ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

145 results

SoBatistaCyber
Hacking OWASP Juice Shop: DOM XSS + IDOR/BOLA Walkthrough

X: https://twitter.com/SoBatistaCyber Instagram: https://www.instagram.com/sobatistacyber/ Medium: ...

11:06
Hacking OWASP Juice Shop: DOM XSS + IDOR/BOLA Walkthrough

463 views

6 days ago

TrustMeImRoot
The Curse of Reflected XSS

Reflected XSS may look like a “low severity” bug… until it takes over the CEO's account. In this video, I break down how a simple ...

3:54
The Curse of Reflected XSS

33 views

7 days ago

BugBite Security
OWASP Top 10 Explained | Web Security Basics for Beginners 🔐

OWASP Top 10 Explained (Beginner Friendly)** In this video, we break down the **OWASP Top 10 vulnerabilities** every ...

3:00
OWASP Top 10 Explained | Web Security Basics for Beginners 🔐

22 views

7 days ago

Forensic Academy
JS Injection Training Live Class 3 | Real-Time XSS Attack Lab | FORENSIC ACADEMY

JSInjection #XSS #WebSecurity #EthicalHacking #CyberSecurity #BugBounty #ForensicAcademy #OWASP #HackingTutorial ...

28:51
JS Injection Training Live Class 3 | Real-Time XSS Attack Lab | FORENSIC ACADEMY

141 views

5 days ago

Forensic Academy
JS Injection Training Live Class 2 | Real-Time XSS Attack Lab | FORENSIC ACADEMY #owasptop10

JSInjection #XSS #WebSecurity #EthicalHacking #CyberSecurity #BugBounty #ForensicAcademy #OWASP #HackingTutorial ...

18:24
JS Injection Training Live Class 2 | Real-Time XSS Attack Lab | FORENSIC ACADEMY #owasptop10

24 views

7 days ago

Linux Matrix
DOM XSS PortSwigger Lab | Step-by-Step Solution & Explanation

In this video, we dive into DOM-Based Cross-Site Scripting (DOM XSS) by solving a real lab from PortSwigger step by step.

4:11
DOM XSS PortSwigger Lab | Step-by-Step Solution & Explanation

9 views

5 days ago

Khan Sploit
How Hackers Find DOM XSS 💀 | Live Demo + Payloads | Bug Bounty Tutorial

In this video, we dive deep into DOM-Based #xss (Cross-Site Scripting) using a real-world vulnerable lab. This is a complete ...

50:46
How Hackers Find DOM XSS 💀 | Live Demo + Payloads | Bug Bounty Tutorial

23 views

7 days ago

Cyber Haztech
Cross Site Scripting (XSS) Attack Explained 🔥 | How Hackers Steal Data

... https://www.linkedin.com/in/aman-gautam-/ GitHub :- https://github.com/AmanGtm92 xss attack, cross site scripting, xss tutorial, ...

11:17
Cross Site Scripting (XSS) Attack Explained 🔥 | How Hackers Steal Data

582 views

4 days ago

mahmoud tohamey (dragon)
Reflected XSS into HTML context with nothing encoded
3:28
Reflected XSS into HTML context with nothing encoded

5 views

6 days ago

The XSS Rat
Exploiting XSS Via Markdown - Medium Reading

Article: https://medium.com/taptuit/exploiting-xss-via-markdown-72a61e774bf8 Discount: ...

10:59
Exploiting XSS Via Markdown - Medium Reading

302 views

5 days ago

Junhua's Cyber Lab
DVWA Complete Tutorials 2026 (Damn Vulnerable Web Application): CSP Bypass  Module | High

cybersecurity #pentesting #bugbounty In this video, we demonstrate how to bypass a strict Content Security Policy (CSP) in ...

13:04
DVWA Complete Tutorials 2026 (Damn Vulnerable Web Application): CSP Bypass Module | High

51 views

5 days ago

Forensic Academy
JS Injection Training Live Class 4 | Real-Time XSS Attack Lab | FORENSIC ACADEMY #jsinjection

JSInjection #XSS #WebSecurity #EthicalHacking #CyberSecurity #BugBounty #ForensicAcademy #OWASP #HackingTutorial ...

21:53
JS Injection Training Live Class 4 | Real-Time XSS Attack Lab | FORENSIC ACADEMY #jsinjection

36 views

3 days ago

Deltaware Solution
Day1 -XSS
47:01
Day1 -XSS

23 views

1 day ago

Career in Cyber Security
6. Cross Site Scripting (XSS) Attack Impact

cybersecurity #penetrationtesting #vapt #wapt #careerincybersecurity cyber security.

10:54
6. Cross Site Scripting (XSS) Attack Impact

17 views

5 days ago

APEX ACADEMY
Vulnerability Assessment, Exploitation And Post Exploitation

computerscience #computereducation #cybersecurity #vulnerability #exploitation #apexacademy.

13:37
Vulnerability Assessment, Exploitation And Post Exploitation

3 views

5 days ago

Career in Cyber Security
5. Cross Site Scripting (XSS)

cybersecurity #vapt #wapt.

12:59
5. Cross Site Scripting (XSS)

47 views

5 days ago

ZeroTrace
How to Setup and Use Grabify: A Step-by-Step Guide | 2026

In this video, I'll show you how to set up and use Grabify, a popular tool for creating short URLs that can help you track clicks and ...

5:59
How to Setup and Use Grabify: A Step-by-Step Guide | 2026

55 views

6 days ago

Junhua's Cyber Lab
DVWA Complete Tutorials 2026 (Damn Vulnerable Web Application): CSP Bypass  Module | Medium

cybersecurity #pentesting #ethicalhacking In this video, we demonstrate how to bypass Content Security Policy (CSP) in DVWA at ...

7:30
DVWA Complete Tutorials 2026 (Damn Vulnerable Web Application): CSP Bypass Module | Medium

71 views

5 days ago

Linux Matrix
DOM XSS in innerHTML sink using source location.search

In this video, we solve a PortSwigger Web Security Academy lab on **DOM-based XSS in an innerHTML sink using source ...

3:45
DOM XSS in innerHTML sink using source location.search

5 views

4 days ago

Hack BY Afnan
how to become a bug bounty hunter | Hack BY afnan

ethicalhacking #ethicalhackingcourse A bug bounty program is a legal, crowdsourced security initiative where organizations ...

2:55
how to become a bug bounty hunter | Hack BY afnan

5 views

4 days ago