ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

223 results

NetworkChuck
the WORST hack of 2026

Axios, the most popular HTTP library with over 100 million weekly downloads, was just hijacked in one of the most sophisticated ...

11:00
the WORST hack of 2026

408,740 views

5 days ago

Fireship
Millions of JS devs just got penetrated by a RAT…

Mux is the best video API for developers. Get $50 in free credits - https://mux.com/fireship Yesterday, a precision-guided remote ...

4:59
Millions of JS devs just got penetrated by a RAT…

639,905 views

4 days ago

Low Level
this is the biggest hack of 2026

https://www.huntress.com/blog/supply-chain-compromise-axios-npm-package ...

9:57
this is the biggest hack of 2026

275,211 views

4 days ago

DeadOverflow
Why Hackers Love postMessage()

All demonstrations are intended solely for lawful, ethical, and defensive use. The creator assumes no liability for actions viewers ...

8:51
Why Hackers Love postMessage()

100 views

1 hour ago

Medusa
This One Line Hacked NPM

Something felt off with a simple npm install… Turned out it was way bigger than it looked. Here's what really happened ...

7:28
This One Line Hacked NPM

1,177 views

2 days ago

NahamSec
I Earned $2M Hacking. Here's Everything I Know

LIKE and SUBSCRIBE with NOTIFICATIONS ON if you enjoyed the video! If you want to learn bug bounty hunting from me: ...

15:10
I Earned $2M Hacking. Here's Everything I Know

15,531 views

6 days ago

CodeOvation
The Axios Attack was a Wake-Up Call. Stop Coding Like It's 2015.

The recent Axios supply chain attack (March 31, 2026) has sent shockwaves through the dev world. But while everyone is ...

6:27
The Axios Attack was a Wake-Up Call. Stop Coding Like It's 2015.

210 views

3 days ago

Astra
Building Heuristic Detections in My Antivirus Engine — Ep. 3

In this video, we're continuing on the antivirus engine by adding heuristic and string based detections! Episode 3 of building an ...

9:57
Building Heuristic Detections in My Antivirus Engine — Ep. 3

6,302 views

2 days ago

Dr Josh Stroschein - The Cyber Yeti
02 - Identifying Signs of Runtime-Linking using CAPA and IDA Pro

In part 02 - we'll use CAPA to help identify signs if runtime linking and navigate to those locations in IDA Pro. We'll then discuss ...

8:11
02 - Identifying Signs of Runtime-Linking using CAPA and IDA Pro

461 views

4 days ago

OkioFlix
Top 10 Most Common Hacking Techniques Explained (2026)

In this video, we break down the Top 10 Hacking Techniques of 2026. Whether you're an ethical hacker or just want to stay safe, ...

4:41
Top 10 Most Common Hacking Techniques Explained (2026)

1 view

4 days ago

Medusa
This XSS Somehow Turned Into Account Takeover!

A simple XSS vulnerability escalates far beyond expectations, eventually leading to full account takeover. This video breaks down ...

19:43
This XSS Somehow Turned Into Account Takeover!

2,576 views

6 days ago

Hack the Clown
Stop grepping logs. Start using Kelora.

Stop scrolling endless logs by hand. In this video, I'll show you how to use Kelora to quickly spot suspicious entries like path ...

4:50
Stop grepping logs. Start using Kelora.

3,730 views

7 days ago

Ravi Paribrajak
the WORST hack of 2026 | 100M+ Infected

The JavaScript ecosystem just got hit by a massive supply-chain attack. A highly sophisticated Remote Access Trojan (RAT) was ...

4:27
the WORST hack of 2026 | 100M+ Infected

43 views

3 days ago

DeadOverflow
You Might Have a HACKED CPU and Not Even Know It

All demonstrations are intended solely for lawful, ethical, and defensive use. The creator assumes no liability for actions viewers ...

8:02
You Might Have a HACKED CPU and Not Even Know It

1,149 views

5 days ago

Tyler Ramsbey - Hack Smarter
Hacking AWS: Data Secrets (Part 2) - Hack Smarter Labs

Hack Smarter: https://hacksmarter.org Realistic hacking labs & courses you can actually afford. ---- In this video, I fully compromise ...

19:44
Hacking AWS: Data Secrets (Part 2) - Hack Smarter Labs

296 views

6 days ago

LoganSec
I Built a CLAUDE.md for Bug Bounty. Here's What's In It.

I've been using Claude Code for almost every hunt lately; but out of the box, it doesn't think like a bug bounty hunter. So, I built a ...

18:02
I Built a CLAUDE.md for Bug Bounty. Here's What's In It.

115 views

3 days ago

Devoctal
They Hid Malware in a Package You Install Every Day…

On the night of March 30th, 2026 — while most developers were asleep — attackers quietly weaponized one of the most ...

4:18
They Hid Malware in a Package You Install Every Day…

727 views

4 days ago

DeadOverflow
How Hackers Hide Malicious Code in Plain Sight

All demonstrations are intended solely for lawful, ethical, and defensive use. The creator assumes no liability for actions viewers ...

9:21
How Hackers Hide Malicious Code in Plain Sight

549 views

2 days ago

Security Explained
The Credentials Nobody Is Watching: How Machine Identity Gets Exploited

A four-second GitHub search returns a list of public repositories containing database passwords, API keys, and service credentials ...

9:51
The Credentials Nobody Is Watching: How Machine Identity Gets Exploited

2 views

5 days ago

Debug Duck
7- Advanced Security by Design

Welcome to Debug Duck, Learn software engineering, programming, and technology in a simple and practical way. Tips, insights ...

4:19
7- Advanced Security by Design

1 view

7 days ago