ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

319 results

Medusa
Broken Access Control Tutorial: Hacking Feedback Forms

Portfolio: https://portfolio.medusa0xf.com/ ✍️ Bug Bounty WriteUps: https://medusa0xf.medium.com/ ...

8:33
Broken Access Control Tutorial: Hacking Feedback Forms

1,402 views

4 days ago

DeadOverflow
How I Found A $2500 Vulnerability In 20 Minutes

All demonstrations are intended solely for lawful, ethical, and defensive use. The creator assumes no liability for actions viewers ...

8:01
How I Found A $2500 Vulnerability In 20 Minutes

2,148 views

1 day ago

S4viSinFiltro
This bug allows you to change any password

In this video, we complete a practical lab where we analyze an application using GraphQL to identify and exploit an IDOR ...

17:38
This bug allows you to change any password

9,936 views

4 days ago

theshyhat
HACKING API LIVE • HackMyVM • HackSmarter • EchoCTF • StandOff365

Hack through the middle of the week! We're stacking up hands-on challenges and demos across multiple platforms! We start with ...

6:41:11
HACKING API LIVE • HackMyVM • HackSmarter • EchoCTF • StandOff365

3,646 views

Streamed 14 hours ago

DeadOverflow
How I Found A Vulnerability Which Doesn't EVEN EXIST

All demonstrations are intended solely for lawful, ethical, and defensive use. The creator assumes no liability for actions viewers ...

8:09
How I Found A Vulnerability Which Doesn't EVEN EXIST

2,549 views

6 days ago

DeadOverflow
How To Have UNFAIR ADVANTAGE In Bug Bounty With Penligent AI

All demonstrations are intended solely for lawful, ethical, and defensive use. The creator assumes no liability for actions viewers ...

8:07
How To Have UNFAIR ADVANTAGE In Bug Bounty With Penligent AI

1,016 views

3 days ago

HackWise by Zecurity
API Bug Bounty Tutorial | API Penetration Testing Lab | crAPI Installation | OWASP API Top 10

... lab helps in bug bounty hunting and API VAPT Common and critical API security risks This is a hands-on API hacking lab series.

5:33
API Bug Bounty Tutorial | API Penetration Testing Lab | crAPI Installation | OWASP API Top 10

17 views

4 days ago

Algoran Automation
No API? No Problem. "Hacking" Nano Banana PRO into n8n

Have you ever found an amazing AI model on Hugging Face (like Nano Banana PRO) but realized the "Use via API" button was ...

5:20
No API? No Problem. "Hacking" Nano Banana PRO into n8n

15 views

6 days ago

DeadOverflow
Why HACKERS Love Programming

All demonstrations are intended solely for lawful, ethical, and defensive use. The creator assumes no liability for actions viewers ...

8:49
Why HACKERS Love Programming

2,345 views

4 days ago

DC506
APIs: Las puertas invisibles que olvidaste cerrar - Ericka Ramirez, Sebastian Velez Forero

En un mundo donde más del 80% del tráfico en línea se transmite a través de APIs, proteger estas puertas invisibles se ha vuelto ...

1:34:47
APIs: Las puertas invisibles que olvidaste cerrar - Ericka Ramirez, Sebastian Velez Forero

43 views

4 days ago

HackAi
Burp Suite? | Attacking Web Application - Linux Hacking (2026)

In this video, you'll learn how hackers and penetration testers use Burp Suite to attack web applications and find critical security ...

7:12
Burp Suite? | Attacking Web Application - Linux Hacking (2026)

189 views

6 days ago

Privatenetwork
Private C2 SHOWCASE | DDOS BEST C2/BOTNET/API 2026| L4 & L7 | BEST BYPASS

Telegram: t.me/privatecnc website: privatenetwork.space TAGS: IGNORE #botnet #botnetspots​​ #r6botnet #cloudflareuam ...

0:55
Private C2 SHOWCASE | DDOS BEST C2/BOTNET/API 2026| L4 & L7 | BEST BYPASS

20 views

5 days ago

NaTivE DeVil
WhatsApp Ban API Method 2026 🔥 | Real Working Method | Live Proof

WhatsApp Ban API Method 2026 | Real Working Method | Live Proof WhatsApp Ban API Method Explained | New Update ...

4:48
WhatsApp Ban API Method 2026 🔥 | Real Working Method | Live Proof

766 views

6 days ago

Mike Holcomb
Intro to OT ICS Penetration Testing (Part 8): What Happens When Hackers EXPLOIT Industrial Networks

Once a pentester or attacker has mapped some of the OT/ICS network, then what happens? The attackers look for ways to gain ...

1:11:06
Intro to OT ICS Penetration Testing (Part 8): What Happens When Hackers EXPLOIT Industrial Networks

173 views

3 days ago

Belajar Cyber Security
Belajar API Hacking Lengkap (Part 0) | Pengenalan API Penetration Testing

Di era aplikasi modern, API adalah target utama hacker. Di video ini, kita akan membahas apa itu API Penetration Testing dan ...

9:56
Belajar API Hacking Lengkap (Part 0) | Pengenalan API Penetration Testing

0 views

13 hours ago

Cyber Tech Ajju
This Tool Changes Bug Bounty Forever  | NightCrawler Automated JS Recon

Introducing NightCrawler | The Ultimate JS Recon Tool for Bug Bounty Hunters . . . . In this video, I'm revealing my own ...

11:16
This Tool Changes Bug Bounty Forever | NightCrawler Automated JS Recon

961 views

3 days ago

Neurix
HTTP Responses for Hackers

It's not always what the browser asks, sometimes, it's what the server quietly sends back that opens the door. This video is for ...

13:05
HTTP Responses for Hackers

5,564 views

6 days ago

S.J.'s Pen-Test Lab
Hacking AWS Cognito: Privilege Escalation Lab Walkthrough

Misconfigured identity providers are one of the fastest ways to compromise a cloud environment. In this lab, we demonstrate a ...

28:35
Hacking AWS Cognito: Privilege Escalation Lab Walkthrough

0 views

7 days ago

Pentesting
ZynoStress / Booter | BEST BYPASS BEST METHODS | CHEAP API / STRESSER / BOOTER / C2

ZYNO STRESS, THE CURRENTLY BEST STRESSER / BOOTER IN MARKET, PROVIDING THE BEST POWER FOR CHEAP ...

1:10
ZynoStress / Booter | BEST BYPASS BEST METHODS | CHEAP API / STRESSER / BOOTER / C2

22 views

6 days ago

Hexity1337
Clyde C2 SHOWCASE | DDOS BEST C2/BOTNET/API 2025 | L4 & L7 | BEST BYPASS

discord.gg/dk2WgK6r t.me/jolesonn TAGS: IGNORE #botnet #botnetspots​​ #r6botnet #cloudflareuam Heavens Gateqbot botnet ...

0:19
Clyde C2 SHOWCASE | DDOS BEST C2/BOTNET/API 2025 | L4 & L7 | BEST BYPASS

0 views

6 days ago