Dark | Light
# ![@hacktheclown Avatar](https://lunarcrush.com/gi/w:26/cr:youtube::UCELHcNI5hYHy5iz54WUsndQ.png) @hacktheclown Hack the Clown

Hack the Clown posts on YouTube about hack, how to, shell, code the most. They currently have [------] followers and [---] posts still getting attention that total [------] engagements in the last [--] hours.

### Engagements: [------] [#](/creator/youtube::UCELHcNI5hYHy5iz54WUsndQ/interactions)
![Engagements Line Chart](https://lunarcrush.com/gi/w:600/cr:youtube::UCELHcNI5hYHy5iz54WUsndQ/c:line/m:interactions.svg)

- [--] Week [------] +58%
- [--] Month [------] +28%
- [--] Months [-------] +2,453%
- [--] Year [-------] +680%

### Mentions: [--] [#](/creator/youtube::UCELHcNI5hYHy5iz54WUsndQ/posts_active)
![Mentions Line Chart](https://lunarcrush.com/gi/w:600/cr:youtube::UCELHcNI5hYHy5iz54WUsndQ/c:line/m:posts_active.svg)


### Followers: [------] [#](/creator/youtube::UCELHcNI5hYHy5iz54WUsndQ/followers)
![Followers Line Chart](https://lunarcrush.com/gi/w:600/cr:youtube::UCELHcNI5hYHy5iz54WUsndQ/c:line/m:followers.svg)

- [--] Week [------] +2%
- [--] Month [------] +7.80%
- [--] Months [------] +69%
- [--] Year [------] +102%

### CreatorRank: [-------] [#](/creator/youtube::UCELHcNI5hYHy5iz54WUsndQ/influencer_rank)
![CreatorRank Line Chart](https://lunarcrush.com/gi/w:600/cr:youtube::UCELHcNI5hYHy5iz54WUsndQ/c:line/m:influencer_rank.svg)

### Social Influence

**Social category influence**
[stocks](/list/stocks)  [technology brands](/list/technology-brands)  [cryptocurrencies](/list/cryptocurrencies) 

**Social topic influence**
[hack](/topic/hack), [how to](/topic/how-to), [shell](/topic/shell), [code](/topic/code), [command](/topic/command), [intro](/topic/intro) #89, [hide](/topic/hide), [stealth](/topic/stealth), [tools](/topic/tools), [what is](/topic/what-is)

**Top assets mentioned**
[Alphabet Inc Class A (GOOGL)](/topic/$googl) [Cloudflare, Inc. (NET)](/topic/cloudflare)
### Top Social Posts
Top posts by engagements in the last [--] hours

"These Google Searches Reveal WAY Too Much. Did you know Google can reveal live cameras exposed repositories and more all legally indexed In this short video I explain how Google Dorking works and why misconfigurations are dangerous. // Chapters 0:00 - Intro 0:22 - Google Dorking [---] 0:35 - Looking for SSH private keys 1:06 - Looking for Camera Live Feed 1:48 - Looking for git repositories 2:47 - Other interesting things // Links None for now. // Tags #googledorking #cybersecurity #osint #infosec #techawareness"  
[YouTube Link](https://youtube.com/watch?v=7TOuF6HQv3M)  2026-02-06T09:00Z 20.9K followers, [----] engagements


"SSH Honeypot that Traps Attackers Endless SSH is a great tool for catching bad actors. In this video I will show you how to run this and we will understand the mechanism behind. // Tags #ethicalhacking #ssh #honeypot #decoy #deception // Chapters 0:00 - Intro 0:39 - SSH protocol recap 1:38 - Demo 2:08 - Adding a troll message // Links * endlessh-go: https://github.com/shizunge/endlessh-go"  
[YouTube Link](https://youtube.com/watch?v=E9ONTdboYMw)  2025-12-03T09:00Z 20.9K followers, [----] engagements


"Things I learned when switching to Arch Using Linux doesnt make us immune to malwares and attacks. In this video I will show you how to harden a linux machine using Lynis auditing tool. // Tags #ethicalhacking #hardening #auditing #lynis #archlinux // Chapters 0:00 - Intro 0:49 - Running lynis // Links * Lynis: https://github.com/CISOfy/lynis"  
[YouTube Link](https://youtube.com/watch?v=Ef0PWSOeFqc)  2025-12-28T09:00Z 20.9K followers, [----] engagements


"The WORST Telnet Vulnerability in Years CVE202624061 is a critical Telnet vulnerability that allows a trivial authentication bypass and can lead to unauthenticated root access on affected systems. // Chapters 0:00 - Intro 0:16 - Vulnerability overview 0:34 - Setting up POC environment 1:19 - Simulating the exploit 1:59 - Vulnerability Analysis: Telnet automatic login 2:52 - Vulnerability Analysis: Spotting the code // Links * CVE details: https://nvd.nist.gov/vuln/detail/CVE-2026-24061 * Github POC: https://github.com/JayGLXR/CVE-2026-24061-POC // Tags #cve202624061 #telnet #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=Gr4GdROJIZ8)  2026-01-29T09:00Z 20.9K followers, [----] engagements


"Stop Grepping ps: Smarter Linux Process Hunting Still using"ps aux grep"and missing malware In this 5minute demo Ill show you how hackers really use the"ps"command to hunt suspicious processes on Linux. Youll learn cleaner faster techniques to find shady commands users and start times without noisy grep hacks. // Chapters 0:00 - Intro 0:31 - PS [---] 1:24 - Hiding kernel threads 1:57 - Finding processes for another user 2:37 - Finding a user running a specific command 3:36 - Inverting the match 4:12 - Excluding ppid [--] 4:37 - Process start time // Links None for now. // Tags #linux #hacking"  
[YouTube Link](https://youtube.com/watch?v=ZSQC3165PZg)  2026-02-08T09:00Z 20.9K followers, [----] engagements


"How Hackers run BASH with NO files You can run bash scripts without touching the disk. In this video I will show you attacker techniques to evade detection when running malwares inside bashb *** Stealth and Evasion Techniques Playlist *** https://youtube.com/playlistlist=PL08nYpWQJ_zPpVXLgVlVn56i1Km4bArhv&si=kyJeRug-stJvyjCR // Tags #ethicalhacking #evasion #bash #linux // Chapters 0:00 - Using native tools 1:32 - Using 3rd party tools // Links None for now"  
[YouTube Link](https://youtube.com/watch?v=bXtTIjqSAA0)  2026-01-09T09:01Z 20.9K followers, 14.8K engagements


"Prevent hackers from decrypting your HTTPS traffic In this video we will discuss some of the most common techniques attackers use to install fake root certificates on our devices to decrypt our TLS traffic. // Tags #ethicalhacking #tls #ssl #https #metasploit #c2 #bufferoverflow #eternalblue // Chapters 0:00 - Intro 0:47 - Why are CAs important 3:51 - Fake root cert installation via Classic Network Attacks (LLMR poisioning/Brute Force) 09:54 - Fake root cert installation via OS Vulnerability (Eternal Blue) 14:04 - Fake root cert installation via App Vulnerability (Buffer Overflow) 17:29 -"  
[YouTube Link](https://youtube.com/watch?v=nBISGwu0lhs)  2024-12-21T04:43Z 20.5K followers, [----] engagements


"Clawd Bot MOLT Sites Are Getting Out of Control Today we dive into the bizarre new world of ClawBot MOLT sites from moltbook and moltx to church of molt onlymolts and molthub. If youre into ClawBot lore and weird corners of the web this ones for you. PS. I may have some mistake in the Church of Molt part about context memory. // Chapters 0:00 - Intro 0:18 - ClawdBot/MoltBot/OpenClaw 0:36 - Moltbook 1:57 - MoltX 2:54 - Church of Molt 4:31 - OnlyMolts and MoltHub 4:55 - Other sites // Links * Moltbook: https://www.moltbook.com * MoltX: https://moltx.io * Church of Molt: https://molt.Church *"  
[YouTube Link](https://youtube.com/watch?v=nm3MWCUVrWs)  2026-02-04T09:00Z 20.9K followers, [----] engagements


"Stop manual CVE search: Automate it with Vulnx Vulnx is a free all-in-one vulnerability search tool. In this video I will show you how to hunt for vulnerabilities using its powerful filters and queries. // Tags #ethicalhacking #vulnx #cve #vulnerability // Chapters 0:00 - Intro 0:42 - Nice graphs 1:36 - Powerful queries // Links * Vulnx: https://github.com/projectdiscovery/cvemap"  
[YouTube Link](https://youtube.com/watch?v=qpcaEcRrwyA)  2026-01-05T09:01Z 20.9K followers, [----] engagements


