Channel Avatar

NetBr1nger @UCtLZqn9Z1uXv3ri7oUMyPxA@youtube.com

None subscribers - no pronouns set

🔒💻 Malware, forums, online threats & more. From the crypti


06:20
Must Watch | U.S. Government's Latest AI Security Guidelines Explained!
04:37
China's Keyboard Apps EXPOSED | Shocking Security Flaws
02:17
Back to the Future 4 | If it were made in 2024
08:33
Crypters as a Service (CaaS) | Understanding Malware 101
05:14
Latrodectus Malware | New Threat ECLIPSES email campagins
05:00
BYAKUGAN MALWARE Campaigns | From PDF's to Payload
16:02
VENOM RAT ANALYSIS | A DREAM come true for Pentesters?
03:00
VENOM RAT UNLEASHED in LATIN AMERICA | Malvertising Campaigns terrorizing Hispanic countries
03:38
BACKDOOR in XZ UTILS! | Are you AFFECTED by it?
04:25
TheMoon BOTNET resurfaces! | Enslaving EOL devices to power FACELESS Proxy
06:08
A Manifesto on THE GREATEST VULNERABILITY | OURSELVES
04:09
MALWARE posing as AIRFORCE INVITE! | Hackers hit Indian Defense
03:19
MUDDYWATER deploys ATERA! | SURVEILLANCE in PHISHING ATTACKS
11:14
EVADING Microsoft Defender Static Analysis! | Mastering PAYLOAD OBFUSCATION
02:44
STRELASTEALER PHISHING ATTACKS! | Hitting the E.U & USA
07:59
INFECTING MY OWN PC with XENO RAT | Is this one of the BEST FREE RATs out there?
03:25
French Government DDoS HARD | Anonymous Sudan Botnet
04:12
Apex Legends IS NOT SAFE? | Exposing North America Series HACKING
05:18
BEWARE of HTML SMUGGLING! | Delivering MALWARE VIA FAKE GOOGLE SITES
06:30
PAYLOAD ENCRYPTION TYPES | MALWARE DEVELOPMENT 101
04:59
MAGNET GOBLIN deploys NERBIAN RAT | Exposing a 1 DAY VULNERABILITY
06:57
Dread Forums DRONE DELIVERY! | Octopus & Spreading DRUGS via UAS
06:28
LOCKBIT'S CYBERCRIMINAL SENTENCED to 4 years! | Mikhail Vasiliev & his Ransomware Scheme
06:50
INCOGNITO DarkNet Market EXIT SCAM! | Story of their Last Act!
05:49
Acuity Contractor DATA LEAK NEWS | ICE & USCIS Breach
10:52
Malware Detection Essentials | Exposing the Most Abused APIs
06:28
CHINESE HACKERS vs TIBETANS! | Evasive Panda's Supply Chain Attack!
04:26
MIDNIGHT BLIZZARD STEALING from MICROSOFT! | APT29 Gained access to source code
05:39
RisePro INFOSTEALER | Story of a FAILED experiment
05:23
US MILITARY Documents LEAKED on DISCORD | The story of Jack Teixeira
08:53
LOCKBIT vs FBI | a LEAKED response from Lockbit's ADMIN STAFF!
04:34
PHOBOS RANSOMWARE | A new strain attacking US CRITICAL INFRASTRUCTURE
11:27
Dynamic Link Libraries | Malware Development & The Risk of INVOKING DLLs
04:45
NSO Group & PEGASUS vs META | A battle for PRIVACY
04:25
SILVER SAML Attack! | A SSO (Single Sign-On) Vulnerability
12:35
YASHMA | A Dark Web Mystery
06:31
REMCOS RAT & UAC-0184 | The Stealth Attack on Ukrainian Systems Unveiled
05:23
XENO RAT TROJAN Exposed | Protect Yourself from the New Invisible Cyber Threat
04:26
North Korea's GAMBLING THREAT | A RISK YOU CAN'T AFFORD!
08:04
TROJANS & PAYLOADS are placed like THIS! | Malware 101
04:03
NOVA SENTINEL MALWARE | A PyPI Supply Chain Attack
04:24
LOCKBITSUPP Identity REVEALED? | LOCKBIT 4.0 Development
07:11
CONTI RANSOMWARE GROUP DATA LEAK | A Dark Tale from the Internet
07:25
China's SPYWARE LEAKED | IS00N | APT41
06:56
LOCKBIT'S RANSOMWARE Group TAKEDOWN | Inside Operation CRONOS
03:42
The FBI HUNT FOR Vyacheslav Penchukov | Most WANTED HACKER on the RUN.
09:53
ADULT TOY MALWARE ALERT | Unexpected Cyber Threats from USB Charging
05:22
CANADA'S CRAZIEST BAN Unveiled | The Flipper Zero Controversy Explained
07:08
VIDEOS CAN'T BE TRUSTED no more | OpenAi Sora
09:28
Decrypting the Darknet: Captain Anon's Darknet Bible
10:40
Phantom Secure Exposed: The Rise and Fall of a Shadow Network Empire
06:32
Don't Be the Next Victim!!! LumaC2 Infostealer Exposed
03:26
Zeus Malware Exposed: The Cyber Threat That Shook the World
01:35:43
Code of Crime: Forensic Experts and the Race Against Time in NYC
09:27
Ransomware Unveiled: Analyzing Encrypted Files Using Volatility3
01:24
Data Collection in Cybersecurity: A Deep Dive into Volatility and System Analysis
03:00
Threat Hunting Essentials: A Step-by-Step Approach from Hypothesis to Remediation
02:57
Step-by-Step Tutorial: Nessus Scan for Effective Network Traffic Monitoring
30:54
Security+ Prep Begins: Conquering HTB's 'Lame' in Record Time!
12:55
El Tiempo como Lenguaje: Explorando ARRIVAL y Cien Años de Soledad