Channel Avatar

Infosec BD @UC3xTOBr0eVC6wd72vidFcEQ@youtube.com

16K subscribers - no pronouns :c

" Spreading Security, Serving Humanity "


02:21
Cyber Security and Ethical Hacking Full Live Course with 1 Month Internship | Best Hacking Course
00:49
Bug Bounty POCs: Open Redirect Vulnerability | Bug Hunting Tutorial | Ethical Hacking Tutorial
06:45
Bug Bounty POCs: NASA Host Header Injection | Bug Hunting Tutorial | Ethical Hacking Tutorial
41:45
Digital Forensics Bangla Tutorial: Digital Evidence Collection , Analysis and Best Practices
04:39
Bug Bounty POCs: XSS Through Origin IP Leakage | Bug Hunting Tutorial in Bangla
32:54
Digital Forensics Bangla Tutorial | Digital Forensics for Ethical Hacking |Cyber Crime Investigation
01:55
Bug Hunting POCs: IDOR led to view any user profile picture | Bug Hunting Tutorial | IDOR
01:06
Bug Hunting Tutorial | Bug Bounty POCs | Ethical Hacking Tutorial
18:07
SQL Injection Tutorial Bangla: Upload Shell Using Union SQL Injection | Web Ethical Hacking Tutorial
16:49
SQL Injection Tutorial Bangla: Time Based SQL Injection | Web Ethical Hacking Tutorial in Bangla
33:29
SQL Injection Tutorial Bangla: Boolean Based SQL Injection | Web Ethical Hacking Tutorial
14:15
SQL Injection Tutorial Bangla: Read Sensitive Information Using SQL Injection | Web Ethical Hacking
01:52:46
Linux for Ethical Hacker Full Course in Bangla | Kali Linux Full Course in Bangla
01:32
Day 13- Linux for Ethical Hacking in Bangla | Resources for Linux in Hacking
22:40
Day 12- Linux for Ethical Hacking in Bangla | How to use Bash Scripting for Hacking | Bash Script
06:29
Day 11- Linux for Ethical Hacking in Bangla: Installing and Updating Tools | Kali Linux Tutorial
07:38
Day 10- Linux for Ethical Hacking in Bangla: How to Starting and Stopping Services on Kali Linux
06:42
Day 9- Linux for Ethical Hacking in Bangla: Viewing, Editing, Creating File | Kali Linux Tutorial
09:58
Day 8- Linux for Ethical Hacking in Bangla: Networking Command
22:59
Day 7- Linux for Ethical Hacking in Bangla: Linux Users and Privileges in Detailed
17:51
Day 6- Linux for Ethical Hacking in Bangla: Navigate file system in Linux | Linux Command and Use
08:03
Day 5-Linux for Ethical Hacking in Bangla: Overview about SUDO | What is SUDO in Kali Linux
01:23:33
Business Logic Vulnerability Full Course in Bangla || Business Logic Vulnerability for Bug Hunting
01:25:35
API Penetration Testing Full Course in Bangla | API Ethical Hacking | API Hacking for Bug Hunting
04:28
Day 4-Linux for Ethical Hacking in Bangla: How to use Kali Linux in Hacking | Kali Linux Overview
01:56:16
Web Hacking Live Class 13: XXE Vulnerability Explained in Bangla |XXE Attack for Bug Hunting
04:54
Day 3-Linux for Ethical Hacker in Bangla: How to install Kali Linux for Hacking Lab| Ethical Hacking
03:03
Day 2- Linux for Ethical Hacker in Bangla: How to install VMware for Hacking Lab || Ethical Hacking
01:24
Day 1- Linux for Ethical Hacker in Bangla: Course Module Introduction || Ethical Hacking Videos
19:08
My CEH Practical Exam Journey | Certified Ethical Hacker Exam | Ethical Hacking Journey | Hacker
03:44
āĻ…āĻĢāĻĢā§‡āĻ¨ā§āĻ¸āĻŋāĻ­ āĻ¨āĻžāĻ•āĻŋ āĻĄāĻŋāĻĢā§‡āĻ¨ā§āĻ¸āĻŋāĻ­ ?āĻāĻ•āĻœāĻ¨ āĻŦāĻŋāĻ—āĻŋāĻ¨āĻžāĻ° āĻšāĻŋāĻ¸āĻžāĻŦā§‡ āĻ†āĻŽāĻžāĻ•ā§‡ āĻ•ā§‹āĻ¨āĻŸāĻž āĻ¨āĻŋāĻ¯āĻŧā§‡ āĻ•āĻžāĻœ āĻļā§āĻ°ā§ āĻ•āĻ°āĻž āĻ‰āĻšāĻŋāĻ¤
