Dark | Light
# ![@declanmidd Avatar](https://lunarcrush.com/gi/w:26/cr:youtube::UCq3hUnT7BR1igAJLAPbi4WQ.png) @declanmidd Declan Middleton

Declan Middleton posts on YouTube about what is, shorts, $googl, ai the most. They currently have [-----] followers and [---] posts still getting attention that total [---] engagements in the last [--] hours.

### Engagements: [---] [#](/creator/youtube::UCq3hUnT7BR1igAJLAPbi4WQ/interactions)
![Engagements Line Chart](https://lunarcrush.com/gi/w:600/cr:youtube::UCq3hUnT7BR1igAJLAPbi4WQ/c:line/m:interactions.svg)

- [--] Week [-----] +43%
- [--] Month [------] +0.89%
- [--] Months [-------] +102%
- [--] Year [-------] +105,812%

### Mentions: [--] [#](/creator/youtube::UCq3hUnT7BR1igAJLAPbi4WQ/posts_active)
![Mentions Line Chart](https://lunarcrush.com/gi/w:600/cr:youtube::UCq3hUnT7BR1igAJLAPbi4WQ/c:line/m:posts_active.svg)

- [--] Week [--] -17%
- [--] Month [--] -61%
- [--] Months [---] +77%
- [--] Year [---] +2,338%

### Followers: [-----] [#](/creator/youtube::UCq3hUnT7BR1igAJLAPbi4WQ/followers)
![Followers Line Chart](https://lunarcrush.com/gi/w:600/cr:youtube::UCq3hUnT7BR1igAJLAPbi4WQ/c:line/m:followers.svg)

- [--] Week [-----] +2.30%
- [--] Month [-----] +9.90%
- [--] Months [-----] +110%
- [--] Year [-----] +2,749%

### CreatorRank: [---------] [#](/creator/youtube::UCq3hUnT7BR1igAJLAPbi4WQ/influencer_rank)
![CreatorRank Line Chart](https://lunarcrush.com/gi/w:600/cr:youtube::UCq3hUnT7BR1igAJLAPbi4WQ/c:line/m:influencer_rank.svg)

### Social Influence

**Social category influence**
[technology brands](/list/technology-brands)  [stocks](/list/stocks)  [social networks](/list/social-networks)  [products](/list/products)  [finance](/list/finance)  [gaming](/list/gaming) 

**Social topic influence**
[what is](/topic/what-is), [shorts](/topic/shorts), [$googl](/topic/$googl), [ai](/topic/ai), [future](/topic/future), [tutorial](/topic/tutorial), [discord](/topic/discord), [python](/topic/python), [tools](/topic/tools), [how to](/topic/how-to)

**Top accounts mentioned or mentioned by**
[@declanmiddles](/creator/undefined)

**Top assets mentioned**
[Alphabet Inc Class A (GOOGL)](/topic/$googl) [ANONYMOUS (ANONYMOUS)](/topic/anonymous) [Robot Consulting Co., Ltd. (LAWR)](/topic/robot)
### Top Social Posts
Top posts by engagements in the last [--] hours

"Kali Linux Cursor DISAPPEARED After Update (VMware Fix) https://hackerr.io If your Kali Linux cursor suddenly vanished in VMware after updating youre not alone this bug has been hitting a lot of users recently. After running weekly updates many people report that their mouse pointer becomes completely invisible making Kali almost impossible to use inside VMware. In this short tutorial Ill show you: Why the Kali update breaks your VMware mouse integration What causes the invisible cursor glitch The exact compatibility setting you need to change How to fix the issue instantly without"  
[YouTube Link](https://youtube.com/watch?v=4rC7FynIPMs)  2025-12-09T20:25Z [----] followers, 12.9K engagements


"How to Install Parrot Security OS on Mac using UTM [----] Edition https://mac.getutm.app/ https://parrotsec.org/ Install Parrot OS on MacBook Air using UTM. Fast secure and perfect for ethical hacking. Want to turn your MacBook Air into a full hacking lab In this tutorial Ill show you exactly how to install Parrot OS on a Mac using UTM fast clean and beginner-friendly. Perfect for ethical hackers penetration testers cybersecurity students and anyone who wants a lightweight Linux distro running safely on macOS. Parrot OS is built for privacy anonymity and security testing. With UTM you can run"  
[YouTube Link](https://youtube.com/watch?v=YW1Jy3pY7hk)  2025-12-06T21:30Z [----] followers, [---] engagements


"Ultimate Kali Linux Basics Tutorial for Beginners (2025/2026 Edition) Kali Linux from Scratch ๐Ÿ“Œ Welcome to the Ultimate Kali Linux Basics Tutorial for Beginners (2025/2026 Edition) https://hackerr.io Are you new to Kali Linux or looking to start your journey in ethical hacking penetration testing or cybersecurity This in-depth tutorial is designed specifically for beginners who want to learn how to use Kali Linux from the ground up. In this comprehensive video well walk you through the core fundamentals of Kali Linux including installation terminal basics file system navigation package"  
[YouTube Link](https://youtube.com/watch?v=csxy3LQB4X0)  2025-07-27T14:30Z [----] followers, 64.6K engagements


"Tiny file manager file upload reverse shell kali linux php reverse shell using weevely"  
[YouTube Link](https://youtube.com/watch?v=7kGV4psdbac)  2023-05-20T20:54Z [----] followers, [----] engagements


"Create a phishing site in [--] seconds Phishing Attacks Are Shockingly Easy (Heres How They Work) ๐Ÿ‘‰ https://hackerr.io Phishing Scams Are Everywhere NordVPN Helps Keep You Safe (70% OFF) ๐Ÿ‘‰ https://go.nordvpn.net/SH9uh Github repo in the video https://github.com/htr-tech/zphisher Want to learn cybersecurity or improve your skills Check out Hack The Box perfect for beginners and pros alike ๐Ÿง ๐Ÿ’ป ๐Ÿ‘‰ https://hacktheboxltd.sjv.io/YRLYoJ โš  Disclaimer: This is for educational purposes only. Unauthorized hacking is illegal. We're here to learn ethical hacking and cybersecurity to protect against real"  
[YouTube Link](https://youtube.com/watch?v=uupKSiqohEw)  2025-07-25T09:01Z [----] followers, 21.5K engagements


"Trust me Ive got this. ๐Ÿ˜Ž Trust me Ive got this. ๐Ÿ˜Ž #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=-ZXtyf5xjpY)  2025-10-09T00:18Z [----] followers, [---] engagements


"BlueDucky - The vulnerability allows an attacker to impersonate a Bluetooth Human Interface Device BlueDucky - The vulnerability allows an attacker to impersonate a Bluetooth Human Interface Device (HID) like a keyboard and inject keystrokes into a target device without needing to pair. โš  Educational purposes only #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=0Qzd4D4dCoc)  2025-10-03T10:01Z [----] followers, [---] engagements


"What Linux distribution did Elliot Alderson use in the beginning of Mr What Linux distribution did Elliot Alderson use in the beginning of Mr. Robot โš  Entertainment purposes only #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=0Yj56SG2VUg)  2025-10-02T02:09Z [----] followers, [----] engagements


"Sherlock is an open-source OSINT (Open-Source Intelligence) tool Sherlock is an open-source OSINT (Open-Source Intelligence) tool specifically designed for finding usernames across many different social networks and websites. Essentially you give Sherlock a username and it will check hundreds of websites to see if that username is registered there. This can be incredibly useful in cybersecurity investigations digital footprint analysis or gathering information during ethical hacking or red-teaming exercises. Sherlock is written in Python and is quite simple to use once set up. You just"  
[YouTube Link](https://youtube.com/watch?v=1j_DzABs50M)  2025-04-28T20:23Z [----] followers, [----] engagements


"Top [--] Lightweight Linux Operating Systems Top [--] Lightweight Linux Operating Systems #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=2zTyesN7GPU)  2025-07-30T02:51Z [----] followers, [----] engagements


"Tools dont make you SKID ignorance does"  
[YouTube Link](https://youtube.com/watch?v=3agDPSYQMbY)  2025-07-22T06:57Z [----] followers, [---] engagements


"This is used by Ethical Hackers. โš  educational only This is used by Ethical Hackers. โš  educational only #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=4HrHhFTkiIk)  2025-09-28T05:10Z [----] followers, [----] engagements


"How Hackers Hack Your Website Want to dive deep into cybersecurity and master the art of ethical hacking Become a member today and unlock hacking tutorials and expert content. Click here to join my discord: https://discord.gg/R8J3xMcRMD โ˜• Educational Purposes Only Teaching cybersecurity to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. // Connect with Me // https://linkedin.com/in/declanmiddleton ๐Ÿšซ Disclaimers: Unauthorized hacking is illegal. The content on this channel is for educational purposes only focused"  
[YouTube Link](https://youtube.com/watch?v=4VkEhALSFTI)  2025-04-10T00:28Z [----] followers, [----] engagements


"๐ŸšจCard Skimmer EXPOSED on Camera You Wont Believe This ๐Ÿ˜ฑ๐Ÿ’ณ โš  entertainment purposes only ๐ŸšจCard Skimmer EXPOSED on Camera You Wont Believe This ๐Ÿ˜ฑ๐Ÿ’ณ โš  entertainment purposes only #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=4Z1eE2CXxqc)  2025-09-30T01:07Z [----] followers, [---] engagements


"Why do Penetration Testers use Kali Linux #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=53JqqdzwRZU)  2025-05-27T05:55Z [----] followers, [----] engagements


"What is Enum4linux ๐Ÿ” Enum4linux is a powerful information-gathering tool used by ethical hackers What is Enum4linux ๐Ÿ” Enum4linux is a powerful information-gathering tool used by ethical hackers to enumerate Windows machines over SMB revealing usernames shares and more. Its often used in penetration testing to understand network structure (for educational purposes only โš ). #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=5BEJsTGnL2Y)  2025-10-11T03:14Z [----] followers, [---] engagements


"Reviewing Vulnerable Spring Boot Code from RedPanda CTF (educational only) ๐Ÿผ๐Ÿ’ฅ Reviewing Vulnerable Spring Boot Code from RedPanda CTF (educational only) ๐Ÿผ๐Ÿ’ฅ #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=5QOPpR_ACP0)  2025-08-06T08:10Z [----] followers, [--] engagements


"Can you hack a Smart Fridge Want to dive deep into cybersecurity and master the art of ethical hacking Become a member today and unlock hacking tutorials and expert content. Click here to join my discord: https://discord.gg/R8J3xMcRMD โ˜• Educational Purposes Only Teaching cybersecurity to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. // Connect with Me // https://linkedin.com/in/declanmiddleton ๐Ÿšซ Disclaimers: Unauthorized hacking is illegal. The content on this channel is for educational purposes only focused"  
[YouTube Link](https://youtube.com/watch?v=6JPLPUPl9eQ)  2025-04-16T23:46Z [----] followers, [----] engagements


"Ethical Hackers vs. Malicious Hackers What's the Real Difference #shorts #cybersecurity Ethical Hackers vs. Malicious Hackers What's the Real Difference #shorts #cybersecurity ๐ŸŽง Music by Track: Cybertrack by Kidcut License Code: U9VNXQBZ0QP53Z85"  
[YouTube Link](https://youtube.com/watch?v=7BiN3au7J6Q)  2025-07-22T08:10Z [----] followers, [---] engagements


"Python Libraries explained #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=7PefxYrHD6k)  2025-05-21T18:21Z [----] followers, [----] engagements


"Python SSH Login using Paramiko #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=9cjJx_AbHEM)  2025-05-18T07:42Z [----] followers, [----] engagements


"Cybersecurity interview tips #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=9m-jv9t3LIg)  2025-05-31T10:11Z [----] followers, [---] engagements


"Automation with Python is key to saving time โš  Educational only Automation with Python is key to saving time โš  Educational only #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=AFIpArzGRUE)  2025-10-13T23:09Z [----] followers, [---] engagements


"I found something better than Nano ๐Ÿ˜ƒ I found something better than Nano ๐Ÿ˜ƒ #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=AIn5jhcZgPo)  2025-08-04T05:14Z [----] followers, [---] engagements


"(Educational) Zip File RCE on Greenhorn CTF retired Machine ๐Ÿš๐Ÿ’ฅ (Educational) Zip File RCE on Greenhorn CTF retired Machine ๐Ÿš๐Ÿ’ฅ #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=AaGn_EI8b00)  2025-08-04T10:10Z [----] followers, [---] engagements


"Python Script Automates Path Traversal #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=B5G26mpxrRk)  2025-05-16T01:53Z [----] followers, [----] engagements


"POV: You Installed TOR at 3AM ๐Ÿ•’ POV: You Installed TOR at 3AM ๐Ÿ•’ #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=BIgw53zrxCA)  2025-07-25T09:12Z [----] followers, [---] engagements


"Villain in Kali Linux ๐Ÿ”ฅ The Hackers C2 Framework Explained Ever wondered how hackers manage Villain in Kali Linux ๐Ÿ”ฅ The Hackers C2 Framework Explained Ever wondered how hackers manage multiple shells at once ๐Ÿ‘€ Meet Villain a powerful post-exploitation & C2 framework built into Kali Linux. It lets penetration testers control compromised systems run commands and organize shells way beyond what Netcat can do. โš  For educational purposes only. Unauthorized use is illegal. kali linux cybersecurity ethical hacking red team pentesting post exploitation C2 framework villain kali linux hacking tools"  
[YouTube Link](https://youtube.com/watch?v=Bt8A4zWmfQs)  2025-10-04T06:00Z [----] followers, [---] engagements


"HOAXSHELL HoaxShell is a post-exploitation tool used by ethical hackers and red teamers to get a HOAXSHELL HoaxShell is a post-exploitation tool used by ethical hackers and red teamers to get a reverse shell over HTTP/HTTPS โš  For educational purposes only. HoaxShell is a reverse shell tool that works over HTTP/HTTPS helping ethical hackers test how well firewalls detect covert connections. Its used in red team operations to simulate real-world scenarios safely and improve defenses. #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=ChquIq1J2p4)  2025-10-05T03:06Z [----] followers, [---] engagements


"Wifite what pros use to audit Wi-Fi fast Wifite what pros use to audit Wi-Fi fast. โš  Educational only. #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=ElK9roq90mY)  2025-10-10T02:09Z [----] followers, [---] engagements


"What your Linux distribution says about you lol ๐Ÿ˜‚ #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=FGMxU8pf5Ww)  2025-06-26T07:31Z [----] followers, [---] engagements


"Is Kali Linux for Noobs or Script Kiddies I dont think so. #cybersecurity #ethicalhacking #tech"  
[YouTube Link](https://youtube.com/watch?v=FMytGLKn4E8)  2024-12-26T07:03Z [----] followers, [--] engagements


"Top [--] Cybersecurity books for Beginners #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=FfYF_s5qDuY)  2025-07-16T01:24Z [----] followers, [----] engagements


"Prevent Server Attacks Secure Your Directory Now Want to dive deep into cybersecurity and master the art of ethical hacking Become a member today and unlock hacking tutorials and expert content. Click here to join my discord: discord.gg/R8J3xMcRMD โ˜• Educational Purposes Only Teaching cybersecurity to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. // Connect with Me // https://linkedin.com/in/declanmiddleton ๐Ÿšซ Disclaimers: Unauthorized hacking is illegal. The content on this channel is for educational purposes"  
[YouTube Link](https://youtube.com/watch?v=GKX_pei-pcg)  2024-12-13T07:46Z [---] followers, [--] engagements


"โš  Dont Be Fooled How ReactJS Powers Modern Phishing Sites (educational only) โš  Dont Be Fooled How ReactJS Powers Modern Phishing Sites (educational only) #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=GOdleX9AgtA)  2025-07-31T04:39Z [----] followers, [---] engagements


"Ettercap is a network security tool โš  Educational purposes only Ettercap is a network security tool โš  Educational purposes only #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=HBXzJSPvNU4)  2025-10-12T02:17Z [----] followers, [---] engagements


"Subfinder tool in Kali Linux explained Want to dive deep into cybersecurity and master the art of ethical hacking Become a member today and unlock hacking tutorials and expert content. Click here to join my discord: https://discord.gg/R8J3xMcRMD โ˜• Educational Purposes Only Teaching cybersecurity to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. // Connect with Me // https://linkedin.com/in/declanmiddleton ๐Ÿšซ Disclaimers: Unauthorized hacking is illegal. The content on this channel is for educational purposes"  
[YouTube Link](https://youtube.com/watch?v=HUJiEPS0pXQ)  2025-04-08T06:34Z [----] followers, [---] engagements


"Mastering C2 Servers #cybersecurity Want to dive deep into cybersecurity and master the art of ethical hacking Become a member today and unlock hacking tutorials and expert content. Click here to join my discord: discord.gg/R8J3xMcRMD โ˜• Educational Purposes Only Teaching cybersecurity to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. ๐Ÿ“•Recommended Reading Kali Linux for Beginners: Your Amazon Book Link Linux Basics for Hackers: Your Amazon Book Link Advanced Kali Linux Guide: Your Amazon Book Link // Connect"  
[YouTube Link](https://youtube.com/watch?v=IMT-UnttJP8)  2024-12-12T20:20Z [---] followers, [--] engagements


"Cybersecurity OS - Athena os โš  Educational only Cybersecurity OS - Athena os โš  Educational only #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=JUAPD5x58yQ)  2025-10-16T20:09Z [----] followers, [----] engagements


"Retired machine hackthebox - Metasploit - meterpreter binary was already on the box from previous Retired machine hackthebox - Metasploit - meterpreter binary was already on the box from previous attempts โš  Educational only #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=JvV2kc7AG3g)  2025-10-15T00:19Z [----] followers, [---] engagements


"John the ripper SSH access (hackthebox retired) Previse #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=NyDJmZhQDSY)  2025-05-30T03:18Z [----] followers, [----] engagements


"Better version than Burpsuite only) Better version than Burpsuite only) #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=O9hN4uMa9d4)  2025-09-30T05:04Z [----] followers, [--] engagements


"Kage - Metasploit GUI version but better #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=OeJVkRE1twc)  2025-07-10T03:12Z [----] followers, [---] engagements


"๐Ÿšจ 70% OFF NordVPN Secure Your Internet and Save Big ๐Ÿ’ธ #shorts #cybersecurity ๐Ÿšจ 70% OFF NordVPN Secure Your Internet and Save Big ๐Ÿ’ธ #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=PNWjUPfpkco)  2025-07-25T06:43Z [----] followers, [---] engagements


"Someone made a Ddos tool Using the Ping Command #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=PUGQDzHHaGw)  2024-12-15T03:27Z [---] followers, [--] engagements


"Linux privilege escalation Retired Hackthebox Machine (educational) Linux privilege escalation Retired Hackthebox Machine (educational) #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=Pd5ujhHEi9g)  2025-07-27T09:10Z [----] followers, [---] engagements


"Metasploit explained by a Ethical Hacker #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=QUaVkDG8HV0)  2025-01-07T01:00Z [----] followers, [--] engagements


"Top [--] VPN - Virtual Private Networks to use in [----] #shorts #cybersecurity Top [--] VPN - Virtual Private Networks to use in [----] #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=QaEYzYNfRQE)  2025-07-25T03:42Z [----] followers, [----] engagements


"Armitage - GUI version of Metasploit"  
[YouTube Link](https://youtube.com/watch?v=QqKjJouivEY)  2025-06-23T06:52Z [----] followers, [---] engagements


"Mr Robot uses Kali Linux ๐Ÿ”ฅ Mr Robot uses Kali Linux ๐Ÿ”ฅ #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=RejAUDEf6c8)  2025-10-03T00:20Z [----] followers, [---] engagements


"My reaction to hate comments #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=S--elQOhiv0)  2025-06-02T05:53Z [----] followers, [----] engagements


