Skip to main content
Search
Connect
DonDoes30
@DonDoes30
20
followers
Amateur penetration tester and cyber security enthusiast looking to teach YOU the tricks black hats use so you can protect yourself.
Follow
Videos
Playlists
Most recent
Most recent
Most viewed
6:51
Hack an Android Phone or Device- Part 1 - Generating the Payload
10 years ago
8:44
Armitage- Scanning a network for computers and finding their Vulnerabilities
10 years ago
4:52
Hack an Android Phone or Device- Part 3 - Sign the Android App and Zipalign
10 years ago
6:34
Bring Down and Deface a Website in 5 minutes with Weevely
10 years ago
12:21
Hack an Android Phone or Device- Part 4 - Hacking texts, and calls, and cameras. OH MY!
10 years ago
9:38
Brute-force WPA-WPA2 Passwords
10 years ago
10:13
Hacking eCommerce Sites to Change Item Prices using Burp Suite
10 years ago
4:04
Catch a Cheating Spouse- Hacking Using a Remote Desktop Viewer
10 years ago
11:43
Hacking using Excel (.xls) and Word (.doc) Payload Injections
10 years ago
14:15
Hacking Windows Series- Part 1 - Executable Payload Generation
10 years ago
8:49
Cracking WPS enabled WiFi Router Passwords
10 years ago
30:03
DonDoes30 - AskMeAnything (AMA) Part 1
10 years ago
9:36
DoS Attack using Slowloris
10 years ago
7:28
Hacking Windows Series- Part 3 - Port Forwarding on Router to Accept Reverse TCP Connection
10 years ago
5:30
Fern WiFi Cracker (WEP, WPS, WPA-WPA2) for Kali Linux
10 years ago
7:39
Find Vulnerabilities and Usernames to Hack WordPress Sites
10 years ago
10:48
GMail Hacking- How to Write a Brute Force (dictionary attack) Python Script
10 years ago
9:58
Hacking Windows Series- Part 4 - Process Migration and Escalating User Privileges
10 years ago
13:33
Hacking Windows Series- Part 6 - Write an MD5 Password Cracker in Python
10 years ago
7:36
Hacking Windows Series- Part 7 - Setup Metasploit Multi Handler to Receive Multiple Connections
10 years ago
12:51
Harvesting GMail, Facebook, Twitter, etc Passwords (Man-in-the-middle, ARP poisoning, DNS Spoofing)
10 years ago
15:59
How to Bypass and Evade Anti-Virus Software and Run a Virus YOU Create
10 years ago
11:44
How to Use ProxyChains- Make your terminal sessions anonymous without Tor
10 years ago
5:41
Install Kali Linux to USB Device
10 years ago
9:39
Kali Linux- Setting up USB Persistence
10 years ago
7:12
PREVIEW- AMA (ask me anything) and Upcoming Hacking Series
10 years ago
8:38
Maltego - Take Cyberstalking to the Next Level (Part 2 OSINT)
10 years ago
8:09
Metasploit- Practical Jokes - Disable keyboard-mouse. Shutdown Programs
10 years ago
5:18
Metasploit- Remotely Keylogging passwords and other sensitive information
10 years ago
6:39
Microsoft Word Document (RTF file) Payload Injection
10 years ago