ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

382 results

Cooper
Pwn2Own: Hacking IoT Devices - Adam

... competition where the companies publish a list of hardware devices you're allowed to hack them and if you do that successfully ...

3:57
Pwn2Own: Hacking IoT Devices - Adam

342 views

5 months ago

Alex Followell | AI Automation
Claude is Now an AI Hacker! (Using Shannon AI Pentester)

I turned Claude Code into a fully autonomous AI pentester using Shannon. Watch it clone my SaaS app, spin up Docker ...

24:04
Claude is Now an AI Hacker! (Using Shannon AI Pentester)

4,699 views

1 month ago

The Coding Gopher
99% of Developers Don't Get RPCs

Inquiries: thecodinggopher@gmail.com ‍ Learn to build Git, Docker, Redis, HTTP ...

9:20
99% of Developers Don't Get RPCs

102,401 views

11 months ago

Chris AI Systems
Skool Has No API or MCP… So I Made One

Skool's official API says it's suspended. But I needed Claude Code to manage my community. So I built the integration anyway.

9:43
Skool Has No API or MCP… So I Made One

64 views

2 months ago

The Coding Gopher
99% of Developers Don't Get Sockets

Get 40% OFF CodeCrafters: https://app.codecrafters.io/join?via=the-coding-gopher ⬆️ Best project-based coding platform.

12:05
99% of Developers Don't Get Sockets

521,432 views

11 months ago

Cooper
Incident Reporting Made Easy, Using Draugnet - Andras Klody

... self-report who they are but they don't have to So basically how it works is it's basically uh two separate applications an API and ...

3:49
Incident Reporting Made Easy, Using Draugnet - Andras Klody

48 views

5 months ago

DEFCONConference
DEF CON 33 - How API flaws led to admin access to 1k+ USA dealers & control of yr car - Eaton Zveare

Many automotive dealers in the USA utilize centralized platforms for everything from sales to service to marketing.

22:26
DEF CON 33 - How API flaws led to admin access to 1k+ USA dealers & control of yr car - Eaton Zveare

685 views

5 months ago

CNCF [Cloud Native Computing Foundation]
The Good, the Bad, and the Ugly: Hacking 3 Cloud Native AI Service... Hillai Ben-Sasson & Nir Ohfeld

Don't miss out! Join us at our next Flagship Conference: KubeCon + CloudNativeCon events in Amsterdam, The Netherlands ...

32:12
The Good, the Bad, and the Ugly: Hacking 3 Cloud Native AI Service... Hillai Ben-Sasson & Nir Ohfeld

85 views

4 months ago

DEFCONConference
DEF CON 33 - CTRAPS-CTAP Impersonation, API Confusion Attacks on FIDO2 - M Casagrande, D Antonioli

FIDO2 is the de-facto standard for passwordless and 2FA authentication. FIDO2 relies on the Client-to-Authenticator Protocol ...

37:25
DEF CON 33 - CTRAPS-CTAP Impersonation, API Confusion Attacks on FIDO2 - M Casagrande, D Antonioli

416 views

5 months ago

luRaichu
Shmoocon2024 DanNagle Hacking Network APIs

The videos in this collection are from ShmooCon 2024, which occurred on 12 - 14 January 2024, at the Washington Hilton Hotel.

16:41
Shmoocon2024 DanNagle Hacking Network APIs

4 views

6 months ago

Yashvir Blogger
The kid who Hacked Linus Tech Tips

SilverBullet, a legitimate web testing tool for developers, has grown wildly popular among hackers. Weaponizing open-source ...

1:38
The kid who Hacked Linus Tech Tips

355 views

4 months ago

Prem Basnet
Hacking the Cloud  Azure

Disclaimer !!! This video is only used for educational purpose.

8:05
Hacking the Cloud Azure

2 views

4 months ago

DEFCONConference
DEF CON 33 - Smart Bus Smart Hacking:  Free WiFi to Total Control  - Kai Ching Wang, Chiao-Lin Yu

Have you ever wondered how the On-Board Units (OBUs) in smart buses communicate and authenticate with Advanced Public ...

21:05
DEF CON 33 - Smart Bus Smart Hacking: Free WiFi to Total Control - Kai Ching Wang, Chiao-Lin Yu

703 views

5 months ago

WHY2025
WHY 2025 - Die Hardcoded: Unlocking Yealink's (weakest) secrets

https://media.ccc.de/v/why2025-45-die-hardcoded-unlocking-yealink-s-weakest-secrets During this talk we look at hardware and ...

33:11
WHY 2025 - Die Hardcoded: Unlocking Yealink's (weakest) secrets

1,023 views

7 months ago

Cooper
Hacking For Hoodies: MISP Edition - Jeroen Pinoy

... was that there's a lot of uh API keys and so on that you can configure in MISP to access external systems And a lot of these were ...

25:14
Hacking For Hoodies: MISP Edition - Jeroen Pinoy

84 views

5 months ago

Agrici Daniel
This Google AI Studio + n8n hack is INSANE! Build & Automate Any App (Tutorial)

The integration between Google AI Studio and n8n is absolutely INSANE! In this tutorial, I'll show you how connecting these two ...

31:31
This Google AI Studio + n8n hack is INSANE! Build & Automate Any App (Tutorial)

33,859 views

5 months ago

Zero Trust Lab
Recon-ng: The Framework Hackers Use to Stay Hidden

The Recon-ng Framework is described in the sources as a powerful, full-featured, and open-source web-based reconnaissance ...

6:13
Recon-ng: The Framework Hackers Use to Stay Hidden

13 views

1 month ago

Catalin Ionescu
North-South Solve Using a Lesser-Known Tor Trick - picoCTF 2026 - Web Exploitation

picoCTF 2026 capture the flag competition: North-South challenge in Web Exploitation category - full solve walk-through ...

3:37
North-South Solve Using a Lesser-Known Tor Trick - picoCTF 2026 - Web Exploitation

85 views

2 weeks ago

Techie Mist
This Axios Update Could Hack Your System | Developers Must Watch This😳

Axios JavaScript library recently faced a cyber attack where fake versions were uploaded to npm with hidden malware.

2:55
This Axios Update Could Hack Your System | Developers Must Watch This😳

70 views

6 days ago

VulnVibes
Severe XXE Vulnerability Discovered in WSO2 API Manager - CVE-2025-2905

A critical security flaw has been discovered in WSO2 API Manager version 2.0.0 and earlier, presenting a serious threat to ...

4:52
Severe XXE Vulnerability Discovered in WSO2 API Manager - CVE-2025-2905

73 views

11 months ago