ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

162 results

Jaime Irazabal
Tu API NestJS podría estar bajo ataque ahora mismo y ni lo sabes 😱

Aprende a protegerla en menos de 1 minuto con validación y rate limiting #programacion #nestjs #seguridadweb ...

0:34
Tu API NestJS podría estar bajo ataque ahora mismo y ni lo sabes 😱

2,786 views

9 months ago

HackeMate
Si resuelves este LABORATORIO, sabrás TODO sobre APIS

Utiliza mi código “HACKEMATE” y obtendrás 30% DESCUENTO en tu ANTIVIRUS! https://latam.kaspersky.com/home-security ...

25:42
Si resuelves este LABORATORIO, sabrás TODO sobre APIS

1,178 views

1 year ago

CAM
DeepSeek R1 Jailbreak - AI Liberator - Feb 2025 #deepseek #chatgpt #jailbreak

How to jailbreak DeepSeek R1 step by step using the AI Liberator app It's available on Mac, iOS, Android, and the Chrome ...

1:26
DeepSeek R1 Jailbreak - AI Liberator - Feb 2025 #deepseek #chatgpt #jailbreak

49,386 views

11 months ago

Luca Berton
API Security Control Frameworks: Securing Your APIs in November 2024

Learn about API Security! Discover crucial control frameworks and strategies to fortify your APIs against November's emerging ...

19:17
API Security Control Frameworks: Securing Your APIs in November 2024

19 views

2 weeks ago

Yaniv Hoffman
Who are the MOST Powerful cyber armies ?

API Hacking - https://youtu.be/1t5wXWFI0yU 11. DNS Hacking - https://youtu.be/Hsj_67RhNMc 12. How to Build a hacking Box ...

0:55
Who are the MOST Powerful cyber armies ?

2,676 views

2 years ago

Adrian Jagielak
They Locked My Futurehome Hub Behind a Paywall… So I Unlocked it Myself Using Home Assistant!

Add-on: https://github.com/adrianjagielak/home-assistant-futurehome.

15:21
They Locked My Futurehome Hub Behind a Paywall… So I Unlocked it Myself Using Home Assistant!

14,531 views

5 months ago

Cypher_Oggy
Hacking Android Apps: Finding Hidden Secrets in RAM with MemDump

Get the Tool (GitHub): https://github.com/Anubhacksaw/memdump Follow me on Instagram: ...

3:08
Hacking Android Apps: Finding Hidden Secrets in RAM with MemDump

12 views

14 hours ago

FenLab
How our crawler engine runs behind the scenes 🔧

This short video clip shows a real-time snapshot of how our distributed crawler platform works. • Tasks are scheduled and ...

0:31
How our crawler engine runs behind the scenes 🔧

500 views

2 months ago

Web3 Magic
TON Payment Tracker (Hack-a-TON, Prague 22)
7:59
TON Payment Tracker (Hack-a-TON, Prague 22)

106 views

3 years ago

Yaniv Hoffman
This Pocket-Sized Device is a Hacker’s Dream

... https://youtu.be/fLwLRvp1YFA API Hacking: https://youtu.be/1t5wXWFI0yU DNS Hacking: https://youtu.be/Hsj_67RhNMc ...

0:59
This Pocket-Sized Device is a Hacker’s Dream

2,075 views

4 months ago

ETCG Experiments
ChatGPT API is EASY!!!

After video I figured out how to print just the response text: print(response["choices"][0]["text"])

7:09
ChatGPT API is EASY!!!

10,907 views

2 years ago

HackinGeeK
Pourquoi Le Pentest des APIs ? 🤨

Accéder à GRATUITEMENT à mon cours "La Roadmap Du Hacker" : https://hackingeek.com ...

1:00
Pourquoi Le Pentest des APIs ? 🤨

673 views

1 year ago

TechAddict
New Crypto Hack Explained | Vitalik.eth connected to drainer!!!

wallethack #crypto #drainer Please SUBSCRlBE if you enjoyed this video❤️ Join my Telegram https://t.me/automatecrypto ...