"Ai Skids are COMING cursor ai text editor (Entertainment purposes only ๐Ÿ˜‚) Ai Skids are COMING cursor ai text editor (Entertainment purposes only ๐Ÿ˜‚) #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=SJDOezUEFnc)  2025-09-30T00:06Z [----] followers, [---] engagements


"PermX - Live Walkthrough Hackthebox Retired Machine (PermX) Want to dive deep into cybersecurity and master the art of ethical hacking Become a member today and unlock hacking tutorials and expert content. Click here to join my discord: https://discord.gg/R8J3xMcRMD โ˜• Educational Purposes Only Teaching cybersecurity to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. // Connect with Me // https://linkedin.com/in/declanmiddleton Join me live as we dive into Headless a retired HackTheBox machine. Whether you're"  
[YouTube Link](https://youtube.com/watch?v=TBmFSGJhNQ0)  2025-04-15T06:01Z [----] followers, [--] engagements


"Top [--] Cybersecurity Tools I use a Penetration Tester / ethical hacker Top [--] Cybersecurity Tools I use a Penetration Tester / ethical hacker #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=TCz2BS_J4Bs)  2025-07-23T09:11Z [----] followers, [----] engagements


"โšก How Hackers Crack Wi-Fi in Seconds with Pixiewps Pixiewps is a tool that exploits weak WPS PINs โšก How Hackers Crack Wi-Fi in Seconds with Pixiewps Pixiewps is a tool that exploits weak WPS PINs using the Pixie Dust attack allowing hackers to recover Wi-Fi keys super fast. โš  Educational purposes only. #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=UIBDikWKu4A)  2025-10-04T10:02Z [----] followers, [---] engagements


"Wi-Fi pineapple ๐Ÿ (entertainment purposes only) Wi-Fi pineapple ๐Ÿ (entertainment purposes only) #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=UPg10wWKkFo)  2025-09-29T23:05Z [----] followers, [---] engagements


"POV: You installed Kali Linux for the first time POV: You installed Kali Linux for the first time #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=V374ImSHc8s)  2025-07-27T06:12Z [----] followers, [----] engagements


"Live Walkthrough Hackthebox Retired HackTheBox Machine (Headless) Want to dive deep into cybersecurity and master the art of ethical hacking Become a member today and unlock hacking tutorials and expert content. Click here to join my discord: https://discord.gg/R8J3xMcRMD โ˜• Educational Purposes Only Teaching cybersecurity to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. // Connect with Me // https://linkedin.com/in/declanmiddleton Join me live as we dive into Headless a retired HackTheBox machine. Whether"  
[YouTube Link](https://youtube.com/watch?v=Veu1xTTrW-0)  2025-04-16T07:47Z [----] followers, [---] engagements


"Trying out Athena Os โš  Educational only Trying out Athena Os โš  Educational only #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=VuWQo785SwM)  2025-10-16T20:09Z [----] followers, [----] engagements


"O.MG Cable from Hak5 O.MG Cable from Hak5. โš  Educational only #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=X-g9-qU1X8k)  2025-09-30T00:08Z [----] followers, [---] engagements


"I Used Nikto and THIS Happened. ๐Ÿ‘ฝ๐Ÿ’ป (You Wont Believe It) In this video I explore Nikto the open-source web server scanner used by ethical hackers to uncover dangerous vulnerabilities. But what I found. was unexpected. ๐Ÿ˜จ ๐Ÿ” What is Nikto ๐Ÿ›ก How ethical hackers use it ๐Ÿ‘ฝ A surprise twist you wont see coming Whether youre a cybersecurity beginner or a seasoned hacker this tool deserves your attention. Stick around for the unexpected moment that had me SHOCKED. ๐Ÿ’ป Tools used: ๐Ÿ”ธ Nikto: https://github.com/sullo/nikto ๐Ÿ”ธ Kali Linux / Parrot OS ๐ŸŽ“ Learn More: โœ… Get my ethical hacking Course:"  
[YouTube Link](https://youtube.com/watch?v=XFq_vDverHM)  2025-04-30T05:03Z [----] followers, [----] engagements


"3 Cybersecurity Books That Will Transform Your Knowledge and Boost Your Skills Today โ˜• Educational Purposes Only Teaching cybersecurity to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. // Connect with Me // https://linkedin.com/in/declanmiddleton https://discord.gg/R8J3xMcRMD ๐Ÿšซ Disclaimers: Unauthorized hacking is illegal. The content on this channel is for educational purposes only focused on ethical hacking penetration testing and cybersecurity awareness to help individuals and organizations defend against"  
[YouTube Link](https://youtube.com/watch?v=XgQODfuXRU4)  2025-04-11T01:16Z [----] followers, [----] engagements


"Retired HackTheBox Machine - Live Walkthrough Hackthebox part [--] - stream crashed Want to dive deep into cybersecurity and master the art of ethical hacking Become a member today and unlock hacking tutorials and expert content. Click here to join my discord: https://discord.gg/R8J3xMcRMD โ˜• Educational Purposes Only Teaching cybersecurity to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. // Connect with Me // https://linkedin.com/in/declanmiddleton Join me live as we dive into BoardLight a retired HackTheBox"  
[YouTube Link](https://youtube.com/watch?v=ZAtIZ4Y6DcU)  2025-04-14T16:13Z [----] followers, [---] engagements


"Proof of concept Python Automation for Captuothe flags Cybersecurity scripting Proof of concept Python Automation for Captuothe flags Cybersecurity scripting. โš  Educational only #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=_-x-SlXj5I4)  2025-10-13T23:09Z [----] followers, [---] engagements


"Xspear XSS Vulnerability Scanner tool for pentesters and ethical hackers ๐Ÿซก โš  educational Xspear XSS Vulnerability Scanner tool for pentesters and ethical hackers ๐Ÿซก โš  educational purposes only #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=_ZQ_QsGFXuE)  2025-10-03T01:20Z [----] followers, [---] engagements


"Code injection technique Using Python #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=_czxOIu3xNY)  2025-05-31T19:42Z [----] followers, [--] engagements


"Why Installing Kali Linux is the Smartest Move for Aspiring Ethical Hackers and Penetration Testers. Why Installing Kali Linux is the Smartest Move for Aspiring Ethical Hackers and Penetration Testers. #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=a-0TkTrHDO8)  2025-08-06T09:08Z [----] followers, [---] engagements


"Free tools that protect your privacy Free tools that protect your privacy #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=aIXCdK_YF8A)  2025-07-23T02:18Z [----] followers, [---] engagements


"Live Walkthrough Hackthebox Retired HackTheBox Machine (Headless) Want to dive deep into cybersecurity and master the art of ethical hacking Become a member today and unlock hacking tutorials and expert content. Click here to join my discord: https://discord.gg/R8J3xMcRMD โ˜• Educational Purposes Only Teaching cybersecurity to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. // Connect with Me // https://linkedin.com/in/declanmiddleton Join me live as we dive into Headless a retired HackTheBox machine. Whether"  
[YouTube Link](https://youtube.com/watch?v=aSe0JQ_-QoA)  2025-04-15T00:52Z [----] followers, [---] engagements


"Kali Linux setup ๐Ÿฅถ Kali Linux setup ๐Ÿฅถ #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=cYjTDrcbzMw)  2025-10-03T22:07Z [----] followers, [---] engagements


"Fake Wi-Fi Hotspots Airgeddon Explained โš  Educational purposes only Fake Wi-Fi Hotspots Airgeddon Explained โš  Educational purposes only #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=cZhPZEZ4vto)  2025-09-30T20:08Z [----] followers, [---] engagements


"๐Ÿ‘ป Hackers are scarier than ghosts heres why you should NEVER trust free Wi-Fi ๐Ÿ‘ป Hackers are scarier than ghosts heres why you should NEVER trust free Wi-Fi. โš  Educational only โš  #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=ck7ryopje2E)  2025-09-30T20:07Z [----] followers, [----] engagements


"Backtrack Linux Old version of the original Kali Linux Operating system โš  Educational only Backtrack Linux Old version of the original Kali Linux Operating system โš  Educational only #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=cxByZM0q7Vo)  2025-10-10T23:19Z [----] followers, [---] engagements


"Explaining what Metasploit is to my Parents ๐Ÿ”— Social instagram.com/declan.middleton tiktok.com/@declanmiddles linkedin.com/in/declanmiddleton https://discord.gg/R8J3xMcRMD ๐Ÿ™๐ŸปSupport me: https://shorturl.at/RoeYd ๐Ÿ‘•Merch: coming soon ๐Ÿ’ธ Help me raise $3000 for Video Production: https://buymeacoffee.com/declanmiddleton โš  Disclaimer Unauthorized hacking is illegal. This channel is dedicated solely to educational purposes focusing on cybersecurity ethical hacking and penetration testing to help us defend against real-world cyber threats. #kalilinux #ethicalhacking #ethicalhacker #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=d-NQ5QUYF-w)  2025-05-06T06:32Z [----] followers, [----] engagements


"POV: Me when I use Kali Linux POV: Me when I use Kali Linux #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=eKaTabbk5Ts)  2025-10-03T22:07Z [----] followers, [----] engagements


"How one line of Python leads to root access ๐Ÿ”“ (Educational only) How one line of Python leads to root access ๐Ÿ”“ (Educational only) #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=fRwVcF3UaFc)  2025-08-05T10:12Z [----] followers, [---] engagements


"POV: You Think Youre Safe Online Then I Open Zphisher POV: You Think Youre Safe Online Then I Open Zphisher #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=ff7wojhsDBY)  2025-07-26T01:23Z [----] followers, [----] engagements


"Ethical SSRF on CTF (educational) ๐Ÿ” Ethical SSRF on CTF (educational) ๐Ÿ” #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=fhkhBWJLw8A)  2025-08-05T04:12Z [----] followers, [---] engagements


"smb attack using responder - capture hashes and crack password"  
[YouTube Link](https://youtube.com/watch?v=hCBVCBMVETY)  2023-05-24T00:31Z [----] followers, [----] engagements


"Watch dogs in real life - Flipper Zero โš  Educational only Watch dogs in real life - Flipper Zero โš  Educational only #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=hKZlj_vYUag)  2025-10-02T21:22Z [----] followers, [---] engagements


"Vulnerability in web app lets check searchsploit โš  Educational only Vulnerability in web app lets check searchsploit โš  Educational only #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=iorUtUziT3c)  2025-10-14T09:01Z [----] followers, [---] engagements


"Greenhorn CTF retired Machine Pwned LIVE ๐Ÿ”ฅ Walkthrough Greenhorn CTF retired Machine Pwned LIVE ๐Ÿ”ฅ Walkthrough #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=ksj0xphhWK8)  2025-08-04T10:09Z [----] followers, [--] engagements


"Tools for Cybersecurity Enthusiasts and Ethical Hackers If you're interested in learning more about cybersecurity whether you're just starting out or want to sharpen your hacking skills I highly recommend checking out Hack The Box ๐Ÿง ๐Ÿ’ป Start Hackthebox TODAY https://hacktheboxltd.sjv.io/YRLYoJ โš  Disclaimer Unauthorized hacking is illegal. This channel is dedicated solely to educational purposes focusing on cybersecurity ethical hacking and penetration testing to help us defend against real-world cyber threats. #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=lFHJHCTgD24)  2025-07-06T23:59Z [----] followers, [----] engagements


"introduction to Clawnix Cybersecurity tool #cybersecurity i made this tool for penetration testing and defensive purposes"  
[YouTube Link](https://youtube.com/watch?v=lFOrXdnukdw)  2025-06-05T16:19Z [----] followers, [---] engagements


"Kali Linux on your main machine is it a safe idea or not๐Ÿ’ก โš  Educational only Kali Linux on your main machine is it a safe idea or not๐Ÿ’ก โš  Educational only #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=lSNxA5dVH2A)  2025-10-01T03:09Z [----] followers, [---] engagements


"๐Ÿšจ The DARK Side of Roblox Voice Chat (Parents need to hear this) โš  For awareness only not hate ๐Ÿšจ The DARK Side of Roblox Voice Chat (Parents need to hear this) โš  For awareness only not hate towards Roblox. Most people dont realize how unsafe Roblox voice chat can be for kids. From predators pretending to be friends to toxic convos slipping past moderation its way deeper than you think. ๐ŸŽฎ๐Ÿ’ญ If your little sibling or cousin plays Roblox you NEED to see this. Stay safe online always. ๐Ÿ›ก #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=la8XtKTUvMI)  2025-10-05T22:19Z [----] followers, [---] engagements


"Trying out Manjaro Linux arch based โš  educational only Trying out Manjaro Linux arch based โš  educational only #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=mW7VW9K6wSI)  2025-10-13T23:09Z [----] followers, [---] engagements


"FREE Websites to Learn Cybersecurity ๐Ÿ’ฅ Want to dive deep into cybersecurity and master the art of ethical hacking Become a member today and unlock hacking tutorials and expert content. Click here to join my discord: https://discord.gg/R8J3xMcRMD โ˜• Educational Purposes Only Teaching cybersecurity to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. // Connect with Me // https://linkedin.com/in/declanmiddleton ๐Ÿšซ Disclaimers: Unauthorized hacking is illegal. The content on this channel is for educational purposes"  
[YouTube Link](https://youtube.com/watch?v=mZfVzjweplg)  2025-03-28T00:09Z [----] followers, [---] engagements


"Love the process of Learning and getting better instead of doubting your ability to understand a Love the process of Learning and getting better instead of doubting your ability to understand a particular topic. #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=olQjhfvY4Z4)  2025-10-13T23:09Z [----] followers, [--] engagements


"Retired HackTheBox Machine - Live Walkthrough Hackthebox Want to dive deep into cybersecurity and master the art of ethical hacking Become a member today and unlock hacking tutorials and expert content. Click here to join my discord: https://discord.gg/R8J3xMcRMD โ˜• Educational Purposes Only Teaching cybersecurity to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. // Connect with Me // https://linkedin.com/in/declanmiddleton Join me live as we dive into BoardLight a retired HackTheBox machine. Whether you're"  
[YouTube Link](https://youtube.com/watch?v=orQIpuKAIq0)  2025-04-14T14:56Z [----] followers, [---] engagements


"POV: me trying to learn Linux POV: me trying to learn Linux #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=p8-YeNXVfXs)  2025-08-02T09:08Z [----] followers, [----] engagements


"Day in the life of a Cybersecurity Content Creator ๐Ÿ˜‚ Day in the life of a Cybersecurity Content Creator ๐Ÿ˜‚ #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=pvB40GGTBq4)  2025-10-03T23:09Z [----] followers, [---] engagements


"Netcat who pwncat gives you scripted shells port-forwarding and stealth perfect for red teamers Netcat who pwncat gives you scripted shells port-forwarding and stealth perfect for red teamers (Offensive Security) - (Penetration Testing) โš  Educational purposes only โš  #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=q-DFpThtI1o)  2025-10-03T05:14Z [----] followers, [---] engagements


"Unlocking Cloud Security PenTesting Secrets Revealed #cybersecurity Want to dive deep into cybersecurity and master the art of ethical hacking Become a member today and unlock hacking tutorials and expert content. Click here to join my discord: discord.gg/R8J3xMcRMD โ˜• Educational Purposes Only Teaching cybersecurity to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. // Connect with Me // https://linkedin.com/in/declanmiddleton ๐Ÿšซ Disclaimers: Unauthorized hacking is illegal. The content on this channel is for"  
[YouTube Link](https://youtube.com/watch?v=qYj_jr9lurQ)  2024-12-12T20:22Z [---] followers, [--] engagements


"Screenshot any Website using this Tool #cybersecurity ๐Ÿ”— Social instagram.com/declan.middleton tiktok.com/@declanmiddles linkedin.com/in/declanmiddleton https://discord.gg/R8J3xMcRMD ๐Ÿ™๐ŸปSupport me: https://shorturl.at/RoeYd ๐Ÿ‘•Merch: coming soon ๐Ÿ’ธ Help me raise $3000 for Video Production: https://buymeacoffee.com/declanmiddleton โš  Disclaimer Unauthorized hacking is illegal. This channel is dedicated solely to educational purposes focusing on cybersecurity ethical hacking and penetration testing to help us defend against real-world cyber threats. #kalilinux #ethicalhacking #ethicalhacker"  
[YouTube Link](https://youtube.com/watch?v=qg7Hbmo0Bw8)  2025-05-04T20:53Z [----] followers, [----] engagements


"Cybersecurity Desk Setup Spring Cleaning ๐Ÿงผ๐Ÿ’ป Time to clean up and level up your cybersecurity workstation In this YouTube Short Im giving my cybersecurity desk setup a full spring cleaningdecluttering my tech workspace organizing my infosec tools optimizing cable management and tightening up my digital security environment. Whether you're a cybersecurity student a red teamer blue team analyst ethical hacker or just love clean efficient hacker desk setups this video is for you. From keyboard and monitor upgrades to privacy tools and network security gear Im showing how a clean space = a"  
[YouTube Link](https://youtube.com/watch?v=qudySj2oJOg)  2025-04-19T21:09Z [----] followers, [----] engagements


"Path Traversal vulnerability found #hackthebox #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=rr9yxokXK0I)  2025-05-14T21:58Z [----] followers, 13.9K engagements


"โœจ Swift programming language for Ethical Hackers and Penetration Testers. Want to dive deep into cybersecurity and master the art of ethical hacking Become a member today and unlock hacking tutorials and expert content. Click here to join my discord: https://discord.gg/R8J3xMcRMD โ˜• Educational Purposes Only Teaching cybersecurity to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. // Connect with Me // https://linkedin.com/in/declanmiddleton ๐Ÿšซ Disclaimers: Unauthorized hacking is illegal. The content on this"  
[YouTube Link](https://youtube.com/watch?v=rvpHiVmD844)  2025-03-25T23:52Z [----] followers, [---] engagements


"POV: day in the life of a NPC Hacker POV: day in the life of a NPC Hacker #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=siyA0dcp_mM)  2025-10-04T01:08Z [----] followers, [----] engagements


"Hide Yourself w/ Proxychains and TOR Comprehensive Guide to Proxychains Tool What is Proxychains Comprehensive Guide to Proxychains Tool Proxychains is a powerful networking tool primarily used in the Linux environment that allows users to route their internet traffic through a series of proxy servers. This technique is commonly known as proxy chaining. By doing this Proxychains helps enhance privacy bypass network restrictions and anonymize your online activities. How Does Proxychains Work Proxychains works by intercepting network connections from any application and redirecting them through"  
[YouTube Link](https://youtube.com/watch?v=sjqwq-teAeE)  2025-07-24T11:45Z [----] followers, [---] engagements


"Path Traversal Discovered in [--] Seconds ๐Ÿ”— Social instagram.com/declan.middleton tiktok.com/@declanmiddles linkedin.com/in/declanmiddleton https://discord.gg/R8J3xMcRMD ๐Ÿ™๐ŸปSupport me: https://shorturl.at/RoeYd ๐Ÿ‘•Merch: coming soon ๐Ÿ’ธ Help me raise $3000 for Video Production: https://buymeacoffee.com/declanmiddleton โš  Disclaimer Unauthorized hacking is illegal. This channel is dedicated solely to educational purposes focusing on cybersecurity ethical hacking and penetration testing to help us defend against real-world cyber threats. #kalilinux #ethicalhacking #ethicalhacker #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=tlqHuVr9a9E)  2025-05-16T22:27Z [----] followers, [----] engagements


"Local File Include vulnerability Custom Python script (educational) #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=uYFp8dq7wd0)  2025-05-27T09:26Z [----] followers, [----] engagements


