ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

2,970 results

NetworkChuck
the WORST hack of 2026

Axios, the most popular HTTP library with over 100 million weekly downloads, was just hijacked in one of the most sophisticated ...

11:00
the WORST hack of 2026

463,849 views

2w ago

CyberTutor
How Hackers Attack APIs (And How to Secure Them)

In this video, we dive into the world of APIs (Application Programming Interfaces) and uncover how they power modern ...

4:02
How Hackers Attack APIs (And How to Secure Them)

45 views

7d ago

Medusa
I Broke a Chatbot Using This Trick

In this video, I solve the OWASP Juice Shop chatbot challenge by exploiting an SSTI (Server-Side Template Injection) vulnerability ...

14:28
I Broke a Chatbot Using This Trick

488 views

11h ago

DeadOverflow
Why Hackers Love This HTML Tag

All demonstrations are intended solely for lawful, ethical, and defensive use. The creator assumes no liability for actions viewers ...

8:16
Why Hackers Love This HTML Tag

1,513 views

1d ago

Teycitek
IDOR ‑ The API killer

How that API vulnerability is exposing your most sensitive data #cybersecurity teycirbensoltane.tn.

5:09
IDOR ‑ The API killer

80 views

8d ago

DeadOverflow
Why Hackers Love postMessage()

All demonstrations are intended solely for lawful, ethical, and defensive use. The creator assumes no liability for actions viewers ...

8:51
Why Hackers Love postMessage()

2,982 views

13d ago

Medusa
This XSS Somehow Turned Into Account Takeover!

A simple XSS vulnerability escalates far beyond expectations, eventually leading to full account takeover. This video breaks down ...

19:43
This XSS Somehow Turned Into Account Takeover!

2,875 views

2w ago

Medusa
Automating Web Cache Deception for Bug Bounties!

In this video, I'm using WCVS (Web Cache Vulnerability Scanner) to automatically detect Web Cache Deception bugs for Bug ...

20:45
Automating Web Cache Deception for Bug Bounties!

3,139 views

4w ago

MRE Security
Live API Hacking: Exploit Unauthenticated Vulnerabilities | AMA | Learning With A Hacker EP 3

Stay ahead of cybersecurity insights – Subscribe & turn on notifications! What Makes You Different Podcast: ...

1:33:00
Live API Hacking: Exploit Unauthenticated Vulnerabilities | AMA | Learning With A Hacker EP 3

1,834 views

Streamed 3w ago

Medusa
This One Line Hacked NPM

Something felt off with a simple npm install… Turned out it was way bigger than it looked. Here's what really happened ...

7:28
This One Line Hacked NPM

1,578 views

2w ago

MRE Security
Live API Hacking: Exploit JWT Vulnerabilities | AMA | Learning With A Hacker EP 5

Stay ahead of cybersecurity insights – Subscribe & turn on notifications! What Makes You Different Podcast: ...

1:24:59
Live API Hacking: Exploit JWT Vulnerabilities | AMA | Learning With A Hacker EP 5

449 views

Streamed 2w ago

NahamSec
I Earned $2M Hacking. Here's Everything I Know

LIKE and SUBSCRIBE with NOTIFICATIONS ON if you enjoyed the video! If you want to learn bug bounty hunting from me: ...

15:10
I Earned $2M Hacking. Here's Everything I Know

19,949 views

2w ago

AmrSec
Claude Code For Hackers

Claude Code is a terminal-native AI agent that reads your files, runs your commands, and controls your tools. But every tutorial ...

40:00
Claude Code For Hackers

11,303 views

2w ago

DeadOverflow
This Secret NEW Exploit Will Hack Your Computer

All demonstrations are intended solely for lawful, ethical, and defensive use. The creator assumes no liability for actions viewers ...

8:21
This Secret NEW Exploit Will Hack Your Computer

3,094 views

5d ago

Haxshadow
Live Hunting Google Gemini API Keys on Tesla, Airbnb, Netflix & More for Bug Bounties

Gemini API Keys Are Extremely Dangerous $2000+ Bounty Exposed! Google Gemini API Keys are NOT safe! In this video, I ...

9:03
Live Hunting Google Gemini API Keys on Tesla, Airbnb, Netflix & More for Bug Bounties

2,339 views

4d ago

Shield Spectrum
Python Hacking Tools for Beginners: Build AI-Like CLI Security Scripts (Ethical Hacking 2026)

Build your own AI-like Python hacking tools from scratch — no experience needed! In this beginner-friendly tutorial, learn how to ...

6:14
Python Hacking Tools for Beginners: Build AI-Like CLI Security Scripts (Ethical Hacking 2026)

561 views

5d ago

Shield Spectrum
Build Your Own AI Pentesting Assistant (Python + API) | Automate Nmap & Nuclei Analysis

In this video, you'll learn how to build your own AI-powered pentesting assistant using Python and API integration. We automate: ...

8:06
Build Your Own AI Pentesting Assistant (Python + API) | Automate Nmap & Nuclei Analysis

651 views

3w ago

ZeroDay Vault
From Zero to API Hacker 🚀 Best Free Resources You Need #api #hack

Want to learn API Pentesting but don’t know where to start? In this video, I’ll show you the best FREE API hacking resources ...

7:14
From Zero to API Hacker 🚀 Best Free Resources You Need #api #hack

289 views

3d ago

pasfort
Exploiting an API Endpoint Like a Hacker

In this video, I walk through how to exploit an API endpoint using exposed documentation in a PortSwigger Web Security ...

6:27
Exploiting an API Endpoint Like a Hacker

49 views

12d ago

Gamuchirai
Exploiting BOLA and Broken Authentication in DVRA API

BOLA happens when: The API does NOT properly check whether a user is allowed to access a specific object (like an order or ...

1:03:41
Exploiting BOLA and Broken Authentication in DVRA API

23 views

12d ago