ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

89 results

Medusa
Broken Access Control Tutorial: Hacking Feedback Forms

Portfolio: https://portfolio.medusa0xf.com/ ✍️ Bug Bounty WriteUps: https://medusa0xf.medium.com/ ...

8:33
Broken Access Control Tutorial: Hacking Feedback Forms

1,267 views

2 days ago

DeadOverflow
How HACKERS STEAL Your Account With This CODE

All demonstrations are intended solely for lawful, ethical, and defensive use. The creator assumes no liability for actions viewers ...

8:44
How HACKERS STEAL Your Account With This CODE

1,845 views

6 days ago

S4viSinFiltro
This bug allows you to change any password

In this video, we complete a practical lab where we analyze an application using GraphQL to identify and exploit an IDOR ...

17:38
This bug allows you to change any password

9,244 views

3 days ago

DeadOverflow
How To Have UNFAIR ADVANTAGE In Bug Bounty With Penligent AI

All demonstrations are intended solely for lawful, ethical, and defensive use. The creator assumes no liability for actions viewers ...

8:07
How To Have UNFAIR ADVANTAGE In Bug Bounty With Penligent AI

867 views

1 day ago

DeadOverflow
How I Found A Vulnerability Which Doesn't EVEN EXIST

All demonstrations are intended solely for lawful, ethical, and defensive use. The creator assumes no liability for actions viewers ...

8:09
How I Found A Vulnerability Which Doesn't EVEN EXIST

2,505 views

4 days ago

Algoran Automation
No API? No Problem. "Hacking" Nano Banana PRO into n8n

Have you ever found an amazing AI model on Hugging Face (like Nano Banana PRO) but realized the "Use via API" button was ...

5:20
No API? No Problem. "Hacking" Nano Banana PRO into n8n

13 views

4 days ago

DeadOverflow
Why HACKERS Love Programming

All demonstrations are intended solely for lawful, ethical, and defensive use. The creator assumes no liability for actions viewers ...

8:49
Why HACKERS Love Programming

2,250 views

2 days ago

El Pingüino de Mario
🥷 My most CURIOUS BUG BOUNTY find on this WEBSITE 💰

In this video, we'll share a vulnerability I recently found and reported in a bug bounty program, with the goal of teaching ...

13:41
🥷 My most CURIOUS BUG BOUNTY find on this WEBSITE 💰

5,049 views

5 days ago

FREE Courses
Hacking Course  72   Advanced Subdomain Discovery using External APIs
10:44
Hacking Course 72 Advanced Subdomain Discovery using External APIs

0 views

6 days ago

HackAi
Burp Suite? | Attacking Web Application - Linux Hacking (2026)

In this video, you'll learn how hackers and penetration testers use Burp Suite to attack web applications and find critical security ...

7:12
Burp Suite? | Attacking Web Application - Linux Hacking (2026)

186 views

4 days ago

NaTivE DeVil
WhatsApp Ban API Method 2026 🔥 | Real Working Method | Live Proof

WhatsApp Ban API Method 2026 | Real Working Method | Live Proof WhatsApp Ban API Method Explained | New Update ...

4:48
WhatsApp Ban API Method 2026 🔥 | Real Working Method | Live Proof

716 views

4 days ago

Darknyte exodus
“Learn Telegram Bot Making Step-by-Step | Darknyte Exodus | Cyber Automation”part-1

get free hacking tools and support tg: @darknyteexodus EXODUS OSINT BOT - THE ULTIMATE ...

17:04
“Learn Telegram Bot Making Step-by-Step | Darknyte Exodus | Cyber Automation”part-1

28 views

4 days ago

MR EXPLOITES
Android Testing Demo | Telegram Bot + Node Backend | Secure Communication Explained

In this testing and learning demo, you will learn: ✓ Android secure backend communication ✓ Telegram BOT connection model ...

16:24
Android Testing Demo | Telegram Bot + Node Backend | Secure Communication Explained

83 views

4 days ago

Cyber Tech Ajju
This Tool Changes Bug Bounty Forever  | NightCrawler Automated JS Recon

Introducing NightCrawler | The Ultimate JS Recon Tool for Bug Bounty Hunters . . . . In this video, I'm revealing my own ...

11:16
This Tool Changes Bug Bounty Forever | NightCrawler Automated JS Recon

608 views

1 day ago

MRE Security
Top Browser Extensions Every Bug Bounty Hunter & Pentester NEEDS (2026)

Stay ahead of cybersecurity insights – Subscribe & turn on notifications! This video explores the top three best chrome extensions ...

12:32
Top Browser Extensions Every Bug Bounty Hunter & Pentester NEEDS (2026)

126 views

6 days ago

Neurix
HTTP Responses for Hackers

It's not always what the browser asks, sometimes, it's what the server quietly sends back that opens the door. This video is for ...

13:05
HTTP Responses for Hackers

4,865 views

4 days ago

Uplatz
Principles and Practices of Modern Web API Architecture | Uplatz

Web APIs form the backbone of modern digital systems—connecting frontend applications, mobile clients, microservices, and ...

5:44
Principles and Practices of Modern Web API Architecture | Uplatz

3 views

3 days ago

P1r4t3h00k
🚨 DATA EXPOSURE IN A TELECOMMUNICATIONS COMPANY 😨 | REAL CASE ANALYZED

In this video, we analyze a real-world case inspired by a recent incident in the telecommunications sector, where a poorly ...

17:47
🚨 DATA EXPOSURE IN A TELECOMMUNICATIONS COMPANY 😨 | REAL CASE ANALYZED

36 views

1 day ago

Coding Chat Room
How Hackers Break OTP Security

In this video, I explain how attackers exploit weak OTP verification systems using simple logic flaws, insecure validation, and poor ...

8:39
How Hackers Break OTP Security

730 views

6 days ago

CybersecurityWhisperer
ONE LEAKED KEY, $7M GONE — ESPIONAGE, MISCONFIGS & AI SHADOW AGENTS IN 2026

Welcome to the first Cybersecurity Whisperer of 2026. While most of us were unplugging over the holidays, attackers stayed busy ...

6:46
ONE LEAKED KEY, $7M GONE — ESPIONAGE, MISCONFIGS & AI SHADOW AGENTS IN 2026

0 views

6 days ago