Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
2,524 results
Learn how to find and exploit IDOR vulnerabilities in a web application giving you access to data that you shouldn't have.
225 views
2 years ago
AVISO LEGAL: Todo el contenido de este video tiene fines educativos y de entretenimiento únicamente. 🔗Discord: https ...
363 views
2 months ago
Usa este repositorio para encontrar los programas de recompensas por errores más lucrativos en h1. 🔗Discord: https://discord ...
228 views
1 month ago
Description: Wisetail Learning Ecosystem (LE) version 4.11.6 and before are affected with multiple IDOR vulnerabilies that allow ...
194 views
7 years ago
IDOR or something else? I hope you found a solution that worked for you :) The Content (except music & images) is licensed ...
7 views
IDOR or something else? Hey guys! Hopefully you found a solution that helped you! The Content is licensed under ...
3 views
1 year ago
TBK DVR4104 and DVR4216 devices, as well as Novo, CeNova, QSee, Pulnix, XVR 5 in 1, Securus, Night OWL, DVR Login, ...
84 views
9 months ago
The world of Web Hacking is evolving, and with it, our tooling must evolve as well. Caido, the new guy on the HTTP Proxy block, ...
1,145 views
Streamed 8 months ago
Direct object references exist on almost all web applications as a way to tell the server what object you are accessing. If you do not ...
13,229 views
9 years ago
Title: BOLA, IDOR, MA, BFLA. Welcome to the OWASP API Top 10! Presenter: Adam Fisher.
349 views
5 years ago
How could attackers gain control of hundreds of million devices? In this talk Vangelis explains how attackers can exploit a series ...
233 views
Application security requires a systematic and holistic approach. However, organizations typically struggle in creating an effective ...
574 views
10 months ago
This talk explores how to leverage the nooks and crannies of Salesforce to find and abuse misconfigurations that chain together ...
33 views
3 months ago
تنويه هام ! ⚠️ انا غير مسؤول عن اي استخدام غير شرعي او غير اخلاقي لكل الطرق المستخدمة في جميع الفيديوهات ⛔ تم انشاء هذة ...
789 views
From AppSecEU 2016 in Rome https://2016.appsec.eu/ - Managed by the official OWASP Media Project ...
2,085 views
Managed by the OWASP® Foundation https://owasp.org/
884 views
4 years ago
Las aplicaciones web modernas no solo exponen API, sino también rutas de ataque. Los exploits de solicitudes recursivas (RRE ...
933 views
Rene Brandel presents how they hacked 7 of 16 publicly accessible RCx25 AI agents, that enabled them to leak user data, ...
141 views
This is video 4/10 covering OWASP's Top 10 Most Critical Web Application Security Risks. For more information on cybersecurity, ...
45 views
8 years ago
Bismillah, hello friends, this time I will share a short tutorial on Searchsploit || How to install in Kali Linux, hopefully it will be useful.
14 views
3 years ago