Channel Avatar

Clint & Si The Hackers @UCsRGOcFwG6_Xgr7Uxkf-crw@youtube.com

3K subscribers - no pronouns :c

Welcome to our channel, we are two ethical hackers, Clinton


05:49
How I Would Learn To Hack (If I Could Start Over)
09:02
Day In The Life of Two Hackers | London
03:31
The Top 10 Cybersecurity Careers
10:00
Create your own Keylogger in C++
14:30
How to make a virus
13:02
How to do OSINT with Spiderfoot
26:17
How we look for SQL injection vulnerabilities | Binance Part 3
27:13
Watch Us Hack Our WordPress Site | Part 2
24:00
Hacking Our Own WordPress Site: Recon & Enumeration
36:05
Hacking Binance - Bug Bounty Hunting for Cross Site Scripting | Part 2
14:55
Hacking WiFi : Evil Twin Attack with Airgeddon | 2024
23:00
Wi-Fi Hacking with Flipper Zero - Deauthentication Attack | 2024
16:48
GitHub Phishing Attack: Evilginx2 MFA Bypass Explained | 2024
19:35
Hacking Binance (Part 1) - Recon & Enumeration
07:21
How We Became Ethical Hackers: Our Journey, Tips & Tricks
16:42
Hacking WIFI in 2024 - De-authentication Attack
06:13
The Dark Side of Social Engineering: Vishing Scams Explained
10:52
My CPTS Certification Experience with Hack The Box | Exam Review
06:47
eJPT - eLearnSecurity Junior Penetration Tester REVIEW
11:42
Hacking Tinder - Live bug bounty hunting on Hackerone (Part 1)
21:34
HTB Nest - Enumeration Walkthrough - Part 1
01:32
Talking rubbish
08:30
A Day in the life of an Ethical Hacker (Penetration Tester)
02:01
Hello
03:26
Navigating Arrays with Python: The Sparse Arrays Challenge - Episode 3
01:39
Mastering Positive and Negative Numbers A Step by Step Guide
06:21
Converting Time with Python: 12-hour to 24-hour Format - Episode 2
10:24
Problem-Solving in Python: Plus Minus Ratio Calculation - Episode 1
01:22
Uncovering the Surprising Counting Technique that will Blow Your Mind!
01:14
Discover the Ultimate Way to Organize and Archive Your Collections!
01:47
Unveiling Secrets BloodHound reveals Kerberos & tests for admin access!
01:33
Unlocking Database Secrets SA User ID and Password Revealed!
01:20
Unveiling SQL Hacks Identifying Impersonation Opportunities in MSSQL Databases
02:33
Mastering DNS Cap Hacking through RDP with Hack the Box
05:22
ASMR Programming - Door Mat Pattern - No Talking
11:27
Server - Multithreaded Java Chat Room Project
03:13
Multithreaded Java Chat Room Application
11:58
JAVA VOIP PROJECT | PART 3: THE RECORDER
07:25
JAVA VOIP PROJECT PART 2: COMMON SOUNDS
08:52
Java Networking Programming - Simple VOIP Tutorial - Part 1 - Server