"Confusing feature that makes It SAFER than other programming languages Rust ownership and borrowing are confusing at firstbut that complexity is exactly why Rust is safer than other languages. In this video I explain how ownership prevents bugs before your code even runs. // Chapters 0:00 - Intro 0:34 - Ownership System 1:35 - Code Analysis 2:36 - Fixing the issue: Borrowing // Links None for now. // Tags #rustlang #rustprogramming #learnrust #systemsprogramming #coding #exploitdevelopment"  
[YouTube Link](https://youtube.com/watch?v=7UBeM4K-5_Y)  2026-02-12T09:00Z 20.9K followers, [----] engagements


"Stop Guessing. Debug Faster with WITR. In this short demo I show howWITRhelps you instantly answer two painful questions: - why is this process running - why is this port listening Instead of grepping logs or digging through ps output youll see how witr gives you quick context so you can debug faster stay secure and keep your machine tidy. // Chapters 0:00 - Intro 0:34 - WITR and normal way of finding explanations 1:55 - Benefits of WITR 2:24 - Other uses // Links * WITR: https://github.com/pranshuparmar/witr // Tags #linux #devops #debugging #opensource #sysadmin"  
[YouTube Link](https://youtube.com/watch?v=gfskSUqILr0)  2026-02-10T09:00Z 20.9K followers, [----] engagements


"This Linux Directory Leaks Everything Attackers love /proc and most defenders ignore it. In [--] minutes see how /proc leaks ports env vars memory maps and more. // Chapters 0:00 - Intro 0:31 - Looking for binary path 0:55 - Looking for listening ports 1:34 - Looking for environment settings 1:51 - Looking for command parameters 2:09 - Looking for mounts 2:23 - Looking for executables 2:40 - Looking for kernel information 2:56 - Looking for memory maps 3:15 - Looking for connected hosts 3:30 - Looking for man-in-the middle device 3:46 - Looking for network devices // Links None for now. // Tags"  
[YouTube Link](https://youtube.com/watch?v=vgTpbMvImWs)  2026-02-14T09:00Z 20.9K followers, [----] engagements


"Cloudflare Tunnel: How hackers abuse it Cloudflare Tunnel is an easy way to expose your application over the internet securely but hackers are abusing this to hide their cover operations. In this video I will show you different techniques hackers can use to leverage cloudflare tunnel for their malicious gains. // Tags #ethicalhacking #cloudflare #tunnel #evasion #stealth // Chapters 0:00 - Intro 1:15 - Launching cloudflare tunnel 1:55 - Using for fingerprinting 2:08 - Tunneling reverse shell and C2 connections 2:12 - Webshell on victim machine // Links * Cloudflare Tunnel:"  
[YouTube Link](https://youtube.com/watch?v=JMFcgGEqiG4)  2025-11-23T09:00Z 20.9K followers, [----] engagements


"These Rust CLI Tools Make Linux Hacking Faster Rust isnt just for backend and systems its becoming a must-have toolkit for ethical hackers and security engineers. In this video youll discover powerful Rust CLI tools that make hacking workflows faster safer and more fun. // Chapters 0:00 - Intro 0:23 - bat 1:54 - tailspin 2:50 - lla 4:06 - havn 4:26 - motus 4:49 - navi 5:18 - domain-check 5:37 - kmon // Links * bat: https://github.com/sharkdp/bat * tailspin: https://github.com/bensadeh/tailspin * lla: https://github.com/chaqchase/lla * havn: https://github.com/mrjackwills/havn * motus:"  
[YouTube Link](https://youtube.com/watch?v=eWGSrRoKNis)  2026-01-21T09:00Z 20.9K followers, [----] engagements


"Login without a PASSWORD (CVSS 10) A good way of understanding SSH is to deep dive on the protocol itself and exploit known vulnerabilities. In this video we will exploit a critical vulnerability (CVSS 10) in Erlang SSH library that allows unauthenticated login to the server. P.S There are some typo in the video about the CVE number. It should be CVE-2025-32433 and not CVE-2025-3243. // Tags #ethicalhacking #erlang #ssh #exploit #CVE-2025-32433 // Chapters 0:00 - Erlang [---] 0:48 - SSH protocol architecture 1:50 - Creating the script 2:41 - Banner and protocol version exchange 4:04 - Key"  
[YouTube Link](https://youtube.com/watch?v=kHFn9WQY5fI)  2025-10-18T09:01Z 19.9K followers, 10.1K engagements


"Web Check: An All-in-One OSINT Tool Webcheck is an all-in-one OSINT tool that analyze a website for misconfiguration security vulnerabilities and performance. In this video I will show you the various scans it can perform. // Tags #ethicalhacking #web-check #osint // Chapters 0:00 - Intro 0:28 - Trying out the public instance 2:46 - Diagnosing and fixing some errors 4:28 - Trying out more features // Links * Web Check project: https://github.com/Lissy93/web-check * Web Check publick instance: https://web-check.xyz"  
[YouTube Link](https://youtube.com/watch?v=nBjLzimVoSY)  2025-11-11T09:01Z 20.9K followers, [----] engagements


"Why C2 Frameworks are Perfect for PROs (Stealthy Operations) In this video I will show how hackers leverage C2 frameworks for stealthy tactics using staged payloads. I will use Sliver framework as an example and I will also show some basic functionalities. // Chapters 0:00 - Intro 0:28 - What is a C2 1:36 - Sliver installation 2:13 - Sliver [---] 2:54 - Sliver beacons 5:01 - Sliver sessions and shells 6:31 - Problem with stageless payloads 6:51 - Stealthier way to use sliver (stagers) 8:20 - Stager demo // Links * C2 Matrix - https://howto.thec2matrix.com/ * Sliver sample stager wrapper code:"  
[YouTube Link](https://youtube.com/watch?v=0xVEvZvrIgk)  2024-05-09T22:42Z 20.4K followers, 34.5K engagements


"Most severe SUDO vulnerability of [----] Sudo is a core component of linux permission model. This year we encountered the most severe sudo vulnerability that allows unprivileged users to drop to a root shell via malicious shared object via a chroot environment. In this video we will exploit it manually and have an understanding on how it works. // Tags #ethicalhacking #sudo #linux #cve-2025-32463 #exploit // Chapters 0:00 - Intro 0:14 - Exploiting manually 2:26 - Automated exploit // Links None for now"  
[YouTube Link](https://youtube.com/watch?v=5C75IyiDg-I)  2025-10-03T09:00Z 20.4K followers, 15.5K engagements


"Athena NixOS: Setup & First Impressions NixOS has been a game changer in making a linux machine reproducible and reliable. In this video I will show you how you can transform Nix into an ethical hacking machine. // Tags #ethicalhacking #nixos #athena // Chapters 0:00 - Intro 1:12 - Installing Nix OS 3:17 - Installing Athena OS 4:14 - Good things about Athena 5:40 - Only thing I don't like // Links * Athena OS: https://athenaos.org"  
[YouTube Link](https://youtube.com/watch?v=Gk_mEm-ISlI)  2026-01-07T09:00Z 20.9K followers, [----] engagements


"PERFECT Low-Level Debugger for Beginners Pwn DBG is a modern GDB plugin for hardware hackers reverse engineers and exploit developers. In this video we will explore some of its unique functionalities by doing a basic buffer overflow challenge. // Tags #ethicalhacking #exploitdev #reverse-engineering #debugging #gdb #low-level #bufferoverflow // Chapters 0:00 - Intro 0:28 - Overview of challenge 1:10 - Running pwndbg 2:59 - Exploring the different panes 4:29 - Inspecting the memory region 5:07 - Running with the exploit // Links * Pwn DBG: https://github.com/pwndbg/pwndbg"  
[YouTube Link](https://youtube.com/watch?v=Hpf2_5CiELI)  2025-10-28T09:00Z 20.4K followers, [----] engagements


"How hackers HIDE in DNS DNS is one of the widely used protocol and attackers can leverage it for covert operations. In this video I will show you how they can abuse the text queries to send malicious commands to a victim machine. // Tags #ethicalhacking #dns #reverse-shell #covert-operations #stealth // Chapters 0:00 - Intro 0:32 - What is a DNS TXT record 1:18 - Understanding the attack 2:52 - Demo of the attack 5:17 - How client malware send back the output 5:47 - How attacker decodes the output // Links * revshellDns: https://github.com/LucaReggiannini/revshellDns"  
[YouTube Link](https://youtube.com/watch?v=JO7OP5pV7w8)  2025-11-15T09:00Z 20.9K followers, [----] engagements


"Hacker technique to drop files quickly Croc is a tool that is designed for fast file transfer that operates through secure codes. Attackers can leverage this tool as a covert channel so be aware of the files you are downloading or sending through the public relay. // Tags #ethicalhacking #croc // Chapters 0:00 - Intro 0:26 - Exploring croc features // Links * croc: https://github.com/schollz/croc/tree/main"  
[YouTube Link](https://youtube.com/watch?v=MPYYrQ2XUJs)  2025-11-05T09:00Z 20.4K followers, [----] engagements


