Search results for #hackingsimplified
Day-10 Complete 9 challenges of Natas from @OverTheWireCTF and read some articles on recon and came across new youtube channel #Hackingsimplified good content #100DaysOfHacking #Hacking #Hackingtime #Hackingtools #ethicalhacking #ethicalhacker
I am looking out for 'hackers' for the show 'Hacker2Hacker'. Most of the people I ping don't seem to respond back or are outrightly un-interested 😅 Please reply with suggestions for people who would be willing to share their knowledge with the community 🙌 #hackingsimplified
That too at #HackingSimplified HQ ❤️✌🏻
That too at #HackingSimplified HQ ❤️✌🏻
New part in the 'Python for hacking' series. Here we continue with talking about : ➡ Git - Pushing code to version control ➡ Python Dictionaries - Using this to get unique domains youtu.be/6sRyXJtMrNs #python #hacking #hackingsimplified
Something is brewing up 😎😃🎉 Thanks @_nancychauhan for the neon lights 💡😃 #HackingSimplified #shodan #bugbounty
Live session about to start in 10 mins on youtube.com/watch?v=_zHzht… #hackingsimplified #cybersecurity #bugbounty
Live session about to start in 10 mins on youtube.com/watch?v=_zHzht… #hackingsimplified #cybersecurity #bugbounty
Sent invites to all those who had responded earlier 🙌 And had their DMs open 😛 See you at 9 PM tonight on youtube.com/c/HackingSimpl… #hackingSimplified #bugbounty #cybersecurity
Sent invites to all those who had responded earlier 🙌 And had their DMs open 😛 See you at 9 PM tonight on youtube.com/c/HackingSimpl… #hackingSimplified #bugbounty #cybersecurity
Hey a 12y old security bug in #Linux system utility, #Polkit that grants unprivileged users,root access youtu.be/jh9F4NZN1XY #bugbounty #hackingsimplified
Hey 👋 In this 'Explained' video,explore a 12y old security bug in #Linux system utility, #Polkit that grants unprivileged users,root access Outline : ➡About ➡Setuid bins ➡Technicals of the exploit ➡Exploit ➡Patched code youtu.be/jh9F4NZN1XY #bugbounty #hackingsimplified
Continuing with the GraphQL Exploitation series. In this part, we're setting up DVGA - Damn Vulnerable GraphQL Application and start with the reconnaissance phase. youtu.be/YA-mL9Z8SNI #GraphQL #hackingsimplified #hacking #bugbounty
Graphql - What, Why & How ? ➡ Problem solved by GraphQL ➡ Intro to GraphQL ➡ Comparison - REST & SOAP youtu.be/w0QOAacuPgQ #hackingsimplified #bugbountytips
new series = learning new #guru @AseemShrey #graphql #hackingsimplified
new series = learning new #guru @AseemShrey #graphql #hackingsimplified
With this new year, I started a new series on #GraphQL 📹 Graphql - What, Why & How ? ➡ Problem solved by GraphQL ➡ Intro to GraphQL ➡ Comparison - REST & SOAP ➡ GraphQL Adoption & Exploitability ➡ Further plans youtu.be/w0QOAacuPgQ #hackingsimplified #BugBounty
Last video of this year 📹 In this video, ➡ Explain recent bug in #log4j CVSS score of 10 ( highest ) ➡ Setup a vulnerable web app and exploit it ➡ What, Why & How of this bug #Log4Shell #hacking #hackingsimplified youtu.be/K2GInd94ucM
Hi Everyone The livestream is about to start in 10 mins : youtube.com/watch?v=mz_naz… We've our guest as @logicbomb_1, Security Engineer @Microsoft He'll be talking about his journey into infosec followed by viewers' questions Today :11 AM IST #cybersecurity #hackingsimplified
New video, after a long time 🚀 Another video in the 'Explained' series. youtu.be/NtNkv5GFzEU Will talk about : ➤ The spyware Pegasus ➤ Technical Capabilities ➤ How you can protect yourself from spywares Let me know your thoughts on this #pegasus #HackingSimplified
New Video Up 🙌 # Deeplink and Weak Host Validation In this part we're going to see how weak host validation would lead to opening an attacker controlled URL in the application's webview. youtu.be/VfyuZIvLX8Y #Android #hacking #hackingsimplified #bugbounty
Dissecting The Hack - $30,000 Instagram Hack ➤ What, Why, How - Instagram Hack ➤ How to start finding these ➤ Where to report them and get Paid - Profit !!! youtu.be/hCJLyxo3HKw Thanks @mayurfartade for the report #bugbounty #hacking #cybersecurity #hackingsimplified
Android Hacking | Deeplink Issues | What, Why & How ➤ What, Why, How of Deeplink ? ➤ Hacking Deeplinks - Insecure URL Validation ➤ Finding, exploiting and fixing them ➤ Demo #android #hacking #bugbounty #hackingsimplified 🧵👇