10:05
New Crypto Hack Explained | Vitalik.eth connected to drainer!!!

11,684 views

6 months ago

CyberSapiens
Is ethical hacking enough to land a job in cybersecurity?

Is ethical hacking enough to land a job in cybersecurity? Think again! Simply knowing ethical hacking won't make hiring easy in ...

1:06
Is ethical hacking enough to land a job in cybersecurity?

86 views

1 year ago

Jaxon
ATTACK SURFACE MEMORY SYSTEM

This is a little showcase to my new ASMS that will be available for open source soon!

11:02
ATTACK SURFACE MEMORY SYSTEM

3 views

1 month ago

Andrej Baranovskij
Offloading MLX inference to a subprocess in Sparrow  #ocr #mlx #fastapi

Offloading MLX inference to a subprocess in Sparrow to reclaim memory after API request completes. This is useful when ...

0:23
Offloading MLX inference to a subprocess in Sparrow #ocr #mlx #fastapi

695 views

1 year ago

AEC Tech Journeys with Mayur Mistry
Langchain + Replit + Huggingface Hackathon Demo 3/28

ai #hackathon #agents.

10:55
Langchain + Replit + Huggingface Hackathon Demo 3/28

358 views

2 years ago

Shreyas Hegde
Delta Hacks 2026-Memento Demo
6:05
Delta Hacks 2026-Memento Demo

19 views

10 days ago

Perforated AI
PyTorch Dendritic Optimization Hackathon with Perforated AI and Weights & Biases

Do you work with PyTorch? Would you like to have smarter, smaller, cheaper ML models? Would you like to have them today ...

59:36
PyTorch Dendritic Optimization Hackathon with Perforated AI and Weights & Biases

158 views

2 months ago

Team AgriSphere2025
Quantum Secure Email Client Application (SIH, PS ID: 25179) - Team AgriSphere2025

This project demonstrates the prototype prepared by the members of the team AgriSphere2025 for Smart India Hackathon 2025 ...

6:50
Quantum Secure Email Client Application (SIH, PS ID: 25179) - Team AgriSphere2025

580 views

2 months ago

Sam Curry
Remotely Unlocking any Kia with Just a License Plate (Kiatool Demo)

Note: this was fixed by Kia and confirmed to have never been exploited maliciously. Our tool is a proof of concept intended to ...

1:56
Remotely Unlocking any Kia with Just a License Plate (Kiatool Demo)

64,721 views

1 year ago

Crypto Shifter
Claim Your Free Solana Now
0:20
Claim Your Free Solana Now

90,420 views

1 year ago

Dr Josh Stroschein - The Cyber Yeti
🎙️NEW episode of Behind the Binary featuring  Greg Sinclair!

Ever wonder who names the world's most notorious APTs? In this episode, we sit down with Greg Sinclair, a reverse engineer ...

0:47
🎙️NEW episode of Behind the Binary featuring Greg Sinclair!

1,569 views

6 months ago

Reverse Everything
PWN OR DIE 2024 Conference - Primeros pasos en el desarrollo de malware - Johnny Chafla

Primeros pasos en el desarrollo de malware: Explorando los fundamentos, conceptos clave y técnicas utilizadas al desarrollar ...

32:19
PWN OR DIE 2024 Conference - Primeros pasos en el desarrollo de malware - Johnny Chafla

81 views

1 year ago

Secure Solution
Log Forenix - Cyber Security Projects For Beginners  || The Terminal Boy

Welcome to log Forenix (Log + Forencis + Linux ) - Your Linux Forensic Artifacts Collector Tool! Forenix is a powerful shell CLI ...

4:24
Log Forenix - Cyber Security Projects For Beginners || The Terminal Boy

188 views

1 year ago