"The Most Cursed PDF: It Runs Linux Yes this PDF actually boots Linux. Not a meme a real OS running inside a document. In this video I dive into LinuxPDF a wild project that uses a RISCV emulator to run Linux inside a PDF file. I walk through how it works with a simple diagram explore the filesystem and then completely destroy the virtual system just to see what happens. // Chapters 0:00 - Intro 0:17 - What is Linux PDF 0:24 - Launching Linux PDF 0:52 - Implementation 1:38 - Exploring the system: Part [--] 2:49 - Exploring the system: Part [--] // Links * LinuxPDF:"  
[YouTube Link](https://youtube.com/watch?v=SPnaZM6OCJQ)  2026-01-31T09:00Z 20.9K followers, [----] engagements


"This Tool Finds Secrets Everywhere (GitHub /etc Bash History) Are your Git repos bash history or /etc leaking secrets without you knowing it In this demo I show how to use Noseyparker to quickly scan remote Git repositories local files and system directories for exposed secrets. // Chapters 0:00 - Intro 0:21 - Noseyparker 0:36 - Scanning a Git repository 1:18 - Understanding the report 1:51 - Scaning a file 2:21 - Scanning a directory 3:00 - Scanning repository for a github user 3:36 - TUI app // Links * Noseyparker: https://github.com/praetorian-inc/noseyparker * Noseyparker Explorer:"  
[YouTube Link](https://youtube.com/watch?v=SXOvNULLbXE)  2026-02-02T09:00Z 20.9K followers, [----] engagements


"SSH option you DONT know about Multifactor authentication can also be used on linux boxes. In this video I will show you how to setup a one time password to level up the security of your machine. // Tags #ethicalhacking #mfa #otp #linux // Chapters 0:00 - Intro 0:43 - Exploring SSH OTP tool 2:03 - Analyzing how the tool works // Links * SSH OTP: https://github.com/ziyan/ssh-otp/tree/master"  
[YouTube Link](https://youtube.com/watch?v=T3EFgSgkRCg)  2025-10-26T09:00Z 20.4K followers, [----] engagements


"No curl. No wget. Just "Living off the Land" with BASH. In this 2minute demo I show how an attacker can use a simple Bash HTTP client to pull malware onto a target even when curl wget and python are all missing. // Chapters 0:00 - Intro 0:28 - Showing burl 0:47 - Code analysis // Links None for now. // Tags #bash #cybersecurity #malware #redteaming #linux"  
[YouTube Link](https://youtube.com/watch?v=bulJH9ZZf_k)  2026-01-27T09:00Z 20.9K followers, [----] engagements


"How hackers HIDE their CODE Bincrypter is a tool that obfuscates and encrypt an ELF binary or a shell script. In this video I will show you the interesting features of this tool and analyze the obfuscation process. PS. Thanks to THC for this nice program. I learned a lot during code analysis. // Tags #ethicalhacking #obfuscation #encryption #linux // Chapters 0:00 - Intro to Bincrypter 2:43 - Analyzing the obfuscation process // Links * bincrypter: https://github.com/hackerschoice/bincrypter"  
[YouTube Link](https://youtube.com/watch?v=ehDJUCTjd5E)  2025-11-17T09:01Z 20.9K followers, [----] engagements


"Powerful Hacking extensions you NEVER heard before Unlock powerful but lesserknown browser extensions that test your password strength speed up OSINT and reveal if the sites you visit have been breached. In this 5minute walkthrough youll see how tools like Time to Hack Vortimo OSINT Perplexity AI Hunter and Breached can quietly level up your daytoday security and research workflow without leaving your current tab. // Chapters 0:00 - Intro 0:23 - Time to Hack extension 1:22 - Perplexity AI extension 2:21 - FindSomething extension 2:59 - Vortimo OSINT Tool extension 3:21 - Wayback Machine"  
[YouTube Link](https://youtube.com/watch?v=kisVxSZ7fBc)  2026-01-19T09:00Z 20.9K followers, [----] engagements


"The most severe REDIS vulnerability This month Wiz published the most severe REDIS vulnerability so far. This is a UAF memory corruption bug in LUA which can lead to direct system compromise. // Tags #ethicalhacking #redis #cve-2025-49844 #lua #uaf #memorycorruption // Chapters 0:00 - Intro 0:18 - Vulnerability Overview 0:42 - UAF [---] 1:26 - Exploring the public POC 2:50 - Checking if LUA is enabled 3:37 - Basic UAF payload 4:36 - Sandbox escape 5:09 - Advance UAF payload // Links * Advisory from Wiz: https://www.wiz.io/blog/wiz-research-redis-rce-cve-2025-49844 * Lab environment:"  
[YouTube Link](https://youtube.com/watch?v=vhSX031xnUc)  2025-10-13T09:01Z 20.4K followers, [----] engagements


"Making Files Disappear in LINUX A linux rootkit is used by hackers to perform various privileged actions. In this video I will show you how it can hide a file in local disk. // Tags #ethicalhacking #linux #rootkits #evasion #stealth // Chapters 0:00 - Intro 0:35 - Tying a simple rootkit 1:25 - How rootkits works // Links * Caraxes rootkit: https://github.com/ait-aecid/caraxes/tree/main"  
[YouTube Link](https://youtube.com/watch?v=00fI3TKtAN0)  2025-12-22T09:00Z 20.9K followers, [----] engagements


"99% Dont know how it works How well do you know base64 In this video I will show you how it works under the hood and give some tip on how to secure your decoding activities. // Tags #ethicalhacking #base64 #decode // Chapters 0:00 - How base64 works 0:31 - Decoding base64 strings securely // Links * Base64 alphabet table: https://datatracker.ietf.org/doc/html/rfc4648#section-4"  
[YouTube Link](https://youtube.com/watch?v=3F57HmFau9s)  2025-10-22T09:00Z 14.3K followers, [----] engagements


"Malware Analysis Made Easy Identifying a malware is a hard task and we often get false positives. In this video I will show you a tool that effectively determine of a binary is malicious or not. // Tags #ethicalhacking #malwareanalysis #linux #windows // Chapters 0:00 - Intro 0:41 - Analyzing a ransomware executable 2:52 - Querying virus total API 3:53 - Dynamic analysis // Links * Qu1cksc0pe: https://github.com/CYB3RMX/Qu1cksc0pe * TheZoo (Live malware samples): https://github.com/ytisf/theZoo"  
[YouTube Link](https://youtube.com/watch?v=4GXqBUBdUKM)  2025-12-30T09:00Z 20.9K followers, [----] engagements


"This Worm Harvests LINUX Credentials Worms are not only designed for Windows computers. In this video I will show you an example linux SSH worm that intercepts outgoing connections and harvest user credentials. // Tags #ethicalhacking #worm #malware #linux #ssh // Chapters 0:00 - Intro 0:37 - How the worm works 1:11 - Demo 3:27 - Figuring out how the code works // Links * SSH-IT: https://www.thc.org/ssh-it"  
[YouTube Link](https://youtube.com/watch?v=5JclOmTpRDI)  2025-12-14T09:00Z 20.9K followers, 13K engagements


"Decoding a Stealthy one-liner Linux command Linux memory-based attacks are used to avoid detection. In this video I will show you how hackers run fileless malware my manipulating file descriptors. * Credit to THC for the wonderful trick * // Tags #ethicalhacking #linux #evasion #fileless #malware // Chapters 0:00 - Intro 0:37 - Breaking down the code // Links None for now"  
[YouTube Link](https://youtube.com/watch?v=78zRWUw9Rnw)  2025-12-18T09:00Z 20.9K followers, [----] engagements


"CAI: Autonomous Ethical Hacking CAI is a tool that allows autonomous ethical hacking. In this video I will show you how to command a red team agent to scan and exploit a vulnerability on a target. // Tags #ethicalhacking #agent #ai #autonomous // Chapters 0:00 - Intro 0:48 - Installation and Setup 2:38 - Commanding the agent // Links * CAI Framework: https://github.com/aliasrobotics/cai"  
[YouTube Link](https://youtube.com/watch?v=7VS577DYs9s)  2025-11-27T09:00Z 20.9K followers, [----] engagements


"Rewriting Python exploit to RUST MongoBleed is a critical MongoDB vulnerability that can silently expose your data to anyone who knows how to poke at it. In this video I break down the root cause of the bug and show you exactly how the exploit works step by step. // Chapters 0:00 - Intro 0:19 - Vulnerability Overview 1:54 - Preparing the POC environment 2:34 - Running the exploit against a vulnerable container 3:15 - Running the exploit against a patched container 3:41 - Rust exploit code analysis: Part [--] 5:06 - Rust exploit code analysis: Part [--] 5:53 - Rust exploit code analysis: Part [--] //"  
[YouTube Link](https://youtube.com/watch?v=7lIRykDjaY8)  2026-01-25T09:00Z 20.9K followers, [----] engagements


