I Planted a JS Agent in a Browser — Here's What the Hacker Sees 👀 | PJ131C2
Hackin' with PJ131
I Planted a JS Agent in a Browser — Here's What the Hacker Sees 👀 | PJ131C2
1:23
Hackers Can See Everything You Type 😳
Hackin' with PJ131
Hackers Can See Everything You Type 😳
0:38
This Is What Happens After a Hacker Gets In Your PC 😳
Hackin' with PJ131
This Is What Happens After a Hacker Gets In Your PC 😳
0:50
Windows NTLM hash vs Hashcat. Spoiler: it didn't last long! 💀
Hackin' with PJ131
Windows NTLM hash vs Hashcat. Spoiler: it didn't last long! 💀
0:25
Mythic C2 - Full Active Directory Attack Chain (Kerberoasting, DLL Hijacking, Pass-the-Hash)
Hackin' with PJ131
Mythic C2 - Full Active Directory Attack Chain (Kerberoasting, DLL Hijacking, Pass-the-Hash)
8:12
Metasploitable 2 Exploitation - Root Access with Metasploit (vsftpd Backdoor)
Hackin' with PJ131
Metasploitable 2 Exploitation - Root Access with Metasploit (vsftpd Backdoor)
3:44
Sliver C2 Framework Tutorial - Complete Guide from Installation to Post-Exploitation
Hackin' with PJ131
Sliver C2 Framework Tutorial - Complete Guide from Installation to Post-Exploitation
9:17
Installing Nmap on WiFi Pineapple 🔥 #shorts
Hackin' with PJ131
Installing Nmap on WiFi Pineapple 🔥 #shorts
0:52