ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

791 results

NetworkChuck
the WORST hack of 2026

Axios, the most popular HTTP library with over 100 million weekly downloads, was just hijacked in one of the most sophisticated ...

11:00
the WORST hack of 2026

403,082 views

4d ago

Medusa
This XSS Somehow Turned Into Account Takeover!

A simple XSS vulnerability escalates far beyond expectations, eventually leading to full account takeover. This video breaks down ...

19:43
This XSS Somehow Turned Into Account Takeover!

2,545 views

6d ago

Low Level
this is the biggest hack of 2026

https://www.huntress.com/blog/supply-chain-compromise-axios-npm-package ...

9:57
this is the biggest hack of 2026

274,296 views

4d ago

Fireship
Millions of JS devs just got penetrated by a RAT…

Mux is the best video API for developers. Get $50 in free credits - https://mux.com/fireship Yesterday, a precision-guided remote ...

4:59
Millions of JS devs just got penetrated by a RAT…

636,551 views

4d ago

David Bombal
Google Big Sleep: The End of Human Hackers?

Big thank you to DeleteMe for sponsoring this video. Use my link http://jointdeleteme.com/Bombal to receive a 20% discount or ...

1:08:22
Google Big Sleep: The End of Human Hackers?

93,554 views

5d ago

NahamSec
I Earned $2M Hacking. Here's Everything I Know

LIKE and SUBSCRIBE with NOTIFICATIONS ON if you enjoyed the video! If you want to learn bug bounty hunting from me: ...

15:10
I Earned $2M Hacking. Here's Everything I Know

15,155 views

5d ago

Medusa
This One Line Hacked NPM

Something felt off with a simple npm install… Turned out it was way bigger than it looked. Here's what really happened ...

7:28
This One Line Hacked NPM

1,125 views

2d ago

CodeOvation
The Axios Attack was a Wake-Up Call. Stop Coding Like It's 2015.

The recent Axios supply chain attack (March 31, 2026) has sent shockwaves through the dev world. But while everyone is ...

6:27
The Axios Attack was a Wake-Up Call. Stop Coding Like It's 2015.

188 views

2d ago

MRE Security
Live API Hacking: Exploit JWT Vulnerabilities | AMA | Learning With A Hacker EP 3

Stay ahead of cybersecurity insights – Subscribe & turn on notifications! What Makes You Different Podcast: ...

1:24:59
Live API Hacking: Exploit JWT Vulnerabilities | AMA | Learning With A Hacker EP 3

335 views

Streamed 5d ago

AmrSec
Claude Code For Hackers

Claude Code is a terminal-native AI agent that reads your files, runs your commands, and controls your tools. But every tutorial ...

40:00
Claude Code For Hackers

5,286 views

3d ago

OkioFlix
Top 10 Most Common Hacking Techniques Explained (2026)

In this video, we break down the Top 10 Hacking Techniques of 2026. Whether you're an ethical hacker or just want to stay safe, ...

4:41
Top 10 Most Common Hacking Techniques Explained (2026)

1 view

4d ago

Hack the Clown
Stop grepping logs. Start using Kelora.

Stop scrolling endless logs by hand. In this video, I'll show you how to use Kelora to quickly spot suspicious entries like path ...

4:50
Stop grepping logs. Start using Kelora.

3,711 views

6d ago

Dr Josh Stroschein - The Cyber Yeti
02 - Identifying Signs of Runtime-Linking using CAPA and IDA Pro

In part 02 - we'll use CAPA to help identify signs if runtime linking and navigate to those locations in IDA Pro. We'll then discuss ...

8:11
02 - Identifying Signs of Runtime-Linking using CAPA and IDA Pro

444 views

3d ago

DeadOverflow
You Might Have a HACKED CPU and Not Even Know It

All demonstrations are intended solely for lawful, ethical, and defensive use. The creator assumes no liability for actions viewers ...

8:02
You Might Have a HACKED CPU and Not Even Know It

1,147 views

4d ago

Astra
Building Heuristic Detections in My Antivirus Engine — Ep. 3

In this video, we're continuing on the antivirus engine by adding heuristic and string based detections! Episode 3 of building an ...

9:57
Building Heuristic Detections in My Antivirus Engine — Ep. 3

5,730 views

2d ago

HackNinja
CPython: command injection in webbrowser.open() API (CVE-2026-4519)

A short video explaining the security vulnerability command injection in webbrowser.open() API and the associated CVE ...

1:54
CPython: command injection in webbrowser.open() API (CVE-2026-4519)

41 views

5d ago

Tyler Ramsbey - Hack Smarter
Hacking AWS: Data Secrets (Part 2) - Hack Smarter Labs

Hack Smarter: https://hacksmarter.org Realistic hacking labs & courses you can actually afford. ---- In this video, I fully compromise ...

19:44
Hacking AWS: Data Secrets (Part 2) - Hack Smarter Labs

292 views

5d ago

Devoctal
They Hid Malware in a Package You Install Every Day…

On the night of March 30th, 2026 — while most developers were asleep — attackers quietly weaponized one of the most ...

4:18
They Hid Malware in a Package You Install Every Day…

725 views

3d ago

DeadOverflow
How Hackers Hide Malicious Code in Plain Sight

All demonstrations are intended solely for lawful, ethical, and defensive use. The creator assumes no liability for actions viewers ...

9:21
How Hackers Hide Malicious Code in Plain Sight

514 views

1d ago

Qurat ul Ain Asim
hack-5
4:45
hack-5

5 views

4d ago