Channel Avatar

Ajin Abraham @UCydYZGwQcBRDFpe07M03Tqw@youtube.com

3.4K subscribers - no pronouns :c

Security Research | Anything that revs |Travel the World!


01:44
VIMC Trackday September 2024 - M2C, Michelin PS4S, Ohlins RT
04:06
MobSF iOS Dynamic Analyzer
07:53
Sanair Trackday 2020
06:28
Trackday at Mecaglisse
00:42
Automated Mobile Application Security Assessment with MobSF
03:32
Winter Lapping and Drifting 2020 at Calabogie Motorsports Park
01:59
Planet Iceland - DJI Mavic Air
00:56
BMW M2 Competition M Performance Exhaust Sound
03:39
Tandem Skydive at Parachute Montreal 13500 ft
06:11
Drive to Mont Orford
02:44
Paragliding in Pokhara, Sarankot, Nepal
08:22
Bangalore to Devarayanadurga Hills (DD Hills)
02:18
Bypassing Hotstar Premium with DOM manipulation and some JavaScript
03:27
Droid Application Fuzz Framework - DAFF
01:41
BMW M Driver Training Bangalore 2017
05:30
Mullayanagiri Peak & Kudremukh Trek - GoPro Travel Video
02:11
Exploiting insecure file extraction in Python for code execution
00:53
OpSecX Android Security Tools Expert - ATX
02:24
BANGALORE to MEKEDATU - GoPro Travel Video
50:57
Injecting Security into Web apps at Runtime - Ajin Abraham, PHDays 2017
05:20
Will it Pwn CVE-2017-5638: Remote Code Execution in Apache Struts 2?
04:11
Exploiting Node.js deserialization bug for Remote Code Execution
00:45
Zenwatch 3 Google Voice search on button
10:30
Windows App Static Analysis with MobSF
01:56
XSSing JS-MVC Applications
04:15
IMMUNIO: Will it Pwn?
01:35
OpSecX WebSecNinja : The Lesser Known WebAttacks
01:02
OpSecX | Online Security Education for Everyone
02:50
Automated Mobile Application Security Assessment with MobSF
02:15
OpenSecurity WebSecNinja: Lesser Known Web Attacks
03:35
AppLock MITM Reset Password Vulnerability
01:23
Whisper - PoC
01:38
Node.js Security: Pentesting and Exploitation - Overview
02:30
Cross Site Scripting (XSS) Attacks for Pentesters from OpenSecurity
02:39
Android Application Pentesting Course from OpenSecurity
01:22
Browser Fingerprinting with Xenotix (Browser & Feature Detection)
04:12
Network Information Gathering with Xenotix
03:12
Victim Fingerprinting with Xenotix
02:03
Detecting Web Application Firewall (WAF) using Xenotix
05:19
Setting up Payload Server for Exploitation and Information Gathering in Xenotix
06:27
General Settings in Xenotix
04:00
Scanning for DOM XSS with Xenotix
02:20
Detecting XSS in Web Applications that use OAuth 1.0a
01:11
Tizen 2.2.1 WebKit Address Spoofing Vulnerability
00:05
Young Buddies near my Car Porch
06:47
Detecting XSS with Advanced Request Fuzzer
05:55
Detecting XSS with POST Request Fuzzer in an Authenticated Page
04:59
Detecting XSS with POST Request Fuzzer
06:15
Detecting XSS with GET Request Fuzzer
10:49
Detecting XSS in GET Request
03:24
Introduction to OWASP Xenotix XSS Exploit Framework
00:51
Facebook Self Redirection from HTML Anchor's window.opener property
01:08
YouTube Self Redirection from HTML Anchor's window.opener property
07:01
OWASP Xenotix XSS Exploit Framework 6 Features
01:47
Persistent XSS in magentocommerce.com
31:26
XSS Filter Bypass, Detection and Explanation with OWASP Xenotix
03:42
WinRAR 4.20 File Spoofing Vulnerability
18:56
nullcon Goa 2013 Detecting & Exploiting XSS vulnerabilities with OWASP Xenotix XSS Exploit Framework
02:05
DEFCON Kerala Closing note and Feedback
09:41
xBOT: The PoC Bot that uses Google Apps to implement it's command and control center