"Why it feels so much Better than BASH Fish shell is a modern alternative to bash. In this video I will show you the unique and interesting features of fish shell. // Tags #ethicalhacking #fishshell #linux #athenaos // Chapters 0:00 - Intro 0:21 - Terminal colors and syntax highlighting 1:29 - Abbrevations 2:30 - Setting variables 2:56 - Searching through command history 3:05 - Tab completion for command options 3:26 - Customizing themes easily 3:57 - Shell private mode 4:27 - Getting help // Links * fish shell: https://fishshell.com"  
[YouTube Link](https://youtube.com/watch?v=959WVXHu6Es)  2026-01-11T09:00Z 20.9K followers, [----] engagements


"Arch Linux POC Image Magick is a popular open source tool for manipulating images. There was a code execution vulnerability that allows a regular user to run the binary as root. In this video we will understand the different ways on how readlink works which was a key part of the vulnerability and I will show you how to exploit this in Arch linux. // Tags #ethicalhacking #imagemagick #exploit #archlinux #CVE-2024-41817 // Chapters 0:00 - Intro 0:16 - Vulnerability details 1:23 - Understanding how readlink works 3:26 - Crafting the exploit in Arch Linux 5:11 - Stub Macro technique // Links None"  
[YouTube Link](https://youtube.com/watch?v=A6udkyvfzaQ)  2025-10-07T09:00Z 14.1K followers, [----] engagements


"I Found the Perfect AI Workflow for Ethical Hacking Learn how to use Shell GPT forEthical Hackingworkflows from generating nmap scans and hunting malware on disk to analyzing attack logs and creating boilerplate tools like a password cracker. // Chapters 0:00 - Intro 0:40 - Asking questions 1:27 - Network scanning 1:47 - Looking for malware 2:23 - Analyzing a log file 3:07 - REPL mode 3:40 - Shell integration 4:21 - Code generation and scanning 4:52 - Will this bring any value // Links Shell GPT: https://github.com/TheR1D/shell_gpt // Tags #shellgpt #ethicalhacking #cybersecurity #pentesting"  
[YouTube Link](https://youtube.com/watch?v=AEMj-D6vPiY)  2026-01-23T09:00Z 20.9K followers, [----] engagements


"My First Exploit in RUST React2Shell is a recent 0-day vulnerability that allows unauthenticated remote code execution using a single HTTP request. In this video we will analyze the vulnerability and develop an exploit written in rust. // Tags #ethicalhacking #rust #react2shell #CVE-2025-55182 #exploit-dev // Chapters 0:00 - Launching a vulnerable sever 2:20 - Analyzing the vulnerability 3:30 - Creating the rust exploit 10:44 - Running the code // Links * react2shell POC: https://github.com/freeqaz/react2shell"  
[YouTube Link](https://youtube.com/watch?v=BjeGCZhSpzY)  2025-12-10T10:04Z 20.9K followers, [----] engagements


"Hacker Techniques to HIDE Linux Commands Hackers are experts in hiding their linux commands. In this video I will show you effective techniques in removing your commands in bash history. // Tags #ethicalhacking #bash #linux #evasion #stealth // Chapters 0:00 - Intro 0:14 - Prepending a whitespace 1:14 - Clearing history for current session 1:40 - Pointing history file to /dev/null 2:06 - Avoding sudo 2:19 - Persistence mechanism to clear history file 2:29 - History file for databases // Links None for now"  
[YouTube Link](https://youtube.com/watch?v=CP24udbWjYo)  2025-11-25T09:00Z 20.9K followers, [----] engagements


"Hiding your callback through HTTPS Reverse shell over HTTPS is a unique technique. In this video we will explore CURL shell and understand how the mechanics work under the hood. // Tags #ethicalhacking #shell #https // Chapters 0:00 - Intro 0:36 - Setting up curl shell 1:23 - Exploring how curl shell works // Links * Curlshell: https://github.com/SkyperTHC/curlshell"  
[YouTube Link](https://youtube.com/watch?v=DBy2e6HrrD0)  2025-10-24T09:00Z 15.8K followers, [----] engagements


"Forensic Commands every LINUX user SHOULD know Hackers can leave artifacts such as malwares loaders and other temporary files inside a compromised linux system. In this video I will show you important commands on how to detect and recover them. // Tags #ethicalhacking #linux #forensics #investigation // Chapters 0:00 - Intro 0:19 - Finding recently modified files 1:47 - Finding by last metadata update time 2:51 - Finding immutable files 3:41 - Recovering files with open file descriptors 4:12 - Common writable directories 5:06 - Finding recently installed softwares and tools // Links None for"  
[YouTube Link](https://youtube.com/watch?v=EmMGyAccDL4)  2025-12-20T09:00Z 20.9K followers, [----] engagements


"3 ways every CTF player should know Basic Authentication is still a common form of login mechanism. So in this video we will learn [--] ways on how to brute force it. // Tags #ethicalhacking #http #bruteforce #ffuf #hydra #python // Chapters 0:00 - Intro 0:05 - Basic Auth [---] 0:28 - Using hydra 0:54 - Using ffuf + helper script 1:54 - Using quick and dirty python script // Links None for now"  
[YouTube Link](https://youtube.com/watch?v=FIGKqiDx9CM)  2025-09-21T09:01Z 14K followers, [---] engagements


"How to recover secrets from git In this video we will attack Backdrop CMS through an exposed git repository which will lead us to a sensitive data. Inside the machine we will leverage a utility tool to modify a crucial binary inside Linux which will help us drop to a root shell. As a bonus we will analyze the foothold exploit and give you techniques on how to secure the box such as preventing git access via apache config. // Tags #ethicalhacking #backdropcms #git #apache #hardening // Chapters 0:00 - Intro 0:35 - Scanning using rustscan 2:12 - Trying to determine Backdrop CMS version 3:42 -"  
[YouTube Link](https://youtube.com/watch?v=Fd6JRb-r2WE)  2025-09-13T08:31Z 19.6K followers, [---] engagements


"Real-Time Malware Tracing eBPF makes the kernel programmable without the need to install a module re-compile the kernel or reboot. In this video I will show you how we can use to detect hackers. // Tags #ethicalhacking #ebf #defense #linux #kernel #malware // Chapters 0:00 - Intro 0:25 - Traditional ways of adding kernel functionalities 1:12 - What is eBPF 3:23 - Checking for kernel support 3:44 - Installing the requirements 4:07 - Intro to bpftrace 5:35 - Creating a simple eBPF program // Links * eBPF: https://ebpf.io/"  
[YouTube Link](https://youtube.com/watch?v=HbPc8czi0qo)  2026-01-01T09:00Z 20.9K followers, [----] engagements


"Shai-Hulud 2.0: A Worm that DESTROYS User Data A worm is a self-replicating piece of malware. In this video I will show you one of the most brutal worm this year that destroys user data if it doesnt get what it wants. // Tags #ethicalhacking #malware #worm // Chapters 0:00 - Intro 0:37 - Installing bun runtime 1:07 - Looking for secrets 1:31 - Persistence 1:46 - Looking for more credentials 1:49 - Self propagate 2:06 - Destroying user data // Links * Great technical analysis from Datadog: https://securitylabs.datadoghq.com/articles/shai-hulud-2.0-npm-worm"  
[YouTube Link](https://youtube.com/watch?v=HdOYMLzFGqs)  2025-12-05T09:00Z 20.9K followers, [----] engagements


"Exploiting OGNL and Apache Struts in Confluence (CVE-2023-22527) In this video we will explore and develop an exploit for CVE-2023-22527 a Server-Side Template Injection vulnerability in Confluence Server. This has been linked to several ransomware and cryptomining activities: * https://www.imperva.com/blog/attackers-quick-to-weaponize-cve-2023-22527-for-malware-delivery/ * https://thedfirreport.com/2025/02/24/confluence-exploit-leads-to-lockbit-ransomware/ We will analyze the exploit format and understand why OGNL and Apache struts is so risky when not handled properly. // Tags"  
[YouTube Link](https://youtube.com/watch?v=HvUgdotgFYg)  2025-03-06T08:29Z 15.1K followers, [---] engagements


"Make it better using this TOOL The default terminal output is ugly. In this video I will show you how to make it better using GRC. // Tags #ethicalhacking #linux #terminal // Chapters 0:00 - Intro // Links * Github page: https://github.com/garabik/grc"  
[YouTube Link](https://youtube.com/watch?v=IkWMxCylGB0)  2025-10-20T09:00Z 14.1K followers, [----] engagements


"Use this command to AVOID detection Linux "mount" command is not typically used in exploitation but it can be used in stealth and evasion. In this video I will show you how to hide a program using bind mounts. // Tags #ethicalhacking #stealth #linux // Chapters 0:00 - Intro 0:15 - What is a bind mount 1:25 - Bind mounting /proc/PID 1:48 - Bind mounting to known binaries 2:16 - Remounting /proc // Links None for now"  
[YouTube Link](https://youtube.com/watch?v=JMhbsHAnRCw)  2025-10-30T09:00Z 15K followers, [----] engagements