"๐Ÿ–ฅ Tools for Ethical Hackers and Cybersecurity Researchers Want to dive deep into cybersecurity and master the art of ethical hacking Become a member today and unlock hacking tutorials and expert content. Click here to join my discord: https://discord.gg/R8J3xMcRMD โ˜• Educational Purposes Only Teaching cybersecurity to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. // Connect with Me // https://linkedin.com/in/declanmiddleton ๐Ÿšซ Disclaimers: Unauthorized hacking is illegal. The content on this channel is for"  
[YouTube Link](https://youtube.com/watch?v=v0q0xZj2WOw)  2025-03-23T22:07Z [----] followers, [---] engagements


"5 Reasons to Use Kali Linux as Your Daily Driver ๐Ÿ”ฅ๐Ÿ’ป [--] Reasons to Use Kali Linux as Your Daily Driver ๐Ÿ”ฅ๐Ÿ’ป #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=v_cnrvIOB0g)  2025-10-02T21:22Z [----] followers, [---] engagements


"Favourite Penetration Testing Linux distribution"  
[YouTube Link](https://youtube.com/watch?v=w52Zoq5Uzjw)  2025-04-12T22:16Z [----] followers, [---] engagements


"Mastering Metasploit Secrets to Payload Obfuscation #cybersecurity Want to dive deep into cybersecurity and master the art of ethical hacking Become a member today and unlock hacking tutorials and expert content. Click here to join my discord: discord.gg/R8J3xMcRMD โ˜• Educational Purposes Only Teaching cybersecurity to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. // Connect with Me // https://linkedin.com/in/declanmiddleton ๐Ÿšซ Disclaimers: Unauthorized hacking is illegal. The content on this channel is for"  
[YouTube Link](https://youtube.com/watch?v=w68GoCI0BNQ)  2024-12-12T20:21Z [---] followers, [--] engagements


"The Backdoor Factory tool The Backdoor Factory tool. Essentially its a tool that can insert hidden backdoors into binaries โš  For educational purposes only. #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=wIR_MR4jRmY)  2025-10-01T19:12Z [----] followers, [---] engagements


"DNSChef tool in Kali Linux So in one line: DNS spoofing = lying about a websites address so people DNSChef tool in Kali Linux So in one line: DNS spoofing = lying about a websites address so people end up at a fake site. โš  Educational purposes only #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=xh9uYk48Slk)  2025-10-04T10:02Z [----] followers, [---] engagements


"How to install Kali Linux like a Pro in 2025"  
[YouTube Link](https://youtube.com/watch?v=y89xwmPB7BA)  2025-07-16T01:27Z [----] followers, [---] engagements


"Kali Linux basics video on my YouTube link in bio Kali Linux basics video on my YouTube link in bio #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=yU5QdSdz6qw)  2025-08-06T08:11Z [----] followers, [---] engagements


"The Tiny PHP Shell Hackers Love (p0wny-shell) ๐Ÿ‘€๐Ÿ’ป p0wny-shell is a tiny single-file PHP webshell The Tiny PHP Shell Hackers Love (p0wny-shell) ๐Ÿ‘€๐Ÿ’ป p0wny-shell is a tiny single-file PHP webshell that gives a terminal-like interface in your browser so you can run commands and manage files on a PHP host. Used by pentesters to simulate real scenarios and test defenses. Do not upload or use on systems you dont own or have explicit permission to test. โš  (Educational purposes only) #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=ydHciirn928)  2025-10-03T01:20Z [----] followers, [---] engagements


"EVERYONE GOT HACKED [--] Billion passwords got leaked #cybersecurity #fyp If you're interested in learning more about cybersecurity whether you're just starting out or want to sharpen your hacking skills I highly recommend checking out Hack The Box ๐Ÿง ๐Ÿ’ป Start Hackthebox TODAY https://hacktheboxltd.sjv.io/YRLYoJ โš  Disclaimer Unauthorized hacking is illegal. This channel is dedicated solely to educational purposes focusing on cybersecurity ethical hacking and penetration testing to help us defend against real-world cyber threats"  
[YouTube Link](https://youtube.com/watch?v=ywIoXcg0Kzs)  2025-06-21T21:08Z [----] followers, [--] engagements


"ProxyChains Explained: Private Browsing on Steroids ๐Ÿ˜Ž (For Education) ProxyChains Explained: Private Browsing on Steroids ๐Ÿ˜Ž (For Education) #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=zKrO2S19CL8)  2025-07-25T04:19Z [----] followers, [---] engagements


"How hacker stay anonymous (Chapter [--] - Ethical Hacking Basics) - Educational only Hackers would use ProxyChains to route their internet traffic through a series of intermediary proxy servers which conceals their real IP address and location making it extremely difficult to trace their online activities. This technique is often combined with other anonymity methods for maximum stealth. โš  Disclaimer: This is for educational purposes only. Unauthorized hacking is illegal. We're here to learn ethical hacking and cybersecurity to protect against real threats. #CyberSecurity #EthicalHacking"  
[YouTube Link](https://youtube.com/watch?v=-6dsGxsB-qg)  2025-12-04T04:09Z [----] followers, [---] engagements


"How Port Scanning Works using Python Network Scanning Explained Kali Linux Educational How Port Scanning Works using Python Network Scanning Explained Kali Linux Educational purposes only #shorts #cybersecurity MUSIC IN VIDEO. Beautiful Day - Urban Godzilla Content owners: Elite Alliance Music ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends"  
[YouTube Link](https://youtube.com/watch?v=-F6UzBp5RvA)  2025-12-12T18:11Z [----] followers, [----] engagements


"Metasploit for Beginners (Chapter [--] - Ethical Hacking Basics) โš  Disclaimer: This is for educational purposes only. Unauthorized hacking is illegal. We're here to learn ethical hacking and cybersecurity to protect against real threats. #CyberSecurity #EthicalHacking #HackTheBox #LearnHacking #VPN #OnlineSafety"  
[YouTube Link](https://youtube.com/watch?v=-PwUOvO7eNw)  2025-12-04T04:03Z [----] followers, [--] engagements


"Pre production vulnerability found in angular web application . Pre production vulnerability found in angular web application . #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends google cybersecurity learn cybersecurity what cybersecurity do what is cybersecurity women in cybersecurity ai and cybersecurity cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=-V_hYZlKUXI)  2025-12-14T07:03Z [----] followers, [----] engagements


"How Hackers Exploit PHP File Upload Vulnerabilities (Full Breakdown) Want to dive deep into cybersecurity and master the art of ethical hacking Become a member today and unlock hacking tutorials and expert content. Click here to join my discord: https://discord.gg/R8J3xMcRMD โ˜• Educational Purposes Only Teaching cybersecurity to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. // Connect with Me // https://linkedin.com/in/declanmiddleton ๐Ÿšซ Disclaimers: Unauthorized hacking is illegal. The content on this channel"  
[YouTube Link](https://youtube.com/watch?v=0NOYrDBJ5q8)  2024-10-22T08:02Z [----] followers, [----] engagements


"What is Hydra Hydra (often called THC-Hydra) is a fast open-source parallelized login tool used to What is Hydra Hydra (often called THC-Hydra) is a fast open-source parallelized login tool used to test authentication strength by trying many username/password combinations against network services. Music from Uppbeat https://uppbeat.io/t/img/visibility โš  Educational purposes only #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=2KZs16FeBNI)  2025-10-26T23:06Z [----] followers, [---] engagements


"Kali Linux on Windows [--] (WSL) Full Setup & Real-World Use educational only Kali Linux on Windows [--] (WSL) Full Setup & Real-World Use educational only #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends google cybersecurity learn cybersecurity what cybersecurity do what is cybersecurity women in cybersecurity ai and"  
[YouTube Link](https://youtube.com/watch?v=3R5aLbjjYWM)  2025-12-12T04:06Z [----] followers, [----] engagements


"FFUF for beginners ffuf is a fast web fuzzer used by penetration testers to discover hidden FFUF for beginners ffuf is a fast web fuzzer used by penetration testers to discover hidden directories files parameters and attack surfaces that are not visible to normal users. In this video I demonstrate ffuf in a controlled lab environment for educational purposes only showing how security professionals identify misconfigurations and improve defensive security. โš  Educational purposes only content never do anything without permission to test systems security. โš  https://nordvpn.com/declan #shorts"  
[YouTube Link](https://youtube.com/watch?v=40P9yzNmi9I)  2026-01-09T03:19Z [----] followers, [----] engagements


"Why I prefer FFUF and Dirsearch for directory scanning โš  educational only Why I prefer FFUF and Dirsearch for directory scanning โš  educational only #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends google cybersecurity learn cybersecurity what cybersecurity do what is cybersecurity women in cybersecurity ai and"  
[YouTube Link](https://youtube.com/watch?v=4jkKpc9KPGE)  2025-12-09T23:06Z [----] followers, [---] engagements


"Understanding Metasploit Architecture (Metasploit Fundamentals ep3) Welcome to Episode [--] of the Metasploit Fundamentals Course. Now that your lab environment is ready its time to understand what makes Metasploit such a powerful exploitation framework. Before you can use it effectively you need to know how all the moving parts inside Metasploit actually work together. In this episode we break down the Metasploit Architecture step-by-step so you can see the full picture of how exploits payloads and modules operate under the hood. Youll learn: The [--] core components of the Metasploit Framework"  
[YouTube Link](https://youtube.com/watch?v=6fzMhxbEHgw)  2025-12-10T20:00Z [----] followers, [--] engagements


"Password Strength Is Analyzed Python for Beginners Kali Linux Educational only Password Strength Is Analyzed Python for Beginners Kali Linux Educational only #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends google cybersecurity learn cybersecurity what cybersecurity do what is cybersecurity women in cybersecurity ai and"  
[YouTube Link](https://youtube.com/watch?v=6n2xkldpuq4)  2025-12-12T06:03Z [----] followers, [----] engagements


"What is Nmap โš  Educational purposes only What is Nmap โš  Educational purposes only #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=7oXwhAnLPm8)  2025-10-19T23:09Z [----] followers, [----] engagements


"The NEW Next.js Vulnerability Nobodys Talking About The NEW Next.js Vulnerability Nobodys Talking About #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=87L04Vp46YU)  2025-12-09T01:07Z [----] followers, [---] engagements


"Kali Linux VMware Workstation bridge network connection issue resolved using Virtual Network Editor โ˜• Educational Purposes Only Teaching Cyber Security to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. ๐ŸŽฅ Video Topics: Kali Linux VMware workstation bridge network connection issue fixed using virtual network editor ๐Ÿšซ Disclaimers: Hacking without permission is illegal. This channel is for educational purposes only"  
[YouTube Link](https://youtube.com/watch?v=9hwr-bz85kk)  2024-09-21T02:06Z [----] followers, [----] engagements


"Learning Cybersecurity be like . Want to dive deep into cybersecurity and master the art of ethical hacking Become a member today and unlock hacking tutorials and expert content. Click here to join my discord: https://discord.gg/R8J3xMcRMD โ˜• Educational Purposes Only Teaching cybersecurity to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. // Connect with Me // https://linkedin.com/in/declanmiddleton // Visit the Dex Security https://dexsecurityacademy.com/ ๐Ÿšซ Disclaimers: Unauthorized hacking is illegal. The"  
[YouTube Link](https://youtube.com/watch?v=Ar9XDNUU1A8)  2025-03-31T22:57Z [----] followers, [---] engagements


"FFUF tool Kali Linux for noobies Educational only FFUF tool Kali Linux for noobies Educational only #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends google cybersecurity learn cybersecurity what cybersecurity do what is cybersecurity women in cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=CNNJ-nQnOto)  2025-12-12T03:09Z [----] followers, [----] engagements


"Metasploit For Beginners - How To Pwn A Website Learn from a pro ethical hacker // Mini Penetration Testing course for Beginners https://whop.com/dex-security-academy-course/ https://dexsecurityacademy.com/ โ˜• Educational Purposes Only Teaching cybersecurity to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. Want to dive deep into cybersecurity and master the art of ethical hacking Become a member today and unlock hacking tutorials and expert content. Click here to join my discord: https://discord.gg/R8J3xMcRMD //"  
[YouTube Link](https://youtube.com/watch?v=CjzmxkJm_nM)  2025-04-13T02:46Z [----] followers, [----] engagements


"Weevely tool in Kali Linux Kali linux for noobies Educational only Weevely tool in Kali Linux Kali linux for noobies Educational only #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends google cybersecurity learn cybersecurity what cybersecurity do what is cybersecurity women in cybersecurity ai and cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=D9K0XZOlKFc)  2025-12-12T03:09Z [----] followers, [---] engagements


"POV: You didn't finish the CTF Challenge on Hackthebox or Tryhackme. POV: You didn't finish the CTF Challenge on Hackthebox or Tryhackme. #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=Df1JCT0rT9w)  2025-12-05T02:20Z [----] followers, [---] engagements


"Nmap for begineers everything to do with Nmap - Network Mapper Nmap for begineers everything to do with Nmap - Network Mapper. โš  educational only โš  #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends google cybersecurity learn cybersecurity what cybersecurity do what is cybersecurity women in cybersecurity ai and"  
[YouTube Link](https://youtube.com/watch?v=FPqh9mKzVCs)  2026-01-16T07:11Z [----] followers, [---] engagements


"I Intercepted Network Traffic with Bettercap (Beginner Friendly) part [--] https://www.bettercap.org/ https://www.kali.org/tools/bettercap/ Stay safe online with NordVPN ๐Ÿ‘‰ https://nordvpn.com/declan This video explains how Man-in-the-Middle attacks work from an educational cybersecurity perspective using Bettercap on Parrot OS in a controlled lab environment. Bettercap is a widely used network analysis and security assessment tool that helps demonstrate how traffic flows across a local network and how attackers may attempt to intercept or observe communications when systems are misconfigured or"  
[YouTube Link](https://youtube.com/watch?v=GCkb5Iw6qAE)  2025-12-16T02:55Z [----] followers, [---] engagements


"๐Ÿ›œ What Is Bettercap The Hacking Tool Hackers Dont Talk About pentesters use Bettercap to test how ๐Ÿ›œ What Is Bettercap The Hacking Tool Hackers Dont Talk About pentesters use Bettercap to test how secure networks really are. It can perform ARP spoofing DNS spoofing packet sniffing credential harvesting and traffic injection on both wired and wireless networks. Because it operates live Bettercap shows exactly how attackers can exploit weak network configurations unsecured Wi-Fi and careless user behavior. https://uppbeat.io/t/tecnosine/drowning License code: Z7LKMHIXKP1WKLIP Educational"  
[YouTube Link](https://youtube.com/watch?v=HYIQoSjIcUw)  2025-12-18T21:23Z [----] followers, [----] engagements


"How to install Parrot Os on a MacBook laptop ๐Ÿฆœ ๐Ÿ’ป How to install Parrot Os on a MacBook laptop ๐Ÿฆœ ๐Ÿ’ป #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=Hb9qGxRDmzU)  2025-10-24T01:10Z [----] followers, [----] engagements


"Previse hackthebox #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=ITrDWAlnGMc)  2025-05-28T17:39Z [----] followers, [----] engagements


"Weak passwords vs Strong Passwords Weak passwords vs Strong Passwords. Music from Uppbeat: Music used - falling-mirrors-chilled License code: NMEXSINK6MLN1SSP #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends google cybersecurity learn cybersecurity what cybersecurity do what is cybersecurity women in cybersecurity ai and"  
[YouTube Link](https://youtube.com/watch?v=JahEqtzpIoU)  2026-01-18T21:19Z [----] followers, [----] engagements


"You just got called a skid. You just got called a skid. #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=JjjsGkcekhc)  2025-11-22T03:18Z [----] followers, [----] engagements


"Part 2: Why Bettercap Is So Dangerous (and Powerful) What makes Bettercap stand out is how much Part 2: Why Bettercap Is So Dangerous (and Powerful) What makes Bettercap stand out is how much control it gives over a network once access is gained. Instead of just observing traffic Bettercap can actively alter communications between devices without users noticing. This means attackers can silently redirect websites inject malicious content downgrade HTTPS connections or hijack sessions in real time. Bettercap is especially effective on public and poorly secured Wi-Fi networks where devices"  
[YouTube Link](https://youtube.com/watch?v=KCieuoZcqdU)  2025-12-18T22:21Z [----] followers, [---] engagements


"How to Install Kali Linux on Windows [--] Using WSL (2025 Method) https://hackerr.io Want the power of Kali Linux without wiping your PC or setting up a virtual machine In this video Ill show you step-by-step how to install Kali Linux on Windows [--] using WSL (Windows Subsystem for Linux) the fastest and easiest way to start hacking learning cybersecurity or running Linux tools directly inside Windows. This method is perfect for beginners AND advanced users because: No dual-booting required No virtual machine lag Full Linux environment inside Windows Access to real Kali tools using WSL 2"  
[YouTube Link](https://youtube.com/watch?v=KXsp8zkDLU0)  2025-12-09T08:58Z [----] followers, [----] engagements


"Settings up the environment (Chapter [--] - Ethical hacking Basics) โš  Disclaimer: This is for educational purposes only. Unauthorized hacking is illegal. We're here to learn ethical hacking and cybersecurity to protect against real threats. #CyberSecurity #EthicalHacking #HackTheBox #LearnHacking #VPN #OnlineSafety"  
[YouTube Link](https://youtube.com/watch?v=L1OJOUlnmKI)  2025-12-04T03:10Z [----] followers, [--] engagements


"โš  The Python Tool Hackers Dont Want You to Understand Penelope is a Python-based โš  The Python Tool Hackers Dont Want You to Understand Penelope is a Python-based post-exploitation utility used by penetration testers to manage reverse shells more efficiently. It provides session handling command execution file transfer support and better control over unstable shells compared to raw netcat connections. Ethical hackers use Penelope during authorized security assessments to improve workflow and simulate real-world attacker behavior in a controlled lab environment. โš  WARNING: This content is for"  
[YouTube Link](https://youtube.com/watch?v=LuYvgg4I_d4)  2025-12-22T00:08Z [----] followers, [----] engagements


"Exposing Hidden Web App Paths LIVE with Dirsearch - hackthebox retired machine Exposing Hidden Web App Paths LIVE with Dirsearch - hackthebox retired machine #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=N4P3Gy1J5MQ)  2025-12-09T01:08Z [----] followers, [---] engagements


"This React Flaw Could Let Hackers Take Over EVERYTHING This React Flaw Could Let Hackers Take Over EVERYTHING #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=Nru5c62BPUY)  2025-12-09T01:08Z [----] followers, [---] engagements


"Patator - Kali Linux โš  Educational only Patator - Kali Linux โš  Educational only #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=O7v66ZrbiRY)  2025-11-26T23:09Z [----] followers, [---] engagements


"Server side template injection vulnerability #cybersecurity (educational) hackthebox"  
[YouTube Link](https://youtube.com/watch?v=OVyWLbQohpQ)  2025-07-12T01:49Z [----] followers, [----] engagements


"Website coping tools for cybersecurity enthusiasts - follow for more Website coping tools for cybersecurity enthusiasts - follow for more #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=RbdPI7kbWA8)  2025-11-27T22:15Z [----] followers, [----] engagements


"M1 M2 and M3 MacBook computers good for penetration testing and ethical hacking Want to dive deep into cybersecurity and master the art of ethical hacking Become a member today and unlock hacking tutorials and expert content. Click here to join my discord: https://discord.gg/R8J3xMcRMD โ˜• Educational Purposes Only Teaching cybersecurity to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. // Connect with Me // https://linkedin.com/in/declanmiddleton ๐Ÿšซ Disclaimers: Unauthorized hacking is illegal. The content on"  
[YouTube Link](https://youtube.com/watch?v=S1nrkjmvFVQ)  2025-04-15T07:04Z [----] followers, 12.5K engagements


