ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

2,899 results

NetworkChuck
the WORST hack of 2026

Axios, the most popular HTTP library with over 100 million weekly downloads, was just hijacked in one of the most sophisticated ...

11:00
the WORST hack of 2026

408,547 views

5 days ago

DeadOverflow
Why Hackers Love postMessage()

All demonstrations are intended solely for lawful, ethical, and defensive use. The creator assumes no liability for actions viewers ...

8:51
Why Hackers Love postMessage()

88 views

1 hour ago

Fireship
Millions of JS devs just got penetrated by a RAT…

Mux is the best video API for developers. Get $50 in free credits - https://mux.com/fireship Yesterday, a precision-guided remote ...

4:59
Millions of JS devs just got penetrated by a RAT…

639,770 views

4 days ago

Low Level
this is the biggest hack of 2026

https://www.huntress.com/blog/supply-chain-compromise-axios-npm-package ...

9:57
this is the biggest hack of 2026

275,175 views

4 days ago

Medusa
This One Line Hacked NPM

Something felt off with a simple npm install… Turned out it was way bigger than it looked. Here's what really happened ...

7:28
This One Line Hacked NPM

1,175 views

2 days ago

MRE Security
Live API Hacking: Exploit JWT Vulnerabilities | AMA | Learning With A Hacker EP 3

Stay ahead of cybersecurity insights – Subscribe & turn on notifications! What Makes You Different Podcast: ...

1:24:59
Live API Hacking: Exploit JWT Vulnerabilities | AMA | Learning With A Hacker EP 3

339 views

Streamed 5 days ago

Medusa
Automating Web Cache Deception for Bug Bounties!

In this video, I'm using WCVS (Web Cache Vulnerability Scanner) to automatically detect Web Cache Deception bugs for Bug ...

20:45
Automating Web Cache Deception for Bug Bounties!

2,946 views

2 weeks ago

The Network Knight🐉
API HACKING 101: The 10-Step Attack Framework (REST & GraphQL)  The Playbook

APIs ARE THE NEW FRONTIER FOR ATTACKERS. ⚠️ Traditional firewalls and WAFs are failing. In this video, we break down ...

6:39
API HACKING 101: The 10-Step Attack Framework (REST & GraphQL) The Playbook

14 views

3 weeks ago

NahamSec
I Earned $2M Hacking. Here's Everything I Know

LIKE and SUBSCRIBE with NOTIFICATIONS ON if you enjoyed the video! If you want to learn bug bounty hunting from me: ...

15:10
I Earned $2M Hacking. Here's Everything I Know

15,524 views

6 days ago

CyberFlow
Hacking Android Apps (Full Guide)

Join The Family: ‍ https://cyberflow-academy.framer.website/ Check Out The Courses We Offer: ...

8:02
Hacking Android Apps (Full Guide)

9,041 views

9 days ago

David Bombal
Google Big Sleep: The End of Human Hackers?

Big thank you to DeleteMe for sponsoring this video. Use my link http://jointdeleteme.com/Bombal to receive a 20% discount or ...

1:08:22
Google Big Sleep: The End of Human Hackers?

112,249 views

6 days ago

Dr Josh Stroschein - The Cyber Yeti
02 - Exploring the Reverse Shell Source Code and API Breakdown

Join us as we dive into the reverse shell's source code! This video breaks down the C program from Video 01, spotlighting how ...

18:11
02 - Exploring the Reverse Shell Source Code and API Breakdown

685 views

2 weeks ago

MRE Security
Live API Hacking: Exploit Unauthenticated Vulnerabilities | AMA | Learning With A Hacker EP 3

Stay ahead of cybersecurity insights – Subscribe & turn on notifications! What Makes You Different Podcast: ...

1:33:00
Live API Hacking: Exploit Unauthenticated Vulnerabilities | AMA | Learning With A Hacker EP 3

1,692 views

Streamed 10 days ago

David Bombal
How to hack IP Cameras (Ethically) and learn IoT hacking

Are your smart home devices spying on you? In this video, David Bombal interviews cybersecurity researcher and IoT penetration ...

42:28
How to hack IP Cameras (Ethically) and learn IoT hacking

353,094 views

4 weeks ago

Fireship
Anthropic just released the real Claude Bot...

Try SerpApi for free to get real-time search data from a single API - https://serpapi.com/?utm_source=fireship Anthropic just ...

5:00
Anthropic just released the real Claude Bot...

1,006,637 views

9 days ago

Cyber Truth
How LiteLLM Hack Exposed Thousands of API Keys 2026

How LiteLLM Hack Exposed Thousands of API Supply ChainAttack Is your AI infrastructure compromised? In March 2026, a ...

1:37
How LiteLLM Hack Exposed Thousands of API Keys 2026

10 views

3 days ago

Async Codex
The Token Bucket Algorithm: Defending Your API from Hackers

Remember yesterday on Day 16 when we built a massive, scalable cache using Consistent Hashing? That was awesome.

7:11
The Token Bucket Algorithm: Defending Your API from Hackers

18 views

1 month ago

AmrSec
Claude Code For Hackers

Claude Code is a terminal-native AI agent that reads your files, runs your commands, and controls your tools. But every tutorial ...

40:00
Claude Code For Hackers

5,600 views

4 days ago

For Bug Hunters
(3)How Hackers Find API Keys, Hidden Parameters & Open Ports | Bug Bounty Recon

In this video I demonstrate how security researchers and bug bounty hunters discover API keys, hidden parameters and open ...

16:03
(3)How Hackers Find API Keys, Hidden Parameters & Open Ports | Bug Bounty Recon

1,122 views

4 weeks ago

Shield Spectrum
Build Your Own AI Pentesting Assistant (Python + API) | Automate Nmap & Nuclei Analysis

In this video, you'll learn how to build your own AI-powered pentesting assistant using Python and API integration. We automate: ...

8:06
Build Your Own AI Pentesting Assistant (Python + API) | Automate Nmap & Nuclei Analysis

487 views

10 days ago