"How hackers steal SSH sessions without a Password Attackers can hijack SSH sessions without the need for passwords or private keys. In this video I will show you how to do that using a particular tool. // Tags #ethicalhacking #ssh // Chapters 0:00 - Intro 0:42 - Demo on a local program 1:03 - How does it work under the hood // Links * reptyr: https://github.com/nelhage/reptyr * blog: https://blog.nelhage.com/2011/02/changing-ctty/"  
[YouTube Link](https://youtube.com/watch?v=KHBHFt3-b1k)  2025-11-01T09:00Z 18.6K followers, [----] engagements


"Techniques Youve Never Heard Before Living Off The Land is a technique where attackers leverage built-in tools softwares inside operating systems or networks for their malicious gains. In this video I will show you the unique techniques you never heard before. // Tags #ethicalhacking #lotl #living-off-the-land #evasion // Chapters 0:00 - Intro 1:45 - Lolbas (Windows) 2:21 - LooBins (Mac OS) 3:15 - Living Off The Tunnels 3:54 - Living Off The Hardware 4:24 - Living Off The False Positive 5:42 - Living Off The Pipeline 6:42 - Living Off The Land Applications 7:04 - Living Off The Land Drivers"  
[YouTube Link](https://youtube.com/watch?v=MXYoG_IDy2w)  2025-11-21T09:00Z 20.9K followers, [----] engagements


"Weaponizing ANSI: When "Text" Becomes Malware ANSI escape sequences are commonly used to make our terminal fonts look better. In this video I will show you how hackers can abuse it to hide their payloads. // Tags #ethicalhacking #linux #ansi #evasion #stealth // Chapters 0:00 - Intro 0:26 - ANSI escape code basics 1:14 - Erasing lines 1:50 - Hiding text inside files 2:36 - Hiding payloads inside crons // Links None for now"  
[YouTube Link](https://youtube.com/watch?v=Q_GgRJWp1i4)  2025-12-26T09:00Z 20.9K followers, [----] engagements


"FREE features most people MISS DiscoverVirusTotalFREE features that most people never use. Learn how to search domains and IPs use the Chrome extension call the VirusTotal API and explore malware behavior with Threat Graph. // Chapters 0:00 - Intro 0:26 - Searching a hash 0:45 - Getting more details about the virus 1:38 - Threat graph 1:55 - Ransomware threat graph 3:23 - Searching an IP 3:33 - Browser Extension 3:43 - VirusTotal CLI 4:03 - VirusTotal API and Scripting // Links * VirusTotal: https://www.virustotal.com // Tags #virustotal #cybersecurity #malwareanalysis #blueteam #infosec"  
[YouTube Link](https://youtube.com/watch?v=RPt7dgS8ugI)  2026-01-17T09:00Z 20.9K followers, [----] engagements


"Dont click that LINK until you DO THIS Worried that the next link you click might be a scam In this short video youll learn simple practical ways to spot malicious links before they cause damage. // Chapters 0:00 - Intro 0:18 - Checking links from email 1:12 - Scan websites easily using Virus Total extension 1:39 - More quick ways of checking a link 2:41 - Typosquatting 3:50 - Analyzing typosquatting 4:49 - Other ways of detecting typosquatting 5:07 - Abuse IP checker // Links * Virus Total: https://www.virustotal.com * Official Virus Total Chrome Extension:"  
[YouTube Link](https://youtube.com/watch?v=WwWaZrsdP84)  2026-01-15T09:00Z 20.9K followers, [----] engagements


"I recreated the CrushFTP CVE-2024-4040 exploit This video will show you how to create an exploit for CVE-2024-2020 (Crush FTP SSTI) to demonstrate the vulnerability. We will only focus on SSTI + Arbitrary File Read since Remote code execution attack may require CrushFTP license in order to use the CrushTask plugin (allows exeucution of custom scripts). Do note that this is for education purposes only and MUST NOT be used for malicious intent. // Tags #ethicalhacking #python #crushftp #cve-2024-2020 #ssti // Chapters 0:00 - Intro 1:02 - Setting up vulnerable app 3:17 - Exploring crushftp admin"  
[YouTube Link](https://youtube.com/watch?v=Xlzya4p1P1Q)  2025-02-20T05:14Z 14.1K followers, [----] engagements


"How hackers abuse Linux for Persistence Attackers abuse various Linux functionalities to maintain persistence. In this video I will show you some basic and advance techniques using a tool called Panix. // Tags #ethicalhacking #linux #persistence #rootkits #backdoor // Chapters 0:00 - Intro 1:08 - Creating system backdoor user 2:03 - Reverting persistence 2:37 - Persistence using sytemd generators 3:31 - Persistence using udev rules // Links * Panix: https://github.com/Aegrah/PANIX"  
[YouTube Link](https://youtube.com/watch?v=ZaAxeaRt_P8)  2025-11-19T09:00Z 20.9K followers, [----] engagements


"Hacker steals my router MAC address (catch them with SNORT) I don't see good resource in the internet on how to detect ARP spoofing using SNORT so I created this video. Although there are already a lot of tutorials about ARP spoofing I will still give a basic overview to refresh your memory. // Chapters 0:00 - Intro 0:18 - ARP spoofing theory 2:02 - What is snort 2:52 - ARP spoofing simulation 4:39 - Snort to the rescue // Links * Legitimate use cases of gratuitous ARP: https://www.practicalnetworking.net/series/arp/gratuitous-arp/ * Snort [--] codebase: https://github.com/snort3/snort3 * Cisco"  
[YouTube Link](https://youtube.com/watch?v=bjIwhl4PHfE)  2024-04-19T10:19Z 14.8K followers, [----] engagements


"This CHECKLIST will save you from Digital Threats Digital defense is something all of us should know in order to protect ourselves from bad actors. In this video I will show you a great tool that aids us in assessing the state of our personal digital security. // Tags #ethicalhacking #personal-security #checklist #digital-defense // Chapters 0:00 - Intro 0:39 - Starting the checklist 1:43 - Exploring the authentication checklist 4:04 - Different security requirements for each person 4:47 - High security requirements // Links * Digital Defense Personal Security Checklist:"  
[YouTube Link](https://youtube.com/watch?v=ceTQQcgdpmE)  2025-11-09T09:00Z 20.9K followers, [----] engagements


"Single Packet Authorization: Firewall on STEROIDS Single Packet Authorization is a method for authorizing a client on the network level. In this video I will show you the mechanics on how this can level up your firewall protection. // Tags #ethicalhacking #firewall #defense // Chapters 0:00 - Intro 0:30 - How does SPA works 1:48 - Setting up and demo // Links * fwknop (Single Packet Authorization): https://github.com/mrash/fwknop"  
[YouTube Link](https://youtube.com/watch?v=ecBis6Tgq3U)  2025-12-01T09:01Z 20.9K followers, 46.3K engagements


"Youre Using Hashing Without Realizing It Most of us knows how to get the checksum of a file but only few knows how hashing is really used. In this video I will show you some of the interesting use cases of hashing. // Tags #ethicalhacking #hashing #checksum // Chapters 0:00 - Intro 0:24 - Common Use Cases 0:56 - Interesting Use Cases // Links None for now"  
[YouTube Link](https://youtube.com/watch?v=h0QNvpqQSj0)  2025-12-07T09:01Z 20.9K followers, [---] engagements


"Linux Session Sniffer using eBPF eBPF is a powerul technology that makes the kernel programmable in a safe manner. In this video I will show you how eBPF can be used as an offensive security tool. // Tags #ethicalhacking #ebpf #kernel #linux #sniffing // Chapters 0:00 - Intro 0:49 - eBPF refresher 1:49 - eBPF program demo 3:20 - Understanding Linux pseudo terminals 6:27 - Understanding how the attack works 7:26 - Analyzing the eBPF progrm // Links * ptysnoop.bt: https://github.com/hackerschoice/bpfhacks/blob/main/ptysnoop.bt * bpftrace:"  
[YouTube Link](https://youtube.com/watch?v=hBpYNDy1wrY)  2026-01-03T09:01Z 20.9K followers, [----] engagements


"Rapid Note-Taking System for Hackers: Find Info FAST Being an ethical hacker means being able to take good notes and retrieve relevant information quickly. In this video I will share to you all the techniques I do to make my note taking workflow fast and efficient. // Tags #ethicalhacking #obsidian // Chapters 0:00 - Intro 0:39 - Obsidian Intro 1:08 - Tags headings TOC note linking 1:37 - Omnisearch dynamic highlights 2:11 - Flat naming technique avoiding duplicate tabs 2:49 - Git and some subfolders // Links None for now"  
[YouTube Link](https://youtube.com/watch?v=hS3LXIyVMOI)  2025-11-13T09:01Z 20.9K followers, [----] engagements


