ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

1,822 results

Medusa
How to Learn Web & API Hacking in 2026 (Complete Roadmap)

Portfolio: https://portfolio.medusa0xf.com/ ✍️ Bug Bounty WriteUps: https://medusa0xf.medium.com/ ...

23:53
How to Learn Web & API Hacking in 2026 (Complete Roadmap)

8,244 views

2 weeks ago

Medusa
Broken Access Control Tutorial: Hacking Feedback Forms

Portfolio: https://portfolio.medusa0xf.com/ ✍️ Bug Bounty WriteUps: https://medusa0xf.medium.com/ ...

8:33
Broken Access Control Tutorial: Hacking Feedback Forms

1,282 views

2 days ago

ZACK0X01
Master Recon in Bug Bounty (2026) 🔥 | Complete Beginner to Pro Guide

Learn more about hacking & bug bounty Practical tips and write-ups: https://lureo.shop Enjoy 25% OFF : GOODSTART99 ...

33:26
Master Recon in Bug Bounty (2026) 🔥 | Complete Beginner to Pro Guide

5,547 views

2 weeks ago

HackAi
Postman? | Web Attack Using API Testing - Kali Linux Hacking (2026)

Learn Postman API Testing and Web API Attacks step-by-step in this complete Postman Tutorial (2026). This video explains how ...

7:06
Postman? | Web Attack Using API Testing - Kali Linux Hacking (2026)

285 views

3 weeks ago

Shield Spectrum
Complete AI Setup for Ethical Hacking (Kali Linux + Gemini/ChatGPT)

Turn your Kali Linux into an AI‑powered ethical hacking machine in 2025. In this step‑by‑step tutorial, you'll set up ChatGPT and ...

18:20
Complete AI Setup for Ethical Hacking (Kali Linux + Gemini/ChatGPT)

23,953 views

3 weeks ago

Semi Yulianto
Vulnerable Bank API Penetration Test

This video was recorded to demonstrate the API penetration testing process for the Vulnerable Bank, available in the following ...

5:15
Vulnerable Bank API Penetration Test

517 views

2 weeks ago

SAINTCON
SAINTCON 2025 - Neiko (Specters) Rivera - Grand Theft API

Grand Theft API A car hacking talk where I (specters) purchased a car that had really $h1t security and over the course of 3 years ...

18:50
SAINTCON 2025 - Neiko (Specters) Rivera - Grand Theft API

202 views

2 weeks ago

JakSec
Hacking Google Drive Integrations | Bug Bounty Explained

In this video, I go over the ways that bug bounty hunters attack weakly implemented Google Drive integrations in web applications.

30:30
Hacking Google Drive Integrations | Bug Bounty Explained

184 views

9 days ago

Engineer Abroad
Hacking the Human API: Engineering Logic for Global Career Success

Ever felt like interacting with a co-worker is harder than debugging complex legacy code? You're not alone. As engineers, we love ...

8:25
Hacking the Human API: Engineering Logic for Global Career Success

9 views

3 weeks ago

Malman
How Hackers Use Windows API to Build Malware

Stop being a "Script Kiddie" who just hits Next, Next, Finish. Tonight, we are learning the real "Dark Arts" of Malware Development.

45:15
How Hackers Use Windows API to Build Malware

44 views

Streamed 3 weeks ago

Secursky
The IBM Flaw Letting Hackers Walk In Without a Password

A newly discovered critical vulnerability in IBM's API Connect platform is creating an urgent security crisis across the globe.

1:38
The IBM Flaw Letting Hackers Walk In Without a Password

25 views

2 weeks ago

Infosec Now
Malicious WhatsApp API Package Exposed: What You Need to Know

In a recent alarming development in the realm of cybersecurity, researchers have uncovered a malicious package on the npm ...

7:56
Malicious WhatsApp API Package Exposed: What You Need to Know

42 views

2 weeks ago

HackAi
How Hackers Find Secrets in Web Apps using TruffleHog | Kali Linux 2026

TruffleHog Tutorial – Web Application Attacks using Kali Linux (2026) In this video, you will learn how hackers and security ...

6:03
How Hackers Find Secrets in Web Apps using TruffleHog | Kali Linux 2026

324 views

4 weeks ago

GitGuardian
Secrets in the Machine: Preventing Sensitive Data Leaks Through LLM APIs

In this webinar, we break down a simple but increasingly common problem: secrets leak wherever text flows, and modern LLM ...

33:11
Secrets in the Machine: Preventing Sensitive Data Leaks Through LLM APIs

73 views

2 weeks ago

Offensive Security Podcasts
Top 10 web API Bugs

In this video Top 10 API Bugs published by the OWASP API Security project is introduced in a nutshell . Although published for the ...

6:11
Top 10 web API Bugs

22 views

2 weeks ago

HackAi
Frida? | Android Attack by Hackers - Linux Hacking (2026)

In this video, you will learn how hackers and penetration testers use Frida to perform powerful runtime attacks on Android ...

6:16
Frida? | Android Attack by Hackers - Linux Hacking (2026)

359 views

2 weeks ago

White Hat Learner's
API Testing Lab 4 Solved | Full Walkthrough | API Security & Ethical Hacking

In this video, I solve API Testing Lab 4 step by step and explain the complete API security testing process used by professional ...

18:12
API Testing Lab 4 Solved | Full Walkthrough | API Security & Ethical Hacking

5 views

8 days ago

Algoran Automation
No API? No Problem. "Hacking" Nano Banana PRO into n8n

Have you ever found an amazing AI model on Hugging Face (like Nano Banana PRO) but realized the "Use via API" button was ...

5:20
No API? No Problem. "Hacking" Nano Banana PRO into n8n

13 views

4 days ago

Cyber Tech Ajju
How Hackers Find Hidden Bugs in JavaScript | $500 Bounty Case Study Part- 1

🎥 How I Found a $500 Bug Using JS Recon | Part 1 (Manual Bug Bounty Method Explained) . . . . In this video, I’ll show you how ...

31:00
How Hackers Find Hidden Bugs in JavaScript | $500 Bounty Case Study Part- 1

1,454 views

2 weeks ago

Semi Yulianto
General University API Penetration Test

This video was recorded to demonstrate the API penetration testing process for the Generic University, which is available in the ...

10:11
General University API Penetration Test

243 views

2 weeks ago