"Everyone Uses Kali Linux So Why Do People Hate It Kali isnt bad but its often misunderstood Everyone Uses Kali Linux So Why Do People Hate It Kali isnt bad but its often misunderstood overused and blamed for mistakes that have nothing to do with the OS itself. #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends google"  
[YouTube Link](https://youtube.com/watch?v=S4KcdAE-iG8)  2025-12-23T06:06Z [----] followers, [----] engagements


"Want to learn more about web security and iOS security Want to learn more about web security and iOS security #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=VultmiyZMms)  2025-11-17T20:11Z [----] followers, [----] engagements


"Introduction to Metasploit Framework (Metasploit Fundamentals ep1) In this lesson were breaking down the fundamentals of the Metasploit Framework inside Kali Linux. Before we touch any commands its important to understand what Metasploit actually is and why its one of the most widely used exploitation frameworks in the cybersecurity industry. Metasploit Framework is an open-source platform used to identify validate and exploit vulnerabilities in systems. It provides a structured environment where security professionals can test systems safely using real well-documented exploits. Instead of"  
[YouTube Link](https://youtube.com/watch?v=WBlFrQH_XoU)  2025-12-10T10:00Z [----] followers, [---] engagements


"Black Hat VS White Hat - Computer hackers - what do they mean Educational information Music Black Hat VS White Hat - Computer hackers - what do they mean Educational information Music from Uppbeat (free for Creators): Music in video: falling-mirrors-chilled License code: NMEXSINK6MLN1SSP #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills"  
[YouTube Link](https://youtube.com/watch?v=W_JNAe4yEB8)  2026-01-17T23:19Z [----] followers, [---] engagements


"How to Install Parrot OS on Windows [--] (2025 Edition) Easiest VirtualBox Setup Tutorial Want to learn how to install Parrot OS on your Windows [--] machine in under [--] minutes ๐Ÿ‘‡ Step 1: Download the latest Parrot OS OVA file from the official Parrot Security website. ๐Ÿ‘‰ (Make sure to choose the VirtualBox-compatible version) Step 2: Download and install Oracle VirtualBox from virtualbox.org Step 3: Once VirtualBox is installed double-click the Parrot OS OVA file. It will automatically open and import into VirtualBox just click Import to continue. Step 4: Start Parrot OS by selecting it and"  
[YouTube Link](https://youtube.com/watch?v=WhcuhiVYp94)  2025-10-25T20:15Z [----] followers, [---] engagements


"Thanks for the support lets continue to grow this cybersecurity discord community Thanks for the support lets continue to grow this cybersecurity discord community #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=Wj3zwWjCXNo)  2025-11-30T04:04Z [----] followers, [---] engagements


"Port Scanning with Metasploit (Information Gathering and Scanning Ep. 7) Welcome to Episode [--] of the Metasploit Fundamentals Course an educational cybersecurity series designed to help you understand how security assessment tools function inside a safe private and fully authorized lab environment. In this lesson we explore how Metasploit performs port scanning one of the most important steps in any professional security assessment. Port scanning allows security teams to identify which services are running on a system so they can verify configuration issues detect unnecessary exposure and"  
[YouTube Link](https://youtube.com/watch?v=WlQycMFyFKw)  2025-12-11T01:56Z [----] followers, [---] engagements


"NZs Biggest Health Data Breach Hundreds of thousands of medical documents were taken in the NZs Biggest Health Data Breach Hundreds of thousands of medical documents were taken in the ManageMyHealth breach and the most alarming part is that no one publicly knows the exact flaw that was exploited. No confirmed vulnerability. No technical breakdown. Just unauthorised access. For healthcare systems thats a serious problem. These platforms store highly sensitive data and without transparency around what failed access controls document security or backend permissions the same class of weaknesses"  
[YouTube Link](https://youtube.com/watch?v=YXFbqgeKpMQ)  2026-01-11T04:17Z [----] followers, [----] engagements


"POV: You installed Tor Browser at 3AM"  
[YouTube Link](https://youtube.com/watch?v=aFxzH7ZK13A)  2025-10-23T21:46Z [----] followers, [---] engagements


"Basic Commands and Workflow (Metasploit Fundamentals Ep. 4) Welcome to Episode [--] of the Metasploit Fundamentals Course a structured educational series designed to help students and professionals understand how modern security tools function in a safe and controlled environment. In this episode we focus on the core commands and workflow used inside the Metasploit Framework. These basics form the foundation of how cybersecurity analysts and penetration testers operate during authorized security assessments. Understanding these commands is essential for navigating the MSF console evaluating"  
[YouTube Link](https://youtube.com/watch?v=bIaORmf336Y)  2025-12-10T21:24Z [----] followers, [---] engagements


"Passive and Active Reconnaissance (Information Gathering and Scanning Ep. 6) Welcome to Episode [--] of the Metasploit Fundamentals Course. In this lesson we explore one of the most important phases of any authorized security assessment: reconnaissance. Understanding how information is gatheredboth passively and activelyis critical for identifying potential weaknesses and improving system defenses. This episode explains how cybersecurity professionals use reconnaissance techniques in legal controlled environments to understand networks services and potential misconfigurations before running any"  
[YouTube Link](https://youtube.com/watch?v=bUxpexzNL1M)  2025-12-10T23:24Z [----] followers, [---] engagements


"Be Precise with Commands & Services (Information Gathering and Scanning Ep. 8) Welcome to Episode [--] of the Metasploit Fundamentals Course a structured cybersecurity learning series focused on teaching beginners how to safely and responsibly use security tools inside a controlled private lab environment. In this lesson we highlight one of the most important skills in cybersecurity and professional security assessments: precision specifically when working with Metasploit commands services modules and configuration options. Being precise with commands ensures accuracy consistency and safe"  
[YouTube Link](https://youtube.com/watch?v=baGkCCYiiTc)  2025-12-11T03:04Z [----] followers, [--] engagements


"Prune - directory search & Sub enumeration tool Prune - directory search & Sub enumeration tool. Prune is a cybersecurity tool designed for penetration testers and security professionals enabling concurrent reconnaissance workflows by combining advanced directory and vector discovery with automated subdomain enumeration in a single streamlined process. Tool available on my GitHub Open sourced. โš Educational purposes only #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=bqm7BCHTvNA)  2026-01-13T09:10Z [----] followers, [---] engagements


"I Thought It Was a Normal Box Then I Saw IP [--] I Thought It Was a Normal Box Then I Saw IP [--]. This Cybersecurity Challenge Was NOT Random. #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends google cybersecurity learn cybersecurity what cybersecurity do what is cybersecurity women in cybersecurity ai and cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=cBnPHUVQOcc)  2025-12-14T09:01Z [----] followers, [---] engagements


"Linux file structure linux folders understanding linux better โš  Disclaimer: This is for educational purposes only. Unauthorized hacking is illegal. We're here to learn ethical hacking and cybersecurity to protect against real threats. #CyberSecurity #EthicalHacking #HackTheBox #LearnHacking #VPN #OnlineSafety"  
[YouTube Link](https://youtube.com/watch?v=cOlCkHQjsco)  2025-12-03T21:34Z [----] followers, [---] engagements


"Sqlmap - SQL Injections (educational) (Chapter [--] - Web Application Security) โš  Disclaimer: This is for educational purposes only. Unauthorized hacking is illegal. We're here to learn ethical hacking and cybersecurity to protect against real threats. #CyberSecurity #EthicalHacking #HackTheBox #LearnHacking #VPN #OnlineSafety"  
[YouTube Link](https://youtube.com/watch?v=dqUk7onIAxE)  2025-12-04T04:59Z [----] followers, [--] engagements


"Why Short PINs Are Unsafe Brute Force Explained Kali Linux / Python Tutorial Educational Why Short PINs Are Unsafe Brute Force Explained Kali Linux / Python Tutorial Educational purposes only #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends google cybersecurity learn cybersecurity what cybersecurity do what is"  
[YouTube Link](https://youtube.com/watch?v=gnhsECDt-K8)  2025-12-12T09:00Z [----] followers, [----] engagements


"The Linux OS Hackers Actually Use One major reason Pop_OS stands out is how well it handles The Linux OS Hackers Actually Use One major reason Pop_OS stands out is how well it handles workflows. Features like automatic tiling window management advanced keyboard shortcuts and excellent hardware compatibility (especially for NVIDIA GPUs) make multitasking fast and efficient. That matters when running virtual machines coding or testing security tools. Pop_OS is also popular in cybersecurity because its stable open-source and compatible with popular penetration-testing and development tools. its"  
[YouTube Link](https://youtube.com/watch?v=i7WFDz5ZosE)  2026-01-10T05:15Z [----] followers, [----] engagements


"This is why Python is powerful and risky Kali Linux Python tutorial for beginners educational This is why Python is powerful and risky Kali Linux Python tutorial for beginners educational purposes only #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends google cybersecurity learn cybersecurity what cybersecurity do what is"  
[YouTube Link](https://youtube.com/watch?v=j1DWicct_EU)  2025-12-12T21:10Z [----] followers, [----] engagements


"๐Ÿ”ด SSTI in Java Spring Boot RedPanda HTB Walkthrough ๐Ÿผ Educational Only ๐Ÿง  ๐Ÿ”ด SSTI in Java Spring Boot RedPanda HTB Walkthrough ๐Ÿผ Educational Only ๐Ÿง  #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=jE_M5YU3FJw)  2025-08-05T23:17Z [----] followers, [---] engagements


"Declan is cooking with deprecated version of Python [--] โš  Educational only Declan is cooking with deprecated version of Python [--] โš  Educational only #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=jsFBjkUPgaA)  2025-10-14T10:03Z [----] followers, [---] engagements


"Dex Security Merch - Cybersecurity Merchandise for Penetration Testers and Computer Security Nerds Dex Security Merch - Cybersecurity Merchandise for Penetration Testers and Computer Security Nerds #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=k4PWwGC3Ww0)  2025-07-25T03:44Z [----] followers, [---] engagements


"I Found Everything About Them Using These Tools (OSINT Tutorial) If you're interested in learning more about cybersecurity whether you're just starting out or want to sharpen your hacking skills I highly recommend checking out Hack The Box ๐Ÿง ๐Ÿ’ป Start Hackthebox TODAY https://hacktheboxltd.sjv.io/YRLYoJ โš  Disclaimer Unauthorized hacking is illegal. This channel is dedicated solely to educational purposes focusing on cybersecurity ethical hacking and penetration testing to help us defend against real-world cyber threats. 00:00 Hacker intro 0:37 Google Dorking 2:34 Sherlock 3:15 theHarvester"  
[YouTube Link](https://youtube.com/watch?v=kJsJF8rkb5k)  2025-04-28T16:01Z [----] followers, 16K engagements


"Penelope (Python) Explained โš  How Ethical Hackers Stabilize Shells in Seconds Educational Only Penelope (Python) Explained โš  How Ethical Hackers Stabilize Shells in Seconds Educational Only Music from Uppbeat. https://uppbeat.io/t/atm/smoke-me License code: PNRMOSJAXTPSBN5R #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends"  
[YouTube Link](https://youtube.com/watch?v=lLghjwghjkU)  2025-12-22T21:20Z [----] followers, [----] engagements


"The best browser to use in [----] for cybersecurity The best browser to use in [----] for cybersecurity #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends google cybersecurity learn cybersecurity what cybersecurity do what is cybersecurity women in cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=lmkC8JQBIVY)  2026-01-13T23:21Z [----] followers, [----] engagements


"This OSINT Tool Shows What Data Exists About You (Intelius) Intelius is an open-source intelligence This OSINT Tool Shows What Data Exists About You (Intelius) Intelius is an open-source intelligence (OSINT)style data aggregation platform that compiles publicly available records such as names addresses and phone numbers to demonstrate how much information can exist about an individual online. In this video I explain how data exposure happens why digital footprints matter and how security professionals use OSINT tools to identify privacy risks and improve personal security. All demonstrated in"  
[YouTube Link](https://youtube.com/watch?v=mTq3eeIuk6g)  2026-01-09T04:14Z [----] followers, [---] engagements


"My M1 MacBook Air got HACKED using Python Educational only My M1 MacBook Air got HACKED using Python Educational only #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends google cybersecurity learn cybersecurity what cybersecurity do what is cybersecurity women in cybersecurity ai and cybersecurity cybersecurity cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=nEYvuc1xa04)  2025-12-12T22:09Z [----] followers, [----] engagements


"Kali Linux introduction for noobies โš  Disclaimer: This is for educational purposes only. Unauthorized hacking is illegal. We're here to learn ethical hacking and cybersecurity to protect against real threats. #CyberSecurity #EthicalHacking #HackTheBox #LearnHacking #VPN #OnlineSafety"  
[YouTube Link](https://youtube.com/watch?v=nLQfyrhio9g)  2025-12-03T21:32Z [----] followers, [--] engagements


"Rubeus Kerberos authentication protocol testing Educational only Rubeus Kerberos authentication protocol testing Educational only #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=nxXdrdZMPOQ)  2025-11-18T19:15Z [----] followers, [----] engagements


"What Is NetExec โš  The Tool Everyone Talks About (STRICTLY FOR EDUCATIONAL ONLY) Why Cybersecurity What Is NetExec โš  The Tool Everyone Talks About (STRICTLY FOR EDUCATIONAL ONLY) Why Cybersecurity Experts Use It. ๐ŸŽต Music from Uppbeat (free for Creators) https://uppbeat.io/t/tecnosine/drowning License code: EHWBSHR6TTMMUNGG #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary"  
[YouTube Link](https://youtube.com/watch?v=pNCKWcuR63g)  2026-01-08T22:22Z [----] followers, [----] engagements


"A critical vulnerability has been identified in the React Server Components (RSC) protocol NEXTJS A critical vulnerability has been identified in the React Server Components (RSC) protocol NEXTJS [--] [--] CVE-2025-66478 A brand-new Next.js vulnerability has been discovered that can allow attackers to bypass server logic leak sensitive data or execute unexpected behavior inside your application depending on how your routes and server components are configured. This vulnerability affects Next.js applications using the App Router especially those relying on: Server Actions Route Handlers API"  
[YouTube Link](https://youtube.com/watch?v=p_47v5X4etE)  2025-12-06T06:12Z [----] followers, [----] engagements


"Export Results from Database in Metasploit (Information Gathering and Scanning Ep. 9) Welcome to Episode [--] of the Metasploit Fundamentals Course a structured learning series created to help students and beginners understand how security tools operate inside a safe isolated and fully authorized lab environment. In this episode we focus on one of the most important but often overlooked parts of cybersecurity work: exporting results from the Metasploit database. During an authorized security assessment professionals collect large amounts of information hosts services open ports vulnerabilities"  
[YouTube Link](https://youtube.com/watch?v=qmP0IBrXqQ4)  2025-12-11T03:45Z [----] followers, [--] engagements


"Is Nordvpn Legit This video breaks down what NordVPN says it does not collect no browsing Is Nordvpn Legit This video breaks down what NordVPN says it does not collect no browsing history no IP address logs no DNS queries. If you care about VPN privacy online security and internet anonymity this matters. https://nordvpn.com/declan Music from Uppbeat: clock-is-ticking License code: 6PHNNB5HYQRINHUW #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=rG6hDLHcyIk)  2026-01-05T22:18Z [----] followers, [---] engagements


"CAP - Comprehensive Assessment Platform - for penetration testers and noobies in Cybersecurity CAP - Comprehensive Assessment Platform - for penetration testers and noobies in Cybersecurity. it's a framework developed in Rust programming language to ensure stability and simplicity when doing capture the flags or just general use for security testing/auditing. Pretty cool right note: still in development work in progress. Open source / Built in public. Music from Uppbeat: falling-mirrors-chilled License code: FZSC2XF7TB9UONZP โš  Educational only content. #shorts #cybersecurity ai and"  
[YouTube Link](https://youtube.com/watch?v=rlBQEVpAejc)  2026-01-07T05:03Z [----] followers, [----] engagements


"LIVE Hack The Box Soccer (Easy) โšฝ Web Vulnerabilities Enumeration & Privilege Escalation In this live stream we are hacking the retired Soccer (Easy) machine on Hack The Box focusing on realistic web application exploitation techniques used in penetration testing. This session is designed for beginners and aspiring ethical hackers who want to understand how attackers enumerate exploit and escalate privileges in a controlled legal lab environment. You will see the full attack path from initial reconnaissance to root access including web-based vulnerabilities misconfigurations and common"  
[YouTube Link](https://youtube.com/watch?v=sZhav_hyKDA)  2025-12-22T14:28Z [----] followers, [--] engagements


"Cow patty - used for auditing wireless access points Educational only Cow patty - used for auditing wireless access points Educational only #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=soGpkBu4Btw)  2025-11-18T23:14Z [----] followers, [----] engagements


"Module Types and Exploitation (Metasploit Fundamentals Ep. 5) Want to learn cybersecurity or improve your skills Check out Hack The Box perfect for beginners ๐Ÿง ๐Ÿ’ป ๐Ÿ‘‰ https://hacktheboxltd.sjv.io/YRLYoJ Stay safe online with NordVPN ๐Ÿ‘‰ https://nordvpn.com/declan โš  Disclaimer: This is for educational purposes only. Unauthorized hacking is illegal. We're here to learn ethical hacking and cybersecurity to protect against real threats. #metasploit #ethicalhacking #kaliLinux #cybersecurity #hackingTutorial #penetrationTesting #metasploitTutorial #hackers #linuxTools #bugbounty metasploit modules"  
[YouTube Link](https://youtube.com/watch?v=tC0hlggMiiU)  2025-12-10T22:15Z [----] followers, [---] engagements


"Setting Up Your Lab Environment (Metasploit Fundamentals ep2) Welcome to Episode [--] of the Metasploit Fundamentals Course. Before you can start exploiting vulnerabilities or diving into advanced Metasploit modules you need a safe and reliable lab environment. In this video Ill walk you through everything you need to set up a proper penetration testing lab where you can practice legally safely and effectively. You can watch my previous videos on my youtube channel to see how to install kali linux on a virtual machine. Want to learn cybersecurity or improve your skills Check out Hack The Box"  
[YouTube Link](https://youtube.com/watch?v=uIrYtGHCcjA)  2025-12-10T12:31Z [----] followers, [---] engagements


"Perl Debugger RCE #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=uagZXOzldIs)  2025-05-24T03:38Z [----] followers, [---] engagements


"Not these videos again somebody help its probably in Hindi ๐Ÿคฃ โš  Memes only dont take it Not these videos again somebody help its probably in Hindi ๐Ÿคฃ โš  Memes only dont take it personal #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=upkXb2PM7Ww)  2025-11-22T02:21Z [----] followers, [----] engagements


"Manjaro Linux for Hacking The Arch Setup Hackers Actually Use https://manjaro.org/ https://blackarch.org/downloads.html#install-repo Thinking of installing Manjaro Linux for ethical hacking or penetration testing In this video I break down why Manjaro is becoming one of the most popular Arch-based distros among hackers how it works and why so many security researchers prefer it over Kali Linux. [--]. Why Manjaro Linux for hacking Manjaro gives you the perfect balance between Arch Linuxs cutting-edge power and a stable user-friendly experience. You get faster performance better hardware support"  
[YouTube Link](https://youtube.com/watch?v=xJGWhYiU4io)  2025-12-09T04:46Z [----] followers, [---] engagements


"Hackers dont write everything from scratch heres why ๐Ÿ”ฅ Python libraries are like cheat codes for Hackers dont write everything from scratch heres why ๐Ÿ”ฅ Python libraries are like cheat codes for hackers pre-built tools that handle the hard stuff for you. From scanning to packet sniffing libraries make hacking faster and smarter. #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=zMdiMahxsKk)  2025-11-04T02:08Z [----] followers, [----] engagements


"POV: you installed parrot os after watching mr robot POV: you installed parrot os after watching mr robot #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=zUUqeM3-kAo)  2025-10-23T04:05Z [----] followers, [---] engagements