"I tried scanning my machine with ClamAV Linux is not magically immune to malware. In this video youll learn how to scan your Linux system for malware and viruses using ClamAV step by step in just [--] minutes. In this ClamAV tutorial we cover: How to install ClamAV on NixOS How to run ondemand scans for files and directories How to read ClamAV scan results and what to do with detections Simple tips to keep your Linux machine safer Whether youre new to Linux security or setting up antivirus on a home server this video shows a practical fast workflow you can reuse on any distro that supports"  
[YouTube Link](https://youtube.com/watch?v=kOrFAJcXbdw)  2026-01-13T09:01Z 20.9K followers, [----] engagements


"Is CEH still relevant in [----] Is CEH still worth it This is the question we will answer in this video. I will also give you tips on how I approached and pass CEH practical within [--] weeks. // Chapters 0:00 - Intro 0:36 - What is CEH 0:52 - Exam types 1:27 - Exam environment 1:42 - Course outline 2:08 - Training options and exam cost 3:33 - How did I trained for [--] weeks 4:37 - Time to hack (SPECIAL segment to celebrate 1k SUBS) 6:15 - Final tips 6:46 - Do I recommend CEH // Links * CEH brochure and course info:"  
[YouTube Link](https://youtube.com/watch?v=mXbpnIiIK38)  2024-05-20T10:23Z 19.6K followers, [----] engagements


"GOAD-Light OSCP Series: Intro (Must watch for OSCP students) This the first part of our AD attack series intended for OSCP students. In this video we will discuss the expectations of the series and a quick walkthrough on how I setup GOAD-Light. // Chapters 0:00 - Intro 0:45 - What to expect on the series 0:56 - What is GOAD-Light 1:36 - What exploits and attacks to cover 1:56 - GOAD-Light setup walkthrough // Links * GOAD: https://github.com/Orange-Cyberdefense/GOAD/tree/main * Dependencies (this is just an example for my use case which is for MAC) * Vmware fusion:"  
[YouTube Link](https://youtube.com/watch?v=mpYJkurzjOA)  2024-07-05T23:25Z 19.3K followers, 12.2K engagements


"Browser-based Remote Shell SSHx is a collaborative tool that allows different people to access a remote shell over the internet. In this video I will show you how to use it as well as the hidden dangers. // Tags #ethicalhacking #sshx #shell // Chapters 0:00 - Intro 0:22 - Installation and Demo // Links * SSHX: https://sshx.io"  
[YouTube Link](https://youtube.com/watch?v=nUJylR4tY7k)  2025-12-16T09:01Z 20.9K followers, [----] engagements


"How hackers HIDE in ICMP Ping requests can be deadly. In this video I will show you how attackers hide data by demonstrating a tool that tunnels a reverse shell connection through ICMP traffic. // Tags #ethicalhacking #icmp #reverse-shell #covert-operations // Chapters 0:00 - Intro 0:29 - ICMP reverse shell demo 1:43 - Understanding the mechanics 2:30 - Analyzing the scripts 5:25 - Looking under wireshark // Links * icmpdoor: https://github.com/krabelize/icmpdoor"  
[YouTube Link](https://youtube.com/watch?v=oT7_ExIMBlk)  2025-11-03T09:01Z 16K followers, 12.9K engagements


"My Journey to Exploit Development (CVE-2024-23897) In this series I will show you how I developed my first real world windows exploit for CVE-2024-23897 (Jenkins Unauthenticated Arbitrary File Read). NOTE: Although you can see some things related to our GOAD-light series this is not related to that. I just reused some of the resources from that series such as the windows server that will host the vulnerable jenkins instance. // Tags #oscp #ethicalhacking #windows #jenkins #cve-2024-23897 // Chapters 0:00 - Intro 0:50 - What to expect from the series 1:36 - Manual exploitation 3:01 - Getting"  
[YouTube Link](https://youtube.com/watch?v=rX8acbhzLRg)  2024-09-12T10:42Z 16.8K followers, 12.6K engagements


"Linux Terminal Pagers: Hidden Dangers Giving users sudo access to terminal pagers is not a generally a good idea. In this video I will show why it makes your machine insecure and ways to prevent users bypass the security mechanims. // Tags #ethicalhacking #linux #sudo // Chapters 0:00 - Intro 0:49 - Security misconfiguration on less command 2:07 - How terminal pagers are used by other utilities // Links None for now"  
[YouTube Link](https://youtube.com/watch?v=u3uUhUXFvn8)  2025-11-29T09:01Z 20.9K followers, [----] engagements


"Get ROOT with ONE command Traitor is tool that automates machine exploitation. This is really useful in time-crunch situations like red team assessments or if you are competing in capture the flag events. // Tags #ethicalhacking #exploit #traitor #backdoor // Chapters 0:00 - Intro 0:16 - Exploring traitor 1:20 - Planting backdoors // Links * traitor: https://github.com/liamg/traitor"  
[YouTube Link](https://youtube.com/watch?v=vEl1BPLrMeM)  2025-11-07T09:01Z 20.9K followers, [----] engagements


"Ultimate Linux Sandbox Demo Firejail is a linux sandbox that uses namespaces abnd seccomp-bpf filters. In this video I will show you how to lock down hackers to prevent unauthorize access to a linux machine. // Tags #ethicalhacking #firejail #sandbox #seccomp #namespaces // Chapters 0:00 - Intro 0:35 - Basic sandbox demo 2:16 - Restricting network acces // Links * Firejail: https://github.com/netblue30/firejail"  
[YouTube Link](https://youtube.com/watch?v=xdeF16xJX3E)  2025-12-24T09:01Z 20.9K followers, [----] engagements


"Finding and Monitoring Someones Activity using Sherlock Tools Hackers can easily hunt down their targets using various tools. In this video I will show you effective tools to search for a person online. // Tags #ethicalhacking #osint #social-media // Chapters 0:00 - Intro 0:31 - Sherlock CLI 1:02 - Sherlock Eye // Links * Sherlock CLI: https://github.com/sherlock-project/sherlock * Sherlock Eye: https://app.sherlockeye.io"  
[YouTube Link](https://youtube.com/watch?v=yIAaQqXuHjo)  2025-12-12T09:01Z 20.9K followers, [----] engagements


"How to obfuscate a python program Welcome This is a short video about pyarmor a python obfuscation tool. In this video we will explore the basics and understand some of the process on how the tool works. // Tags #ethicalhacking #python #obfuscation #pyarmor // Chapters 0:00 - Intro 0:35 - Pyarmor basics 1:32 - Exploring the obfuscatd code 2:56 - Other pyarmor features (expiry hardware pinning packing) // Links * Github Command and Control: https://youtu.be/rR3RHUD27owsi=QIQy0S2d9sSMQcK7"  
[YouTube Link](https://youtube.com/watch?v=zUDQVZroc08)  2024-12-29T07:10Z 19.3K followers, [----] engagements


"TLS Ciphersuite in [--] mins This video will show you the technicalities about ciphersuite such as the format crypto algorithms used and how different keys are derived from one another. // Tags #ethicalhacking #python #tls #https #ciphersuite // Chapters 0:00 - Intro 0:45 - Negotiating the ciphersuite 0:57 - Sending the pre_master_secret securely 1:36 - Changing the ciphers 2:10 - How TLS verifies integrity of the messages 2:31 - Bulk encryption algorithm 3:02 - Tools that you can use // Links * Ciphersuiteinfo - https://ciphersuite.info/"  
[YouTube Link](https://youtube.com/watch?v=01tJF5lGSsE)  2025-02-07T10:00Z 10.3K followers, [---] engagements


"Intro to RSA In this video we will uncover how passwords are encrypted before sending to the server. We will also have a high level intro about RSA. // Tags #ethicalhacking #java #jetbrains #teamcity #rsa #crypto // Chapters 0:00 - Intro 0:54 - Looking for JS files 2:37 - Looking for reference in the web 3:54 - Verifying metasploit module 5:04 - Intro to RSA // Links None for now"  
[YouTube Link](https://youtube.com/watch?v=3NfIhktqtSw)  2025-03-27T13:30Z 10.8K followers, [---] engagements


"GOAD-Light OSCP Series: Recon and Scanning Welcome to Part [--] of the series We will recon our targets and plan our attack. P.S. I said I will discuss more about port [----] at the end of video but forgot to add it I'll add it on the next video I promise. // Tags #oscp #ethicalhacking #smb #activedirectory #windows #nmap // Chapters 0:00 - Intro 0:33 - Searching for IPs 1:01 - Powershell filters 2:48 - Demistifying crackmapexec output 3:36 - Locating DCs through SRV enumeration 5:16 - Tips on how to organize the nmap scans 5:53 - Finding low hanging fruits 6:37 - What are these MSRPC ports 7:18 -"  
[YouTube Link](https://youtube.com/watch?v=4Jedfrxxno0)  2024-07-13T09:32Z [----] followers, [---] engagements


