35 тысяч подписчиков
516 видео
Practical Web Application Security - Part 9 - CSRF Defenses [Hacksplaining]
How to Build a Port Scanner in Scapy - Python Penetration Testing [Part 3]
Top 3 Books to Learn Python Penetration Testing (2019)
Learning to Code with Programming Hub - My Thoughts
Voice Search with Tkinter and Python - 3 - Using a Custom Style
Intermediate Python - Building Applications with Tkinter - Part 7
The Best Coding Languages for Hackers - [On Python, Golang, Bash]
Live! Cyber + AI - OpenAI Codex Translating Code from Python to Golang - #23
How to Attack Open Ports for SSH, Telnet, HTTPs - Practical Pentesting
DerpNStink CTF - Getting Inside the Server [Part 1]
Live! Practical Pentesting - Web Server Recon
Bob Vulnhub Walkthrough - Getting Inside - [Part 1]
Voice Search with Tkinter and Python - 2 - Installing Speech Recognition
Real World Application Security - How to Test with OWASP [Input Validation I]
Burp Suite - Part 8 - Repeater I
The Ugly Truth about Bug Bounty Hunting
Practical Pentesting - How I Modify and Fire a Python RCE Exploit - AttackDefense Labs
How to Easily Bypass Basic Web Authentication - Realistic Pentesting
Ultimate GraphQL Recon - A Tactical Approach
Burp Suite - Part 18 - Sequencer
How I Hack or Pentest Mobile Apps [feat
Recon in Cybersecurity #4 - How to Approach Recon - Manual vs. Automated
Google Bard vs. GPT4 - Hands-On First Look [Cybersecurity]
You Can’t Hack Them All - Master of One - From Noob to Clients
Recon in Cybersecurity #13 - A Primer on Reporting - Don't Sabotage Yourself
Recon in Cybersecurity #11 - The Never Ending JS Files
Burp Suite - Part 19 - Extender and BApp Store
How to Find Unique Subdomains Faster
Recon in Cybersecurity #5 - The Importance of Coding in Recon
How to Speed Up Python Learning as a Beginner
How to Build a Port Scanner in Scapy - Python Penetration Testing [Part 1]
SQL Injection - Part 1 - Jr. Penetration Tester [Learning Path]
How to Use Gobuster in Penetration Testing - A Quick Tutorial
Authentication Bypass - Jr. Penetration Tester [Learning Path]
The Best Laptop for Hacking - Do you Really Need One?
Python for Pentesters I - Python Basics - Intro
Top Python Libraries for Penetration Testing and Cybersecurity
Recon in Cybersecurity #8 - Directory Bruteforcing - Attack from Multiple Fronts
Paid to Hack - Salaries in Cybersecurity
Recon in Cybersecurity #14 - Recon is a Door Opener, Not a Goal
Recon in Cybersecurity #12 - Digging into The Past with WaybackMachine
Burp Suite - Part 15 - Intruder VI
Burp Suite - Part 6 - Advanced Scoping
The Most Common Vulns I Find in Pentests [feat.
Burp Suite - Part 16 - Decoder I
Recon in Cybersecurity #9 - Buckets, Dorks, Github, and Shodan Research
My Favorite Tool for Web App Security
Bug Insider GPT - Turn Any Bug Bounty Report into PRO Tips
How to Detect & Bypass Detection of ChatGPT and GPT3 Generated Text
Insights from my 55 Appsec Assessments and Pentests in 2022
How Long does it Take to be Expert in Python