ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

338 results

Cooper
Exploiting Legit APIs For Covert C2: A New Perspective On Cloud-based Malware Operations- Cocomelonc

... for some companies so that's the main problem the of course why the hackers uh few words about why hackers use legit APIs ...

30:23
Exploiting Legit APIs For Covert C2: A New Perspective On Cloud-based Malware Operations- Cocomelonc

388 views

2 months ago

Gnar Coding
Learn to HACK and FIX API Vulnerabilities

APIs power the digital world, but without proper security, they can be vulnerable to attacks. In this video, we dive deep into how ...

20:39
Learn to HACK and FIX API Vulnerabilities

2,222 views

11 months ago

The Coding Gopher
99% of Developers Don't Get RPCs

Inquiries: thecodinggopher@gmail.com ‍ Learn to build Git, Docker, Redis, HTTP ...

9:20
99% of Developers Don't Get RPCs

94,753 views

9 months ago

HITCON
What the hell is Windows's CLIP Service - Reversing and exploiting the obfuscated code at its core.

R0-0823 If you've ever opened an official Windows driver in IDA, you've likely been greeted with some nice quality of life features: ...

40:18
What the hell is Windows's CLIP Service - Reversing and exploiting the obfuscated code at its core.

117 views

5 months ago

NorthSec
NorthSec 2025 - Efficient Web Hacking with Caido

The world of Web Hacking is evolving, and with it, our tooling must evolve as well. Caido, the new guy on the HTTP Proxy block, ...

2:06:00
NorthSec 2025 - Efficient Web Hacking with Caido

1,136 views

Streamed 8 months ago

DEFCONConference
DEF CON 33 - Regex For Hackers - Adam 'BuildHackSecure' Langley, Ben 'nahamsec' Sadeghipour

Let's cut through the BS - if you're not using regex properly, you're leaving money on the table as a hacker. This workshop shows ...

50:09
DEF CON 33 - Regex For Hackers - Adam 'BuildHackSecure' Langley, Ben 'nahamsec' Sadeghipour

6,938 views

3 months ago

Securetia
Workshop: Vulnerabilidades en APIs - Un Viaje Desde la Teoría Hasta la Práctica

Sumate a este workshop donde aprenderás a fondo sobre las APIs y su rol clave en el entorno digital actual. Revisaremos las ...

44:20
Workshop: Vulnerabilidades en APIs - Un Viaje Desde la Teoría Hasta la Práctica

55 views

8 months ago

The Coding Gopher
99% of Developers Don't Get Sockets

Get 40% OFF CodeCrafters: https://app.codecrafters.io/join?via=the-coding-gopher ⬆️ Best project-based coding platform.

12:05
99% of Developers Don't Get Sockets

483,027 views

8 months ago

Cisco DevNet
Hack the RADKit! Integrating Cisco RADKit & Grafana – Ep.2. Launching & Building API Endpoints

Welcome to our series—Hack the RADKit! This is your go-to place for hacking your existing Cisco RADKit deployment with ...

16:34
Hack the RADKit! Integrating Cisco RADKit & Grafana – Ep.2. Launching & Building API Endpoints

198 views

3 months ago

BSidesLV
Autonomous Discovery of Logic-based API Vulnerabilities

Identifier: JZ98SA Description: - “Autonomous Discovery of Logic-based API Vulnerabilities” - Examines how AI agents can be ...

37:19
Autonomous Discovery of Logic-based API Vulnerabilities

44 views

1 month ago

OWASP Foundation
Self-Discovering API Key Permissions and Resources - Joseph Leon, Dylan Ayrey

You're a security analyst triaging a list of exposed credentials - how do you prioritize which key to rotate first? How do you even ...

42:56
Self-Discovering API Key Permissions and Resources - Joseph Leon, Dylan Ayrey

100 views

10 months ago

BSides Budapest IT Security Conference
Bug Bounty Year 1: $0–16k, Low to CVE #BSidesBUD2025

Bálint Magyar - Bug Bounty Year 1: $0–16k, Low to CVE This presentation was held at #BSidesBUD2025 IT security conference ...

40:23
Bug Bounty Year 1: $0–16k, Low to CVE #BSidesBUD2025

966 views

7 months ago

Gnar Coding
Web Sec 101: How Hackers Steal $1337 Jackets

Wanna learn Web App hacking in a legit way without getting in trouble? Then this video is for you #cybersecurity DISCLAIMER: ...

23:39
Web Sec 101: How Hackers Steal $1337 Jackets

1,116 views

6 months ago

Ziang Security
PortSwigger API Testing

To solve the lab, exploit a hidden API endpoint to buy a Lightweight l33t Leather Jacket. Follow me on Twitter: ...

4:16
PortSwigger API Testing

28 views

10 months ago

CNCF [Cloud Native Computing Foundation]
The Good, the Bad, and the Ugly: Hacking 3 Cloud Native AI Service... Hillai Ben-Sasson & Nir Ohfeld

Don't miss out! Join us at our next Flagship Conference: KubeCon + CloudNativeCon events in Amsterdam, The Netherlands ...

32:12
The Good, the Bad, and the Ugly: Hacking 3 Cloud Native AI Service... Hillai Ben-Sasson & Nir Ohfeld

70 views

1 month ago

Infin1teXploit
Unlock Hidden Power: How PowerShell & WinAPI Control Your Windows OS Like a Hacker!

Want to take full control of your Windows OS with just PowerShell? In this video, we dive into how PowerShell can harness ...

0:32
Unlock Hidden Power: How PowerShell & WinAPI Control Your Windows OS Like a Hacker!

55 views

11 months ago

luRaichu
Shmoocon2024 DanNagle Hacking Network APIs

The videos in this collection are from ShmooCon 2024, which occurred on 12 - 14 January 2024, at the Washington Hilton Hotel.

16:41
Shmoocon2024 DanNagle Hacking Network APIs

4 views

3 months ago

NorthSec
NorthSec 2025 - Félix Charette - Exploiting the not so misuse-resistant AES-GCM API of OpenSSL

AES-GCM is robust when used properly, but in practice, some APIs make it easy to introduce vulnerabilities giving the possibility ...

31:10
NorthSec 2025 - Félix Charette - Exploiting the not so misuse-resistant AES-GCM API of OpenSSL

32 views

2 months ago

Agrici Daniel
This Google AI Studio + n8n hack is INSANE! Build & Automate Any App (Tutorial)

The integration between Google AI Studio and n8n is absolutely INSANE! In this tutorial, I'll show you how connecting these two ...

31:31
This Google AI Studio + n8n hack is INSANE! Build & Automate Any App (Tutorial)

31,033 views

2 months ago

Brian0day
Ethical Hacking Using Gemini CLI

I used Google's Gemini CLI to automate the entire hacking process on vulnerable target! Learn how this powerful AI tool integrates ...

14:45
Ethical Hacking Using Gemini CLI

223 views

1 month ago