Language
Ocsaly Academy
Multi-Functions in Assembly | Assembly Language
20:26
Circle Area Calculator in Assembly | Assembly Language
Ocsaly Academy
Circle Area Calculator in Assembly | Assembly Language
15:08
Playing with Stack in Assembly FOR EVERYONE | Assembly Language
Ocsaly Academy
Playing with Stack in Assembly FOR EVERYONE | Assembly Language
25:13
Assembly Language | Analyzing Output with GDB and creating makefile
Ocsaly Academy
Assembly Language | Analyzing Output with GDB and creating makefile
17:10
Assembly Language | Using Strings, Decimal Point and Integers
Ocsaly Academy
Assembly Language | Using Strings, Decimal Point and Integers
12:04
Assembling and Testing our Exploit | Exploit Development | Shellcode
Ocsaly Academy
Assembling and Testing our Exploit | Exploit Development | Shellcode
6:36
Creating ASM Shellcode with Stack Technique | Exploit Development | Shellcode
Ocsaly Academy
Creating ASM Shellcode with Stack Technique | Exploit Development | Shellcode
19:40
Injecting Shellcode and Creating Exploit | Exploit Development | Shellcode
Ocsaly Academy
Injecting Shellcode and Creating Exploit | Exploit Development | Shellcode
18:28
Creating Shellcode with JMP Technique in Assembly and C | Exploit Development
Ocsaly Academy
Creating Shellcode with JMP Technique in Assembly and C | Exploit Development
21:34
Finding Entry Points and Naming Undefined Function Names | Reverse Engineering
Ocsaly Academy
Finding Entry Points and Naming Undefined Function Names | Reverse Engineering
4:51
Extracting  SYS file from Malware | Reverse Engineering
Ocsaly Academy
Extracting SYS file from Malware | Reverse Engineering
11:47
Analyzing Libraries that Malware Uses | Reverse Engineering
Ocsaly Academy
Analyzing Libraries that Malware Uses | Reverse Engineering
3:13
OSINT for Reverse Engineering | Reverse Engineering
Ocsaly Academy
OSINT for Reverse Engineering | Reverse Engineering
5:42
Analyzing Suspicious String using Ghidra | Reverse Engineering
Ocsaly Academy
Analyzing Suspicious String using Ghidra | Reverse Engineering
11:08
Starting Real Malware Analysis with Ghidra | Reverse Engineering
Ocsaly Academy
Starting Real Malware Analysis with Ghidra | Reverse Engineering
7:55
Getting Familiar with Ghidra | Reverse Engineering
Ocsaly Academy
Getting Familiar with Ghidra | Reverse Engineering
9:05
Starting Project in Ghidra | Reverse Engineering
Ocsaly Academy
Starting Project in Ghidra | Reverse Engineering
14:25
Volatility for Digital Forensics - Learning more with Volatility Plugins
Ocsaly Academy
Volatility for Digital Forensics - Learning more with Volatility Plugins
14:41
Digital Forensics with Volatility - Analysis of the Malware Using Volatility
Ocsaly Academy
Digital Forensics with Volatility - Analysis of the Malware Using Volatility
5:17
Volatility for Digital Forensics - Password Extraction and Time Liner Plugin
Ocsaly Academy
Volatility for Digital Forensics - Password Extraction and Time Liner Plugin
4:55
Mastering Volatility Registry Analysis: Unveiling Insights with Hivescan | DFIR
Ocsaly Academy
Mastering Volatility Registry Analysis: Unveiling Insights with Hivescan | DFIR
7:51
Volatility DLL Analysis: Uncovering Secrets with Getsids, Verinfo, and Dlllist
Ocsaly Academy
Volatility DLL Analysis: Uncovering Secrets with Getsids, Verinfo, and Dlllist
11:03
Mastering Volatility: Unleashing the Power of Connscan and Sockets Plugin
Ocsaly Academy
Mastering Volatility: Unleashing the Power of Connscan and Sockets Plugin
5:16
Mastering Volatility Plugins - Part 2: Analyzing System Memory with pstree, imageinfo, and psscan
Ocsaly Academy
Mastering Volatility Plugins - Part 2: Analyzing System Memory with pstree, imageinfo, and psscan
6:55
Mastering Volatility: Unleashing the Power of the pslist Plugin - Part 1"
Ocsaly Academy
Mastering Volatility: Unleashing the Power of the pslist Plugin - Part 1"
5:25
Unlocking the Power of Volatility: Downloading and Unraveling Sample Images
Ocsaly Academy
Unlocking the Power of Volatility: Downloading and Unraveling Sample Images
13:44
Mastering Digital Forensics: Unleash the Power of Volatility with Easy Download and Installation
Ocsaly Academy
Mastering Digital Forensics: Unleash the Power of Volatility with Easy Download and Installation
3:43
Power of Volatility Framework: Downloading Virus-Infected Memory and Storage Samples
Ocsaly Academy
Power of Volatility Framework: Downloading Virus-Infected Memory and Storage Samples
6:00
Wireshark 101: Mastering Captured Data Visualization and Plugins
Ocsaly Academy
Wireshark 101: Mastering Captured Data Visualization and Plugins
8:28
Changing MAC Address without TOOLS and Bypassing MAC Filtering | Real Hacker
Ocsaly Academy
Changing MAC Address without TOOLS and Bypassing MAC Filtering | Real Hacker
6:28
From Cybercriminal to Cyber Savior:The Journey of Albert Gonzalez #shorts #shorts #shortvideo #short
Ocsaly Academy
