ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

523 results

GhostStrats
Building a Budget-Friendly Private Cybersecurity Laptop Step by Step!

In this video, I take you on a trip to Walmart to find the perfect budget-friendly laptop for your cybersecurity and privacy needs.

7:59
Building a Budget-Friendly Private Cybersecurity Laptop Step by Step!

68,074 views

9 months ago

GhostStrats
Build a Tails Linux Wallet Drive – Boot Any Computer & Protect Your Privacy (Cheap & Easy DIY!)

This is a safety and awareness demo done only on hardware I own. I am not showing how to break into other people's computers.

5:10
Build a Tails Linux Wallet Drive – Boot Any Computer & Protect Your Privacy (Cheap & Easy DIY!)

12,289 views

2 months ago

Pat's Cyber Chronicles
Linux isn’t as secure as you think

In this video I rant about why Linux isn't as secure as you think.

9:54
Linux isn’t as secure as you think

441 views

4 months ago

Cyber SecGuru
Part - 13 - Secure Your Systems: Windows & Linux Hardening Essentials

CyberSec Guru: Mastering Windows & Linux Hardening" "OS Fortification: Windows & Linux Security Strategies" "The Cyber ...

57:55
Part - 13 - Secure Your Systems: Windows & Linux Hardening Essentials

22 views

3 months ago

Pat's Cyber Chronicles
Powershell is better than Bash on Linux

In this video I have a hot take about how Bash is worse than Powershell.

8:09
Powershell is better than Bash on Linux

1,048 views

3 months ago

GhostStrats
Turning Hidden Flash Drives into Powerful Cybersecurity Tools! | Tails, Kali Linux, and Parrot OS

In this video, I take a bunch of hidden flash drives and transform them into powerful cybersecurity tools. Follow along as I walk you ...

5:35
Turning Hidden Flash Drives into Powerful Cybersecurity Tools! | Tails, Kali Linux, and Parrot OS

10,470 views

9 months ago

Pat's Cyber Chronicles
a realistic rant about the future of Linux

This is barely coherent bro.

16:31
a realistic rant about the future of Linux

6,553 views

8 months ago

Rodski
linux secure boot

linux secure boot.

2:02
linux secure boot

247 views

2 years ago

Di Think
Flipper zero open the all of hotel doors

In this video, I opened the hotel door by first reading the lock's receiver, and then finding the master key, which, by the way, often ...

0:32
Flipper zero open the all of hotel doors

543,074 views

2 years ago

GhostStrats
I Built the Ultimate Privacy Laptop (Ghost Laptop 2.0 Upgrade) Hardware Privacy & WiFi PenTesting!

In this updated Ghost Laptop Build, I take everything I learned from my original video — along with your feedback from the ...

8:21
I Built the Ultimate Privacy Laptop (Ghost Laptop 2.0 Upgrade) Hardware Privacy & WiFi PenTesting!

31,473 views

8 months ago

GhostStrats
Exploring Cybersecurity Tools: From Free DIY Gear to Advanced Tech – The Ultimate Starter Guide!

In this video, I share my top recommended tools for learning cybersecurity through hands-on experience. After over a year and a ...

22:00
Exploring Cybersecurity Tools: From Free DIY Gear to Advanced Tech – The Ultimate Starter Guide!

23,126 views

6 months ago

9to5Linux
Is Pentoo 2025 the BEST Hacking Distro? (Hands-On Tutorial)

Pentoo is a Live CD and Live USB designed for penetration testing and security assessment. Based off Gentoo Linux, Pentoo is ...

10:08
Is Pentoo 2025 the BEST Hacking Distro? (Hands-On Tutorial)

1,172 views

1 year ago

GhostStrats
DIY Ghost Laptop UPDATED: Full Build Guide — And the Harsh Truth About Privacy!

In this video, I explore the idea of building a ghost laptop — a system designed for maximum privacy and minimal traceability.

18:46
DIY Ghost Laptop UPDATED: Full Build Guide — And the Harsh Truth About Privacy!

259,074 views

6 months ago

ruth karen
ENCRYPTION AND DECRYPTION USING OPENSSL IN LINUX

Learn how to encrypt and decrypt files on Linux using OpenSSL in this tutorial. I covered the basics of encryption, demonstrated ...

12:29
ENCRYPTION AND DECRYPTION USING OPENSSL IN LINUX

50 views

8 months ago

The Staying Up Show
How to Create a Spear Phishing Attack with Kali Linux! #tutorial #hacking #kali

In this video, I describe how to leverage the social engineering tool kit on Callie Lennox installed on a 100% free Amazon EC2 ...

8:48
How to Create a Spear Phishing Attack with Kali Linux! #tutorial #hacking #kali

68 views

5 months ago

Robert Sirchia
Legacy Linux isn’t something to quit over. #linux #opensource
2:02
Legacy Linux isn’t something to quit over. #linux #opensource

957 views

4 weeks ago

Alfredredbird
🛠️ How Hacker Brute-Force SSH with Hydra #HydraTool #SSHBruteForce #LearnToHack #EthicalHacking

Join the hacking community: discord.com/invite/pgeAV38HPH #HydraTool #SSHBruteForce #LearnToHack #EthicalHacking ...

0:41
🛠️ How Hacker Brute-Force SSH with Hydra #HydraTool #SSHBruteForce #LearnToHack #EthicalHacking

1,122 views

4 months ago

Secure Solution
Log Forenix - Cyber Security Projects For Beginners  || The Terminal Boy

Welcome to log Forenix (Log + Forencis + Linux ) - Your Linux Forensic Artifacts Collector Tool! Forenix is a powerful shell CLI ...

4:24
Log Forenix - Cyber Security Projects For Beginners || The Terminal Boy

188 views

1 year ago

DC | David Lee
RIP Windows 10 (Time To Switch To Linux?)

With windows 10 support ending, it's time to consider your next steps, so here are some tech tips. *FOLLOW ME:* Instagram ...

0:46
RIP Windows 10 (Time To Switch To Linux?)

1,904 views

2 months ago

Alfredredbird
📥 How Hackers Scrape Emails with TheHarvester #TheHarvester #OSINT #CyberSecurity #shorts

Join the hacking community: discord.com/invite/pgeAV38HPH #TheHarvester #OSINT #EmailRecon #CyberSecurity ...

0:34
📥 How Hackers Scrape Emails with TheHarvester #TheHarvester #OSINT #CyberSecurity #shorts

5,112 views

4 months ago