ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

75,281 results

BePractical
I uncovered an interesting vulnerability in an AI application — Practical demonstration

I show how manipulating an AI chatbot helped me bypass input filters and uncover a stored XSS — demonstrated in a safe, ...

14:28
I uncovered an interesting vulnerability in an AI application — Practical demonstration

3,786 views

2 months ago

BePractical
From Simple Prompt to SSRF: Turning AI Instructions Into Real Attacks

From Prompt to SSRF: Turning AI Instructions Into Real Attacks In this video, we dive into one of the most overlooked risks in ...

9:42
From Simple Prompt to SSRF: Turning AI Instructions Into Real Attacks

2,831 views

1 month ago

BePractical
This AI Method Turns XSS Hunting Into Easy Mode | Practical Demonstration

Check out penligent here: https://penligent.ai/ inding Cross-Site Scripting (XSS) can feel confusing and time-consuming, ...

12:39
This AI Method Turns XSS Hunting Into Easy Mode | Practical Demonstration

4,283 views

12 days ago

BePractical
How I Bypassed A Complex File Upload Restriction In A Pentest! | Practical Demonstration

I bypassed a complex file‑upload restriction in a real application and turned it into a working PoC — step‑by‑step. Watch the exact ...

10:16
How I Bypassed A Complex File Upload Restriction In A Pentest! | Practical Demonstration

5,970 views

3 months ago

BePractical
Bug Bounty: Best Way To Find XSS & Bypass WAF | Live Demonstration | 2024

Welcome to our latest tutorial where we dive deep into the world of cybersecurity! In this video, you'll learn how to identify ...

15:52
Bug Bounty: Best Way To Find XSS & Bypass WAF | Live Demonstration | 2024

54,350 views

1 year ago

BePractical
Can XSS Ever Be Stopped? How Devs Secure It, How Hackers Break It | 34K Special | 2025

SafeLine Link: https://ly.safepoint.cloud/P6mLiSe Product Keys: 8013d1e8-e500-4b21-ba8a-8c31f10190b1 ...

19:40
Can XSS Ever Be Stopped? How Devs Secure It, How Hackers Break It | 34K Special | 2025

3,486 views

3 months ago

BePractical
4 Ways To Use SQLMAP Effectively For  SQL Injection! | Bug Bounty | 2024

Join me in this exciting video as we explore four powerful ways to use SQLmap for SQL injection. Whether you're a beginner or a ...

12:30
4 Ways To Use SQLMAP Effectively For SQL Injection! | Bug Bounty | 2024

27,882 views

1 year ago

BePractical
Bug Bounty: How Developers Implement 403 & How To Bypass Them? | 2024

Note: This video is only for educational purpose. Welcome to our latest video on cyber security for beginners! In this tutorial, we ...

12:32
Bug Bounty: How Developers Implement 403 & How To Bypass Them? | 2024

23,478 views

1 year ago

BePractical
Testing XSS Tools On Target Protected By WAF | 2024

In this video, we dive into the world of web application security by testing various XSS tools on a target protected by a Web ...

16:20
Testing XSS Tools On Target Protected By WAF | 2024

19,577 views

1 year ago

BePractical
Bug Bounty Hunters: The JWT Mistake You’re Probably Missing | Practical Demonstration | 2025

If you're hunting bugs and not checking for this JWT misconfiguration… you might be leaving money on the table. In this video, I ...

14:18
Bug Bounty Hunters: The JWT Mistake You’re Probably Missing | Practical Demonstration | 2025

6,316 views

6 months ago

BePractical
BUG BOUNTY: UNDERSTANDING LOCAL FILE INCLUSION(LFI) #1 | DEMONSTRATION | 2023

Note: This video is only for educational purpose. Hi everyone! This video demonstrates the process of finding local file inclusion ...

17:18
BUG BOUNTY: UNDERSTANDING LOCAL FILE INCLUSION(LFI) #1 | DEMONSTRATION | 2023

15,888 views

2 years ago

BePractical
The Hidden Attack Surface of nginx — Recon Techniques That Win Bounties | 2025

Too many bug hunters scroll past sites that show “Welcome to nginx” — assuming there's nothing interesting underneath.

13:03
The Hidden Attack Surface of nginx — Recon Techniques That Win Bounties | 2025

6,394 views

3 months ago

BePractical
Account Takeover Lab#4 | BePractical

Hi everyone, In this video I have shown you the walk-through of lab 3.Check out the lab here: https://bepractical.tech/lab_4 Lab 3: ...

8:50
Account Takeover Lab#4 | BePractical

1,257 views

3 years ago

BePractical
Chaining Vulnerabilities: Reflected XSS + CORS = More Impact!! | Live Demonstration | 2024

In this video, I'll walk you through how to chain reflected XSS with CORS misconfigurations to amplify the overall impact of your ...

13:04
Chaining Vulnerabilities: Reflected XSS + CORS = More Impact!! | Live Demonstration | 2024

7,410 views

1 year ago

BePractical
Here's How You Can Bypass Host Header Injection Protection In Modern Web App | 2025

In this video, I dive deep into Host Header Injection, a vulnerability that often goes unnoticed in modern web applications.

9:53
Here's How You Can Bypass Host Header Injection Protection In Modern Web App | 2025

13,431 views

11 months ago

BePractical
This Vulnerability Lets You Overwrite Anything the Server Can Touch — Instantly | Bug Bounty | 2025

In this video, I demonstrate how a simple ZIP file upload can lead to something far more dangerous — arbitrary file overwrite on ...

13:15
This Vulnerability Lets You Overwrite Anything the Server Can Touch — Instantly | Bug Bounty | 2025

3,577 views

5 months ago

BePractical
The Hidden CSRF Vulnerability: Why Testing Every Endpoint Matters! (A Must-Watch Lesson) | 2024

In this eye-opening video, we dive into the world of cybersecurity and uncover a surprising CSRF vulnerability that allowed me to ...

12:59
The Hidden CSRF Vulnerability: Why Testing Every Endpoint Matters! (A Must-Watch Lesson) | 2024

6,398 views

1 year ago

BePractical
Account Takeover #Lab-3 | BePractical

Hi everyone, In this video i have shown you the walk-through of lab 3.Check out the lab here: https://bepractical.tech/lab_3 Lab 2: ...

6:04
Account Takeover #Lab-3 | BePractical

1,860 views

3 years ago

BePractical
WHAT CROSS SITE SCRIPTING IS? | ZERO TO HERO | BEPRACTICAL

Learn about what cross site scripting is over here: https://bepractical.tech/bitbbrowser-in-the-browser-attack-tutorial/ Hi everyone!

5:12
WHAT CROSS SITE SCRIPTING IS? | ZERO TO HERO | BEPRACTICAL

2,771 views

3 years ago

BePractical
Account Takeover #Lab-1 | BePractical

Hi everyone, In this video i have shown you the walk-through of lab 1. Check out the lab here: ...

4:03
Account Takeover #Lab-1 | BePractical

4,353 views

3 years ago