Nermin Zlatanovic-CyberCortex
O.MG Cable in Action | Custom Payload with Remote Console (Educational Demo)
11:34
Nermin Zlatanovic-CyberCortex
USB Rubber Ducky + Sliver C2: Build a Custom Remote‑Access Payload (Tutorial)
15:16
Nermin Zlatanovic-CyberCortex
🧠 Reverse Engineering a Python Script to Reveal the Hidden Flag | CTF Walkthrough
4:42
Nermin Zlatanovic-CyberCortex
🔧 End-to-End IT Architecture: From Hardware to AI | Complete Breakdown for Modern IT Systems
47:40
Nermin Zlatanovic-CyberCortex
🚀 Retrieving the MetaCTF Flag from christmas_tree.bin | Binary Exploitation Challenge 🔥
2:33
Nermin Zlatanovic-CyberCortex
Hacking Metasploitable 2 with Metasploit & Nmap | Ethical Hacking Tutorial
16:21
Nermin Zlatanovic-CyberCortex
Create a Windows Batch File to Gain Remote Access | Ethical Hacking with Kali Linux & Metasploit
17:51
Nermin Zlatanovic-CyberCortex
SET in Action: How Hackers Exploit the Social-Engineer Toolkit
7:06
Nermin Zlatanovic-CyberCortex
Defend Against Phishing: Protect Yourself from Email Spoofing, BEC, and SIM Swapping Scams!
22:19
Nermin Zlatanovic-CyberCortex
ChatGPT Hacks: How to Communicate with AI Like a Pro
14:14
Nermin Zlatanovic-CyberCortex
Join Me on My Cybersecurity Journey: Penetration Testing, Bug Bounty, & AI Explained!
0:34