Create your home lab for CORPORATE PENTESTING (active directory) | ethical hacking (part 2)
Mark H4CK
Create your home lab for CORPORATE PENTESTING (active directory) | ethical hacking (part 2)
27:50
Exploitation of corporate networks (Active Directory + brute force) | ethical hacking (Part 1)
Mark H4CK
Exploitation of corporate networks (Active Directory + brute force) | ethical hacking (Part 1)
15:54
This happens exactly when you execute a function (something no one explains to you)
Mark H4CK
This happens exactly when you execute a function (something no one explains to you)
16:28
Emulating ARM in Windows
Mark H4CK
Emulating ARM in Windows
0:56
Is ARM harder than x86? (crack me CTF with Qemu and Ghidra)
Mark H4CK
Is ARM harder than x86? (crack me CTF with Qemu and Ghidra)
15:47
Understand STACK POINTER and BASE POINTER (once and for all)
Mark H4CK
Understand STACK POINTER and BASE POINTER (once and for all)
11:35
Why does EVERYTHING start on the MAIN?
Mark H4CK
Why does EVERYTHING start on the MAIN?
0:55
Playing with the stack
Mark H4CK
Playing with the stack
0:57
How to analyze software with x64dbg and IDA Pro
Mark H4CK
How to analyze software with x64dbg and IDA Pro
1:00
I tried to crack this program... Is it IMPOSSIBLE? (Reversing)
Mark H4CK
I tried to crack this program... Is it IMPOSSIBLE? (Reversing)
21:40
Debugger y X64dbg #shorts #markh4ck #programming #windows
Mark H4CK
Debugger y X64dbg #shorts #markh4ck #programming #windows
1:00
Create Your Own Game Cheat with Python
Mark H4CK
Create Your Own Game Cheat with Python
0:43
This is how I created an ESP cheat in Python
Mark H4CK
This is how I created an ESP cheat in Python
30:09
🔐How to solve a packaged crackme?
Mark H4CK
🔐How to solve a packaged crackme?
0:41
Reverse Engineering with IDA Pro
Mark H4CK
Reverse Engineering with IDA Pro
0:22
Analysis of Sections of Windows Executables
Mark H4CK
Analysis of Sections of Windows Executables
0:42
Your antivirus is useless: this is how hackers hide malware
Mark H4CK
Your antivirus is useless: this is how hackers hide malware
22:14
.BSS Section (Uninitialized Variables)
Mark H4CK
.BSS Section (Uninitialized Variables)
0:43
Why was the PE format created? Windows executables
Mark H4CK
Why was the PE format created? Windows executables
0:47
Sections of an EXE (data and rdata)
Mark H4CK
Sections of an EXE (data and rdata)
0:38
The key is in the Optional Header | Reversing explained
Mark H4CK
The key is in the Optional Header | Reversing explained
0:32
Constant variables and functions in programming
Mark H4CK
Constant variables and functions in programming
0:46
This is what's inside an .EXE file (Reverse Engineering)
Mark H4CK
This is what's inside an .EXE file (Reverse Engineering)
38:57
Everything is Open Source if you know REVERSE ENGINEERING | Tutorial for Beginners
Mark H4CK
Everything is Open Source if you know REVERSE ENGINEERING | Tutorial for Beginners
24:37
Aprende a CRACKEAR un PROGRAMA desde 0 | Crackmes.one (CTF)
Mark H4CK
Aprende a CRACKEAR un PROGRAMA desde 0 | Crackmes.one (CTF)
21:20
CREA tu PRIMER EXPLOIT en WINDOWS con KALI LINUX | Tutorial en Español
Mark H4CK
CREA tu PRIMER EXPLOIT en WINDOWS con KALI LINUX | Tutorial en Español
34:41
¿Qué hay dentro de Windows? TEB, PEB y ASLR explicado | Windows Internals
Mark H4CK
¿Qué hay dentro de Windows? TEB, PEB y ASLR explicado | Windows Internals
37:14
CÓMO CREAR HACKS para JUEGOS | Guía para PRINCIPIANTES
Mark H4CK
CÓMO CREAR HACKS para JUEGOS | Guía para PRINCIPIANTES
7:24
Buffer Overflow in Vulnserver | Computer Course 101
Mark H4CK
Buffer Overflow in Vulnserver | Computer Course 101
29:25
Crack your first program with reverse engineering | Crackmes tutorial for beginners
Mark H4CK
Crack your first program with reverse engineering | Crackmes tutorial for beginners
12:00
Cómo crear un PAYLOAD y EXPLOTAR un BUFFER OVERFLOW
Mark H4CK
Cómo crear un PAYLOAD y EXPLOTAR un BUFFER OVERFLOW
21:37
Cómo explotar un BUFFER OVERFLOW en Windows | Curso computación 101
Mark H4CK
Cómo explotar un BUFFER OVERFLOW en Windows | Curso computación 101
30:58
Así funciona la pila en la memoria RAM 💡
Mark H4CK
Así funciona la pila en la memoria RAM 💡
0:36
Claves de la memoria RAM: ¿Qué hacen ESP y EBP en el stack?
Mark H4CK
Claves de la memoria RAM: ¿Qué hacen ESP y EBP en el stack?
0:31
Cómo funciona el STACK en memoria | Curso computación 101
Mark H4CK
Cómo funciona el STACK en memoria | Curso computación 101
32:07
Estructura del código ensamblador en MASM
Mark H4CK
Estructura del código ensamblador en MASM
0:47
¿Cuantos bits representan 4 dígitos? | Assembly
Mark H4CK
¿Cuantos bits representan 4 dígitos? | Assembly
0:49
Así funcionan los registros de la CPU y los punteros
Mark H4CK
Así funcionan los registros de la CPU y los punteros
0:47
Class 3 (Part 1/2): XOR Logic Operation in x86 Assembly Language (Assembly)
Mark H4CK
Class 3 (Part 1/2): XOR Logic Operation in x86 Assembly Language (Assembly)
15:13
Reverse Engineering con Ghidra: Analizando el Entry Point
Mark H4CK
Reverse Engineering con Ghidra: Analizando el Entry Point
0:33
Direcciones de Memoria y Offset
Mark H4CK
Direcciones de Memoria y Offset
0:35
La mejor herramienta para Ciberseguridad | Ghidra
Mark H4CK
La mejor herramienta para Ciberseguridad | Ghidra
24:31