ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

4,553 results

Martin Voelk
Cross Origin Resource Sharing (CORS) Vulnerability | BugBountyTraining | Bug Bounty Service

Ready to master AI security? Spots fill fast—save your seat now! https://live.haxorplus.com ☕️ Enjoying the content? Support ...

5:41
Cross Origin Resource Sharing (CORS) Vulnerability | BugBountyTraining | Bug Bounty Service

25,161 views

2 years ago

Fireship
CORS in 100 Seconds

Cross-Origin Resource Sharing or CORS is a mechanism that allows browsers to request data from 3rd party URLs (or origins) ...

2:31
CORS in 100 Seconds

659,317 views

4 years ago

Rana Khalil
Cross-Origin Resource Sharing (CORS) | Complete Guide

42:37 – How to exploit CORS vulnerabilities? 50:25 – How to prevent CORS vulnerabilities? 51:47 – Resources 52:00 - Thank ...

52:17
Cross-Origin Resource Sharing (CORS) | Complete Guide

93,587 views

3 years ago

Medusa
CORS Misconfigurations: How Hackers Steal Your Cookies?

Portfolio: https://portfolio.medusa0xf.com/ ✍️ Bug Bounty WriteUps: https://medusa0xf.medium.com/ CORS misconfigs are ...

19:11
CORS Misconfigurations: How Hackers Steal Your Cookies?

3,936 views

3 months ago

Akto
Demystifying CORS Vulnerabilities: How Attackers Exploit CORS to Steal API Keys

Demystifying CORS Vulnerabilities: How Attackers Exploit Cross-Origin Resource Sharing to Steal API Keys! We'll explore: - 0:00 ...

8:55
Demystifying CORS Vulnerabilities: How Attackers Exploit CORS to Steal API Keys

1,541 views

2 years ago

SecurityZone
Exploiting CORS misconfiguration |Understanding CORS Misconfigurations - Educational PoC

In this video, we explore a common security misconfiguration known as CORS (Cross-Origin Resource Sharing). This proof of ...

1:50
Exploiting CORS misconfiguration |Understanding CORS Misconfigurations - Educational PoC

10,792 views

5 years ago

Bug Hunter Aryan
CORS Misconfiguration PoC || Bug Bounty POC

This video is just for educational purpose In this educational video, we'll be exploring the world of Cross-Origin Resource Sharing ...

2:24
CORS Misconfiguration PoC || Bug Bounty POC

10,539 views

2 years ago

Rana Khalil
CORS - Lab #1 CORS vulnerability with basic origin reflection | Short Video

In this video, we cover Lab #1 in the CORS module of the Web Security Academy. The website has an insecure CORS ...

12:10
CORS - Lab #1 CORS vulnerability with basic origin reflection | Short Video

55,134 views

3 years ago

Fireship
Ethical Hacking in 100 Seconds // And why do we need CORS?

Use “Ethical Hacking” or penetration testing to find exploits in your web app before the bad guys do. Featuring ...

11:05
Ethical Hacking in 100 Seconds // And why do we need CORS?

245,142 views

4 years ago

People also watched

Hayk Simonyan
API Security Explained: Rate Limiting, CORS, SQL Injection, CSRF, XSS & More

Become a Remote Senior Software Engineer with a Job Guarantee: ...

8:41
API Security Explained: Rate Limiting, CORS, SQL Injection, CSRF, XSS & More

315,457 views

5 months ago

CybeR_FrosT
CORS || Bypass CORS Misconfiguration Leads to Sensitive Exposure POC || Cashfree || Bug Bounty

Hello, Hunters! I got bounty from cashfree. #bugbountytips #poc #hackerone #bughunter #bug #ethicalhacking #cybersecurity ...

2:51
CORS || Bypass CORS Misconfiguration Leads to Sensitive Exposure POC || Cashfree || Bug Bounty

8,012 views

2 years ago

Djalil Ayed
TryHackMe Exploitation with cURL - Hoperation Eggsploit - Bonus question  - Advent of Cyber 2025

The evil Easter bunnies operate a web control panel that holds the wormhole open. Using cURL, identify the endpoints, send the ...

13:16
TryHackMe Exploitation with cURL - Hoperation Eggsploit - Bonus question - Advent of Cyber 2025

884 views

2 weeks ago

Wes Bos and Syntax
i’m gonna crash out (react2shell vulnerability)

00:00 Wrong 01:43 The Code Explained 03:10 The React2Shell Hack 08:00 Mixing Client + Server Code 09:05 How RSC Works ...

16:55
i’m gonna crash out (react2shell vulnerability)

20,776 views

1 month ago

𝙀𝙫𝙚𝙧5𝙚𝙘╮
Reflected XSS Exploitation in 10 Minutes Worth 250$ | Full PoC Walkthrough

In this advanced proof-of-concept (PoC) video, I demonstrate how to uncover a reflected XSS vulnerability in under 10 minutes.

9:28
Reflected XSS Exploitation in 10 Minutes Worth 250$ | Full PoC Walkthrough

5,432 views

1 year ago

Noman Shaikh
Exploiting CORS Misconfiguration using XSS

This is a Proof of concept of exploiting cors misconfiguration that accepts all subdomains and you have xss on one of them. you ...

