Channel Avatar

FORnSEC Solutions @UC9NmivU81PpHDOhavsehriw@youtube.com

7.2K subscribers - no pronouns :c

Hello everyone and welcome to our channel. Our company FORNS


08:08
VULNERABLE AND OUTDATED COMPONENTS|EXPLAINED IN HINDI
09:29
SECURITY MISCONFIGURATION | OWASP TOP 10 | EXPLAINED IN HINDI
07:05
INSECURE DESIGN | OWASP TOP 10 | EXPLAINED IN HINDI
09:01
INJECTION(SQL injection / Command injection)| OWASP Top 10 | Explained in (Hindi)
13:18
CRYPTOGRAPHIC FAILURE | OWASP TOP 10 | EXPLAINED IN (HINDI)
09:19
BROKEN ACCESS CONTROL | OWASP TOP 10 | Explained in (Hindi)
08:40
Introduction To OWASP Top 10 Vulnerabilities | Explained in Hindi 2025
14:57
What is Cyber Crime ? | It's Types and Techniques | Classification and Awareness 2025
05:47
Burp suite | Explained | Collaborator, Sequencer, Decoder, Comparer, Logger, Organizer, Extensions
08:23
Burp Suite Explain in hindi | Burp Suite Intruder | Snipper, Battering Ram, Pitchfork, Cluster Bomb
09:47
Burpsuite Repeater | Full Explanation in Hindi | GET , POST , PUT , PUSH Method
06:41
How to Setup Burp Proxy | Proxy Setup | Full Setup in Hindi
04:23
Digital Arrest | What is Digital Arrest? | Digital Fraud Alert !
05:12
Burp Suite | Community Edition | Full Explanation in Hindi
05:48
Cyber Security Roadmap of 2025 | Opportunity | Package | Full Explanation in (Hindi)
04:19
What is Cryptography | Blockchain technology | Dark Web (Part 7) |Explained
09:07
Excavator browser| Interesting Website | Part-6 | Explain in (Hindi)
07:23
DuckDuckGo browser | Hidden Wiki | Part-5 | Explain in (Hindi)
04:02
Pager Blast | What is Pager | Pager Attack
01:01
FORnSEC Solutions providing VAPT Service & Many more stay tune
08:32
Security Settings of Tor | Network Setting | Part - 4 | Explain in (Hindi)
05:31
Installation of Tor | Tails | Part-3 | Explain in (Hindi)
09:54
Why do we need the dark web? | Surface Web |Deep web | Part-2 | Explain in (Hindi)
05:19
Introduction | Deep Dark Web | Tor Browser| Part-1| Explained in (Hindi)
06:30
OMINIS-OSINT tool guide | Best Open Source Intelligence Tool For Investigations| Explained
07:14
Ashok - Osint | How to use Ashok Tool | Full Tutorial for Beginners | Ashok Tool Features and Tips l
03:50
Wapiti Tool Tutorial : Powerful Web Vulnerability Scanner for Beginners | Explained
03:29
Dmitry Tool Tutorial | Master Information Gathering with Dmitry| Osint for Ethical Hackers
04:22
FEROXBUSTER TOOL | Explained
04:20
XSStrike Tool Tutorial | Advanced XSS Scanner for Web Application Security | Complete Guide
03:32
What is Digital Signature? | Explained
03:24
CRYPTOGRAPHY | Explained
04:48
GOBUSTER TOOL | Explained
03:37
WAYBACKURLS TOOL | Explained
03:00
CRUNCH TOOL | Explained
05:21
HydraRecon | Tool | Explained
05:35
INFOOOZE | TOOL | Explained
03:48
NETWORK MINER | Explained
05:24
CYBER SECURITY : Safeguarding The Digital Landscape | PART-2 | SquareX |
12:25
CYBER SECURITY : Safeguarding The Digital Landscape | SESSION | PART-1
04:20
APKLeaks | TOOL | Explained
04:41
JOHN THE RIPPER | TOOL | Explained
05:38
HYDRA | Brute-Forcing Tool | Explained
03:56
HASHCAT | Password Cracking Tool | Explained
02:15
NETDISCOVER | NETWORK ADDRESS DISCOVERING TOOL
02:22
Dirb | Tool
03:21
APKHunt | Tool
03:59
STEGHIDE TOOL | Explained
03:25
PARAMSPIDER TOOL | EXPLAINED
04:58
SKIPFISH | Web Application Scanner | TOOL
05:36
SOCIAL ENGINEERING | What is Social Engineering? | Explained
05:27
Sherlock Tool | OSINT | What is Sherlock ? | How to use it |
05:05
NIKTO TOOL | Vulnerability Scanner
02:57
APEPE - APK Analyzer
04:19
PWNXSS TOOL | XSS Scanning Tool | What is XSS?
03:55
BRYOBIO TOOL | Network Pcap File Analysis |
02:56
Session Hijacking Explained
04:38
DALFOX | XSS Scanning Tool |
03:57
What is Cryptojacking | Cryptojacking |
04:06
Explained LOG4J Vulnerability