"๐Ÿš Got a Bash Shell via SSTI RedPanda HTB Hack ๐Ÿ”ฅ Java Spring Boot Educational Only ๐Ÿš Got a Bash Shell via SSTI RedPanda HTB Hack ๐Ÿ”ฅ Java Spring Boot Educational Only #shorts #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=zma-xe13MNQ)  2025-08-05T23:17Z [----] followers, [---] engagements


"Hackerr.io - a fresh brand new cyber security learning platform for newbies educational only Hackerr.io - a fresh brand new cyber security learning platform for newbies educational only #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends google cybersecurity learn cybersecurity what cybersecurity do what is cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=zFqaLz6MSFw)  2026-02-03T00:32Z [----] followers, [----] engagements


"New Cyber Security platform for beginners New Cyber Security platform for beginners #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends google cybersecurity learn cybersecurity what cybersecurity do what is cybersecurity women in cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity 2025"  
[YouTube Link](https://youtube.com/watch?v=c_JKV8UdFHo)  2026-02-01T22:32Z [----] followers, [---] engagements


"Weak passwords vs Strong Passwords Weak passwords vs Strong Passwords. Music from Uppbeat: Music used - falling-mirrors-chilled License code: NMEXSINK6MLN1SSP #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends google cybersecurity learn cybersecurity what cybersecurity do what is cybersecurity women in cybersecurity ai and"  
[YouTube Link](https://youtube.com/watch?v=JahEqtzpIoU)  2026-01-18T21:19Z [----] followers, [----] engagements


"Black Hat VS White Hat - Computer hackers - what do they mean Educational information Music Black Hat VS White Hat - Computer hackers - what do they mean Educational information Music from Uppbeat (free for Creators): Music in video: falling-mirrors-chilled License code: NMEXSINK6MLN1SSP #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills"  
[YouTube Link](https://youtube.com/watch?v=W_JNAe4yEB8)  2026-01-17T23:19Z [----] followers, [---] engagements


"Nmap for begineers everything to do with Nmap - Network Mapper Nmap for begineers everything to do with Nmap - Network Mapper. โš  educational only โš  #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends google cybersecurity learn cybersecurity what cybersecurity do what is cybersecurity women in cybersecurity ai and"  
[YouTube Link](https://youtube.com/watch?v=FPqh9mKzVCs)  2026-01-16T07:11Z [----] followers, [---] engagements


"Top [--] BEST Websites to Learn about Cybersecurity in [----] Top [--] BEST Websites to Learn about Cybersecurity in [----] #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends google cybersecurity learn cybersecurity what cybersecurity do what is cybersecurity women in cybersecurity ai and cybersecurity cybersecurity cybersecurity 101"  
[YouTube Link](https://youtube.com/watch?v=Dq1q0qNes9U)  2026-01-14T03:17Z [----] followers, [----] engagements


"Cybersecurity tools to use in [----] if you are just starting out Cybersecurity tools to use in [----] if you are just starting out. โš  Educational only โš  #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends google cybersecurity learn cybersecurity what cybersecurity do what is cybersecurity women in cybersecurity ai and"  
[YouTube Link](https://youtube.com/watch?v=SIBCihjUzuc)  2026-01-14T00:20Z [----] followers, [----] engagements

Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing

@declanmidd Avatar @declanmidd Declan Middleton

Declan Middleton posts on YouTube about what is, shorts, $googl, ai the most. They currently have [-----] followers and [---] posts still getting attention that total [---] engagements in the last [--] hours.

Engagements: [---] #

Engagements Line Chart

  • [--] Week [-----] +43%
  • [--] Month [------] +0.89%
  • [--] Months [-------] +102%
  • [--] Year [-------] +105,812%

Mentions: [--] #

Mentions Line Chart

  • [--] Week [--] -17%
  • [--] Month [--] -61%
  • [--] Months [---] +77%
  • [--] Year [---] +2,338%

Followers: [-----] #

Followers Line Chart

  • [--] Week [-----] +2.30%
  • [--] Month [-----] +9.90%
  • [--] Months [-----] +110%
  • [--] Year [-----] +2,749%

CreatorRank: [---------] #

CreatorRank Line Chart

Social Influence

Social category influence technology brands stocks social networks products finance gaming

Social topic influence what is, shorts, $googl, ai, future, tutorial, discord, python, tools, how to

Top accounts mentioned or mentioned by @declanmiddles

Top assets mentioned Alphabet Inc Class A (GOOGL) ANONYMOUS (ANONYMOUS) Robot Consulting Co., Ltd. (LAWR)

Top Social Posts

Top posts by engagements in the last [--] hours

"Kali Linux Cursor DISAPPEARED After Update (VMware Fix) https://hackerr.io If your Kali Linux cursor suddenly vanished in VMware after updating youre not alone this bug has been hitting a lot of users recently. After running weekly updates many people report that their mouse pointer becomes completely invisible making Kali almost impossible to use inside VMware. In this short tutorial Ill show you: Why the Kali update breaks your VMware mouse integration What causes the invisible cursor glitch The exact compatibility setting you need to change How to fix the issue instantly without"
YouTube Link 2025-12-09T20:25Z [----] followers, 12.9K engagements

"How to Install Parrot Security OS on Mac using UTM [----] Edition https://mac.getutm.app/ https://parrotsec.org/ Install Parrot OS on MacBook Air using UTM. Fast secure and perfect for ethical hacking. Want to turn your MacBook Air into a full hacking lab In this tutorial Ill show you exactly how to install Parrot OS on a Mac using UTM fast clean and beginner-friendly. Perfect for ethical hackers penetration testers cybersecurity students and anyone who wants a lightweight Linux distro running safely on macOS. Parrot OS is built for privacy anonymity and security testing. With UTM you can run"
YouTube Link 2025-12-06T21:30Z [----] followers, [---] engagements

"Ultimate Kali Linux Basics Tutorial for Beginners (2025/2026 Edition) Kali Linux from Scratch ๐Ÿ“Œ Welcome to the Ultimate Kali Linux Basics Tutorial for Beginners (2025/2026 Edition) https://hackerr.io Are you new to Kali Linux or looking to start your journey in ethical hacking penetration testing or cybersecurity This in-depth tutorial is designed specifically for beginners who want to learn how to use Kali Linux from the ground up. In this comprehensive video well walk you through the core fundamentals of Kali Linux including installation terminal basics file system navigation package"
YouTube Link 2025-07-27T14:30Z [----] followers, 64.6K engagements

"Tiny file manager file upload reverse shell kali linux php reverse shell using weevely"
YouTube Link 2023-05-20T20:54Z [----] followers, [----] engagements

"Create a phishing site in [--] seconds Phishing Attacks Are Shockingly Easy (Heres How They Work) ๐Ÿ‘‰ https://hackerr.io Phishing Scams Are Everywhere NordVPN Helps Keep You Safe (70% OFF) ๐Ÿ‘‰ https://go.nordvpn.net/SH9uh Github repo in the video https://github.com/htr-tech/zphisher Want to learn cybersecurity or improve your skills Check out Hack The Box perfect for beginners and pros alike ๐Ÿง ๐Ÿ’ป ๐Ÿ‘‰ https://hacktheboxltd.sjv.io/YRLYoJ โš  Disclaimer: This is for educational purposes only. Unauthorized hacking is illegal. We're here to learn ethical hacking and cybersecurity to protect against real"
YouTube Link 2025-07-25T09:01Z [----] followers, 21.5K engagements

"Trust me Ive got this. ๐Ÿ˜Ž Trust me Ive got this. ๐Ÿ˜Ž #shorts #cybersecurity"
YouTube Link 2025-10-09T00:18Z [----] followers, [---] engagements

"BlueDucky - The vulnerability allows an attacker to impersonate a Bluetooth Human Interface Device BlueDucky - The vulnerability allows an attacker to impersonate a Bluetooth Human Interface Device (HID) like a keyboard and inject keystrokes into a target device without needing to pair. โš  Educational purposes only #shorts #cybersecurity"
YouTube Link 2025-10-03T10:01Z [----] followers, [---] engagements

"What Linux distribution did Elliot Alderson use in the beginning of Mr What Linux distribution did Elliot Alderson use in the beginning of Mr. Robot โš  Entertainment purposes only #shorts #cybersecurity"
YouTube Link 2025-10-02T02:09Z [----] followers, [----] engagements

"Sherlock is an open-source OSINT (Open-Source Intelligence) tool Sherlock is an open-source OSINT (Open-Source Intelligence) tool specifically designed for finding usernames across many different social networks and websites. Essentially you give Sherlock a username and it will check hundreds of websites to see if that username is registered there. This can be incredibly useful in cybersecurity investigations digital footprint analysis or gathering information during ethical hacking or red-teaming exercises. Sherlock is written in Python and is quite simple to use once set up. You just"
YouTube Link 2025-04-28T20:23Z [----] followers, [----] engagements

"Top [--] Lightweight Linux Operating Systems Top [--] Lightweight Linux Operating Systems #shorts #cybersecurity"
YouTube Link 2025-07-30T02:51Z [----] followers, [----] engagements

"Tools dont make you SKID ignorance does"
YouTube Link 2025-07-22T06:57Z [----] followers, [---] engagements

"This is used by Ethical Hackers. โš  educational only This is used by Ethical Hackers. โš  educational only #shorts #cybersecurity"
YouTube Link 2025-09-28T05:10Z [----] followers, [----] engagements

"How Hackers Hack Your Website Want to dive deep into cybersecurity and master the art of ethical hacking Become a member today and unlock hacking tutorials and expert content. Click here to join my discord: https://discord.gg/R8J3xMcRMD โ˜• Educational Purposes Only Teaching cybersecurity to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. // Connect with Me // https://linkedin.com/in/declanmiddleton ๐Ÿšซ Disclaimers: Unauthorized hacking is illegal. The content on this channel is for educational purposes only focused"
YouTube Link 2025-04-10T00:28Z [----] followers, [----] engagements

"๐ŸšจCard Skimmer EXPOSED on Camera You Wont Believe This ๐Ÿ˜ฑ๐Ÿ’ณ โš  entertainment purposes only ๐ŸšจCard Skimmer EXPOSED on Camera You Wont Believe This ๐Ÿ˜ฑ๐Ÿ’ณ โš  entertainment purposes only #shorts #cybersecurity"
YouTube Link 2025-09-30T01:07Z [----] followers, [---] engagements

"Why do Penetration Testers use Kali Linux #cybersecurity"
YouTube Link 2025-05-27T05:55Z [----] followers, [----] engagements

"What is Enum4linux ๐Ÿ” Enum4linux is a powerful information-gathering tool used by ethical hackers What is Enum4linux ๐Ÿ” Enum4linux is a powerful information-gathering tool used by ethical hackers to enumerate Windows machines over SMB revealing usernames shares and more. Its often used in penetration testing to understand network structure (for educational purposes only โš ). #shorts #cybersecurity"
YouTube Link 2025-10-11T03:14Z [----] followers, [---] engagements

"Reviewing Vulnerable Spring Boot Code from RedPanda CTF (educational only) ๐Ÿผ๐Ÿ’ฅ Reviewing Vulnerable Spring Boot Code from RedPanda CTF (educational only) ๐Ÿผ๐Ÿ’ฅ #shorts #cybersecurity"
YouTube Link 2025-08-06T08:10Z [----] followers, [--] engagements

"Can you hack a Smart Fridge Want to dive deep into cybersecurity and master the art of ethical hacking Become a member today and unlock hacking tutorials and expert content. Click here to join my discord: https://discord.gg/R8J3xMcRMD โ˜• Educational Purposes Only Teaching cybersecurity to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. // Connect with Me // https://linkedin.com/in/declanmiddleton ๐Ÿšซ Disclaimers: Unauthorized hacking is illegal. The content on this channel is for educational purposes only focused"
YouTube Link 2025-04-16T23:46Z [----] followers, [----] engagements

"Ethical Hackers vs. Malicious Hackers What's the Real Difference #shorts #cybersecurity Ethical Hackers vs. Malicious Hackers What's the Real Difference #shorts #cybersecurity ๐ŸŽง Music by Track: Cybertrack by Kidcut License Code: U9VNXQBZ0QP53Z85"
YouTube Link 2025-07-22T08:10Z [----] followers, [---] engagements

"Python Libraries explained #cybersecurity"
YouTube Link 2025-05-21T18:21Z [----] followers, [----] engagements

"Python SSH Login using Paramiko #cybersecurity"
YouTube Link 2025-05-18T07:42Z [----] followers, [----] engagements

"Cybersecurity interview tips #cybersecurity"
YouTube Link 2025-05-31T10:11Z [----] followers, [---] engagements

"Automation with Python is key to saving time โš  Educational only Automation with Python is key to saving time โš  Educational only #shorts #cybersecurity"
YouTube Link 2025-10-13T23:09Z [----] followers, [---] engagements

"I found something better than Nano ๐Ÿ˜ƒ I found something better than Nano ๐Ÿ˜ƒ #shorts #cybersecurity"
YouTube Link 2025-08-04T05:14Z [----] followers, [---] engagements

"(Educational) Zip File RCE on Greenhorn CTF retired Machine ๐Ÿš๐Ÿ’ฅ (Educational) Zip File RCE on Greenhorn CTF retired Machine ๐Ÿš๐Ÿ’ฅ #shorts #cybersecurity"
YouTube Link 2025-08-04T10:10Z [----] followers, [---] engagements

"Python Script Automates Path Traversal #cybersecurity"
YouTube Link 2025-05-16T01:53Z [----] followers, [----] engagements

"POV: You Installed TOR at 3AM ๐Ÿ•’ POV: You Installed TOR at 3AM ๐Ÿ•’ #shorts #cybersecurity"
YouTube Link 2025-07-25T09:12Z [----] followers, [---] engagements

"Villain in Kali Linux ๐Ÿ”ฅ The Hackers C2 Framework Explained Ever wondered how hackers manage Villain in Kali Linux ๐Ÿ”ฅ The Hackers C2 Framework Explained Ever wondered how hackers manage multiple shells at once ๐Ÿ‘€ Meet Villain a powerful post-exploitation & C2 framework built into Kali Linux. It lets penetration testers control compromised systems run commands and organize shells way beyond what Netcat can do. โš  For educational purposes only. Unauthorized use is illegal. kali linux cybersecurity ethical hacking red team pentesting post exploitation C2 framework villain kali linux hacking tools"
YouTube Link 2025-10-04T06:00Z [----] followers, [---] engagements

"HOAXSHELL HoaxShell is a post-exploitation tool used by ethical hackers and red teamers to get a HOAXSHELL HoaxShell is a post-exploitation tool used by ethical hackers and red teamers to get a reverse shell over HTTP/HTTPS โš  For educational purposes only. HoaxShell is a reverse shell tool that works over HTTP/HTTPS helping ethical hackers test how well firewalls detect covert connections. Its used in red team operations to simulate real-world scenarios safely and improve defenses. #shorts #cybersecurity"
YouTube Link 2025-10-05T03:06Z [----] followers, [---] engagements

"Wifite what pros use to audit Wi-Fi fast Wifite what pros use to audit Wi-Fi fast. โš  Educational only. #shorts #cybersecurity"
YouTube Link 2025-10-10T02:09Z [----] followers, [---] engagements

"What your Linux distribution says about you lol ๐Ÿ˜‚ #cybersecurity"
YouTube Link 2025-06-26T07:31Z [----] followers, [---] engagements

"Is Kali Linux for Noobs or Script Kiddies I dont think so. #cybersecurity #ethicalhacking #tech"
YouTube Link 2024-12-26T07:03Z [----] followers, [--] engagements

"Top [--] Cybersecurity books for Beginners #cybersecurity"
YouTube Link 2025-07-16T01:24Z [----] followers, [----] engagements

"Prevent Server Attacks Secure Your Directory Now Want to dive deep into cybersecurity and master the art of ethical hacking Become a member today and unlock hacking tutorials and expert content. Click here to join my discord: discord.gg/R8J3xMcRMD โ˜• Educational Purposes Only Teaching cybersecurity to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. // Connect with Me // https://linkedin.com/in/declanmiddleton ๐Ÿšซ Disclaimers: Unauthorized hacking is illegal. The content on this channel is for educational purposes"
YouTube Link 2024-12-13T07:46Z [---] followers, [--] engagements

"โš  Dont Be Fooled How ReactJS Powers Modern Phishing Sites (educational only) โš  Dont Be Fooled How ReactJS Powers Modern Phishing Sites (educational only) #shorts #cybersecurity"
YouTube Link 2025-07-31T04:39Z [----] followers, [---] engagements

"Ettercap is a network security tool โš  Educational purposes only Ettercap is a network security tool โš  Educational purposes only #shorts #cybersecurity"
YouTube Link 2025-10-12T02:17Z [----] followers, [---] engagements

"Subfinder tool in Kali Linux explained Want to dive deep into cybersecurity and master the art of ethical hacking Become a member today and unlock hacking tutorials and expert content. Click here to join my discord: https://discord.gg/R8J3xMcRMD โ˜• Educational Purposes Only Teaching cybersecurity to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. // Connect with Me // https://linkedin.com/in/declanmiddleton ๐Ÿšซ Disclaimers: Unauthorized hacking is illegal. The content on this channel is for educational purposes"
YouTube Link 2025-04-08T06:34Z [----] followers, [---] engagements

"Mastering C2 Servers #cybersecurity Want to dive deep into cybersecurity and master the art of ethical hacking Become a member today and unlock hacking tutorials and expert content. Click here to join my discord: discord.gg/R8J3xMcRMD โ˜• Educational Purposes Only Teaching cybersecurity to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. ๐Ÿ“•Recommended Reading Kali Linux for Beginners: Your Amazon Book Link Linux Basics for Hackers: Your Amazon Book Link Advanced Kali Linux Guide: Your Amazon Book Link // Connect"
YouTube Link 2024-12-12T20:20Z [---] followers, [--] engagements

"Cybersecurity OS - Athena os โš  Educational only Cybersecurity OS - Athena os โš  Educational only #shorts #cybersecurity"
YouTube Link 2025-10-16T20:09Z [----] followers, [----] engagements

"Retired machine hackthebox - Metasploit - meterpreter binary was already on the box from previous Retired machine hackthebox - Metasploit - meterpreter binary was already on the box from previous attempts โš  Educational only #shorts #cybersecurity"
YouTube Link 2025-10-15T00:19Z [----] followers, [---] engagements

"John the ripper SSH access (hackthebox retired) Previse #cybersecurity"
YouTube Link 2025-05-30T03:18Z [----] followers, [----] engagements

"Better version than Burpsuite only) Better version than Burpsuite only) #shorts #cybersecurity"
YouTube Link 2025-09-30T05:04Z [----] followers, [--] engagements

"Kage - Metasploit GUI version but better #cybersecurity"
YouTube Link 2025-07-10T03:12Z [----] followers, [---] engagements

"๐Ÿšจ 70% OFF NordVPN Secure Your Internet and Save Big ๐Ÿ’ธ #shorts #cybersecurity ๐Ÿšจ 70% OFF NordVPN Secure Your Internet and Save Big ๐Ÿ’ธ #shorts #cybersecurity"
YouTube Link 2025-07-25T06:43Z [----] followers, [---] engagements

"Someone made a Ddos tool Using the Ping Command #cybersecurity"
YouTube Link 2024-12-15T03:27Z [---] followers, [--] engagements

"Linux privilege escalation Retired Hackthebox Machine (educational) Linux privilege escalation Retired Hackthebox Machine (educational) #shorts #cybersecurity"
YouTube Link 2025-07-27T09:10Z [----] followers, [---] engagements

"Metasploit explained by a Ethical Hacker #cybersecurity"
YouTube Link 2025-01-07T01:00Z [----] followers, [--] engagements

