Channel Avatar

TechAcdnt @UCSUX_bebd6F9DD4dFMswAXw@youtube.com

2.5K subscribers - no pronouns :c

Welcome to TechAcdnt – Your Definitive Source for IT Mastery


09:41
70 Bypassing Whitelists in Bug Bounty: Advanced Techniques and Strategies
08:11
69 Exploiting SSRF Vulnerabilities: A Deep Dive into Bypassing Security Measures
07:44
68 Scanning & Mapping Internal Network & Services
05:55
67 . Advanced SSRF Discovery
06:27
66. Accessing Private (Admin) Resources Using an SSRF Vulnerability
05:02
65 . Discovering a Basic SSRF Vulnerability: Step-by-Step Guide
06:53
64 Theory Behind SSRF Vulnerabilities & Their Impact
01:12
63. Introduction to SSRF Vulnerabilities
42:46
Penetrating Secure Facilities with OSDP | Dan Petro and David Vargas
40:14
Azure B2C 0-Day: Unraveling an Exploit Chain from Public Keys to Microsoft Bug Bounty
36:42
Backdoor in the Core: Modifying the Intel x86 Instruction Set in Real-Time
18:03
Assessing the Security of Certificates
34:35
Exploring NSPredicate Exploitation on macOS and iOS
38:48
All information looks like noise until you break the code
21:27
Power of AI: Tackling the Cyber Challenge
09:35
62. Cracking the Code: Admin Password Retrieval via Time-Based Blind SQL Injection
45:57
Advanced ROP Framework and Pushing ROP to Its Limits .Dr Bramwell Brizendine and Shiva
10:31
61 Data Extraction: Mastering Time-Based Blind SQL Injection Techniques
08:08
60. Time-Based Blind SQL Injection: A Deep Dive into Stealthy Exploitation Techniques
07:31
59 Exploring Password Recovery with Cluster-Bomb Attacks in Burp
07:57
58 Burp Intruder: Unlocking Administrator Password Recovery Techniques
10:08
57 Database Secrets: A Deep Dive into Enumerating Table & Column Names in SQL
05:57
56. Exploring Blind SQL Injections for Ethical Hacking
34:45
A Unraveling the Hidden Dangers of Certificate Misuse Bill Demirkap
34:09
A Series of Unfortunate Events Ben Sadeghipour and Corben Leo.
06:44
55 Database Admin Records Access: Ethical Considerations and Security Measures
07:56
54 Database Queries: A Comprehensive Guide to Selecting Data with SQL
04:43
53 Admin Login Bypass: Exploring Logical Operators for Ethical Hacking
07:23
52 SQL Injection: A Comprehensive Guide to Discovering and Mitigating Vulnerabilities
07:21
51 SQL Injection: Understanding the Basics of Vulnerabilities
08:16
50. XSS Unveiled: Navigating CSP Challenges in Application Security
05:47
49 Bursuite Insight: Mastering Application Analysis
43:39
Beyond the Clouds: Unveiling NAS Vulnerabilities and Cloud Exploits with Noam and Shar | TechAcdnt
49:20
A Unique Post-Mortem with Joe Sullivan | TechAcdnt
41:11
A Deep Dive into Overlooked MikroTik Pre-Authentication Vulnerabilities | TechAcdnt
19:54
Kerberos: Abusing Mixed Vendor Stacks with Ceri Coburn | TechAcdnt
44:37
Decoding Vulkan Leaks & Historical State | TechAcdnt
09:22
48 Bypassing Extreme Filters with Burp Intruder Mastery | TechAcdnt
06:44
47 Mastering Server-Side Filtering Bypass Techniques | TechAcdnt
10:23
46 Advanced Filters Demystified | TechAcdnt
07:34
45 Hacking Fundamentals: Bypassing Single-Quotes Filtering Techniques | TechAcdnt
06:00
44 Bypassing Basic Filters | [Your Channel Name]
04:19
43 Angular Alchemy: Unearthing XSS in AngularJS Applications | TechAcdnt
04:26
42 Menu Mayhem: Discovering XSS in a Drop-down | TechAcdnt
06:26
41 JavaScript Injection : Injecting Code Directly into Page Scripts | TechAcdnt
05:42
40 Hacking the Visuals: Discovering Reflected XSS in Image Tags | TechAcdnt
05:41
39 Web Threats: Introduction to DOM XSS Vulnerabilities | TechAcdnt
05:24
38 Web Threats: Discovering Reflected & Stored XSS Vulnerabilities | TechAcdnt
05:30
37 Web Vulnerabilities: Exploring HTML Injection | TechAcdnt
05:24
36 Web Risks: Discovering an HTML Injection Vulnerability | Cybersecurity Chronicles
04:02
35 Introduction to XSS Vulnerabilities & Its Types
01:50:57
DEF CON 20 : Journey into the Heart of Hacking Excellence | Exclusive Documentary Experience
05:29
34 Bypassing Boundaries: Mastering Asynchronous Blind Command Injection with Burp Collaborator
08:09
33 Async Command Injection Exposed: Mastering the Art of Vulnerability Discovery
09:01
32 Blind Command Injection Demystified: A Deep Dive into Vulnerability Discovery
07:41
31 Command Injection Unveiled: Unraveling the Basics of Vulnerability Discovery
01:22
30 Injecting Knowledge: Mastering Vulnerabilities - An Introduction to Injection Exploits
13:20
29 OAuth 2.0 CSRF Mastery: Unleashing Login Exploits for Ethical Hackers
12:24
27 OAuth Hacks Unveiled: Mastering Bypass Techniques for Bug Bounty Success
13:20
28 OAuth Hacks Unveiled: Mastering Bypass Techniques for Bug Bounty Success