ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

1,054 results

NetworkChuck
the WORST hack of 2026

Axios, the most popular HTTP library with over 100 million weekly downloads, was just hijacked in one of the most sophisticated ...

11:00
the WORST hack of 2026

442,016 views

9 days ago

DeadOverflow
Why Hackers Love postMessage()

All demonstrations are intended solely for lawful, ethical, and defensive use. The creator assumes no liability for actions viewers ...

8:51
Why Hackers Love postMessage()

2,836 views

4 days ago

Fireship
Millions of JS devs just got penetrated by a RAT…

Mux is the best video API for developers. Get $50 in free credits - https://mux.com/fireship Yesterday, a precision-guided remote ...

4:59
Millions of JS devs just got penetrated by a RAT…

663,644 views

9 days ago

Medusa
This One Line Hacked NPM

Something felt off with a simple npm install… Turned out it was way bigger than it looked. Here's what really happened ...

7:28
This One Line Hacked NPM

1,434 views

7 days ago

Medusa
This XSS Somehow Turned Into Account Takeover!

A simple XSS vulnerability escalates far beyond expectations, eventually leading to full account takeover. This video breaks down ...

19:43
This XSS Somehow Turned Into Account Takeover!

2,738 views

11 days ago

The Network Knight🐉
API HACKING 101: The 10-Step Attack Framework (REST & GraphQL)  The Playbook

APIs ARE THE NEW FRONTIER FOR ATTACKERS. ⚠️ Traditional firewalls and WAFs are failing. In this video, we break down ...

6:39
API HACKING 101: The 10-Step Attack Framework (REST & GraphQL) The Playbook

15 views

4 weeks ago

CyberFlow
Hacking Android Apps (Full Guide)

Join The Family: ‍ https://cyberflow-academy.framer.website/ Check Out The Courses We Offer: ...

8:02
Hacking Android Apps (Full Guide)

9,821 views

13 days ago

Dr Josh Stroschein - The Cyber Yeti
02 - Exploring the Reverse Shell Source Code and API Breakdown

Join us as we dive into the reverse shell's source code! This video breaks down the C program from Video 01, spotlighting how ...

18:11
02 - Exploring the Reverse Shell Source Code and API Breakdown

700 views

3 weeks ago

DeadOverflow
How Hackers Use AI to Become Admin on Websites

All demonstrations are intended solely for lawful, ethical, and defensive use. The creator assumes no liability for actions viewers ...

8:04
How Hackers Use AI to Become Admin on Websites

2,369 views

3 weeks ago

DeadOverflow
I Found a Serious Steam Account Takeover Bug

In this video, I show how a serious Steam vulnerability could put accounts at risk and why you should never paste untrusted ...

8:58
I Found a Serious Steam Account Takeover Bug

1,782 views

14 hours ago

NahamSec
BECOMING AN AI HACKER (Episode 01)

LIKE and SUBSCRIBE with NOTIFICATIONS ON if you enjoyed the video! If you want to learn bug bounty hunting from me: ...

17:58
BECOMING AN AI HACKER (Episode 01)

14,564 views

3 weeks ago

Medusa
How Hackers Abuse the Like Button

Disclaimer: This content is for educational purposes only. The testing shown in this video was performed on a deliberately ...

7:48
How Hackers Abuse the Like Button

2,348 views

4 weeks ago

Nate Herk | AI Automation
18 Claude Code Token Hacks in 18 Minutes

Full courses + unlimited support: https://www.skool.com/ai-automation-society-plus/about?el=claude-token-hacks All my FREE ...

18:57
18 Claude Code Token Hacks in 18 Minutes

131,977 views

8 days ago

Shield Spectrum
Build Your Own AI Pentesting Assistant (Python + API) | Automate Nmap & Nuclei Analysis

In this video, you'll learn how to build your own AI-powered pentesting assistant using Python and API integration. We automate: ...

8:06
Build Your Own AI Pentesting Assistant (Python + API) | Automate Nmap & Nuclei Analysis

576 views

2 weeks ago

NahamSec
I Earned $2M Hacking. Here's Everything I Know

LIKE and SUBSCRIBE with NOTIFICATIONS ON if you enjoyed the video! If you want to learn bug bounty hunting from me: ...

15:10
I Earned $2M Hacking. Here's Everything I Know

17,780 views

10 days ago

HackersArsenal
Programming For Hacker's (VERY SPECIFIC)

Music: massobeats - ruby https://www.youtube.com/watch?v=fpuogvBgPYg Hacking isn't just about tools… It's about how fast you ...

8:04
Programming For Hacker's (VERY SPECIFIC)

15,343 views

2 weeks ago

DeadOverflow
How AI Changed Hacking Forever

All demonstrations are intended solely for lawful, ethical, and defensive use. The creator assumes no liability for actions viewers ...

6:49
How AI Changed Hacking Forever

1,487 views

4 weeks ago

vaehz
Roblox exploits are HACKING you.

In this video I talk about the dangers of roblox exploiting and how to stay safe when wanting to hack on steal a brainrot In depth ...

8:24
Roblox exploits are HACKING you.

168,965 views

3 weeks ago

0xdaras
What Hackers Do With 20,000+ Subdomains?

https://github.com/Darasxs/radar How do you handle a large number of subdomains? How do you stay ahead in bug bounty?

4:42
What Hackers Do With 20,000+ Subdomains?

481 views

2 weeks ago

CyberYozh
How to Hack a Backend Via an API: A Look at Vulnerabilities in 2026

🔐 Get a discount on the "Anonymity 3.0" course—the art of digital invisibility in the age of AI—with promo code "DAVID ...

12:27
How to Hack a Backend Via an API: A Look at Vulnerabilities in 2026

3,397 views

6 days ago