"Top [--] VPN - Virtual Private Networks to use in [----] #shorts #cybersecurity Top [--] VPN - Virtual Private Networks to use in [----] #shorts #cybersecurity"
YouTube Link 2025-07-25T03:42Z [----] followers, [----] engagements

"Armitage - GUI version of Metasploit"
YouTube Link 2025-06-23T06:52Z [----] followers, [---] engagements

"Mr Robot uses Kali Linux ๐Ÿ”ฅ Mr Robot uses Kali Linux ๐Ÿ”ฅ #shorts #cybersecurity"
YouTube Link 2025-10-03T00:20Z [----] followers, [---] engagements

"My reaction to hate comments #cybersecurity"
YouTube Link 2025-06-02T05:53Z [----] followers, [----] engagements

"Ai Skids are COMING cursor ai text editor (Entertainment purposes only ๐Ÿ˜‚) Ai Skids are COMING cursor ai text editor (Entertainment purposes only ๐Ÿ˜‚) #shorts #cybersecurity"
YouTube Link 2025-09-30T00:06Z [----] followers, [---] engagements

"PermX - Live Walkthrough Hackthebox Retired Machine (PermX) Want to dive deep into cybersecurity and master the art of ethical hacking Become a member today and unlock hacking tutorials and expert content. Click here to join my discord: https://discord.gg/R8J3xMcRMD โ˜• Educational Purposes Only Teaching cybersecurity to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. // Connect with Me // https://linkedin.com/in/declanmiddleton Join me live as we dive into Headless a retired HackTheBox machine. Whether you're"
YouTube Link 2025-04-15T06:01Z [----] followers, [--] engagements

"Top [--] Cybersecurity Tools I use a Penetration Tester / ethical hacker Top [--] Cybersecurity Tools I use a Penetration Tester / ethical hacker #shorts #cybersecurity"
YouTube Link 2025-07-23T09:11Z [----] followers, [----] engagements

"โšก How Hackers Crack Wi-Fi in Seconds with Pixiewps Pixiewps is a tool that exploits weak WPS PINs โšก How Hackers Crack Wi-Fi in Seconds with Pixiewps Pixiewps is a tool that exploits weak WPS PINs using the Pixie Dust attack allowing hackers to recover Wi-Fi keys super fast. โš  Educational purposes only. #shorts #cybersecurity"
YouTube Link 2025-10-04T10:02Z [----] followers, [---] engagements

"Wi-Fi pineapple ๐Ÿ (entertainment purposes only) Wi-Fi pineapple ๐Ÿ (entertainment purposes only) #shorts #cybersecurity"
YouTube Link 2025-09-29T23:05Z [----] followers, [---] engagements

"POV: You installed Kali Linux for the first time POV: You installed Kali Linux for the first time #shorts #cybersecurity"
YouTube Link 2025-07-27T06:12Z [----] followers, [----] engagements

"Live Walkthrough Hackthebox Retired HackTheBox Machine (Headless) Want to dive deep into cybersecurity and master the art of ethical hacking Become a member today and unlock hacking tutorials and expert content. Click here to join my discord: https://discord.gg/R8J3xMcRMD โ˜• Educational Purposes Only Teaching cybersecurity to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. // Connect with Me // https://linkedin.com/in/declanmiddleton Join me live as we dive into Headless a retired HackTheBox machine. Whether"
YouTube Link 2025-04-16T07:47Z [----] followers, [---] engagements

"Trying out Athena Os โš  Educational only Trying out Athena Os โš  Educational only #shorts #cybersecurity"
YouTube Link 2025-10-16T20:09Z [----] followers, [----] engagements

"O.MG Cable from Hak5 O.MG Cable from Hak5. โš  Educational only #shorts #cybersecurity"
YouTube Link 2025-09-30T00:08Z [----] followers, [---] engagements

"I Used Nikto and THIS Happened. ๐Ÿ‘ฝ๐Ÿ’ป (You Wont Believe It) In this video I explore Nikto the open-source web server scanner used by ethical hackers to uncover dangerous vulnerabilities. But what I found. was unexpected. ๐Ÿ˜จ ๐Ÿ” What is Nikto ๐Ÿ›ก How ethical hackers use it ๐Ÿ‘ฝ A surprise twist you wont see coming Whether youre a cybersecurity beginner or a seasoned hacker this tool deserves your attention. Stick around for the unexpected moment that had me SHOCKED. ๐Ÿ’ป Tools used: ๐Ÿ”ธ Nikto: https://github.com/sullo/nikto ๐Ÿ”ธ Kali Linux / Parrot OS ๐ŸŽ“ Learn More: โœ… Get my ethical hacking Course:"
YouTube Link 2025-04-30T05:03Z [----] followers, [----] engagements

"3 Cybersecurity Books That Will Transform Your Knowledge and Boost Your Skills Today โ˜• Educational Purposes Only Teaching cybersecurity to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. // Connect with Me // https://linkedin.com/in/declanmiddleton https://discord.gg/R8J3xMcRMD ๐Ÿšซ Disclaimers: Unauthorized hacking is illegal. The content on this channel is for educational purposes only focused on ethical hacking penetration testing and cybersecurity awareness to help individuals and organizations defend against"
YouTube Link 2025-04-11T01:16Z [----] followers, [----] engagements

"Retired HackTheBox Machine - Live Walkthrough Hackthebox part [--] - stream crashed Want to dive deep into cybersecurity and master the art of ethical hacking Become a member today and unlock hacking tutorials and expert content. Click here to join my discord: https://discord.gg/R8J3xMcRMD โ˜• Educational Purposes Only Teaching cybersecurity to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. // Connect with Me // https://linkedin.com/in/declanmiddleton Join me live as we dive into BoardLight a retired HackTheBox"
YouTube Link 2025-04-14T16:13Z [----] followers, [---] engagements

"Proof of concept Python Automation for Captuothe flags Cybersecurity scripting Proof of concept Python Automation for Captuothe flags Cybersecurity scripting. โš  Educational only #shorts #cybersecurity"
YouTube Link 2025-10-13T23:09Z [----] followers, [---] engagements

"Xspear XSS Vulnerability Scanner tool for pentesters and ethical hackers ๐Ÿซก โš  educational Xspear XSS Vulnerability Scanner tool for pentesters and ethical hackers ๐Ÿซก โš  educational purposes only #shorts #cybersecurity"
YouTube Link 2025-10-03T01:20Z [----] followers, [---] engagements

"Code injection technique Using Python #cybersecurity"
YouTube Link 2025-05-31T19:42Z [----] followers, [--] engagements

"Why Installing Kali Linux is the Smartest Move for Aspiring Ethical Hackers and Penetration Testers. Why Installing Kali Linux is the Smartest Move for Aspiring Ethical Hackers and Penetration Testers. #shorts #cybersecurity"
YouTube Link 2025-08-06T09:08Z [----] followers, [---] engagements

"Free tools that protect your privacy Free tools that protect your privacy #shorts #cybersecurity"
YouTube Link 2025-07-23T02:18Z [----] followers, [---] engagements

"Live Walkthrough Hackthebox Retired HackTheBox Machine (Headless) Want to dive deep into cybersecurity and master the art of ethical hacking Become a member today and unlock hacking tutorials and expert content. Click here to join my discord: https://discord.gg/R8J3xMcRMD โ˜• Educational Purposes Only Teaching cybersecurity to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. // Connect with Me // https://linkedin.com/in/declanmiddleton Join me live as we dive into Headless a retired HackTheBox machine. Whether"
YouTube Link 2025-04-15T00:52Z [----] followers, [---] engagements

"Kali Linux setup ๐Ÿฅถ Kali Linux setup ๐Ÿฅถ #shorts #cybersecurity"
YouTube Link 2025-10-03T22:07Z [----] followers, [---] engagements

"Fake Wi-Fi Hotspots Airgeddon Explained โš  Educational purposes only Fake Wi-Fi Hotspots Airgeddon Explained โš  Educational purposes only #shorts #cybersecurity"
YouTube Link 2025-09-30T20:08Z [----] followers, [---] engagements

"๐Ÿ‘ป Hackers are scarier than ghosts heres why you should NEVER trust free Wi-Fi ๐Ÿ‘ป Hackers are scarier than ghosts heres why you should NEVER trust free Wi-Fi. โš  Educational only โš  #shorts #cybersecurity"
YouTube Link 2025-09-30T20:07Z [----] followers, [----] engagements

"Backtrack Linux Old version of the original Kali Linux Operating system โš  Educational only Backtrack Linux Old version of the original Kali Linux Operating system โš  Educational only #shorts #cybersecurity"
YouTube Link 2025-10-10T23:19Z [----] followers, [---] engagements

"Explaining what Metasploit is to my Parents ๐Ÿ”— Social instagram.com/declan.middleton tiktok.com/@declanmiddles linkedin.com/in/declanmiddleton https://discord.gg/R8J3xMcRMD ๐Ÿ™๐ŸปSupport me: https://shorturl.at/RoeYd ๐Ÿ‘•Merch: coming soon ๐Ÿ’ธ Help me raise $3000 for Video Production: https://buymeacoffee.com/declanmiddleton โš  Disclaimer Unauthorized hacking is illegal. This channel is dedicated solely to educational purposes focusing on cybersecurity ethical hacking and penetration testing to help us defend against real-world cyber threats. #kalilinux #ethicalhacking #ethicalhacker #cybersecurity"
YouTube Link 2025-05-06T06:32Z [----] followers, [----] engagements

"POV: Me when I use Kali Linux POV: Me when I use Kali Linux #shorts #cybersecurity"
YouTube Link 2025-10-03T22:07Z [----] followers, [----] engagements

"How one line of Python leads to root access ๐Ÿ”“ (Educational only) How one line of Python leads to root access ๐Ÿ”“ (Educational only) #shorts #cybersecurity"
YouTube Link 2025-08-05T10:12Z [----] followers, [---] engagements

"POV: You Think Youre Safe Online Then I Open Zphisher POV: You Think Youre Safe Online Then I Open Zphisher #shorts #cybersecurity"
YouTube Link 2025-07-26T01:23Z [----] followers, [----] engagements

"Ethical SSRF on CTF (educational) ๐Ÿ” Ethical SSRF on CTF (educational) ๐Ÿ” #shorts #cybersecurity"
YouTube Link 2025-08-05T04:12Z [----] followers, [---] engagements

"smb attack using responder - capture hashes and crack password"
YouTube Link 2023-05-24T00:31Z [----] followers, [----] engagements

"Watch dogs in real life - Flipper Zero โš  Educational only Watch dogs in real life - Flipper Zero โš  Educational only #shorts #cybersecurity"
YouTube Link 2025-10-02T21:22Z [----] followers, [---] engagements

"Vulnerability in web app lets check searchsploit โš  Educational only Vulnerability in web app lets check searchsploit โš  Educational only #shorts #cybersecurity"
YouTube Link 2025-10-14T09:01Z [----] followers, [---] engagements

"Greenhorn CTF retired Machine Pwned LIVE ๐Ÿ”ฅ Walkthrough Greenhorn CTF retired Machine Pwned LIVE ๐Ÿ”ฅ Walkthrough #shorts #cybersecurity"
YouTube Link 2025-08-04T10:09Z [----] followers, [--] engagements

"Tools for Cybersecurity Enthusiasts and Ethical Hackers If you're interested in learning more about cybersecurity whether you're just starting out or want to sharpen your hacking skills I highly recommend checking out Hack The Box ๐Ÿง ๐Ÿ’ป Start Hackthebox TODAY https://hacktheboxltd.sjv.io/YRLYoJ โš  Disclaimer Unauthorized hacking is illegal. This channel is dedicated solely to educational purposes focusing on cybersecurity ethical hacking and penetration testing to help us defend against real-world cyber threats. #cybersecurity"
YouTube Link 2025-07-06T23:59Z [----] followers, [----] engagements

"introduction to Clawnix Cybersecurity tool #cybersecurity i made this tool for penetration testing and defensive purposes"
YouTube Link 2025-06-05T16:19Z [----] followers, [---] engagements

"Kali Linux on your main machine is it a safe idea or not๐Ÿ’ก โš  Educational only Kali Linux on your main machine is it a safe idea or not๐Ÿ’ก โš  Educational only #shorts #cybersecurity"
YouTube Link 2025-10-01T03:09Z [----] followers, [---] engagements

"๐Ÿšจ The DARK Side of Roblox Voice Chat (Parents need to hear this) โš  For awareness only not hate ๐Ÿšจ The DARK Side of Roblox Voice Chat (Parents need to hear this) โš  For awareness only not hate towards Roblox. Most people dont realize how unsafe Roblox voice chat can be for kids. From predators pretending to be friends to toxic convos slipping past moderation its way deeper than you think. ๐ŸŽฎ๐Ÿ’ญ If your little sibling or cousin plays Roblox you NEED to see this. Stay safe online always. ๐Ÿ›ก #shorts #cybersecurity"
YouTube Link 2025-10-05T22:19Z [----] followers, [---] engagements

"Trying out Manjaro Linux arch based โš  educational only Trying out Manjaro Linux arch based โš  educational only #shorts #cybersecurity"
YouTube Link 2025-10-13T23:09Z [----] followers, [---] engagements

"FREE Websites to Learn Cybersecurity ๐Ÿ’ฅ Want to dive deep into cybersecurity and master the art of ethical hacking Become a member today and unlock hacking tutorials and expert content. Click here to join my discord: https://discord.gg/R8J3xMcRMD โ˜• Educational Purposes Only Teaching cybersecurity to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. // Connect with Me // https://linkedin.com/in/declanmiddleton ๐Ÿšซ Disclaimers: Unauthorized hacking is illegal. The content on this channel is for educational purposes"
YouTube Link 2025-03-28T00:09Z [----] followers, [---] engagements

"Love the process of Learning and getting better instead of doubting your ability to understand a Love the process of Learning and getting better instead of doubting your ability to understand a particular topic. #shorts #cybersecurity"
YouTube Link 2025-10-13T23:09Z [----] followers, [--] engagements

"Retired HackTheBox Machine - Live Walkthrough Hackthebox Want to dive deep into cybersecurity and master the art of ethical hacking Become a member today and unlock hacking tutorials and expert content. Click here to join my discord: https://discord.gg/R8J3xMcRMD โ˜• Educational Purposes Only Teaching cybersecurity to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. // Connect with Me // https://linkedin.com/in/declanmiddleton Join me live as we dive into BoardLight a retired HackTheBox machine. Whether you're"
YouTube Link 2025-04-14T14:56Z [----] followers, [---] engagements

"POV: me trying to learn Linux POV: me trying to learn Linux #shorts #cybersecurity"
YouTube Link 2025-08-02T09:08Z [----] followers, [----] engagements

"Day in the life of a Cybersecurity Content Creator ๐Ÿ˜‚ Day in the life of a Cybersecurity Content Creator ๐Ÿ˜‚ #shorts #cybersecurity"
YouTube Link 2025-10-03T23:09Z [----] followers, [---] engagements

"Netcat who pwncat gives you scripted shells port-forwarding and stealth perfect for red teamers Netcat who pwncat gives you scripted shells port-forwarding and stealth perfect for red teamers (Offensive Security) - (Penetration Testing) โš  Educational purposes only โš  #shorts #cybersecurity"
YouTube Link 2025-10-03T05:14Z [----] followers, [---] engagements

"Unlocking Cloud Security PenTesting Secrets Revealed #cybersecurity Want to dive deep into cybersecurity and master the art of ethical hacking Become a member today and unlock hacking tutorials and expert content. Click here to join my discord: discord.gg/R8J3xMcRMD โ˜• Educational Purposes Only Teaching cybersecurity to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. // Connect with Me // https://linkedin.com/in/declanmiddleton ๐Ÿšซ Disclaimers: Unauthorized hacking is illegal. The content on this channel is for"
YouTube Link 2024-12-12T20:22Z [---] followers, [--] engagements

"Screenshot any Website using this Tool #cybersecurity ๐Ÿ”— Social instagram.com/declan.middleton tiktok.com/@declanmiddles linkedin.com/in/declanmiddleton https://discord.gg/R8J3xMcRMD ๐Ÿ™๐ŸปSupport me: https://shorturl.at/RoeYd ๐Ÿ‘•Merch: coming soon ๐Ÿ’ธ Help me raise $3000 for Video Production: https://buymeacoffee.com/declanmiddleton โš  Disclaimer Unauthorized hacking is illegal. This channel is dedicated solely to educational purposes focusing on cybersecurity ethical hacking and penetration testing to help us defend against real-world cyber threats. #kalilinux #ethicalhacking #ethicalhacker"
YouTube Link 2025-05-04T20:53Z [----] followers, [----] engagements

"Cybersecurity Desk Setup Spring Cleaning ๐Ÿงผ๐Ÿ’ป Time to clean up and level up your cybersecurity workstation In this YouTube Short Im giving my cybersecurity desk setup a full spring cleaningdecluttering my tech workspace organizing my infosec tools optimizing cable management and tightening up my digital security environment. Whether you're a cybersecurity student a red teamer blue team analyst ethical hacker or just love clean efficient hacker desk setups this video is for you. From keyboard and monitor upgrades to privacy tools and network security gear Im showing how a clean space = a"
YouTube Link 2025-04-19T21:09Z [----] followers, [----] engagements

"Path Traversal vulnerability found #hackthebox #cybersecurity"
YouTube Link 2025-05-14T21:58Z [----] followers, 13.9K engagements

"โœจ Swift programming language for Ethical Hackers and Penetration Testers. Want to dive deep into cybersecurity and master the art of ethical hacking Become a member today and unlock hacking tutorials and expert content. Click here to join my discord: https://discord.gg/R8J3xMcRMD โ˜• Educational Purposes Only Teaching cybersecurity to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. // Connect with Me // https://linkedin.com/in/declanmiddleton ๐Ÿšซ Disclaimers: Unauthorized hacking is illegal. The content on this"
YouTube Link 2025-03-25T23:52Z [----] followers, [---] engagements

"POV: day in the life of a NPC Hacker POV: day in the life of a NPC Hacker #shorts #cybersecurity"
YouTube Link 2025-10-04T01:08Z [----] followers, [----] engagements

"Hide Yourself w/ Proxychains and TOR Comprehensive Guide to Proxychains Tool What is Proxychains Comprehensive Guide to Proxychains Tool Proxychains is a powerful networking tool primarily used in the Linux environment that allows users to route their internet traffic through a series of proxy servers. This technique is commonly known as proxy chaining. By doing this Proxychains helps enhance privacy bypass network restrictions and anonymize your online activities. How Does Proxychains Work Proxychains works by intercepting network connections from any application and redirecting them through"
YouTube Link 2025-07-24T11:45Z [----] followers, [---] engagements

"Path Traversal Discovered in [--] Seconds ๐Ÿ”— Social instagram.com/declan.middleton tiktok.com/@declanmiddles linkedin.com/in/declanmiddleton https://discord.gg/R8J3xMcRMD ๐Ÿ™๐ŸปSupport me: https://shorturl.at/RoeYd ๐Ÿ‘•Merch: coming soon ๐Ÿ’ธ Help me raise $3000 for Video Production: https://buymeacoffee.com/declanmiddleton โš  Disclaimer Unauthorized hacking is illegal. This channel is dedicated solely to educational purposes focusing on cybersecurity ethical hacking and penetration testing to help us defend against real-world cyber threats. #kalilinux #ethicalhacking #ethicalhacker #cybersecurity"
YouTube Link 2025-05-16T22:27Z [----] followers, [----] engagements

"Local File Include vulnerability Custom Python script (educational) #cybersecurity"
YouTube Link 2025-05-27T09:26Z [----] followers, [----] engagements

