Channel Avatar

Hacking Simplified @UCARsgS1stRbRgh99E63Q3ng@youtube.com

15K subscribers - no pronouns :c

Wanted to learn about hacking and cybersecurity ? You're at


24:10
Is Instagram Spying on You ? #privacy #spying #instagram
08:06
Hacking 30k Machines Worldwide | CUPS Vulnerability
11:09
The Dark Side of Password Security & Self Hosting
08:05
Why Your Online Privacy Matters More Than Ever
32:52
Hacking With ChatGPT by Mike Takahashi
32:43
Journey into Security and Web3 With @0xrudrapratap | Hacker2Hacker | #bugbounty
55:18
Playing With Idors With @IAmRenganathan | Hacker2Hacker | Hacking IRCTC #bugbounty
01:02:37
Let's Recon With Vaibhav | Hacker2Hacker | #osint #bugbounty
43:38
CyberSecurity Journey With @HarshBothra | Hacker2Hacker | SSRF
45:58
SSRF Hacking With Yuvraj | Hacker2Hacker | SSRF
49:38
Live Hacking On Indeed with Tess 💥 | Hacker2Hacker
36:20
Theft of Arbitrary files from LocalStorage | Hacking on Android With Gaurang | #InsecureShop - 02
12:32
Hacking on Android With Gaurang Bhatnagar | Creator #InsecureShop | Security Engineer #vmware - 01
10:37
Deep Recursion Attack + Introspection | Damn Vulnerable GraphQL App | GraphQL Exploitation - Part 4
16:35
NullCon CyberSecurity Interview With Madhu Akula,Creator KubernetesGoat #nullcongoa2022 @nullcon
03:54
Cybersecurity Interview With Vandana Verma @nullcon Security Leader, Chair @ #owasp & InfosecGirls
03:36
NullCon Cybersecurity Interview With Founder of Security Zines, Rohit Sehgal @nullcon
03:27
Uber Hacked - Sept 2022 | All Internal Dashboard | Slack Disabled #hack #uber #socialengineering
19:15
Python Web Scanner - Pt 04 | Python tldextract & Multithreading | Programming Hacking Tools
15:19
May Contain Hackers 2022 | World's Largest Hackercamp #mch2022
17:14
Python Web Scanner - Pt 03 | Git 101 & Python Dict | Programming Hacking Tools
15:45
Python Web Scanner - Pt 02 | Programming Hacking Tools
17:11
Python Web Scanner - Pt 01 | Programming Hacking Tools
12:05
Hacking UPI with UPI-Recon-CLI | #Golang CLI Tool
16:01
Hacking The Internet Through Shodan | Shodan Filters and Hacks
14:47
DVGA - Batch Query Attack | GraphQL Exploitation - Part - 3 | DVGA
24:17
Finding and Verifying secrets with trufflehogV3 & Interview with the founder, Dylan
21:40
Polkit - 12-year-old Security Vulnerability to Privilege Escalation | PolicyKit | Linux | #Explained
18:27
DVGA - Damn Vulnerable GraphQL Application | GraphQL Exploitation - Part - 2 | DVGA
19:56
Introduction to GraphQL | GraphQL Exploitation - Part - 1 | DVGA
19:26
log4shell Explained | What, Why & How | Hacking using log4j vulnerability
13:36
Hacking Android Apps Using Insecure Broadcast Receiver | Android Pentesting
16:43
Intent Redirection (Access to Protected Components) | Android Pentesting
26:59
The Pegasus Project | NSO Group | Spyware #Explained
11:05
Android Weak Host Validation | Android Pentesting
12:02
Hacking The Criminals | Operation IronSide | Largest Covert Operation Ever | FBI + AFP + EUROPOL 🌎 💻
11:56
$30,000 Instagram Hack | What, Why, How | Dissecting The Hack | How to Start Finding Bugs & Report
28:28
Hacking Android Deeplink Issues | Insecure URL Validation | Android Pentesting
08:12
Domino's India Data Breach | 13 TB Data Leak | 180,000,000 Records Leaked | Data Leak
21:49
Plan Your Career In CyberSecurity While In College | With Full Timeline & Plan | Hindi | Part - 0x02
21:09
Getting a Job In CyberSecurity [Hindi - English] | Qualifications | Expectations | Salary
33:01
Free Automated Recon Using Github Actions | Ft. Project Discovery
11:27
Flawed CSRF Protection - State Param - Hacking Oauth Pt . 2 | Live Demo on Medium.com
16:45
Hacking Oauth Applications - Pt. 1
07:52
Lineage OS, Rooting & Custom ROMs - Hacking Android - Sniffing Android '10' HTTPs traffic- Part - 03
12:53
Physical Vs Emulator - Sniffing Android '10' HTTPs traffic - Part - 02
13:52
SSL & It's Unpinning - Sniffing Android '10' HTTPs traffic - Part - 01
11:24
Dependency Confusion Pt. 2 | Final Part | Exploiting Dependency Injection
18:36
Dependency Confusion Pt. 1 | The Setup | Packages | Private Registry
22:18
Android Pentesting | Insecure Logging & Storage + Setup Genymotion & pidcat - Pt. 02
32:53
Android Pentesting - Android Architecture + Static Analysis with apktool + gf + jadx - Pt. 01
18:54
Automating IDORS with Autorize - Common API Bugs Pt. 2 - IDORs & Access Control Issues
20:32
XXE - What Why & How | XXE on Twitter | $10k Bounty | XML External Entity
27:41
Automate your Bug Hunting using Nuclei | Writing our own nuclei template | Be The H.A.C.R. - Ep. 18
22:36
SSRF - What Why & How | SSRF in Google Production Network | Server Side Request Forgery
13:22
Local Recon Machine - Kali on Windows ft. WSL | Final Part - Pt.2 | Recon on a live site
09:11
Kali on Windows WSL for Pentester & Bug Bounty Hunter | Local Recon | Hacking Machine | No VPS / VM
34:21
How to Find and Exploit XSS DOM Cloberring - XSS in GMail
42:24
XSS CSP Bypass - BugPoC Challenge
11:46
LFI - Local File Inclusion | Realistic Mission - 7 - Be The H.A.C.R. - Ep. - 17