ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

794 results

NetworkChuck
the WORST hack of 2026

Axios, the most popular HTTP library with over 100 million weekly downloads, was just hijacked in one of the most sophisticated ...

11:00
the WORST hack of 2026

402,716 views

4 days ago

Low Level
this is the biggest hack of 2026

https://www.huntress.com/blog/supply-chain-compromise-axios-npm-package ...

9:57
this is the biggest hack of 2026

274,262 views

4 days ago

Fireship
Millions of JS devs just got penetrated by a RAT…

Mux is the best video API for developers. Get $50 in free credits - https://mux.com/fireship Yesterday, a precision-guided remote ...

4:59
Millions of JS devs just got penetrated by a RAT…

636,499 views

4 days ago

Medusa
This One Line Hacked NPM

Something felt off with a simple npm install… Turned out it was way bigger than it looked. Here's what really happened ...

7:28
This One Line Hacked NPM

1,119 views

2 days ago

Medusa
This XSS Somehow Turned Into Account Takeover!

A simple XSS vulnerability escalates far beyond expectations, eventually leading to full account takeover. This video breaks down ...

19:43
This XSS Somehow Turned Into Account Takeover!

2,544 views

6 days ago

NahamSec
I Earned $2M Hacking. Here's Everything I Know

LIKE and SUBSCRIBE with NOTIFICATIONS ON if you enjoyed the video! If you want to learn bug bounty hunting from me: ...

15:10
I Earned $2M Hacking. Here's Everything I Know

15,138 views

5 days ago

David Bombal
Google Big Sleep: The End of Human Hackers?

Big thank you to DeleteMe for sponsoring this video. Use my link http://jointdeleteme.com/Bombal to receive a 20% discount or ...

1:08:22
Google Big Sleep: The End of Human Hackers?

93,554 views

5 days ago

CodeOvation
NPM is BROKEN: Why I’m Deleting Axios Forever.

The recent Axios supply chain attack (March 31, 2026) has sent shockwaves through the dev world. But while everyone is ...

6:27
NPM is BROKEN: Why I’m Deleting Axios Forever.

188 views

2 days ago

AmrSec
Claude Code For Hackers

Claude Code is a terminal-native AI agent that reads your files, runs your commands, and controls your tools. But every tutorial ...

40:00
Claude Code For Hackers

5,259 views

3 days ago

Astra
Building Heuristic Detections in My Antivirus Engine — Ep. 3

In this video, we're continuing on the antivirus engine by adding heuristic and string based detections! Episode 3 of building an ...

9:57
Building Heuristic Detections in My Antivirus Engine — Ep. 3

5,706 views

2 days ago

Dr Josh Stroschein - The Cyber Yeti
02 - Identifying Signs of Runtime-Linking using CAPA and IDA Pro

In part 02 - we'll use CAPA to help identify signs if runtime linking and navigate to those locations in IDA Pro. We'll then discuss ...

8:11
02 - Identifying Signs of Runtime-Linking using CAPA and IDA Pro

444 views

3 days ago

MRE Security
Live API Hacking: Exploit JWT Vulnerabilities | AMA | Learning With A Hacker EP 3

Stay ahead of cybersecurity insights – Subscribe & turn on notifications! What Makes You Different Podcast: ...

1:24:59
Live API Hacking: Exploit JWT Vulnerabilities | AMA | Learning With A Hacker EP 3

334 views

Streamed 5 days ago

Hack the Clown
Stop grepping logs. Start using Kelora.

Stop scrolling endless logs by hand. In this video, I'll show you how to use Kelora to quickly spot suspicious entries like path ...

4:50
Stop grepping logs. Start using Kelora.

3,710 views

6 days ago

DeadOverflow
You Might Have a HACKED CPU and Not Even Know It

All demonstrations are intended solely for lawful, ethical, and defensive use. The creator assumes no liability for actions viewers ...

8:02
You Might Have a HACKED CPU and Not Even Know It

1,147 views

4 days ago

OkioFlix
Top 10 Most Common Hacking Techniques Explained (2026)

In this video, we break down the Top 10 Hacking Techniques of 2026. Whether you're an ethical hacker or just want to stay safe, ...

4:41
Top 10 Most Common Hacking Techniques Explained (2026)

1 view

4 days ago

DeadOverflow
How Hackers Hide Malicious Code in Plain Sight

All demonstrations are intended solely for lawful, ethical, and defensive use. The creator assumes no liability for actions viewers ...

9:21
How Hackers Hide Malicious Code in Plain Sight

501 views

1 day ago

Tyler Ramsbey - Hack Smarter
Hacking AWS: Data Secrets (Part 2) - Hack Smarter Labs

Hack Smarter: https://hacksmarter.org Realistic hacking labs & courses you can actually afford. ---- In this video, I fully compromise ...

19:44
Hacking AWS: Data Secrets (Part 2) - Hack Smarter Labs

292 views

5 days ago

HackNinja
CPython: command injection in webbrowser.open() API (CVE-2026-4519)

A short video explaining the security vulnerability command injection in webbrowser.open() API and the associated CVE ...

1:54
CPython: command injection in webbrowser.open() API (CVE-2026-4519)

41 views

5 days ago

Devoctal
They Hid Malware in a Package You Install Every Day…

On the night of March 30th, 2026 — while most developers were asleep — attackers quietly weaponized one of the most ...

4:18
They Hid Malware in a Package You Install Every Day…

725 views

3 days ago

pebble
Hacking HackSmarter Active Directory Network "DarkHaven"

Join HackTheBox! https://hacktheboxltd.sjv.io/jrMWo0 (Affiliate Link) Twitch https://www.twitch.tv/pebl3 Discord: ...

6:11:46
Hacking HackSmarter Active Directory Network "DarkHaven"

2,101 views

Streamed 6 days ago