Satish C J
VISIT https://codespindle.com to get the following
Code/Commands used in Video Lectures
More Exercises (You will find more exercises /solved problems on the platform)
Follow codespindle social media accounts to get more updates about the platform .
The Channel covers the following concepts
1. Java Programming
2. Database Management Systems.
3. Cyber Security
4. C Programming
5. Python Programming .
6. Advanced Database Management Systems
7. Neo4j Graph Database (NoSQL Databases)
8. REDIS - Key Value Store
9. MongoDB Database
10. Software Engineering
11. Column Store Databases
12. HTML
13. CSS
14. JavaScript
15 PHP
16 nodejs
17 XSS attacks Demo
Metasploit JavaScript Keylogger: руководство по захвату нажатий клавиш с помощью вспомогательного...
Nmap TCP Scanning & Flag Analysis - The Ultimate Guide
Goodbye Passwords! Create a Google Passkey in Minutes
Eclipse 2025-06 Installation Guide on Windows 11 (Step-by-Step Tutorial)
Reflected Cross Site Scripting (XSS) Attack: An In-Depth Look for Developers
How Cross-Site Request Forgery Attack (CSRF) Works: A Deep Dive
Metasploit Meterpreter in Action: Demo of Remote Code Execution & File Transfer
MAC Flooding Attack Demo: Kali Linux Tutorial
Managing Metasploit Data : A Guide to PostgreSQL Integration
Passive Sniffing with tcpdump: Essential Commands and Techniques
Understanding SQL Injection Attacks - Manual and Automated - How it Works?
UFW (Uncomplicated Firewall) - Step by Step Demo
DNS Enumeration: Mastering Host, Dig, Dnsenum, Dnsmap, & Dnsrecon
Система доменных имен (DNS) — как это работает?
Advanced Nmap: Using Scripts for MySQL, FTP, & SSH Exploitation
Network File System[NFS] Attack - Demo using Kali Linux 2024 and Metasploitable 2
Exploiting MySQL Database using MetaSploit Auxiliary Modules [Kaii Linux 2024]
Database Vulnerabilities and Counter Measures
StringBuilder Class in Java - Capacity, Append, Insert, Delete, Substring, Replace, Reverse - Demo
Java ArrayList - Creating subList - sorting and comparing ArrayList - Demo
BufferedReader and BufferedWriter in Java
Java printf - %s, %d, %f, %b, %c and %n - Demo
Чтение входных данных из файла с использованием класса сканера
Освоение сканирования Nessus: руководство по обнаружению хостов, базовому сканированию сети и тес...
Password Recovery using Ophcrack - Kali Linux - Demo
Wifi Hacking Using Aircrack-ng -The complete Guide
WEP , WPA , WPA 2 and Four way Handshake
Nessus Essentials Installation on Kali Linux [2024]
Metasploit for Detecting Null Sessions and Exploiting Samba Server(SMB)
Hydra / Hydra Graphical Password Cracking Tool Demo