1:37
Exploiting CORS Misconfiguration using XSS

10,153 views

7 years ago

Rajdip.M
CORS misconfiguration leads to the disclosure of wp-json/wp/v2/users

Follow:https://x.com/rajdip35993634 #bugbounty #hackerone #crosssitescripting #bugsbunnychallenge #bugbounty #sqlinjection ...

1:52
CORS misconfiguration leads to the disclosure of wp-json/wp/v2/users

3,316 views

2 years ago

Akshaydeep Singh
CORS Misconfigration explain and exploit

CORS Misconfigration explain and exploit, cors vulnerability,Cors, sop.

8:40
CORS Misconfigration explain and exploit

3,701 views

4 years ago

Mersa
Full Account Takeover POC | $2500 Bounty | 2025 BugBounty

In this video, I demonstrate a Proof of Concept (POC) for a Full Account Takeover vulnerability that earned me a $2500 bounty as ...

3:18
Full Account Takeover POC | $2500 Bounty | 2025 BugBounty

15,827 views

11 months ago

BePractical
Broken Access Control Explained: How to Discover It in 2025?

Whether you are a bug bounty hunter, penetration tester, or just getting started in cybersecurity, this video will give you practical ...

9:23
Broken Access Control Explained: How to Discover It in 2025?

13,820 views

9 months ago

ByteMonk
🔓 Mastering CORS: How to Securely Enable Cross-Origin Requests

CORS (Cross-Origin Resource Sharing) is one of the most frustrating challenges developers face when working with REST APIs.

7:38
🔓 Mastering CORS: How to Securely Enable Cross-Origin Requests

88,838 views

10 months ago

Web Dev Simplified
Learn CORS In 6 Minutes

CORS, also known as Cross-Origin Resource Sharing, is something every web developer has to deal with at some point.

6:06
Learn CORS In 6 Minutes

792,436 views

4 years ago

Arfi Tutorials
CORS Misconfiguration Bug Bounty PoC! 🔥💰

Exploiting CORS gone wrong! 🛡️ Watch this real-world Proof of Concept (PoC) of a CORS misconfiguration vulnerability that ...

2:42
CORS Misconfiguration Bug Bounty PoC! 🔥💰

3,446 views

7 months ago

𝙇𝙤𝙨𝙩𝙨𝙚𝙘
CORS Vulnerability mass hunting on Dell Bounty program worth 500$ | Bug bounty poc

IF you Enjoyed the video, don't forget to Like , Subscribe, and turn on the Notification Bell to stay updated! WHO AM I ? I'm ...

5:00
CORS Vulnerability mass hunting on Dell Bounty program worth 500$ | Bug bounty poc

30,249 views

1 year ago

Zead Osama
CORS - Lab #1 CORS vulnerability with basic origin reflection

Linked in www.linkedin.com/in/zead-osama-1a2a5424b/ Facebook www.facebook.com/profile.php?id=100089269934713 ...

2:44
CORS - Lab #1 CORS vulnerability with basic origin reflection

1,490 views

1 year ago

KBT
CORS Exploit (XSS+Console)

Sometimes, the XSS does not pop up you the treasure. Console does! If you want to learn more about CORS, I've wrapped up ...

5:54
CORS Exploit (XSS+Console)

1,544 views

5 years ago

𝙀𝙫𝙚𝙧5𝙚𝙘╮
poc for Cross-Origin Resource Sharing (CORS) Misconfiguration Allowing Unauthorized Data Access

this video' is education purpose.... do not use for cyber crime and self entertainment.....! https://t.me/+vOpMfbS3R3Q2ZjM1 #poc ...

15:01
poc for Cross-Origin Resource Sharing (CORS) Misconfiguration Allowing Unauthorized Data Access

10,098 views

1 year ago

𝙀𝙫𝙚𝙧5𝙚𝙘╮
CORS Exploitation Walkthrough | Bypass & Exploit Misconfigured CORS | Ethical Hacking Tutorial

In this video, I will walk you through CORS (Cross-Origin Resource Sharing) exploitation, showing how misconfigurations can ...

13:21
CORS Exploitation Walkthrough | Bypass & Exploit Misconfigured CORS | Ethical Hacking Tutorial

1,392 views

10 months ago

Popo Hack
Portswigger - Cross-origin resource sharing - Lab #1 CORS vulnerability with basic origin reflection

Hello Hackers, in this video of CORS vulnerability with basic origin reflection you will see how to exploit and discover Cross-origin ...

12:41
Portswigger - Cross-origin resource sharing - Lab #1 CORS vulnerability with basic origin reflection

12,423 views

2 years ago

BePractical
Chaining Vulnerabilities: Reflected XSS + CORS = More Impact!! | Live Demonstration | 2024

In this video, I'll walk you through how to chain reflected XSS with CORS misconfigurations to amplify the overall impact of your ...

13:04
Chaining Vulnerabilities: Reflected XSS + CORS = More Impact!! | Live Demonstration | 2024

7,438 views

1 year ago

BePractical
Covering The Under Rated Vulnerabilities: CORS Misconfiguration #1

This video is perfect for anyone who wants to learn about CORS vulnerabilities and how to protect against them. Let's make your ...

17:19
Covering The Under Rated Vulnerabilities: CORS Misconfiguration #1

8,570 views

1 year ago