ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

837 results

NetworkChuck
the WORST hack of 2026

Axios, the most popular HTTP library with over 100 million weekly downloads, was just hijacked in one of the most sophisticated ...

11:00
the WORST hack of 2026

408,740 views

5 days ago

Low Level
this is the biggest hack of 2026

https://www.huntress.com/blog/supply-chain-compromise-axios-npm-package ...

9:57
this is the biggest hack of 2026

275,211 views

4 days ago

Fireship
Millions of JS devs just got penetrated by a RAT…

Mux is the best video API for developers. Get $50 in free credits - https://mux.com/fireship Yesterday, a precision-guided remote ...

4:59
Millions of JS devs just got penetrated by a RAT…

639,905 views

4 days ago

DeadOverflow
Why Hackers Love postMessage()

All demonstrations are intended solely for lawful, ethical, and defensive use. The creator assumes no liability for actions viewers ...

8:51
Why Hackers Love postMessage()

100 views

1 hour ago

Medusa
This One Line Hacked NPM

Something felt off with a simple npm install… Turned out it was way bigger than it looked. Here's what really happened ...

7:28
This One Line Hacked NPM

1,177 views

2 days ago

NahamSec
I Earned $2M Hacking. Here's Everything I Know

LIKE and SUBSCRIBE with NOTIFICATIONS ON if you enjoyed the video! If you want to learn bug bounty hunting from me: ...

15:10
I Earned $2M Hacking. Here's Everything I Know

15,531 views

6 days ago

CodeOvation
The Axios Attack was a Wake-Up Call. Stop Coding Like It's 2015.

The recent Axios supply chain attack (March 31, 2026) has sent shockwaves through the dev world. But while everyone is ...

6:27
The Axios Attack was a Wake-Up Call. Stop Coding Like It's 2015.

210 views

3 days ago

David Bombal
Google Big Sleep: The End of Human Hackers?

Big thank you to DeleteMe for sponsoring this video. Use my link http://jointdeleteme.com/Bombal to receive a 20% discount or ...

1:08:22
Google Big Sleep: The End of Human Hackers?

112,260 views

6 days ago

MRE Security
Live API Hacking: Exploit JWT Vulnerabilities | AMA | Learning With A Hacker EP 3

Stay ahead of cybersecurity insights – Subscribe & turn on notifications! What Makes You Different Podcast: ...

1:24:59
Live API Hacking: Exploit JWT Vulnerabilities | AMA | Learning With A Hacker EP 3

339 views

Streamed 5 days ago

Astra
Building Heuristic Detections in My Antivirus Engine — Ep. 3

In this video, we're continuing on the antivirus engine by adding heuristic and string based detections! Episode 3 of building an ...

9:57
Building Heuristic Detections in My Antivirus Engine — Ep. 3

6,302 views

2 days ago

Dr Josh Stroschein - The Cyber Yeti
02 - Identifying Signs of Runtime-Linking using CAPA and IDA Pro

In part 02 - we'll use CAPA to help identify signs if runtime linking and navigate to those locations in IDA Pro. We'll then discuss ...

8:11
02 - Identifying Signs of Runtime-Linking using CAPA and IDA Pro

461 views

4 days ago

AmrSec
Claude Code For Hackers

Claude Code is a terminal-native AI agent that reads your files, runs your commands, and controls your tools. But every tutorial ...

40:00
Claude Code For Hackers

5,606 views

4 days ago

OkioFlix
Top 10 Most Common Hacking Techniques Explained (2026)

In this video, we break down the Top 10 Hacking Techniques of 2026. Whether you're an ethical hacker or just want to stay safe, ...

4:41
Top 10 Most Common Hacking Techniques Explained (2026)

1 view

4 days ago

Ravi Paribrajak
the WORST hack of 2026 | 100M+ Infected

The JavaScript ecosystem just got hit by a massive supply-chain attack. A highly sophisticated Remote Access Trojan (RAT) was ...

4:27
the WORST hack of 2026 | 100M+ Infected

43 views

3 days ago

DeadOverflow
You Might Have a HACKED CPU and Not Even Know It

All demonstrations are intended solely for lawful, ethical, and defensive use. The creator assumes no liability for actions viewers ...

8:02
You Might Have a HACKED CPU and Not Even Know It

1,149 views

5 days ago

expoQA
expoQA'26 | Cedomir Zivkovic

From Console to Contract: Ethical API Hacking & Debugging That Wins Practical API testing, DevTools tricks and a true ...

0:33
expoQA'26 | Cedomir Zivkovic

3 views

4 days ago

Tyler Ramsbey - Hack Smarter
Hacking AWS: Data Secrets (Part 2) - Hack Smarter Labs

Hack Smarter: https://hacksmarter.org Realistic hacking labs & courses you can actually afford. ---- In this video, I fully compromise ...

19:44
Hacking AWS: Data Secrets (Part 2) - Hack Smarter Labs

296 views

6 days ago

HackNinja
CPython: command injection in webbrowser.open() API (CVE-2026-4519)

A short video explaining the security vulnerability command injection in webbrowser.open() API and the associated CVE ...

1:54
CPython: command injection in webbrowser.open() API (CVE-2026-4519)

41 views

6 days ago

Hack the Clown
Stop grepping logs. Start using Kelora.

Stop scrolling endless logs by hand. In this video, I'll show you how to use Kelora to quickly spot suspicious entries like path ...

4:50
Stop grepping logs. Start using Kelora.

3,730 views

7 days ago

Medusa
This XSS Somehow Turned Into Account Takeover!

A simple XSS vulnerability escalates far beyond expectations, eventually leading to full account takeover. This video breaks down ...

19:43
This XSS Somehow Turned Into Account Takeover!

2,576 views

6 days ago