"๐Ÿ–ฅ Tools for Ethical Hackers and Cybersecurity Researchers Want to dive deep into cybersecurity and master the art of ethical hacking Become a member today and unlock hacking tutorials and expert content. Click here to join my discord: https://discord.gg/R8J3xMcRMD โ˜• Educational Purposes Only Teaching cybersecurity to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. // Connect with Me // https://linkedin.com/in/declanmiddleton ๐Ÿšซ Disclaimers: Unauthorized hacking is illegal. The content on this channel is for"
YouTube Link 2025-03-23T22:07Z [----] followers, [---] engagements

"5 Reasons to Use Kali Linux as Your Daily Driver ๐Ÿ”ฅ๐Ÿ’ป [--] Reasons to Use Kali Linux as Your Daily Driver ๐Ÿ”ฅ๐Ÿ’ป #shorts #cybersecurity"
YouTube Link 2025-10-02T21:22Z [----] followers, [---] engagements

"Favourite Penetration Testing Linux distribution"
YouTube Link 2025-04-12T22:16Z [----] followers, [---] engagements

"Mastering Metasploit Secrets to Payload Obfuscation #cybersecurity Want to dive deep into cybersecurity and master the art of ethical hacking Become a member today and unlock hacking tutorials and expert content. Click here to join my discord: discord.gg/R8J3xMcRMD โ˜• Educational Purposes Only Teaching cybersecurity to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. // Connect with Me // https://linkedin.com/in/declanmiddleton ๐Ÿšซ Disclaimers: Unauthorized hacking is illegal. The content on this channel is for"
YouTube Link 2024-12-12T20:21Z [---] followers, [--] engagements

"The Backdoor Factory tool The Backdoor Factory tool. Essentially its a tool that can insert hidden backdoors into binaries โš  For educational purposes only. #shorts #cybersecurity"
YouTube Link 2025-10-01T19:12Z [----] followers, [---] engagements

"DNSChef tool in Kali Linux So in one line: DNS spoofing = lying about a websites address so people DNSChef tool in Kali Linux So in one line: DNS spoofing = lying about a websites address so people end up at a fake site. โš  Educational purposes only #shorts #cybersecurity"
YouTube Link 2025-10-04T10:02Z [----] followers, [---] engagements

"How to install Kali Linux like a Pro in 2025"
YouTube Link 2025-07-16T01:27Z [----] followers, [---] engagements

"Kali Linux basics video on my YouTube link in bio Kali Linux basics video on my YouTube link in bio #shorts #cybersecurity"
YouTube Link 2025-08-06T08:11Z [----] followers, [---] engagements

"The Tiny PHP Shell Hackers Love (p0wny-shell) ๐Ÿ‘€๐Ÿ’ป p0wny-shell is a tiny single-file PHP webshell The Tiny PHP Shell Hackers Love (p0wny-shell) ๐Ÿ‘€๐Ÿ’ป p0wny-shell is a tiny single-file PHP webshell that gives a terminal-like interface in your browser so you can run commands and manage files on a PHP host. Used by pentesters to simulate real scenarios and test defenses. Do not upload or use on systems you dont own or have explicit permission to test. โš  (Educational purposes only) #shorts #cybersecurity"
YouTube Link 2025-10-03T01:20Z [----] followers, [---] engagements

"EVERYONE GOT HACKED [--] Billion passwords got leaked #cybersecurity #fyp If you're interested in learning more about cybersecurity whether you're just starting out or want to sharpen your hacking skills I highly recommend checking out Hack The Box ๐Ÿง ๐Ÿ’ป Start Hackthebox TODAY https://hacktheboxltd.sjv.io/YRLYoJ โš  Disclaimer Unauthorized hacking is illegal. This channel is dedicated solely to educational purposes focusing on cybersecurity ethical hacking and penetration testing to help us defend against real-world cyber threats"
YouTube Link 2025-06-21T21:08Z [----] followers, [--] engagements

"ProxyChains Explained: Private Browsing on Steroids ๐Ÿ˜Ž (For Education) ProxyChains Explained: Private Browsing on Steroids ๐Ÿ˜Ž (For Education) #shorts #cybersecurity"
YouTube Link 2025-07-25T04:19Z [----] followers, [---] engagements

"How hacker stay anonymous (Chapter [--] - Ethical Hacking Basics) - Educational only Hackers would use ProxyChains to route their internet traffic through a series of intermediary proxy servers which conceals their real IP address and location making it extremely difficult to trace their online activities. This technique is often combined with other anonymity methods for maximum stealth. โš  Disclaimer: This is for educational purposes only. Unauthorized hacking is illegal. We're here to learn ethical hacking and cybersecurity to protect against real threats. #CyberSecurity #EthicalHacking"
YouTube Link 2025-12-04T04:09Z [----] followers, [---] engagements

"How Port Scanning Works using Python Network Scanning Explained Kali Linux Educational How Port Scanning Works using Python Network Scanning Explained Kali Linux Educational purposes only #shorts #cybersecurity MUSIC IN VIDEO. Beautiful Day - Urban Godzilla Content owners: Elite Alliance Music ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends"
YouTube Link 2025-12-12T18:11Z [----] followers, [----] engagements

"Metasploit for Beginners (Chapter [--] - Ethical Hacking Basics) โš  Disclaimer: This is for educational purposes only. Unauthorized hacking is illegal. We're here to learn ethical hacking and cybersecurity to protect against real threats. #CyberSecurity #EthicalHacking #HackTheBox #LearnHacking #VPN #OnlineSafety"
YouTube Link 2025-12-04T04:03Z [----] followers, [--] engagements

"Pre production vulnerability found in angular web application . Pre production vulnerability found in angular web application . #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends google cybersecurity learn cybersecurity what cybersecurity do what is cybersecurity women in cybersecurity ai and cybersecurity cybersecurity"
YouTube Link 2025-12-14T07:03Z [----] followers, [----] engagements

"How Hackers Exploit PHP File Upload Vulnerabilities (Full Breakdown) Want to dive deep into cybersecurity and master the art of ethical hacking Become a member today and unlock hacking tutorials and expert content. Click here to join my discord: https://discord.gg/R8J3xMcRMD โ˜• Educational Purposes Only Teaching cybersecurity to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. // Connect with Me // https://linkedin.com/in/declanmiddleton ๐Ÿšซ Disclaimers: Unauthorized hacking is illegal. The content on this channel"
YouTube Link 2024-10-22T08:02Z [----] followers, [----] engagements

"What is Hydra Hydra (often called THC-Hydra) is a fast open-source parallelized login tool used to What is Hydra Hydra (often called THC-Hydra) is a fast open-source parallelized login tool used to test authentication strength by trying many username/password combinations against network services. Music from Uppbeat https://uppbeat.io/t/img/visibility โš  Educational purposes only #shorts #cybersecurity"
YouTube Link 2025-10-26T23:06Z [----] followers, [---] engagements

"Kali Linux on Windows [--] (WSL) Full Setup & Real-World Use educational only Kali Linux on Windows [--] (WSL) Full Setup & Real-World Use educational only #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends google cybersecurity learn cybersecurity what cybersecurity do what is cybersecurity women in cybersecurity ai and"
YouTube Link 2025-12-12T04:06Z [----] followers, [----] engagements

"FFUF for beginners ffuf is a fast web fuzzer used by penetration testers to discover hidden FFUF for beginners ffuf is a fast web fuzzer used by penetration testers to discover hidden directories files parameters and attack surfaces that are not visible to normal users. In this video I demonstrate ffuf in a controlled lab environment for educational purposes only showing how security professionals identify misconfigurations and improve defensive security. โš  Educational purposes only content never do anything without permission to test systems security. โš  https://nordvpn.com/declan #shorts"
YouTube Link 2026-01-09T03:19Z [----] followers, [----] engagements

"Why I prefer FFUF and Dirsearch for directory scanning โš  educational only Why I prefer FFUF and Dirsearch for directory scanning โš  educational only #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends google cybersecurity learn cybersecurity what cybersecurity do what is cybersecurity women in cybersecurity ai and"
YouTube Link 2025-12-09T23:06Z [----] followers, [---] engagements

"Understanding Metasploit Architecture (Metasploit Fundamentals ep3) Welcome to Episode [--] of the Metasploit Fundamentals Course. Now that your lab environment is ready its time to understand what makes Metasploit such a powerful exploitation framework. Before you can use it effectively you need to know how all the moving parts inside Metasploit actually work together. In this episode we break down the Metasploit Architecture step-by-step so you can see the full picture of how exploits payloads and modules operate under the hood. Youll learn: The [--] core components of the Metasploit Framework"
YouTube Link 2025-12-10T20:00Z [----] followers, [--] engagements

"Password Strength Is Analyzed Python for Beginners Kali Linux Educational only Password Strength Is Analyzed Python for Beginners Kali Linux Educational only #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends google cybersecurity learn cybersecurity what cybersecurity do what is cybersecurity women in cybersecurity ai and"
YouTube Link 2025-12-12T06:03Z [----] followers, [----] engagements

"What is Nmap โš  Educational purposes only What is Nmap โš  Educational purposes only #shorts #cybersecurity"
YouTube Link 2025-10-19T23:09Z [----] followers, [----] engagements

"The NEW Next.js Vulnerability Nobodys Talking About The NEW Next.js Vulnerability Nobodys Talking About #shorts #cybersecurity"
YouTube Link 2025-12-09T01:07Z [----] followers, [---] engagements

"Kali Linux VMware Workstation bridge network connection issue resolved using Virtual Network Editor โ˜• Educational Purposes Only Teaching Cyber Security to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. ๐ŸŽฅ Video Topics: Kali Linux VMware workstation bridge network connection issue fixed using virtual network editor ๐Ÿšซ Disclaimers: Hacking without permission is illegal. This channel is for educational purposes only"
YouTube Link 2024-09-21T02:06Z [----] followers, [----] engagements

"Learning Cybersecurity be like . Want to dive deep into cybersecurity and master the art of ethical hacking Become a member today and unlock hacking tutorials and expert content. Click here to join my discord: https://discord.gg/R8J3xMcRMD โ˜• Educational Purposes Only Teaching cybersecurity to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. // Connect with Me // https://linkedin.com/in/declanmiddleton // Visit the Dex Security https://dexsecurityacademy.com/ ๐Ÿšซ Disclaimers: Unauthorized hacking is illegal. The"
YouTube Link 2025-03-31T22:57Z [----] followers, [---] engagements

"FFUF tool Kali Linux for noobies Educational only FFUF tool Kali Linux for noobies Educational only #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends google cybersecurity learn cybersecurity what cybersecurity do what is cybersecurity women in cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity"
YouTube Link 2025-12-12T03:09Z [----] followers, [----] engagements

"Metasploit For Beginners - How To Pwn A Website Learn from a pro ethical hacker // Mini Penetration Testing course for Beginners https://whop.com/dex-security-academy-course/ https://dexsecurityacademy.com/ โ˜• Educational Purposes Only Teaching cybersecurity to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. Want to dive deep into cybersecurity and master the art of ethical hacking Become a member today and unlock hacking tutorials and expert content. Click here to join my discord: https://discord.gg/R8J3xMcRMD //"
YouTube Link 2025-04-13T02:46Z [----] followers, [----] engagements

"Weevely tool in Kali Linux Kali linux for noobies Educational only Weevely tool in Kali Linux Kali linux for noobies Educational only #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends google cybersecurity learn cybersecurity what cybersecurity do what is cybersecurity women in cybersecurity ai and cybersecurity"
YouTube Link 2025-12-12T03:09Z [----] followers, [---] engagements

"POV: You didn't finish the CTF Challenge on Hackthebox or Tryhackme. POV: You didn't finish the CTF Challenge on Hackthebox or Tryhackme. #shorts #cybersecurity"
YouTube Link 2025-12-05T02:20Z [----] followers, [---] engagements

"Nmap for begineers everything to do with Nmap - Network Mapper Nmap for begineers everything to do with Nmap - Network Mapper. โš  educational only โš  #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends google cybersecurity learn cybersecurity what cybersecurity do what is cybersecurity women in cybersecurity ai and"
YouTube Link 2026-01-16T07:11Z [----] followers, [---] engagements

"I Intercepted Network Traffic with Bettercap (Beginner Friendly) part [--] https://www.bettercap.org/ https://www.kali.org/tools/bettercap/ Stay safe online with NordVPN ๐Ÿ‘‰ https://nordvpn.com/declan This video explains how Man-in-the-Middle attacks work from an educational cybersecurity perspective using Bettercap on Parrot OS in a controlled lab environment. Bettercap is a widely used network analysis and security assessment tool that helps demonstrate how traffic flows across a local network and how attackers may attempt to intercept or observe communications when systems are misconfigured or"
YouTube Link 2025-12-16T02:55Z [----] followers, [---] engagements

"๐Ÿ›œ What Is Bettercap The Hacking Tool Hackers Dont Talk About pentesters use Bettercap to test how ๐Ÿ›œ What Is Bettercap The Hacking Tool Hackers Dont Talk About pentesters use Bettercap to test how secure networks really are. It can perform ARP spoofing DNS spoofing packet sniffing credential harvesting and traffic injection on both wired and wireless networks. Because it operates live Bettercap shows exactly how attackers can exploit weak network configurations unsecured Wi-Fi and careless user behavior. https://uppbeat.io/t/tecnosine/drowning License code: Z7LKMHIXKP1WKLIP Educational"
YouTube Link 2025-12-18T21:23Z [----] followers, [----] engagements

"How to install Parrot Os on a MacBook laptop ๐Ÿฆœ ๐Ÿ’ป How to install Parrot Os on a MacBook laptop ๐Ÿฆœ ๐Ÿ’ป #shorts #cybersecurity"
YouTube Link 2025-10-24T01:10Z [----] followers, [----] engagements

"Previse hackthebox #cybersecurity"
YouTube Link 2025-05-28T17:39Z [----] followers, [----] engagements

"Weak passwords vs Strong Passwords Weak passwords vs Strong Passwords. Music from Uppbeat: Music used - falling-mirrors-chilled License code: NMEXSINK6MLN1SSP #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends google cybersecurity learn cybersecurity what cybersecurity do what is cybersecurity women in cybersecurity ai and"
YouTube Link 2026-01-18T21:19Z [----] followers, [----] engagements

"You just got called a skid. You just got called a skid. #shorts #cybersecurity"
YouTube Link 2025-11-22T03:18Z [----] followers, [----] engagements

"Part 2: Why Bettercap Is So Dangerous (and Powerful) What makes Bettercap stand out is how much Part 2: Why Bettercap Is So Dangerous (and Powerful) What makes Bettercap stand out is how much control it gives over a network once access is gained. Instead of just observing traffic Bettercap can actively alter communications between devices without users noticing. This means attackers can silently redirect websites inject malicious content downgrade HTTPS connections or hijack sessions in real time. Bettercap is especially effective on public and poorly secured Wi-Fi networks where devices"
YouTube Link 2025-12-18T22:21Z [----] followers, [---] engagements

"How to Install Kali Linux on Windows [--] Using WSL (2025 Method) https://hackerr.io Want the power of Kali Linux without wiping your PC or setting up a virtual machine In this video Ill show you step-by-step how to install Kali Linux on Windows [--] using WSL (Windows Subsystem for Linux) the fastest and easiest way to start hacking learning cybersecurity or running Linux tools directly inside Windows. This method is perfect for beginners AND advanced users because: No dual-booting required No virtual machine lag Full Linux environment inside Windows Access to real Kali tools using WSL 2"
YouTube Link 2025-12-09T08:58Z [----] followers, [----] engagements

"Settings up the environment (Chapter [--] - Ethical hacking Basics) โš  Disclaimer: This is for educational purposes only. Unauthorized hacking is illegal. We're here to learn ethical hacking and cybersecurity to protect against real threats. #CyberSecurity #EthicalHacking #HackTheBox #LearnHacking #VPN #OnlineSafety"
YouTube Link 2025-12-04T03:10Z [----] followers, [--] engagements

"โš  The Python Tool Hackers Dont Want You to Understand Penelope is a Python-based โš  The Python Tool Hackers Dont Want You to Understand Penelope is a Python-based post-exploitation utility used by penetration testers to manage reverse shells more efficiently. It provides session handling command execution file transfer support and better control over unstable shells compared to raw netcat connections. Ethical hackers use Penelope during authorized security assessments to improve workflow and simulate real-world attacker behavior in a controlled lab environment. โš  WARNING: This content is for"
YouTube Link 2025-12-22T00:08Z [----] followers, [----] engagements

"Exposing Hidden Web App Paths LIVE with Dirsearch - hackthebox retired machine Exposing Hidden Web App Paths LIVE with Dirsearch - hackthebox retired machine #shorts #cybersecurity"
YouTube Link 2025-12-09T01:08Z [----] followers, [---] engagements

"This React Flaw Could Let Hackers Take Over EVERYTHING This React Flaw Could Let Hackers Take Over EVERYTHING #shorts #cybersecurity"
YouTube Link 2025-12-09T01:08Z [----] followers, [---] engagements

"Patator - Kali Linux โš  Educational only Patator - Kali Linux โš  Educational only #shorts #cybersecurity"
YouTube Link 2025-11-26T23:09Z [----] followers, [---] engagements

"Server side template injection vulnerability #cybersecurity (educational) hackthebox"
YouTube Link 2025-07-12T01:49Z [----] followers, [----] engagements

"Website coping tools for cybersecurity enthusiasts - follow for more Website coping tools for cybersecurity enthusiasts - follow for more #shorts #cybersecurity"
YouTube Link 2025-11-27T22:15Z [----] followers, [----] engagements

"M1 M2 and M3 MacBook computers good for penetration testing and ethical hacking Want to dive deep into cybersecurity and master the art of ethical hacking Become a member today and unlock hacking tutorials and expert content. Click here to join my discord: https://discord.gg/R8J3xMcRMD โ˜• Educational Purposes Only Teaching cybersecurity to others with passion Stay updated with the latest features and methodologies in ethical hacking through this informative channel. // Connect with Me // https://linkedin.com/in/declanmiddleton ๐Ÿšซ Disclaimers: Unauthorized hacking is illegal. The content on"
YouTube Link 2025-04-15T07:04Z [----] followers, 12.5K engagements

"Everyone Uses Kali Linux So Why Do People Hate It Kali isnt bad but its often misunderstood Everyone Uses Kali Linux So Why Do People Hate It Kali isnt bad but its often misunderstood overused and blamed for mistakes that have nothing to do with the OS itself. #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends google"
YouTube Link 2025-12-23T06:06Z [----] followers, [----] engagements

"Want to learn more about web security and iOS security Want to learn more about web security and iOS security #shorts #cybersecurity"
YouTube Link 2025-11-17T20:11Z [----] followers, [----] engagements

"Introduction to Metasploit Framework (Metasploit Fundamentals ep1) In this lesson were breaking down the fundamentals of the Metasploit Framework inside Kali Linux. Before we touch any commands its important to understand what Metasploit actually is and why its one of the most widely used exploitation frameworks in the cybersecurity industry. Metasploit Framework is an open-source platform used to identify validate and exploit vulnerabilities in systems. It provides a structured environment where security professionals can test systems safely using real well-documented exploits. Instead of"
YouTube Link 2025-12-10T10:00Z [----] followers, [---] engagements

"Black Hat VS White Hat - Computer hackers - what do they mean Educational information Music Black Hat VS White Hat - Computer hackers - what do they mean Educational information Music from Uppbeat (free for Creators): Music in video: falling-mirrors-chilled License code: NMEXSINK6MLN1SSP #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills"
YouTube Link 2026-01-17T23:19Z [----] followers, [---] engagements

