Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
338 results
... for some companies so that's the main problem the of course why the hackers uh few words about why hackers use legit APIs ...
388 views
2 months ago
APIs power the digital world, but without proper security, they can be vulnerable to attacks. In this video, we dive deep into how ...
2,222 views
11 months ago
Inquiries: thecodinggopher@gmail.com Learn to build Git, Docker, Redis, HTTP ...
94,753 views
9 months ago
R0-0823 If you've ever opened an official Windows driver in IDA, you've likely been greeted with some nice quality of life features: ...
117 views
5 months ago
The world of Web Hacking is evolving, and with it, our tooling must evolve as well. Caido, the new guy on the HTTP Proxy block, ...
1,136 views
Streamed 8 months ago
Let's cut through the BS - if you're not using regex properly, you're leaving money on the table as a hacker. This workshop shows ...
6,938 views
3 months ago
Sumate a este workshop donde aprenderás a fondo sobre las APIs y su rol clave en el entorno digital actual. Revisaremos las ...
55 views
8 months ago
Get 40% OFF CodeCrafters: https://app.codecrafters.io/join?via=the-coding-gopher ⬆️ Best project-based coding platform.
483,027 views
Welcome to our series—Hack the RADKit! This is your go-to place for hacking your existing Cisco RADKit deployment with ...
198 views
Identifier: JZ98SA Description: - “Autonomous Discovery of Logic-based API Vulnerabilities” - Examines how AI agents can be ...
44 views
1 month ago
You're a security analyst triaging a list of exposed credentials - how do you prioritize which key to rotate first? How do you even ...
100 views
10 months ago
Bálint Magyar - Bug Bounty Year 1: $0–16k, Low to CVE This presentation was held at #BSidesBUD2025 IT security conference ...
966 views
7 months ago
Wanna learn Web App hacking in a legit way without getting in trouble? Then this video is for you #cybersecurity DISCLAIMER: ...
1,116 views
6 months ago
To solve the lab, exploit a hidden API endpoint to buy a Lightweight l33t Leather Jacket. Follow me on Twitter: ...
28 views
Don't miss out! Join us at our next Flagship Conference: KubeCon + CloudNativeCon events in Amsterdam, The Netherlands ...
70 views
Want to take full control of your Windows OS with just PowerShell? In this video, we dive into how PowerShell can harness ...
The videos in this collection are from ShmooCon 2024, which occurred on 12 - 14 January 2024, at the Washington Hilton Hotel.
4 views
AES-GCM is robust when used properly, but in practice, some APIs make it easy to introduce vulnerabilities giving the possibility ...
32 views
The integration between Google AI Studio and n8n is absolutely INSANE! In this tutorial, I'll show you how connecting these two ...
31,033 views
I used Google's Gemini CLI to automate the entire hacking process on vulnerable target! Learn how this powerful AI tool integrates ...
223 views