All creators
John Hammond

John Hammond

Malware Analysis, Software Exploits, and Scripting with a focus on reverse engineering and live debugging.

Rating
7.8
ReReview score
Award
Worth Prioritizing
Chart
#26
AI & Software Tools
Subscribers
2.1M
YouTube
Age
15y 0m
Channel age

Nutrition Label

John Hammond delivers highly technical, hands-on demonstrations of malware analysis and software vulnerabilities, often executing exploits live on camera. While the content excels at demystifying complex attack vectors through real-time debugging and code review, it typically focuses on reproducing existing research rather than presenting novel zero-day discoveries.

Strengths

  • +Live Code Execution
  • +Complex Exploit Explanation
  • +Transparent Troubleshooting

Notes

  • !He often reproduces existing CVEs, so check the description for links to the primary research sources.
  • !Videos involve heavy live debugging, so be prepared to read raw code and terminal outputs.

Why this rating

Evidence receipts showing why each dimension is rated the way it is.

Experience Authenticity9/10
We can literally see inside of the extension.js... it is literally just spawning a child process... it is running python code.py.
[02:15]

Demonstrates direct engagement with the malware source code, showing the exact mechanism of execution rather than just describing it.

Transparency9/10
Disassemble, decompile and debug with IDA Pro! Use promo code HAMMOND50 for 50% off... https://www.aikido.dev/blog/fake-clawdbot-vscode-extension-malware
[Description]

Explicit disclosure of the sponsor (Hex-Rays) with specific limitations on the discount, and clear citation of the primary researchers (Aikido) who discovered the malware.

Expertise Signal9/10
This is a .NET executable. We can see the MZ header... we can drop this into a decompiler like dnSpy or ILSpy to see the C# code.
[07:30]

Correctly identifies file signatures and selects appropriate industry-standard tooling for reverse engineering the specific binary type.

Technical Depth5/10
Detailed discussion on the necessity of understanding Windows Internals, specifically referencing paging structures and memory management as prerequisites for successful exploit development.
[24:30]
Title-Content Alignment5/10
The video is a promotional announcement for a future livestream event rather than the immediate tutorial implied by the title 'Learn PowerShell!'.
[Description]
Rigor & Evidence5/10
Friday February 20th at 10am PT
[0:05]
Categories
Automation & AgentsCoding ToolsDeveloper PlatformsResearch ToolsSecurity & Privacy
Formats
TutorialsDeep Dives