ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

88 results

Hacklog
HACKLOG 2x18 - XSS Bindings (Cross Site Scripting Guide) (Subtitled)

⚠️ The subtitles have been translated automatically. We apologize for any errors. If you want, you can help us translate them ...

11:33
HACKLOG 2x18 - XSS Bindings (Cross Site Scripting Guide) (Subtitled)

3,938 views

5 years ago

WisTech Open (formerly Wisc-Online)
Cross-Site Scripting Defined

This video defines the various kinds of cross-site scripting, or xss, and explains how to protect your website from it.

5:40
Cross-Site Scripting Defined

820 views

9 years ago

Hacklog
HACKLOG 2x08 - Your First XSS / SQLi Cyber Attack (Subtitled)

⚠️ The subtitles have been translated automatically. We apologize for any errors. If you want, you can help us translate them ...

7:13
HACKLOG 2x08 - Your First XSS / SQLi Cyber Attack (Subtitled)

5,438 views

5 years ago

WordPress
Fixing common security vulnerabilities

A more "real world" example of fixing common vulnerabilities, covering SQL Injection, Cross Site Scripting, Cross-site Request ...

10:38
Fixing common security vulnerabilities

2,252 views

1 year ago

Chrome for Developers
From security as opt-in to security by default | Session

Spectre impacted the security landscape of the web significantly. In this Session, we talk about some of the security headers best ...

15:30
From security as opt-in to security by default | Session

2,529 views

4 years ago

Alex Demko
Simple Tips to Secure Your Frontend Applications 🔐

Don't miss this essential guide to frontend security Curious about how simple code injections can compromise your whole ...

18:28
Simple Tips to Secure Your Frontend Applications 🔐

207 views

6 months ago

Hacklog
HACKLOG 2x17 - Session Attacks (CSRF Session Hacking Guide) (Subtitled)

⚠️ The subtitles have been translated automatically. We apologize for any errors. If you want, you can help us translate them ...

8:09
HACKLOG 2x17 - Session Attacks (CSRF Session Hacking Guide) (Subtitled)

3,279 views

5 years ago

DEFCONConference
DEF CON 31 - ELECTRONizing MacOS Privacy - A New Weapon in Your Red Teaming Armory - Wojciech Reguła

MacOS is known for an additional layer of privacy controls called TCC - Transparency, Consent, and Control (TCC) that restricts ...

19:55
DEF CON 31 - ELECTRONizing MacOS Privacy - A New Weapon in Your Red Teaming Armory - Wojciech Reguła

5,534 views

2 years ago

Chrome for Developers
How to speed up  Largest Contentful Paint (LCP) with cross-site prefetching

Prefetching web pages can greatly improve their general loading performance and, in particular, Largest Contentful Paint (LCP).

12:14
How to speed up Largest Contentful Paint (LCP) with cross-site prefetching

7,729 views

3 years ago

Hacklog
HACKLOG 2x15 - Authentication Attacks (Web Server Auth Hacking) (Subtitle)

⚠️ The subtitles have been translated automatically. We apologize for any errors. If you want, you can help us translate them ...

7:37
HACKLOG 2x15 - Authentication Attacks (Web Server Auth Hacking) (Subtitle)

2,928 views

5 years ago

MMOKaruna
2.5  What is Broken Access Control v2

2.5 What is Broken Access Control v2.

4:12
2.5 What is Broken Access Control v2

8 views

1 year ago

Augusta University Cybersecurity
Vulnerabilities and Vectors

This lecture describes the classification of the Internet into five distinct layers (geographic, physical network, logic, cyber persona, ...

6:46
Vulnerabilities and Vectors

252 views

8 years ago

tomek7667
EZMD Unintended Solution: DOMPurify Bypass to Puppeteer Escape - 0CTF 2025

Bypassing DOMPurify via replacement patterns and chaining a Puppeteer escape to leak the flag in the ezmd challenge.

11:01
EZMD Unintended Solution: DOMPurify Bypass to Puppeteer Escape - 0CTF 2025

285 views

3 months ago

Chrome for Developers
Crisper: Protecting your Polymer app with CSP -- Polycasts #40

Content Security Policy (CSP) is a set of rules to help mitigate and prevent attacks such as Cross Site Scripting (XSS) and data ...

5:25
Crisper: Protecting your Polymer app with CSP -- Polycasts #40

10,614 views

10 years ago

Hacklog
HACKLOG 2x04 - HTML, CSS and Javascript (Subtitled)

⚠️ The subtitles have been translated automatically. We apologize for any errors. If you want, you can help us translate them ...

8:25
HACKLOG 2x04 - HTML, CSS and Javascript (Subtitled)

4,117 views

5 years ago

Hacklog
HACKLOG 2x19 - Command Execution Attacks (Remote & Local) (Subtitled)

⚠️ The subtitles have been translated automatically. We apologize for any errors. If you want, you can help us translate them ...

4:49
HACKLOG 2x19 - Command Execution Attacks (Remote & Local) (Subtitled)

1,875 views

5 years ago

Hacklog
HACKLOG 2x10 - IP Address Analysis (Information Gathering) (Subtitled)

⚠️ The subtitles have been translated automatically. We apologize for any errors. If you want, you can help us translate them ...

4:22
HACKLOG 2x10 - IP Address Analysis (Information Gathering) (Subtitled)

3,470 views

5 years ago

Chrome for Developers
New in Chrome 105: Container Queries, :has, the Sanitizer API, and more!

Chrome 105 is rolling out now! Container queries and :has() are a match made in responsive heaven. The new Sanitizer API ...

4:53
New in Chrome 105: Container Queries, :has, the Sanitizer API, and more!

26,115 views

3 years ago

loops
Log-me-in challenge for Google CTF 2020

Fun fact: The audio is 92 frames out of sync. But this took forever to render so I'm not going to rerender it.

11:15
Log-me-in challenge for Google CTF 2020

1,366 views

5 years ago

MMOKaruna
2.3  What is Senstive Data Exposure

2.3 What is Senstive Data Exposure.

5:34
2.3 What is Senstive Data Exposure

4 views

1 year ago