Channel Avatar

Andrew Hoffman @UC2vVVgKKzN-Gb_xeaUY0o-Q@youtube.com

None subscribers - no pronouns set

Hi - I'm Andrew Hoffman. I'm a security researcher, softwar


12:12
The Newest Way to Learn AppSec!
15:52
JSON Save Files Tutorial for GODOT v4.0+
28:00
Build a Godot Roguelite in 30 Minutes!
07:48
How Attackers use Clickjacking to Steal Social Media Accounts
07:38
Trusted Types Explained [With Live Coding Demo]
31:09
How to Find and Read a Bill (US Congress)
13:55
Zero Trust Architecture Explained
10:56
MidJourney vs DALL-E 2 Detailed Comparison
03:41
Generating Art With Midjourney AI
29:23
I Hacked my Pokémon Yellow Cartridge and Created a New Pokémon!
19:55
GODOT4 Major Changes Overview & Demo
15:01
Understanding JavaScript Prototypes & Prototype Pollution Attacks
10:02
Master JavaScript Variables & Scope in One Video!
08:38
Easily Build Projectile Weapons in GODOT
12:46
How to Build a Modular Ability System in GODOT
09:40
Build Highly Scalable GODOT Games in Under 10 Minutes!
05:46
Game Jams 101
07:36
Mass Assignment Attacks Explained
06:49
The Strange World of Quines: Algorithms that Generate Themselves
04:07
How to add a Table of Contents to any YouTube Video
11:38
How to Build Beautiful GODOT UI Using THEME Files
10:10
Build infinite procedurally generated GODOT maps in 10 minutes!
17:43
Build a 2D GODOT Platformer in 20 Minutes!
20:13
Build a 2D GODOT Character Customizer in 20 Minutes!
13:23
Master the GODOT TileMap tool in 15 Minutes!
19:27
Build a Top-Down 2D GODOT RPG in 20 Minutes!
08:27
What is Log4Shell (Log4J RCE) and why does it matter?
36:45
How to Write a Best-Selling Book (Step by Step Tutorial from an Author)
06:31
How to Install Kali Linux on VirtualBox (Easiest Way)
08:45
SQL Injection Explained
06:35
Twitch Hack Exposed: Passwords, AWS Secrets, YouTube/Facebook Keys & More
13:57
How to Not Get Hacked - 5 Rules Explained by White Hat Hacker
06:26
Command Injection Explained
14:53
MASSIVE Twitch Hack Explained by White Hat Hacker
08:40
Cross-Site Request Forgery (CSRF) Explained
22:39
What is the most secure programming language?
15:18
What is the best programming language to learn in 2022?
07:41
Mutation-Based Cross-Site Scripting (Mutation XSS) Explained
07:49
DOM-Based Cross-Site Scripting (DOM XSS) Explained
08:24
Stored Cross-Site Scripting (Stored XSS) Explained
06:30
Reflected Cross-Site Scripting (Reflected XSS) Explained
03:28
Defeating Google's XSS Game | Level 6: Follow the white rabbit
03:24
Defeating Google's XSS Game | Level 5: Breaking protocol
05:35
Defeating Google's XSS Game | Level 4: Context matters
08:47
Defeating Google's XSS Game | Level 3: That sinking feeling...
05:14
Defeating Google's XSS Game | Level 2: Persistence is key
04:46
Defeating Google's XSS Game | Level 1: Hello, world of XSS
01:59
Why is there is a special JavaScript object that both exists and does not exist - at the same time?
02:38
Why is (EMPTY_ARRAY) equal to (NOT_EMPTY_ARRAY) in JavaScript?
02:58
Is NULL Equal to FALSE in JavaScript?
02:22
Why aren't all strings created equal in JavaScript?
02:12
This JavaScript Edge Case Can Easily Break Timers!
02:31
When does "true" equal "false" in JavaScript?
02:40
What happens when you try to add two arrays together in JavaScript?
02:40
What happens when you add a leading 0 to a number in JavaScript?
05:18
Why can't you add 0.1 and 0.2 in JavaScript?
04:23
What happens if you add two booleans in JavaScript?
11:57
Project: Anim8
06:51
Channel Reboot: Big Changes Incoming