ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

552 results

GhostStrats
Building a Budget-Friendly Private Cybersecurity Laptop Step by Step!

In this video, I take you on a trip to Walmart to find the perfect budget-friendly laptop for your cybersecurity and privacy needs.

7:59
Building a Budget-Friendly Private Cybersecurity Laptop Step by Step!

70,245 views

9 months ago

GhostStrats
Build a Tails Linux Wallet Drive – Boot Any Computer & Protect Your Privacy (Cheap & Easy DIY!)

This is a safety and awareness demo done only on hardware I own. I am not showing how to break into other people's computers.

5:10
Build a Tails Linux Wallet Drive – Boot Any Computer & Protect Your Privacy (Cheap & Easy DIY!)

13,596 views

2 months ago

Pat's Cyber Chronicles
Linux isn’t as secure as you think

In this video I rant about why Linux isn't as secure as you think.

9:54
Linux isn’t as secure as you think

448 views

5 months ago

Pat's Cyber Chronicles
Powershell is better than Bash on Linux

In this video I have a hot take about how Bash is worse than Powershell.

8:09
Powershell is better than Bash on Linux

1,184 views

4 months ago

Cyber SecGuru
Part - 13 - Secure Your Systems: Windows & Linux Hardening Essentials

CyberSec Guru: Mastering Windows & Linux Hardening" "OS Fortification: Windows & Linux Security Strategies" "The Cyber ...

57:55
Part - 13 - Secure Your Systems: Windows & Linux Hardening Essentials

22 views

4 months ago

Pat's Cyber Chronicles
a realistic rant about the future of Linux

This is barely coherent bro.

16:31
a realistic rant about the future of Linux

6,553 views

9 months ago

Rodski
linux secure boot

linux secure boot.

2:02
linux secure boot

247 views

2 years ago

GhostStrats
Turning Hidden Flash Drives into Powerful Cybersecurity Tools! | Tails, Kali Linux, and Parrot OS

In this video, I take a bunch of hidden flash drives and transform them into powerful cybersecurity tools. Follow along as I walk you ...

5:35
Turning Hidden Flash Drives into Powerful Cybersecurity Tools! | Tails, Kali Linux, and Parrot OS

10,637 views

9 months ago

GhostStrats
I Built the Ultimate Privacy Laptop (Ghost Laptop 2.0 Upgrade) Hardware Privacy & WiFi PenTesting!

In this updated Ghost Laptop Build, I take everything I learned from my original video — along with your feedback from the ...

8:21
I Built the Ultimate Privacy Laptop (Ghost Laptop 2.0 Upgrade) Hardware Privacy & WiFi PenTesting!

33,070 views

9 months ago

GhostStrats
DIY Ghost Laptop UPDATED: Full Build Guide — And the Harsh Truth About Privacy!

In this video, I explore the idea of building a ghost laptop — a system designed for maximum privacy and minimal traceability.

18:46
DIY Ghost Laptop UPDATED: Full Build Guide — And the Harsh Truth About Privacy!

273,574 views

7 months ago

GhostStrats
Exploring Cybersecurity Tools: From Free DIY Gear to Advanced Tech – The Ultimate Starter Guide!

In this video, I share my top recommended tools for learning cybersecurity through hands-on experience. After over a year and a ...

22:00
Exploring Cybersecurity Tools: From Free DIY Gear to Advanced Tech – The Ultimate Starter Guide!

24,027 views

6 months ago

Secure Solution
Log Forenix - Cyber Security Projects For Beginners  || The Terminal Boy

Welcome to log Forenix (Log + Forencis + Linux ) - Your Linux Forensic Artifacts Collector Tool! Forenix is a powerful shell CLI ...

4:24
Log Forenix - Cyber Security Projects For Beginners || The Terminal Boy

188 views

1 year ago

9to5Linux
Is Pentoo 2025 the BEST Hacking Distro? (Hands-On Tutorial)

Pentoo is a Live CD and Live USB designed for penetration testing and security assessment. Based off Gentoo Linux, Pentoo is ...

10:08
Is Pentoo 2025 the BEST Hacking Distro? (Hands-On Tutorial)

1,223 views

1 year ago

The Staying Up Show
How to Create a Spear Phishing Attack with Kali Linux! #tutorial #hacking #kali

In this video, I describe how to leverage the social engineering tool kit on Callie Lennox installed on a 100% free Amazon EC2 ...

8:48
How to Create a Spear Phishing Attack with Kali Linux! #tutorial #hacking #kali

78 views

5 months ago

Yaniv Hoffman
This Pocket-Sized Device is a Hacker’s Dream

A full cyber lab that fits in your pocket. The uConsole turns ethical hacking into something you can carry anywhere — red team, ...

0:59
This Pocket-Sized Device is a Hacker’s Dream

2,075 views

4 months ago

ruth karen
ENCRYPTION AND DECRYPTION USING OPENSSL IN LINUX

Learn how to encrypt and decrypt files on Linux using OpenSSL in this tutorial. I covered the basics of encryption, demonstrated ...

12:29
ENCRYPTION AND DECRYPTION USING OPENSSL IN LINUX

54 views

9 months ago

Hedge Tech
RTL-SDR on Hackberry Pi #techtok #kali #linux #hacker #pentesting #tech #cyberdeck #raspberrypi #sdr
0:32
RTL-SDR on Hackberry Pi #techtok #kali #linux #hacker #pentesting #tech #cyberdeck #raspberrypi #sdr

19,503 views

1 year ago

Alfredredbird
🛠️ How Hacker Brute-Force SSH with Hydra #HydraTool #SSHBruteForce #LearnToHack #EthicalHacking

Join the hacking community: discord.com/invite/pgeAV38HPH #HydraTool #SSHBruteForce #LearnToHack #EthicalHacking ...

0:41
🛠️ How Hacker Brute-Force SSH with Hydra #HydraTool #SSHBruteForce #LearnToHack #EthicalHacking

1,185 views

5 months ago

Transfer Multisort Elektronik
Camera Project for RaspberryPi  #raspberrypi #engineering #project #diy

Turn your Rapberry Pi 5 into amazing camera! Thank you for watching! ✦✦✦ See where else you can find us!

0:10
Camera Project for RaspberryPi #raspberrypi #engineering #project #diy

913,429 views

1 year ago

GhostStrats
How to Change Your IP Address (Easy vs Hard)!#privacy #cybersecurity #vpn #onlineprivacy #shorts

There are two ways to change your IP address — the hard way and the easy way. First, I'll show you the hard way using Auto Tor ...

1:48
How to Change Your IP Address (Easy vs Hard)!#privacy #cybersecurity #vpn #onlineprivacy #shorts

5,691 views

3 months ago