ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

336 results

Cooper
Exploiting Legit APIs For Covert C2: A New Perspective On Cloud-based Malware Operations- Cocomelonc

... for some companies so that's the main problem the of course why the hackers uh few words about why hackers use legit APIs ...

30:23
Exploiting Legit APIs For Covert C2: A New Perspective On Cloud-based Malware Operations- Cocomelonc

390 views

2 months ago

Gnar Coding
Learn to HACK and FIX API Vulnerabilities

APIs power the digital world, but without proper security, they can be vulnerable to attacks. In this video, we dive deep into how ...

20:39
Learn to HACK and FIX API Vulnerabilities

2,225 views

11 months ago

NorthSec
NorthSec 2025 - Efficient Web Hacking with Caido

The world of Web Hacking is evolving, and with it, our tooling must evolve as well. Caido, the new guy on the HTTP Proxy block, ...

2:06:00
NorthSec 2025 - Efficient Web Hacking with Caido

1,145 views

Streamed 8 months ago

DEFCONConference
DEF CON 33 - Regex For Hackers - Adam 'BuildHackSecure' Langley, Ben 'nahamsec' Sadeghipour

Let's cut through the BS - if you're not using regex properly, you're leaving money on the table as a hacker. This workshop shows ...

50:09
DEF CON 33 - Regex For Hackers - Adam 'BuildHackSecure' Langley, Ben 'nahamsec' Sadeghipour

6,970 views

3 months ago

The Coding Gopher
99% of Developers Don't Get RPCs

Inquiries: thecodinggopher@gmail.com ‍ Learn to build Git, Docker, Redis, HTTP ...

9:20
99% of Developers Don't Get RPCs

95,113 views

9 months ago

The Coding Gopher
99% of Developers Don't Get Sockets

Get 40% OFF CodeCrafters: https://app.codecrafters.io/join?via=the-coding-gopher ⬆️ Best project-based coding platform.

12:05
99% of Developers Don't Get Sockets

484,493 views

8 months ago

Infin1teXploit
Unlock Hidden Power: How PowerShell & WinAPI Control Your Windows OS Like a Hacker!

Want to take full control of your Windows OS with just PowerShell? In this video, we dive into how PowerShell can harness ...

0:32
Unlock Hidden Power: How PowerShell & WinAPI Control Your Windows OS Like a Hacker!

55 views

11 months ago

BSidesLV
Autonomous Discovery of Logic-based API Vulnerabilities

Identifier: JZ98SA Description: - “Autonomous Discovery of Logic-based API Vulnerabilities” - Examines how AI agents can be ...

37:19
Autonomous Discovery of Logic-based API Vulnerabilities

45 views

1 month ago

HITCON
What the hell is Windows's CLIP Service - Reversing and exploiting the obfuscated code at its core.

R0-0823 If you've ever opened an official Windows driver in IDA, you've likely been greeted with some nice quality of life features: ...

40:18
What the hell is Windows's CLIP Service - Reversing and exploiting the obfuscated code at its core.

119 views

5 months ago

Cisco DevNet
Hack the RADKit! Integrating Cisco RADKit & Grafana – Ep.2. Launching & Building API Endpoints

Welcome to our series—Hack the RADKit! This is your go-to place for hacking your existing Cisco RADKit deployment with ...

16:34
Hack the RADKit! Integrating Cisco RADKit & Grafana – Ep.2. Launching & Building API Endpoints

199 views

3 months ago

OWASP Foundation
Self-Discovering API Key Permissions and Resources - Joseph Leon, Dylan Ayrey

You're a security analyst triaging a list of exposed credentials - how do you prioritize which key to rotate first? How do you even ...

42:56
Self-Discovering API Key Permissions and Resources - Joseph Leon, Dylan Ayrey

100 views

10 months ago

Securetia
Workshop: Vulnerabilidades en APIs - Un Viaje Desde la Teoría Hasta la Práctica

Sumate a este workshop donde aprenderás a fondo sobre las APIs y su rol clave en el entorno digital actual. Revisaremos las ...