"How to Install Parrot OS on Windows [--] (2025 Edition) Easiest VirtualBox Setup Tutorial Want to learn how to install Parrot OS on your Windows [--] machine in under [--] minutes ๐Ÿ‘‡ Step 1: Download the latest Parrot OS OVA file from the official Parrot Security website. ๐Ÿ‘‰ (Make sure to choose the VirtualBox-compatible version) Step 2: Download and install Oracle VirtualBox from virtualbox.org Step 3: Once VirtualBox is installed double-click the Parrot OS OVA file. It will automatically open and import into VirtualBox just click Import to continue. Step 4: Start Parrot OS by selecting it and"
YouTube Link 2025-10-25T20:15Z [----] followers, [---] engagements

"Thanks for the support lets continue to grow this cybersecurity discord community Thanks for the support lets continue to grow this cybersecurity discord community #shorts #cybersecurity"
YouTube Link 2025-11-30T04:04Z [----] followers, [---] engagements

"Port Scanning with Metasploit (Information Gathering and Scanning Ep. 7) Welcome to Episode [--] of the Metasploit Fundamentals Course an educational cybersecurity series designed to help you understand how security assessment tools function inside a safe private and fully authorized lab environment. In this lesson we explore how Metasploit performs port scanning one of the most important steps in any professional security assessment. Port scanning allows security teams to identify which services are running on a system so they can verify configuration issues detect unnecessary exposure and"
YouTube Link 2025-12-11T01:56Z [----] followers, [---] engagements

"NZs Biggest Health Data Breach Hundreds of thousands of medical documents were taken in the NZs Biggest Health Data Breach Hundreds of thousands of medical documents were taken in the ManageMyHealth breach and the most alarming part is that no one publicly knows the exact flaw that was exploited. No confirmed vulnerability. No technical breakdown. Just unauthorised access. For healthcare systems thats a serious problem. These platforms store highly sensitive data and without transparency around what failed access controls document security or backend permissions the same class of weaknesses"
YouTube Link 2026-01-11T04:17Z [----] followers, [----] engagements

"POV: You installed Tor Browser at 3AM"
YouTube Link 2025-10-23T21:46Z [----] followers, [---] engagements

"Basic Commands and Workflow (Metasploit Fundamentals Ep. 4) Welcome to Episode [--] of the Metasploit Fundamentals Course a structured educational series designed to help students and professionals understand how modern security tools function in a safe and controlled environment. In this episode we focus on the core commands and workflow used inside the Metasploit Framework. These basics form the foundation of how cybersecurity analysts and penetration testers operate during authorized security assessments. Understanding these commands is essential for navigating the MSF console evaluating"
YouTube Link 2025-12-10T21:24Z [----] followers, [---] engagements

"Passive and Active Reconnaissance (Information Gathering and Scanning Ep. 6) Welcome to Episode [--] of the Metasploit Fundamentals Course. In this lesson we explore one of the most important phases of any authorized security assessment: reconnaissance. Understanding how information is gatheredboth passively and activelyis critical for identifying potential weaknesses and improving system defenses. This episode explains how cybersecurity professionals use reconnaissance techniques in legal controlled environments to understand networks services and potential misconfigurations before running any"
YouTube Link 2025-12-10T23:24Z [----] followers, [---] engagements

"Be Precise with Commands & Services (Information Gathering and Scanning Ep. 8) Welcome to Episode [--] of the Metasploit Fundamentals Course a structured cybersecurity learning series focused on teaching beginners how to safely and responsibly use security tools inside a controlled private lab environment. In this lesson we highlight one of the most important skills in cybersecurity and professional security assessments: precision specifically when working with Metasploit commands services modules and configuration options. Being precise with commands ensures accuracy consistency and safe"
YouTube Link 2025-12-11T03:04Z [----] followers, [--] engagements

"Prune - directory search & Sub enumeration tool Prune - directory search & Sub enumeration tool. Prune is a cybersecurity tool designed for penetration testers and security professionals enabling concurrent reconnaissance workflows by combining advanced directory and vector discovery with automated subdomain enumeration in a single streamlined process. Tool available on my GitHub Open sourced. โš Educational purposes only #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity"
YouTube Link 2026-01-13T09:10Z [----] followers, [---] engagements

"I Thought It Was a Normal Box Then I Saw IP [--] I Thought It Was a Normal Box Then I Saw IP [--]. This Cybersecurity Challenge Was NOT Random. #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends google cybersecurity learn cybersecurity what cybersecurity do what is cybersecurity women in cybersecurity ai and cybersecurity"
YouTube Link 2025-12-14T09:01Z [----] followers, [---] engagements

"Linux file structure linux folders understanding linux better โš  Disclaimer: This is for educational purposes only. Unauthorized hacking is illegal. We're here to learn ethical hacking and cybersecurity to protect against real threats. #CyberSecurity #EthicalHacking #HackTheBox #LearnHacking #VPN #OnlineSafety"
YouTube Link 2025-12-03T21:34Z [----] followers, [---] engagements

"Sqlmap - SQL Injections (educational) (Chapter [--] - Web Application Security) โš  Disclaimer: This is for educational purposes only. Unauthorized hacking is illegal. We're here to learn ethical hacking and cybersecurity to protect against real threats. #CyberSecurity #EthicalHacking #HackTheBox #LearnHacking #VPN #OnlineSafety"
YouTube Link 2025-12-04T04:59Z [----] followers, [--] engagements

"Why Short PINs Are Unsafe Brute Force Explained Kali Linux / Python Tutorial Educational Why Short PINs Are Unsafe Brute Force Explained Kali Linux / Python Tutorial Educational purposes only #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends google cybersecurity learn cybersecurity what cybersecurity do what is"
YouTube Link 2025-12-12T09:00Z [----] followers, [----] engagements

"The Linux OS Hackers Actually Use One major reason Pop_OS stands out is how well it handles The Linux OS Hackers Actually Use One major reason Pop_OS stands out is how well it handles workflows. Features like automatic tiling window management advanced keyboard shortcuts and excellent hardware compatibility (especially for NVIDIA GPUs) make multitasking fast and efficient. That matters when running virtual machines coding or testing security tools. Pop_OS is also popular in cybersecurity because its stable open-source and compatible with popular penetration-testing and development tools. its"
YouTube Link 2026-01-10T05:15Z [----] followers, [----] engagements

"This is why Python is powerful and risky Kali Linux Python tutorial for beginners educational This is why Python is powerful and risky Kali Linux Python tutorial for beginners educational purposes only #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends google cybersecurity learn cybersecurity what cybersecurity do what is"
YouTube Link 2025-12-12T21:10Z [----] followers, [----] engagements

"๐Ÿ”ด SSTI in Java Spring Boot RedPanda HTB Walkthrough ๐Ÿผ Educational Only ๐Ÿง  ๐Ÿ”ด SSTI in Java Spring Boot RedPanda HTB Walkthrough ๐Ÿผ Educational Only ๐Ÿง  #shorts #cybersecurity"
YouTube Link 2025-08-05T23:17Z [----] followers, [---] engagements

"Declan is cooking with deprecated version of Python [--] โš  Educational only Declan is cooking with deprecated version of Python [--] โš  Educational only #shorts #cybersecurity"
YouTube Link 2025-10-14T10:03Z [----] followers, [---] engagements

"Dex Security Merch - Cybersecurity Merchandise for Penetration Testers and Computer Security Nerds Dex Security Merch - Cybersecurity Merchandise for Penetration Testers and Computer Security Nerds #shorts #cybersecurity"
YouTube Link 2025-07-25T03:44Z [----] followers, [---] engagements

"I Found Everything About Them Using These Tools (OSINT Tutorial) If you're interested in learning more about cybersecurity whether you're just starting out or want to sharpen your hacking skills I highly recommend checking out Hack The Box ๐Ÿง ๐Ÿ’ป Start Hackthebox TODAY https://hacktheboxltd.sjv.io/YRLYoJ โš  Disclaimer Unauthorized hacking is illegal. This channel is dedicated solely to educational purposes focusing on cybersecurity ethical hacking and penetration testing to help us defend against real-world cyber threats. 00:00 Hacker intro 0:37 Google Dorking 2:34 Sherlock 3:15 theHarvester"
YouTube Link 2025-04-28T16:01Z [----] followers, 16K engagements

"Penelope (Python) Explained โš  How Ethical Hackers Stabilize Shells in Seconds Educational Only Penelope (Python) Explained โš  How Ethical Hackers Stabilize Shells in Seconds Educational Only Music from Uppbeat. https://uppbeat.io/t/atm/smoke-me License code: PNRMOSJAXTPSBN5R #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends"
YouTube Link 2025-12-22T21:20Z [----] followers, [----] engagements

"The best browser to use in [----] for cybersecurity The best browser to use in [----] for cybersecurity #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends google cybersecurity learn cybersecurity what cybersecurity do what is cybersecurity women in cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity"
YouTube Link 2026-01-13T23:21Z [----] followers, [----] engagements

"This OSINT Tool Shows What Data Exists About You (Intelius) Intelius is an open-source intelligence This OSINT Tool Shows What Data Exists About You (Intelius) Intelius is an open-source intelligence (OSINT)style data aggregation platform that compiles publicly available records such as names addresses and phone numbers to demonstrate how much information can exist about an individual online. In this video I explain how data exposure happens why digital footprints matter and how security professionals use OSINT tools to identify privacy risks and improve personal security. All demonstrated in"
YouTube Link 2026-01-09T04:14Z [----] followers, [---] engagements

"My M1 MacBook Air got HACKED using Python Educational only My M1 MacBook Air got HACKED using Python Educational only #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends google cybersecurity learn cybersecurity what cybersecurity do what is cybersecurity women in cybersecurity ai and cybersecurity cybersecurity cybersecurity"
YouTube Link 2025-12-12T22:09Z [----] followers, [----] engagements

"Kali Linux introduction for noobies โš  Disclaimer: This is for educational purposes only. Unauthorized hacking is illegal. We're here to learn ethical hacking and cybersecurity to protect against real threats. #CyberSecurity #EthicalHacking #HackTheBox #LearnHacking #VPN #OnlineSafety"
YouTube Link 2025-12-03T21:32Z [----] followers, [--] engagements

"Rubeus Kerberos authentication protocol testing Educational only Rubeus Kerberos authentication protocol testing Educational only #shorts #cybersecurity"
YouTube Link 2025-11-18T19:15Z [----] followers, [----] engagements

"What Is NetExec โš  The Tool Everyone Talks About (STRICTLY FOR EDUCATIONAL ONLY) Why Cybersecurity What Is NetExec โš  The Tool Everyone Talks About (STRICTLY FOR EDUCATIONAL ONLY) Why Cybersecurity Experts Use It. ๐ŸŽต Music from Uppbeat (free for Creators) https://uppbeat.io/t/tecnosine/drowning License code: EHWBSHR6TTMMUNGG #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary"
YouTube Link 2026-01-08T22:22Z [----] followers, [----] engagements

"A critical vulnerability has been identified in the React Server Components (RSC) protocol NEXTJS A critical vulnerability has been identified in the React Server Components (RSC) protocol NEXTJS [--] [--] CVE-2025-66478 A brand-new Next.js vulnerability has been discovered that can allow attackers to bypass server logic leak sensitive data or execute unexpected behavior inside your application depending on how your routes and server components are configured. This vulnerability affects Next.js applications using the App Router especially those relying on: Server Actions Route Handlers API"
YouTube Link 2025-12-06T06:12Z [----] followers, [----] engagements

"Export Results from Database in Metasploit (Information Gathering and Scanning Ep. 9) Welcome to Episode [--] of the Metasploit Fundamentals Course a structured learning series created to help students and beginners understand how security tools operate inside a safe isolated and fully authorized lab environment. In this episode we focus on one of the most important but often overlooked parts of cybersecurity work: exporting results from the Metasploit database. During an authorized security assessment professionals collect large amounts of information hosts services open ports vulnerabilities"
YouTube Link 2025-12-11T03:45Z [----] followers, [--] engagements

"Is Nordvpn Legit This video breaks down what NordVPN says it does not collect no browsing Is Nordvpn Legit This video breaks down what NordVPN says it does not collect no browsing history no IP address logs no DNS queries. If you care about VPN privacy online security and internet anonymity this matters. https://nordvpn.com/declan Music from Uppbeat: clock-is-ticking License code: 6PHNNB5HYQRINHUW #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity"
YouTube Link 2026-01-05T22:18Z [----] followers, [---] engagements

"CAP - Comprehensive Assessment Platform - for penetration testers and noobies in Cybersecurity CAP - Comprehensive Assessment Platform - for penetration testers and noobies in Cybersecurity. it's a framework developed in Rust programming language to ensure stability and simplicity when doing capture the flags or just general use for security testing/auditing. Pretty cool right note: still in development work in progress. Open source / Built in public. Music from Uppbeat: falling-mirrors-chilled License code: FZSC2XF7TB9UONZP โš  Educational only content. #shorts #cybersecurity ai and"
YouTube Link 2026-01-07T05:03Z [----] followers, [----] engagements

"LIVE Hack The Box Soccer (Easy) โšฝ Web Vulnerabilities Enumeration & Privilege Escalation In this live stream we are hacking the retired Soccer (Easy) machine on Hack The Box focusing on realistic web application exploitation techniques used in penetration testing. This session is designed for beginners and aspiring ethical hackers who want to understand how attackers enumerate exploit and escalate privileges in a controlled legal lab environment. You will see the full attack path from initial reconnaissance to root access including web-based vulnerabilities misconfigurations and common"
YouTube Link 2025-12-22T14:28Z [----] followers, [--] engagements

"Cow patty - used for auditing wireless access points Educational only Cow patty - used for auditing wireless access points Educational only #shorts #cybersecurity"
YouTube Link 2025-11-18T23:14Z [----] followers, [----] engagements

"Module Types and Exploitation (Metasploit Fundamentals Ep. 5) Want to learn cybersecurity or improve your skills Check out Hack The Box perfect for beginners ๐Ÿง ๐Ÿ’ป ๐Ÿ‘‰ https://hacktheboxltd.sjv.io/YRLYoJ Stay safe online with NordVPN ๐Ÿ‘‰ https://nordvpn.com/declan โš  Disclaimer: This is for educational purposes only. Unauthorized hacking is illegal. We're here to learn ethical hacking and cybersecurity to protect against real threats. #metasploit #ethicalhacking #kaliLinux #cybersecurity #hackingTutorial #penetrationTesting #metasploitTutorial #hackers #linuxTools #bugbounty metasploit modules"
YouTube Link 2025-12-10T22:15Z [----] followers, [---] engagements

"Setting Up Your Lab Environment (Metasploit Fundamentals ep2) Welcome to Episode [--] of the Metasploit Fundamentals Course. Before you can start exploiting vulnerabilities or diving into advanced Metasploit modules you need a safe and reliable lab environment. In this video Ill walk you through everything you need to set up a proper penetration testing lab where you can practice legally safely and effectively. You can watch my previous videos on my youtube channel to see how to install kali linux on a virtual machine. Want to learn cybersecurity or improve your skills Check out Hack The Box"
YouTube Link 2025-12-10T12:31Z [----] followers, [---] engagements

"Perl Debugger RCE #cybersecurity"
YouTube Link 2025-05-24T03:38Z [----] followers, [---] engagements

"Not these videos again somebody help its probably in Hindi ๐Ÿคฃ โš  Memes only dont take it Not these videos again somebody help its probably in Hindi ๐Ÿคฃ โš  Memes only dont take it personal #shorts #cybersecurity"
YouTube Link 2025-11-22T02:21Z [----] followers, [----] engagements

"Manjaro Linux for Hacking The Arch Setup Hackers Actually Use https://manjaro.org/ https://blackarch.org/downloads.html#install-repo Thinking of installing Manjaro Linux for ethical hacking or penetration testing In this video I break down why Manjaro is becoming one of the most popular Arch-based distros among hackers how it works and why so many security researchers prefer it over Kali Linux. [--]. Why Manjaro Linux for hacking Manjaro gives you the perfect balance between Arch Linuxs cutting-edge power and a stable user-friendly experience. You get faster performance better hardware support"
YouTube Link 2025-12-09T04:46Z [----] followers, [---] engagements

"Hackers dont write everything from scratch heres why ๐Ÿ”ฅ Python libraries are like cheat codes for Hackers dont write everything from scratch heres why ๐Ÿ”ฅ Python libraries are like cheat codes for hackers pre-built tools that handle the hard stuff for you. From scanning to packet sniffing libraries make hacking faster and smarter. #shorts #cybersecurity"
YouTube Link 2025-11-04T02:08Z [----] followers, [----] engagements

"POV: you installed parrot os after watching mr robot POV: you installed parrot os after watching mr robot #shorts #cybersecurity"
YouTube Link 2025-10-23T04:05Z [----] followers, [---] engagements

"๐Ÿš Got a Bash Shell via SSTI RedPanda HTB Hack ๐Ÿ”ฅ Java Spring Boot Educational Only ๐Ÿš Got a Bash Shell via SSTI RedPanda HTB Hack ๐Ÿ”ฅ Java Spring Boot Educational Only #shorts #cybersecurity"
YouTube Link 2025-08-05T23:17Z [----] followers, [---] engagements

"Hackerr.io - a fresh brand new cyber security learning platform for newbies educational only Hackerr.io - a fresh brand new cyber security learning platform for newbies educational only #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends google cybersecurity learn cybersecurity what cybersecurity do what is cybersecurity"
YouTube Link 2026-02-03T00:32Z [----] followers, [----] engagements

"New Cyber Security platform for beginners New Cyber Security platform for beginners #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends google cybersecurity learn cybersecurity what cybersecurity do what is cybersecurity women in cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity 2025"
YouTube Link 2026-02-01T22:32Z [----] followers, [---] engagements

"Weak passwords vs Strong Passwords Weak passwords vs Strong Passwords. Music from Uppbeat: Music used - falling-mirrors-chilled License code: NMEXSINK6MLN1SSP #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends google cybersecurity learn cybersecurity what cybersecurity do what is cybersecurity women in cybersecurity ai and"
YouTube Link 2026-01-18T21:19Z [----] followers, [----] engagements

"Black Hat VS White Hat - Computer hackers - what do they mean Educational information Music Black Hat VS White Hat - Computer hackers - what do they mean Educational information Music from Uppbeat (free for Creators): Music in video: falling-mirrors-chilled License code: NMEXSINK6MLN1SSP #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills"
YouTube Link 2026-01-17T23:19Z [----] followers, [---] engagements

"Nmap for begineers everything to do with Nmap - Network Mapper Nmap for begineers everything to do with Nmap - Network Mapper. โš  educational only โš  #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends google cybersecurity learn cybersecurity what cybersecurity do what is cybersecurity women in cybersecurity ai and"
YouTube Link 2026-01-16T07:11Z [----] followers, [---] engagements

"Top [--] BEST Websites to Learn about Cybersecurity in [----] Top [--] BEST Websites to Learn about Cybersecurity in [----] #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends google cybersecurity learn cybersecurity what cybersecurity do what is cybersecurity women in cybersecurity ai and cybersecurity cybersecurity cybersecurity 101"
YouTube Link 2026-01-14T03:17Z [----] followers, [----] engagements

"Cybersecurity tools to use in [----] if you are just starting out Cybersecurity tools to use in [----] if you are just starting out. โš  Educational only โš  #shorts #cybersecurity ai and cybersecurity cybersecurity cybersecurity [---] cybersecurity [----] cybersecurity basics cybersecurity career cybersecurity course cybersecurity degree cybersecurity future cybersecurity jobs cybersecurity roadmap cybersecurity salary cybersecurity shorts cybersecurity skills cybersecurity trends google cybersecurity learn cybersecurity what cybersecurity do what is cybersecurity women in cybersecurity ai and"
YouTube Link 2026-01-14T00:20Z [----] followers, [----] engagements

Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing

@declanmidd
/creator/youtube::declanmidd