ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

86 results

David Bombal
Zero-Click n8n Takeover via Webhooks

Security researchers Dor Attias and Ofek Itach demonstrate a critical CVSS 10.0 n8n vulnerability (CVE-2026-21858). Watch the ...

34:06
Zero-Click n8n Takeover via Webhooks

164,502 views

6 days ago

WireDogSec
React2Shell RCE | CVE‑2025‑55182 Walkthrough | TryHackMe

Known as React2Shell, this flaw affects React Server Components (RSC) and allows unauthenticated remote code execution ...

27:54
React2Shell RCE | CVE‑2025‑55182 Walkthrough | TryHackMe

40 views

6 days ago

Hacker Valley Media
The Day AI Stopped Asking for Permission with Marcus J. Carey

AI didn't quietly evolve, it crossed the line from recommendation to execution. Once agents stopped advising humans and started ...

33:50
The Day AI Stopped Asking for Permission with Marcus J. Carey

1,667 views

5 days ago

PDQ
🔴R.I.P. MDT  - Now what?

Microsoft just announced they're retiring MDT effective immediately. Yep, it's done. Finished. Over. No victory lap, no gold watch…

31:46
🔴R.I.P. MDT - Now what?

603 views

Streamed 5 days ago

Patch My PC
Patch Tuesday January 2026: CVEs, Chaos, and Why SharePoint Still Hurts | PTSG

... Years 03:09 Azure Cognitive Services & AI CVE 03:30 SharePoint Remote Code Execution (RCEs) 04:52 Exchange & On-Prem ...

1:02:34
Patch Tuesday January 2026: CVEs, Chaos, and Why SharePoint Still Hurts | PTSG

187 views

4 days ago

CVUTFEL
dr. S. García: Introduction to Security (B4M36BSY) – 03 [9. 10. 2025, ZS 25/26]

Introduction to Security – Lesson 3: Getting access to a computer, Software vulnerabilities, Protocol weaknesses, Social ...

2:57:21
dr. S. García: Introduction to Security (B4M36BSY) – 03 [9. 10. 2025, ZS 25/26]

743 views

4 days ago

Keith AI
Master OpenCode in 28 minutes

Most AI coding tools limit you to one task, one terminal, one conversation at a time. After using Cursor, Claude Code, and every ...

28:24
Master OpenCode in 28 minutes

16 views

1 hour ago

censoredHacker
📂Port swigger Web academy File upload vulnerability🔥

In this video, we explore File Inclusion vulnerabilities using hands-on labs from the PortSwigger Web Security Academy. You'll ...

1:51:23
📂Port swigger Web academy File upload vulnerability🔥

90 views

Streamed 7 days ago

THEGEN3TIC
ASP.NET ViewState: How Leaked machineKeys Lead to RCE (Full Lab Guide)

Full tutorial on ASP.NET ViewState deserialization attacks - Learn how a simple configuration mistake can lead to complete server ...

21:08
ASP.NET ViewState: How Leaked machineKeys Lead to RCE (Full Lab Guide)

143 views

5 days ago

ExcelR
SDP on Cyber Security - Day 5
2:08:30
SDP on Cyber Security - Day 5

953 views

Streamed 1 day ago

Junhua's Cyber Lab
TryHackMe Plotted-EMR(Free Room):  Cron Wildcard Injection & Privilege Escalation with Capabilities

This allows us to exploit a known OpenEMR 5.0.1 Remote Code Execution (RCE) vulnerability using Searchsploit, ultimately ...

55:22
TryHackMe Plotted-EMR(Free Room): Cron Wildcard Injection & Privilege Escalation with Capabilities

19 views

2 days ago

AxisOfEasy
Claude AI Just Had a MAJOR Leak - New Risks Explained

This week's easyDNS #AxisOfEasy briefing is packed with some of the biggest cyber, privacy, and infrastructure stories you ...

44:20
Claude AI Just Had a MAJOR Leak - New Risks Explained

30 views

4 days ago

censoredHacker
📂 PortSwigger: File Inclusion Vulnerabilities | LFI & RFI Explained 🔓

In this video, we explore File Inclusion vulnerabilities using hands-on labs from the PortSwigger Web Security Academy. You'll ...

1:57:09
📂 PortSwigger: File Inclusion Vulnerabilities | LFI & RFI Explained 🔓

74 views

Streamed 6 days ago

Risky Business Media
Risky Business Weekly (820): Asian fraud kingpin will face Chinese justice (pew pew!)

... Recorded Future News https://therecord.media/chinese-attackers-zero-day Ni8mare - Unauthenticated Remote Code Execution ...

58:57
Risky Business Weekly (820): Asian fraud kingpin will face Chinese justice (pew pew!)

650 views

7 days ago

Ray Fernando
The Minimal Config That Actually Works In 2026

I've been using Cursor 2.3 almost exclusively for months. Then a Discord member showed me what Claude Code can do now ...

3:03:38
The Minimal Config That Actually Works In 2026

4,854 views

Streamed 5 days ago

Joyland-Animation
🔔【New】【Multi Sub】Weird currency EP1-144#anime #animation

anime #animation #donghua #動漫#二次元#new anime If you want to watch exciting, exciting and passionate anime, come to ...

11:19:18
🔔【New】【Multi Sub】Weird currency EP1-144#anime #animation

2,608 views

3 days ago

censoredHacker
📂Port swigger Web academy File upload vulnerability🔥

In this video, we explore File Inclusion vulnerabilities using hands-on labs from the PortSwigger Web Security Academy. You'll ...

1:51:23
📂Port swigger Web academy File upload vulnerability🔥

7 views

2 days ago

censoredHacker
📂 PortSwigger  File Inclusion Vulnerabilities   LFI & RFI Explained 🔓

In this video, we explore File Inclusion vulnerabilities using hands-on labs from the PortSwigger Web Security Academy. You'll ...

1:57:09
📂 PortSwigger File Inclusion Vulnerabilities LFI & RFI Explained 🔓

6 views

2 days ago

Acosta E.T.F
Using For Loops In Simple Bash Scripts!

In this video, we build on the last lesson and take our Bash scripting skills to the next level by adding loops to automate work ...

47:34
Using For Loops In Simple Bash Scripts!

44 views

2 days ago

censoredHacker
📂 TryHackMe File Inclusion Vulnerabilities Part 3/3 🔥

In this video, we explore the TryHackMe File Inclusion Vulnerabilities room, where we learn how Local File Inclusion (LFI) and ...

1:34:44
📂 TryHackMe File Inclusion Vulnerabilities Part 3/3 🔥

42 views

Streamed 3 days ago