ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

3,171 results

NetworkChuck
the WORST hack of 2026

Axios, the most popular HTTP library with over 100 million weekly downloads, was just hijacked in one of the most sophisticated ...

11:00
the WORST hack of 2026

388,530 views

3 days ago

The Network Knight🐉
API HACKING 101: The 10-Step Attack Framework (REST & GraphQL)  The Playbook

APIs ARE THE NEW FRONTIER FOR ATTACKERS. ⚠️ Traditional firewalls and WAFs are failing. In this video, we break down ...

6:39
API HACKING 101: The 10-Step Attack Framework (REST & GraphQL) The Playbook

13 views

3 weeks ago

Low Level
this is the biggest hack of 2026

https://www.huntress.com/blog/supply-chain-compromise-axios-npm-package ...

9:57
this is the biggest hack of 2026

271,718 views

3 days ago

NahamSec
I Earned $2M Hacking. Here's Everything I Know

LIKE and SUBSCRIBE with NOTIFICATIONS ON if you enjoyed the video! If you want to learn bug bounty hunting from me: ...

15:10
I Earned $2M Hacking. Here's Everything I Know

14,498 views

4 days ago

CyberFlow
Hacking Android Apps (Full Guide)

Join The Family: ‍ https://cyberflow-academy.framer.website/ Check Out The Courses We Offer: ...

8:02
Hacking Android Apps (Full Guide)

8,665 views

7 days ago

David Bombal
How to hack IP Cameras (Ethically) and learn IoT hacking

Are your smart home devices spying on you? In this video, David Bombal interviews cybersecurity researcher and IoT penetration ...

42:28
How to hack IP Cameras (Ethically) and learn IoT hacking

352,704 views

4 weeks ago

Dr Josh Stroschein - The Cyber Yeti
02 - Exploring the Reverse Shell Source Code and API Breakdown

Join us as we dive into the reverse shell's source code! This video breaks down the C program from Video 01, spotlighting how ...

18:11
02 - Exploring the Reverse Shell Source Code and API Breakdown

682 views

2 weeks ago

MRE Security
Live API Hacking: Exploit JWT Vulnerabilities | AMA | Learning With A Hacker EP 3

Stay ahead of cybersecurity insights – Subscribe & turn on notifications! What Makes You Different Podcast: ...

1:24:59
Live API Hacking: Exploit JWT Vulnerabilities | AMA | Learning With A Hacker EP 3

328 views

Streamed 4 days ago

David Bombal
Google Big Sleep: The End of Human Hackers?

Big thank you to DeleteMe for sponsoring this video. Use my link http://jointdeleteme.com/Bombal to receive a 20% discount or ...

1:08:22
Google Big Sleep: The End of Human Hackers?

76,733 views

4 days ago

MRE Security
Live API Hacking: Exploit Unauthenticated Vulnerabilities | AMA | Learning With A Hacker EP 3

Stay ahead of cybersecurity insights – Subscribe & turn on notifications! What Makes You Different Podcast: ...

1:33:00
Live API Hacking: Exploit Unauthenticated Vulnerabilities | AMA | Learning With A Hacker EP 3

1,682 views

Streamed 9 days ago

NahamSec
BECOMING AN AI HACKER (Episode 01)

LIKE and SUBSCRIBE with NOTIFICATIONS ON if you enjoyed the video! If you want to learn bug bounty hunting from me: ...

17:58
BECOMING AN AI HACKER (Episode 01)

13,271 views

2 weeks ago

Async Codex
The Token Bucket Algorithm: Defending Your API from Hackers

Remember yesterday on Day 16 when we built a massive, scalable cache using Consistent Hashing? That was awesome.

7:11
The Token Bucket Algorithm: Defending Your API from Hackers

18 views

4 weeks ago

HackersArsenal
Programming For Hacker's (VERY SPECIFIC)

Music: massobeats - ruby https://www.youtube.com/watch?v=fpuogvBgPYg Hacking isn't just about tools… It's about how fast you ...

8:04
Programming For Hacker's (VERY SPECIFIC)

14,870 views

13 days ago

Medusa
This Is How Hackers Own Any MCP Server!

MCP servers are connecting AI assistants to your most sensitive tools, but there's a critical security flaw that most people don't ...

25:14
This Is How Hackers Own Any MCP Server!

3,476 views

2 weeks ago

Tyler Ramsbey - Hack Smarter
Hacking AWS: Data Secrets (Part 1) - Hack Smarter Labs

Hack Smarter: https://hacksmarter.org Realistic hacking labs & courses you can actually afford. ---- In this video, I begin working ...

33:23
Hacking AWS: Data Secrets (Part 1) - Hack Smarter Labs

1,118 views

6 days ago

Shield Spectrum
Build Your Own AI Pentesting Assistant (Python + API) | Automate Nmap & Nuclei Analysis

In this video, you'll learn how to build your own AI-powered pentesting assistant using Python and API integration. We automate: ...

8:06
Build Your Own AI Pentesting Assistant (Python + API) | Automate Nmap & Nuclei Analysis

451 views

8 days ago

pebble
Hacking HTB Principal and HackSmarter 404Bank

Join HackTheBox! https://hacktheboxltd.sjv.io/jrMWo0 (Affiliate Link) Twitch https://www.twitch.tv/pebl3 Discord: ...

3:44:03
Hacking HTB Principal and HackSmarter 404Bank

1,709 views

Streamed 2 weeks ago

For Bug Hunters
(3)How Hackers Find API Keys, Hidden Parameters & Open Ports | Bug Bounty Recon

In this video I demonstrate how security researchers and bug bounty hunters discover API keys, hidden parameters and open ...

16:03
(3)How Hackers Find API Keys, Hidden Parameters & Open Ports | Bug Bounty Recon

1,102 views

3 weeks ago

Medusa
How Hackers Abuse the Like Button

Disclaimer: This content is for educational purposes only. The testing shown in this video was performed on a deliberately ...

7:48
How Hackers Abuse the Like Button

2,318 views

3 weeks ago

MRE Security
Live API Hacking: OpenVault Bank | AMA | Learning With A Hacker EP 2

Stay ahead of cybersecurity insights – Subscribe & turn on notifications! What Makes You Different Podcast: ...

1:25:25
Live API Hacking: OpenVault Bank | AMA | Learning With A Hacker EP 2

669 views

Streamed 2 weeks ago