03:19
3 tips to become a CTF Champion || How to become a Best CTF Player
03:18
āĻĢā§āĻ°ā§€āĻ¤ā§‡ āĻ‡āĻĨāĻŋāĻ•ā§āĻ¯āĻžāĻ˛ āĻšā§āĻ¯āĻžāĻ•āĻŋāĻ‚ āĻļāĻŋāĻ–āĻžāĻ° ā§Š āĻŸāĻŋ āĻ¸ā§‡āĻ°āĻž āĻŸāĻŋāĻĒāĻ¸ | 3 ways to learn Ethical Hacking in Free ||
06:13
āĻ‡āĻĨāĻŋāĻ•ā§āĻ¯āĻžāĻ˛ āĻšā§āĻ¯āĻžāĻ•āĻŋāĻ‚āĻ¯āĻŧā§‡ āĻ¸āĻĢāĻ˛ āĻšāĻŦāĻžāĻ° āĻ¸ā§‡āĻ°āĻž ā§Ģ āĻŸāĻŋ āĻŸāĻŋāĻĒāĻ¸āĨ¤ 5 ways to become a best Ethical Hacker
05:38
Professional Web Penetration Testing and Bug Hunting Live Course | @CyberBanglaltd
06:25
āĻ¯ā§‡ ā§Š āĻŸāĻŋ āĻ‰āĻĒāĻžāĻ¯āĻŧā§‡ āĻ†āĻĒāĻ¨āĻŋ āĻ›āĻžāĻ¤ā§āĻ° āĻ…āĻŦāĻ¸ā§āĻĨāĻžāĻ¯āĻŧ āĻ¸āĻŋāĻ•āĻŋāĻ‰āĻ°āĻŋāĻŸāĻŋāĻ¤ā§‡ āĻ°āĻŋāĻŽā§‹āĻŸ āĻœāĻŦ āĻĒā§‡āĻ¤ā§‡ āĻĒāĻžāĻ°ā§‡āĻ¨āĨ¤ Remote Job in Cybersecurity
08:31
āĻ¸āĻžāĻ‡āĻŦāĻžāĻ° āĻ¸āĻŋāĻ•āĻŋāĻ‰āĻ°āĻŋāĻŸāĻŋāĻ¤ā§‡ āĻ†āĻĒāĻ¨āĻŋ āĻĢā§āĻ°āĻŋāĻ˛ā§āĻ¯āĻžāĻ¨ā§āĻ¸āĻŋāĻ‚ āĻ•āĻ°āĻŦā§‡āĻ¨ āĻ¨āĻžāĻ•āĻŋ āĻŦāĻžāĻ— āĻŦāĻžāĻ‰āĻ¨ā§āĻŸāĻŋ ? Freelancing Vs Bug Hunting
01:38
Ethical Hacking and Cyber Security Full Course In Bangla | IoT, Cloud Security Course In Bangla
01:43:05
Web Hacking Live Class 12:HTTP Host Header Attack A to Z
09:18
Hackerone Bug Hunt 2023 Qualification Round Bug Reporting | Bug Bounty Tutorial | Bug Hunt 2023
09:52
National Inter-University Cyber Drill 2022 Prize Giving Ceremony | National Cyber Drill | CTF
09:12
How to become a Ethical Hacker in 2024 | Ethical Hacking Full Guideline in Bangla |
05:58
How to use ChatGPT for Freelancing | ChatGPT For Freelancer |
23:37
How to Use ChatGPT for CyberSecurity | ChatGPT For Ethical Hacking | ChatGPT Tutorial in Bangla
10:31
#Day 22-Python For Ethical Hacking in Bangla | Send Unlimited SMS to Friend | Message Booming
01:09
Web Pentesting and Bug Hunting Full Course In Bangla | Bug Bounty and Web Hacking Full Course
01:03:27
Web Ethical Hacking Live Class 11:Code Review and Exploitation | Flask Source Code Pen-testing| SSTI
20:20
File Upload Vulnerabilities 04 | Bug Bounty Tutorials | Ethical Hacking Tutorial
10:34
File Upload Vulnerabilities 03 | Bug Bounty Tutorials | Ethical Hacking Tutorial
14:44
File Upload Vulnerabilities 02 | Bug Bounty Tutorials #ethicalhacking #cybersecurity #bugbounty
10:23
File Upload Vulnerabilities 01 | Web Hacking Tutorials | Bug Bounty Tutorials
01:24:49
Web Hacking Live Class 09:SQL Injection Full Bangla Tutorial Part 03 | SQL injection for Bug-bounty
11:14
Cryptography for CyberSecurity & BlockChain in Bangla#Class 03:Roles of Crypto in Communication
07:06
Web Hacking Live Class 08:SQL Injection Full Bangla Tutorial Part 02 | SQL Injection for Bug-Bounty
09:56
Cryptography for Cyber Security & BlockChain Bangla Tutorial #Class 02: What is Cryptography?
01:43:47
Web Hacking Live Class 07:SQL Injection Full Bangla Tutorial Part 01 | SQL Injection for Bug-Bounty
01:36
Cryptography for Cyber Security and BlockChain Bangla Tutorial #Class 01 :Course Introduction
02:33
Ethical Hacking Paid Course | Course Review | āĻ‡āĻĨāĻŋāĻ•ā§āĻ¯āĻžāĻ˛ āĻšā§āĻ¯āĻžāĻ•āĻŋāĻ‚ āĻĢā§āĻ˛ āĻ•ā§‹āĻ°ā§āĻ¸ āĻ°āĻŋāĻ­āĻŋāĻ‰
05:25
WordPress Ethical Hacking Full Course | āĻ“āĻ¯āĻŧāĻžāĻ°ā§āĻĄāĻĒā§āĻ°ā§‡āĻ¸ āĻšā§āĻ¯āĻžāĻ•āĻŋāĻ‚ āĻĢā§āĻ˛ āĻ•ā§‹āĻ°ā§āĻ¸ āĻ‡āĻ¨ āĻŦāĻžāĻ‚āĻ˛āĻž | āĻ‡āĻĨāĻŋāĻ•ā§āĻ¯āĻžāĻ˛ āĻšā§āĻ¯āĻžāĻ•āĻŋāĻ‚
01:41:27
Web Ethical Hacking Live Class 06:Hydra Bangla Tutorial | IDOR & Burp-Suite Intruder Bangla Tutorial