O.MG Cable in Action | Custom Payload with Remote Console (Educational Demo)
Nermin Zlatanovic-CyberCortex
O.MG Cable in Action | Custom Payload with Remote Console (Educational Demo)
11:34
USB Rubber Ducky + Sliver C2: Build a Custom Remote‑Access Payload (Tutorial)
Nermin Zlatanovic-CyberCortex
USB Rubber Ducky + Sliver C2: Build a Custom Remote‑Access Payload (Tutorial)
15:16
🧠 Reverse Engineering a Python Script to Reveal the Hidden Flag | CTF Walkthrough
Nermin Zlatanovic-CyberCortex
🧠 Reverse Engineering a Python Script to Reveal the Hidden Flag | CTF Walkthrough
4:42
🔧 End-to-End IT Architecture: From Hardware to AI | Complete Breakdown for Modern IT Systems
Nermin Zlatanovic-CyberCortex
🔧 End-to-End IT Architecture: From Hardware to AI | Complete Breakdown for Modern IT Systems
47:40
🚀 Retrieving the MetaCTF Flag from christmas_tree.bin | Binary Exploitation Challenge 🔥
Nermin Zlatanovic-CyberCortex
🚀 Retrieving the MetaCTF Flag from christmas_tree.bin | Binary Exploitation Challenge 🔥
2:33
Hacking Metasploitable 2 with Metasploit & Nmap | Ethical Hacking Tutorial
Nermin Zlatanovic-CyberCortex
Hacking Metasploitable 2 with Metasploit & Nmap | Ethical Hacking Tutorial
16:21
Create a Windows Batch File to Gain Remote Access | Ethical Hacking with Kali Linux & Metasploit
Nermin Zlatanovic-CyberCortex
Create a Windows Batch File to Gain Remote Access | Ethical Hacking with Kali Linux & Metasploit
17:51
SET in Action: How Hackers Exploit the Social-Engineer Toolkit
Nermin Zlatanovic-CyberCortex
SET in Action: How Hackers Exploit the Social-Engineer Toolkit
7:06
Defend Against Phishing: Protect Yourself from Email Spoofing, BEC, and SIM Swapping Scams!
Nermin Zlatanovic-CyberCortex
Defend Against Phishing: Protect Yourself from Email Spoofing, BEC, and SIM Swapping Scams!
22:19
ChatGPT Hacks: How to Communicate with AI Like a Pro
Nermin Zlatanovic-CyberCortex
ChatGPT Hacks: How to Communicate with AI Like a Pro
14:14
Join Me on My Cybersecurity Journey: Penetration Testing, Bug Bounty, & AI Explained!
Nermin Zlatanovic-CyberCortex
Join Me on My Cybersecurity Journey: Penetration Testing, Bug Bounty, & AI Explained!
0:34