From Cybercriminal to Cyber Savior:The Journey of Albert Gonzalez #shorts #shorts #shortvideo #short
1:00
Python Primer: Unveiling the Magic of Coding - A 4.5 Minute Beginner's Guide! - Lecture 1
Ocsaly Academy
Python Primer: Unveiling the Magic of Coding - A 4.5 Minute Beginner's Guide! - Lecture 1
4:31
(c0mrade) Jonathan James and how he Hacked NASA ! #shortsfeed #shorts #hacker #short #shortsvideo
Ocsaly Academy
(c0mrade) Jonathan James and how he Hacked NASA ! #shortsfeed #shorts #hacker #short #shortsvideo
1:00
World of Kotlin Developers: How Much Do They Earn? #shortsfeed #shortvideo #shorts #short #android
Ocsaly Academy
World of Kotlin Developers: How Much Do They Earn? #shortsfeed #shortvideo #shorts #short #android
1:00
The Creator of ZEUS Trojan : Kristina Svechinskaya #shortsfeed #shortvideo #shorts #short #hacker
Ocsaly Academy
The Creator of ZEUS Trojan : Kristina Svechinskaya #shortsfeed #shortvideo #shorts #short #hacker
1:00
Network Protocols 101:Guide to Communication of Digital World in 4 Minutes
Ocsaly Academy
Network Protocols 101:Guide to Communication of Digital World in 4 Minutes
4:16
How to Become a Certified Ethical Hacker: Our Real Course Will Help You Get There
Ocsaly Academy
How to Become a Certified Ethical Hacker: Our Real Course Will Help You Get There
1:49
Biggest Hacker : Kevin Mitnick's Money #shortvideo #shortsviral #shortsfeed #shorts #short #hacker
Ocsaly Academy
Biggest Hacker : Kevin Mitnick's Money #shortvideo #shortsviral #shortsfeed #shorts #short #hacker
1:00
Top 2 Most Infamous Hackers in History #shortsfeed #shortvideo #shorts #hacker #hackers #short
Ocsaly Academy
Top 2 Most Infamous Hackers in History #shortsfeed #shortvideo #shorts #hacker #hackers #short
1:00
GDI Engines : Advantages of Individual Cylinder Direct Injection
Ocsaly Academy
GDI Engines : Advantages of Individual Cylinder Direct Injection
6:03
Digital Forensics : Storage Acquisition with Bulk_Extractor
Ocsaly Academy
Digital Forensics : Storage Acquisition with Bulk_Extractor
12:06
Stage 4 Tuning Explained 🥴 #jdm #tuning #shortsfeed  #shortsvideo #supra #bmw #cars #jdmcars #turbo
Ocsaly Academy
Stage 4 Tuning Explained 🥴 #jdm #tuning #shortsfeed #shortsvideo #supra #bmw #cars #jdmcars #turbo
1:00
Stage 2 vs Stage 3 Tuning Explained | #cars #tuning #jdm #jdmcars #mechanic #shortsfeed #shortvideo
Ocsaly Academy
Stage 2 vs Stage 3 Tuning Explained | #cars #tuning #jdm #jdmcars #mechanic #shortsfeed #shortvideo
1:00
Car Tuning Stages Explained ! #cars #tuning #jdm #jdmcars #mechanic #shortsfeed #shortvideo #supra
Ocsaly Academy
Car Tuning Stages Explained ! #cars #tuning #jdm #jdmcars #mechanic #shortsfeed #shortvideo #supra
1:00
Car Tuning Stages : from Stage 1 to Stage 4 Tuning Explained
Ocsaly Academy
Car Tuning Stages : from Stage 1 to Stage 4 Tuning Explained
3:12
Discover the Hidden World Behind Your Pictures! #shorts #hacker #hack #cybersecurity #kalilinux
Ocsaly Academy
Discover the Hidden World Behind Your Pictures! #shorts #hacker #hack #cybersecurity #kalilinux
1:00
Android Programming: Understanding the Different Types of Listeners
Ocsaly Academy
Android Programming: Understanding the Different Types of Listeners
5:19
Unlock Your Full Potential: 3 More Tricks to 5X Your Performance in Android Studio!
Ocsaly Academy
Unlock Your Full Potential: 3 More Tricks to 5X Your Performance in Android Studio!
10:32
Boost Your Android Studio Skills: 10 Insanely Effective Tricks to 5x Your Performance Today!
Ocsaly Academy
Boost Your Android Studio Skills: 10 Insanely Effective Tricks to 5x Your Performance Today!
9:44
Power of Linux Permissions: Rule Your System Like a Pro!
Ocsaly Academy
Power of Linux Permissions: Rule Your System Like a Pro!
19:47
How to Choose the Best car for Project ? | Do not make these mistakes !
Ocsaly Academy
How to Choose the Best car for Project ? | Do not make these mistakes !
4:42
Unveiling Offensive OSINT: The Dark Side of Intelligence Gathering
Ocsaly Academy
Unveiling Offensive OSINT: The Dark Side of Intelligence Gathering
5:18
FIX Popular Error in 2023: Kotlin could not find the required JDK tools in the Java installation.
Ocsaly Academy
FIX Popular Error in 2023: Kotlin could not find the required JDK tools in the Java installation.
4:21
RAM Acquisition with FTK Imager | Windows Forensics | Ocsaly Academy
Ocsaly Academy
RAM Acquisition with FTK Imager | Windows Forensics | Ocsaly Academy
6:38
Guymager | Using Linux GUI Tools for Storage Acquisition | Computer Forensics
Ocsaly Academy
Guymager | Using Linux GUI Tools for Storage Acquisition | Computer Forensics
7:20
Memory Acquisition with Magnet | Windows Forensics | RAM Capture
Ocsaly Academy
Memory Acquisition with Magnet | Windows Forensics | RAM Capture
5:57
10 Practical Examples with Constraint Layout | Ocsaly Academy
Ocsaly Academy
10 Practical Examples with Constraint Layout | Ocsaly Academy
9:30