All
Search
Images
Videos
Maps
News
More
Shopping
Flights
Travel
Notebook
Report an inappropriate content
Please select one of the options below.
Not Relevant
Offensive
Adult
Child Sexual Abuse
Length
All
Short (less than 5 minutes)
Medium (5-20 minutes)
Long (more than 20 minutes)
Date
All
Past 24 hours
Past week
Past month
Past year
Resolution
All
Lower than 360p
360p or higher
480p or higher
720p or higher
1080p or higher
Source
All
Dailymotion
Vimeo
Metacafe
Hulu
VEVO
Myspace
MTV
CBS
Fox
CNN
MSN
Price
All
Free
Paid
Clear filters
SafeSearch:
Moderate
Strict
Moderate (default)
Off
Filter
43:05
YouTube
DEFCONConference
DEF CON 33 - Turning your Active Directory into the attacker’s C2 - Quentin Roland, Wilfried Bécard
The implementation of Active Directory environments is, by essence, not unlike a command-and-control infrastructure allowing to centrally coordinate and control network assets. As an attacker, why not make it your own ? As far as the C2 capabilities of Active Directory go, Group Policy Objects (GPOs) are a key functionality that can be ...
1.1K views
2 months ago
Defproc Tutorial
54:42
Step-by-Step Guide to Completing Tender Documents, SBD Forms | uncover secrets to win tenders!
YouTube
Lerato Sebata
70K views
Apr 10, 2023
11:33
e-Procurement :: Bid submission procedure
YouTube
CTFM Centre for Training in
34K views
Mar 11, 2016
13:41
eprocurement Java Settings - e tendering registration process
YouTube
signyourdoc
87.9K views
Aug 10, 2022
Top videos
4:37:31
Class 9 Christmas Exam : English | MEGA MARATHON : Grammar + Discourses | Xylem Class 9
YouTube
Xylem class 9
338.9K views
1 week ago
55:44
DEF CON 33 - From Pwn to Plan: Turning Physical Exploits Into Upgrades - Shawn
YouTube
DEFCONConference
1.5K views
2 months ago
1:46:47
Portal to the Dead? Dr. Raymond Moody on Communicating with the Afterlife
YouTube
Dr. Mayim Bialik
120.5K views
1 week ago
Defproc Basics
12:59
Defence eProcurement Portal | Bidder Registration | DSC Setting | #dsc_guru2023
YouTube
DSC & E- tendering Solutions
5K views
Nov 7, 2024
20:56
Understanding Defensive Fronts & Structure | Key Concepts for Football Success
YouTube
American Football Academy
16.5K views
Jun 25, 2023
22:09
Discrete Math Proofs in 22 Minutes (5 Types, 9 Examples)
YouTube
TrevTutor
185.3K views
Dec 13, 2023
4:37:31
Class 9 Christmas Exam : English | MEGA MARATHON : Grammar + D
…
338.9K views
1 week ago
YouTube
Xylem class 9
55:44
DEF CON 33 - From Pwn to Plan: Turning Physical Exploits Into Up
…
1.5K views
2 months ago
YouTube
DEFCONConference
1:46:47
Portal to the Dead? Dr. Raymond Moody on Communicating with th
…
120.5K views
1 week ago
YouTube
Dr. Mayim Bialik
6:23:09
LIVE TRADING NIFTY BANKNIFTY and SENSEX OPTIONS 23 DEC #li
…
164.3K views
1 week ago
YouTube
Karol SEBI Registered IITian
43:06
DEF CON 33 - Kill Chain Reloaded: Abuse legacy paths fr stealth pers
…
280 views
2 months ago
YouTube
DEFCONConference
38:37
DEF CON 33 - Playing Dirty w/o Cheating - Getting Banned for Fu
…
42.2K views
2 months ago
YouTube
DEFCONConference
6:16:45
Live Crypto & Gold Analysis and trading || #btc #crypto #gold #forex
45.5K views
1 week ago
YouTube
Live Trading With Karol
21:38
DEF CON 33 - Prompt Scan Exploit AI’s Journey Through 0Days and 1
…
114 views
2 months ago
YouTube
DEFCONConference
32:04
DEF CON 33 - Data Duplication Village - Fungible Threats - Mauro
…
1.7K views
2 months ago
YouTube
DEFCONConference
38:42
DEF CON 33 - Automated Unpacking & Deobfuscation of Nested VM-Ba
…
611 views
2 months ago
YouTube
DEFCONConference
36:32
DEF CON 33 - HTTP 1 1 Must Die! The Desync Endgame - James 'alb
…
3.3K views
2 months ago
YouTube
DEFCONConference
4:38
ePortfolio Student Tour
73.2K views
Oct 28, 2019
YouTube
AuburnWrites
2:01
Bad Listening
46.4K views
Feb 5, 2015
YouTube
Pamela Palmersheim
DEF CON 26 PACKET HACKING VILLAGE - TryCatchHCF - Packet
…
7.1K views
Nov 15, 2018
YouTube
DEFCONConference
DEF CON 22 How to Disclose an Exploit Without Getting in Trouble
8.1K views
Dec 16, 2014
YouTube
Ra Darth
e tender corrigendum l corrigendum of tender notice l e tender
17.7K views
Aug 31, 2021
YouTube
Vikas Yadav 1.5K
Data Execution Prevention (DEP) Explained | Cyber Security Trainin
…
218 views
Feb 12, 2024
YouTube
Shree Learning Academy
Defence Procurement | DSC Login New Process 2025 | JAVA Setting
…
2K views
6 months ago
YouTube
DSC & E- tendering Solutions 🌏
DEF CON 23 - Nemus - Hacking SQL Injection for Remote Code Executi
…
8.8K views
Dec 16, 2015
YouTube
DEFCONConference
E Tender Submission using Chrome or Edge
22.4K views
Jan 20, 2022
YouTube
TENDER TRAINING INDIA
Debugging using Proc file system | Linux kernel internals | Linux devi
…
7K views
Feb 19, 2021
YouTube
Linux Kernel Foundation
24:48
191 Linux Kernel /proc Interface - create and read /proc file #educati
…
11.7K views
Feb 22, 2017
YouTube
The Linux Channel
10:12
Defusion: The DEFCON Scale
45.6K views
Jul 11, 2014
YouTube
Defusion Selfdefence
7:21
Fallacies in Commercials
102.9K views
May 29, 2017
YouTube
LANSEL
1:25
Bad Speech Example
151.1K views
Oct 19, 2014
YouTube
Bassaleg ICT
2:46
Fallacies in Commercials
215K views
Mar 3, 2017
YouTube
Debbie Martinez
2:14
Examples of Commensalism
194.1K views
Jul 30, 2017
YouTube
MooMooMath and Science
3:05
Interview Etiquette - Bad Example
195.1K views
May 2, 2016
YouTube
Virtual High School
9:11
Assertiveness scenarios: 10 examples
666.3K views
Apr 24, 2008
YouTube
centreforconfidence
See more videos
More like this
Feedback