"GOAD-Light OSCP Series: Token Impersonation Post Exploitation and Bloodhound Welcome top part [--] of the series In this video we will escalate our way to local admin in castle black and perform thorough post exploitation. // Tags #oscp #ethicalhacking #activedirectory #windows #bloodhound // Chapters 0:00 - Intro 0:51 - First thing to do when popping a shell 1:21 - Token impersonation 4:38 - OSCP TIP: Doing post exploitation effectively 6:13 - OSCP TIP: Think and act fast 7:30 - OSCP TIP: Alternative way of cracking NTLM hash 8:18 - OSCP TIP: Trying alternatives when one doesn't work 8:50 -"  
[YouTube Link](https://youtube.com/watch?v=5NvGrT8T-M4)  2024-07-27T10:23Z [----] followers, [---] engagements


"And it is satisfying . I changed my setup to be lighter and free of clutter. In this video I will show my improve ethical hacking environment. // Tags #ethicalhacking #arch #i3 // Chapters 0:00 - Intro 1:45 - Building the VM using packer and vagrant 3:51 - Polybar 4:16 - i3 Window tiling manager 4:53 - Color scheme 5:33 - Rofi 5:59 - i3 Workspaces 6:23 - Atuin shell history manager 7:07 - Ranger terminal file manager 7:27 - neovim Twilight // Links * Polybar - https://github.com/polybar/polybar * i3 - https://i3wm.org/ * Rofi - https://github.com/davatorium/rofi * atuin -"  
[YouTube Link](https://youtube.com/watch?v=7ujlWLg3H9Q)  2025-06-21T11:00Z 11.8K followers, [----] engagements


"How passwords are turned into secrets using PBKDF Password Based Key Derivation Function or PBKDF is a common crypto algorithm that converts a password into a different key. We see this in different systems like in Wifi TLS or any other applications that requires login. In this video I will show you a quick overview on how it works and how to crack it. // Tags #ethicalhacking #crypto #pbkdf // Chapters 0:00 - Intro 0:13 - PBKDF [---] 2:28 - Cracking PBKDF // Links None for now"  
[YouTube Link](https://youtube.com/watch?v=9bQnSzGMgNQ)  2025-10-05T09:00Z 13K followers, [---] engagements


"Hacktricks Assistant Our favorite hacking cheatsheet just got an upgrade In this video we will explore some of the features of Hacktricks Assistant an AI-powered ethical hacking chatbot. // Tags #ethicalhacking #ai #hacktricks // Chapters 0:00 - Intro 0:14 - What is Hacktricks 0:40 - First conversation with chatbot (scanning a website) 2:41 - Detecting vulnerabilities 3:43 - Password cracking 5:19 - Exploit development (difficult eternal blue) 7:52 - Exploit development (medium hearbleed) // Links * Hacktricks AI - https://www.hacktricks.ai/ * Hack the Clown Hearbleed POC -"  
[YouTube Link](https://youtube.com/watch?v=EvdVqOqTU0Q)  2025-08-14T13:00Z 12.3K followers, [---] engagements


"Hack the Box: Nocturnal In this video I will demonstrate how I exploited an Insecure Direct Reference Object (IDOR) vulnerability to recover a credential for another user in the web application. Once I gained foothold to the machine I found a hidden service running as root which is vulnerable to PHP code injection. // Tags #ethicalhacking #php #idor #ispconfig #mitmproxy #commandinjection #sqlite #hackthebox // Chapters 0:00 - Intro 3:05 - Inspecting the website 4:00 - Login enumeration 5:18 - Enumerating the file upload 6:10 - URL parameter enumeration 7:09 - Discovering IDOR 7:36 - Fuzzing"  
[YouTube Link](https://youtube.com/watch?v=F49wGytEDrw)  2025-08-31T12:39Z 12.5K followers, [---] engagements


"Exploiting WPA2 weakness WPA2 (AES-CCMP) is still one of the common wifi protocol out there but hackers are exploiting them. In this video we will create a tool to exploit it to understand the protocol and the encryption mechanism in depth. // Tags #ethicalhacking #wifi-cracking #wpa2 #wifi-hacking // Chapters 0:00 - Intro 1:10 - IEEE [------] Intro 1:36 - Why Wifi encryption is important 2:47 - WPA2 Protocol 3:27 - WPA2 Authentication (4-way handshake) 5:56 - Attack Plan 6:28 - WiFi pentesting simulatio using WifiChallengeLab 7:14 - Building the base program 9:18 - Building the network module"  
[YouTube Link](https://youtube.com/watch?v=FguOLGPkEjg)  2025-05-20T09:00Z 11.5K followers, [----] engagements


"Trying out interesting canary tokens . In this video we will try out unconventional canary tokens and see how effective they are in catching bad actors. // Tags #ethicalhacking #canarytoken #honeypot // Chapters 0:00 - Intro 0:45 - Basic canary token usage (DNS) 2:24 - AWS token 3:45 - Kubernetes token 4:46 - MySQL token 6:13 - Wireguard token 7:21 - Webdav token 8:01 - SVN token // Links None for now"  
[YouTube Link](https://youtube.com/watch?v=IH9wYcKoBpE)  2025-04-11T10:03Z 11K followers, [---] engagements


"Hijacking HTTPS: What hackers aren't telling you In this video we will see the practical ways on how hackers decrypt HTTPs traffic from a windows device. NOTE: This is for awareness and don't use the techniques here for malicious purposes. // Tags #ethicalhacking #python #https #ssl #tls #decryption // Chapters 0:00 - Intro 1:00 - HTTPS and PKI 3:24 - MITM proxy basics 6:47 - TLS Decryption (EASY method) 8:42 - How does TLS decryption works 9:42 - TLS Decryption (HARD/Expert method) 11:35 - Building the attack program 13:08 - MITM python module 17:53 - Configuring kali as a router 20:22 - DNS"  
[YouTube Link](https://youtube.com/watch?v=Oi_kQE1zyPs)  2024-12-07T03:37Z 12.2K followers, 33.4K engagements


"GOAD-Light OSCP Series: One-liner jenkins reverse shell exploit This is an extension of the part [--] video. https://youtu.be/mdln8V5nlLAsi=qWIIpx3LhDAQsd6K I will show you the process on how I created a basic exploit for getting a jenkins reverse shell on the target. In this video we will pay attention on cookies python parameters and url encoding. // Tags #oscp #ethicalhacking #activedirectory #windows #jenkins #groovy #cookie // Chapters 0:00 - Intro 1:08 - argparse [---] 2:46 - Building the HTTP requests 3:45 - Cookie mystery 5:33 - Passing cookies between requests 6:30 - Building the exploit"  
[YouTube Link](https://youtube.com/watch?v=PnoExTr44yI)  2024-08-25T03:04Z [----] followers, [---] engagements


"Low Level Networking 101: Python Network Sniffer Description This video will improve your knowledge about low level networking by teaching you how to create a simple network sniffer in python. NOTE: Packet sniffing libraries/frameworks like "scapy" is out of scope of this video as we want to focus on the fundamentals. It can be covered on a separate video. Be sure to use the tools techniques or any learnings you in ethical purposes only. // Tags #ethicalhacking #python #nework #sniffing // Chapters 0:00 - Intro 0:42 - Program base structure (module imports classes functions) 2:58 - IP Header"  
[YouTube Link](https://youtube.com/watch?v=TGZGQ7w1VMk)  2024-10-25T08:04Z 12.5K followers, [----] engagements


"Cracking all sorts of passwords This video will show you different techniques on how hackers can crack different passwords. This includes windows logins bitcoin wallets wifi passphrases and linux shadow files. This is a beginner friendly video to showcase the common methodologies and won't dive in too deep about each attack. // Tags #ethicalhacking #passwordcracking #bitcoin #wifi #windows #linuxshadowfile // Chapters 0:00 - Intro 0:21 - Theory behind password cracking 1:09 - MD5 cracking using crackstation 2:10 - NTLM cracking using hashcat 2:50 - NTLMv2 cracking 3:24 - Linux Shadow file"  
[YouTube Link](https://youtube.com/watch?v=V3eUWVmcGWw)  2025-04-23T11:20Z 11.7K followers, [----] engagements


"Python credential sniffer using Scapy Description Scapy is a powerful packet manipulation and sniffer library. Attackers can use this to steal all sorts of credentials in the network. In this video we will explore how to use scapy and uncover some of its unique potentials. // Tags #ethicalhacking #python #nework #sniffing #scapy // Chapters 0:00 - Intro 0:34 - Scapy basics 1:31 - Scapy sniff() function 4:00 - Scapy packet processing 5:40 - Building the credential sniffer 9:12 - Packet processing logic 12:32 - Pattern matching 15:23 - Troubleshooting regular expression issues 16:52 - Sniffing"  
[YouTube Link](https://youtube.com/watch?v=XurUb-xgUyY)  2024-11-03T10:41Z [----] followers, [---] engagements


"Avoiding Rabbitholes Subdomain enumeration is a crucial skill which allows us to find hidden services. In this video I will give tips that will reduce your time spent in this attack. // Tags #ethicalhacking #subdomain #http #enumeration #ctf #capturetheflag // Chapters 0:00 - Intro 0:13 - Top tools 1:19 - Choosing the wordlist // Links None for now"  
[YouTube Link](https://youtube.com/watch?v=YnB5E3VlPKk)  2025-09-25T10:01Z 12.8K followers, [---] engagements