44:20
Workshop: Vulnerabilidades en APIs - Un Viaje Desde la Teoría Hasta la Práctica

55 views

8 months ago

BSides Budapest IT Security Conference
Bug Bounty Year 1: $0–16k, Low to CVE #BSidesBUD2025

Bálint Magyar - Bug Bounty Year 1: $0–16k, Low to CVE This presentation was held at #BSidesBUD2025 IT security conference ...

40:23
Bug Bounty Year 1: $0–16k, Low to CVE #BSidesBUD2025

972 views

7 months ago

Ziang Security
PortSwigger API Testing

To solve the lab, exploit a hidden API endpoint to buy a Lightweight l33t Leather Jacket. Follow me on Twitter: ...

4:16
PortSwigger API Testing

28 views

10 months ago

Gnar Coding
Web Sec 101: How Hackers Steal $1337 Jackets

Wanna learn Web App hacking in a legit way without getting in trouble? Then this video is for you #cybersecurity DISCLAIMER: ...

23:39
Web Sec 101: How Hackers Steal $1337 Jackets

1,120 views

6 months ago

CNCF [Cloud Native Computing Foundation]
The Good, the Bad, and the Ugly: Hacking 3 Cloud Native AI Service... Hillai Ben-Sasson & Nir Ohfeld

Don't miss out! Join us at our next Flagship Conference: KubeCon + CloudNativeCon events in Amsterdam, The Netherlands ...

32:12
The Good, the Bad, and the Ugly: Hacking 3 Cloud Native AI Service... Hillai Ben-Sasson & Nir Ohfeld

71 views

1 month ago

NorthSec
NorthSec 2025 - Félix Charette - Exploiting the not so misuse-resistant AES-GCM API of OpenSSL

AES-GCM is robust when used properly, but in practice, some APIs make it easy to introduce vulnerabilities giving the possibility ...

31:10
NorthSec 2025 - Félix Charette - Exploiting the not so misuse-resistant AES-GCM API of OpenSSL

34 views

2 months ago

luRaichu
Shmoocon2024 DanNagle Hacking Network APIs

The videos in this collection are from ShmooCon 2024, which occurred on 12 - 14 January 2024, at the Washington Hilton Hotel.

16:41
Shmoocon2024 DanNagle Hacking Network APIs

4 views

3 months ago

BSides Cape Town
Attacking GraphQL: A guide for penetration testers - Keith Makan

Whats GraphQL? How do pwn it? And what do I write in my pentest report if I get this in a test? If these questions get your heart ...

25:34
Attacking GraphQL: A guide for penetration testers - Keith Makan

489 views

10 months ago

Agrici Daniel
This Google AI Studio + n8n hack is INSANE! Build & Automate Any App (Tutorial)

The integration between Google AI Studio and n8n is absolutely INSANE! In this tutorial, I'll show you how connecting these two ...

31:31
This Google AI Studio + n8n hack is INSANE! Build & Automate Any App (Tutorial)

31,216 views

2 months ago

Brian0day
Ethical Hacking Using Gemini CLI

I used Google's Gemini CLI to automate the entire hacking process on vulnerable target! Learn how this powerful AI tool integrates ...

14:45
Ethical Hacking Using Gemini CLI

238 views

1 month ago

Chris AI Systems
Skool Has No API or MCP… So I Made One

Skool's official API says it's suspended. But I needed Claude Code to manage my community. So I built the integration anyway.

9:43
Skool Has No API or MCP… So I Made One

0 views

11 days ago

Cisco DevNet
Hack the RADKit! Integrating Cisco RADKit & Grafana | Ep.3. Crafting my dashboard and scheduler

Welcome to our series—Hack the RADKit! This is your go-to place for hacking your existing Cisco RADKit deployment with ...

26:17
Hack the RADKit! Integrating Cisco RADKit & Grafana | Ep.3. Crafting my dashboard and scheduler

362 views

3 months ago

N/A
Pwn2Own: Hacking IoT Devices - Adam

... competition where the companies publish a list of hardware devices you're allowed to hack them and if you do that successfully ...

3:57
Pwn2Own: Hacking IoT Devices - Adam

235 views

2 months ago

Cooper
Incident Reporting Made Easy, Using Draugnet - Andras Klody

... they don't have to So basically how it works is it's basically uh two separate applications an API and the UI part It's super easy to ...

3:49
Incident Reporting Made Easy, Using Draugnet - Andras Klody

45 views

3 months ago