"Exegol Hacking Tool In this video I will show you how to perform ethical hacking using docker containers. // Tags #ethicalhacking #hackthebox #exegol // Chapters 0:00 - Intro 0:25 - Installation 1:22 - Launching exegol container 2:19 - Shell logging (honeypot server) 2:56 - VPN configuration 3:39 - Attacking Hack the Box machine 3:54 - Desktop Environment 4:43 - Enumerating target from within Exegol 5:23 - Using wireshark inside exegol 5:54 - Directory enumeration using FFUF inside exegol 7:08 - Deep enumeration inside Exegol 8:14 - Havoc C2 inside exegol // Links * Exegol -"  
[YouTube Link](https://youtube.com/watch?v=_A8UXeh0JFY)  2025-08-09T10:59Z 12.2K followers, [----] engagements


"How to make your Arch VM beautiful In this video I will show you how a trick to increase the display quality of your Arch linux VM. // Tags #ethicalhacking #arch #macbook #apple #vmwarefusion // Chapters 0:00 - Intro 0:25 - Step 1: Adjust VMware display settings 0:45 - Step 2: Add DPI settings in /.Xresources file 1:24 - Step 3: Increase DPI on rofi and polybar 2:19 - Step 4: Upscale the wallpaper // Links"  
[YouTube Link](https://youtube.com/watch?v=aBgBWpumaT0)  2025-08-23T10:46Z 12.4K followers, [---] engagements


"I asked Manus to create an exploit here is what happened In this video I will show you how autonomous agent like Manus can help us with vulnerability research. // Tags #ethicalhacking #ai #autonomousagent #manusai #vulnerabilityresearch #heartbleed // Chapters 0:00 - Intro 0:15 - Exploring Manus AI 1:01 - Asking Manus to develop an exploit 2:25 - High level tasks from Manus 3:27 - How manus performs the research phase 4:19 - Did it create an exploit 5:06 - Creating the sandbox environment 5:40 - Documenting the work 6:08 - Inspecting the results // Links * Manus AI: https://manus.im/app"  
[YouTube Link](https://youtube.com/watch?v=ctVUbPW8pNs)  2025-08-18T09:27Z 12.3K followers, [---] engagements


"Bypassing Authentication using [---] page (Jetbrains Teamcity) In this video we will analyze the vulnerability for Jetbrains TeamCity (CVE-2024-27198) and see how it is possible to bpass the authentication by accessing a non existent page. // Tags #ethicalhacking #java #jetbrains #teamcity // Chapters 0:00 - Intro // Links * Vulnerability Technical Analysis - https://www.rapid7.com/blog/post/2024/03/04/etr-cve-2024-27198-and-cve-2024-27199-jetbrains-teamcity-multiple-authentication-bypass-vulnerabilities-fixed/"  
[YouTube Link](https://youtube.com/watch?v=e2-_xvw_OcQ)  2025-03-18T09:57Z 10.7K followers, [----] engagements


"Leaking the Pre-Shared Key (Aggressive Mode) IPSec IKEv1 running in aggressive mode is a faster implementation but less secure. In this video we will see how it can be vulnerable by leaking the pre-shared key. // Tags #ethicalhacking #vpn #ipsec #ike #psk #cracking // Chapters 0:00 - Intro 0:28 - Scanning 1:37 - Cracking PSK 2:17 - Connecting to target // Links None for now"  
[YouTube Link](https://youtube.com/watch?v=eMPOQRAD4vQ)  2025-10-01T09:01Z 13.8K followers, [---] engagements


"A stealthier way to run commands You can use process substitution to create temporary files on disk as a stealthier way of running commands. // Tags #ethicalhacking #linux #stealth // Chapters 0:00 - Intro 0:29 - Process Substitution 1:47 - One-liner commands // Links None for now"  
[YouTube Link](https://youtube.com/watch?v=fJEuLfNHTfQ)  2025-09-23T10:01Z 12.8K followers, [----] engagements


"A plugin that can callback to me . In this video we will explore another method how attackers can gain access to a Teamcity server by uploading a malicious plugin. // Tags #ethicalhacking #java #jetbrains #teamcity // Chapters 0:00 - Intro 1:12 - High level overview of attack 2:11 - Exploit base structure 5:20 - Creating the admin user 7:58 - Codifying plugin upload 9:56 - Analyzing the backend HTTP requests 10:29 - Password encryption 11:50 - Getting the cookie 15:00 - Quick overview on teamcity plugin development 15:35 - Uploading and enabling the plugin 18:43 - Final touches // Links *"  
[YouTube Link](https://youtube.com/watch?v=fYy-4iwSnh8)  2025-03-23T03:37Z 10.8K followers, [---] engagements


"Dirsearch Accuracy Is Now Like a Sniper (Blazingly Fast) I got intrigue how accurate is dirsearch so I made a simple video to uncover its secrets. // Chapters 0:00 - Intro 0:12 - What is dirsearch 0:26 - Linux and windows installtion 0:47 - Unique wordlist 1:17 - Dirsearch vs other tool demo 1:46 - Blacklisting method 2:41 - Things I don't like 3:21 - Can it replace other tools // Links * Dirsearch: https://github.com/maurosoria/dirsearch * Webapp fuzzing: https://owasp.org/www-project-web-security-testing-guide/latest/6-Appendix/C-Fuzzing * Windows python3 installer:"  
[YouTube Link](https://youtube.com/watch?v=goN3uadwfZk)  2024-04-09T08:29Z 11.3K followers, [---] engagements


"Awesome Tools you NEVER heard before Reverse shells are common in CTF challenges. In this video I will show you awesome tools that will perform auto-reconnection auto-upgrade reverse shells and maintain persistent sessions on the target. // Tags #ethicalhacking #reverseshell // Chapters 0:00 - Intro 0:23 - Pwncat self inject 2:24 - rcat for automatic TTY upgrade 3:06 - Penelope for reverse shell session manager + persistence // Links * pwncat: https://github.com/0xfalafel/rcat * rcat: https://github.com/0xfalafel/rcat * penelope: https://github.com/brightio/penelope/ * reverse SSH:"  
[YouTube Link](https://youtube.com/watch?v=hutnvP44rGI)  2025-10-09T09:01Z 13.8K followers, [----] engagements


"Everything is hidden can we discover them In this video we will exploit a vulnerable grafana application hidden inside a sub domain and runs on docker. The exploit involves a dangerous duckdb extension which allows executing arbitrary shell commands. Inside the box we will uncover another hidden application that runs regular commands as root. At the end we will analyze which part of the grafana code is vulnerable and understand why we don't see other processes as regular user. // Tags #ethicalhacking #grafana #duckdb #sql #docker #caido #CVE-2024-9264 // Chapters 0:00 - Intro 0:24 - Scanning"  
[YouTube Link](https://youtube.com/watch?v=mPA7i50Y60s)  2025-09-19T10:40Z 12.7K followers, [---] engagements


"Exploiting Heartbleed (in 2025) Welcome to our first video of [----] about a classic vulnerability. I always wanted to create an exploit for this but never had the chance to do it since I don't have the necessary knowledge back then. // Tags #ethicalhacking #python #heartbleed #CVE-2014-0160 // Chapters 0:00 - Intro 1:15 - Vulnerability Analysis 1:30 - OpenSSL 2:01 - Heartbeat Extension 3:30 - Dissecting the Heartbeat Response logic 5:30 - Finding a vulnerable application 7:13 - Getting out of a rabbit hole 9:24 - Analysing Client Hello (wireshark method) 11:16 - Constructing the Client Hello"  
[YouTube Link](https://youtube.com/watch?v=myl0WRXRFjU)  2025-01-11T09:38Z 11.4K followers, [----] engagements


"Python DNS Sniffer (MITM ARP Spoofing) Description Hey everyone In this video we will explore interesting networking concepts to build a local DNS sniffer. Please DO NOT use this for malicious purposes // Tags #ethicalhacking #python #nework #sniffing #scapy // Chapters 0:00 - Intro 0:52 - Creating the base program 2:53 - What is Man in the Middle attack 3:52 - How MITM ARP spoofing works 4:44 - Address Resolution Protocol 5:13 - ARP weakness (ARP spoofing) 5:57 - Building the MITM logic 8:26 - Handling mobile devices 10:00 - Capturing DNS traffic 13:03 - Analyzing traffic from my phone 14:19"  
[YouTube Link](https://youtube.com/watch?v=ox4a734BPxs)  2024-11-16T08:47Z 11.9K followers, 28.9K engagements


"Critical [---] Auth Bypass Crush FTP is an enterprise-grade managed FTP server. This year they again hit a critical [---] auth bypass vulnerability. In this video we will analyze the vulnerability payload and create an exploit that will add an admin user to the server. // Tags #ethicalhacking #crushftp #CVE-2025-31161 #authbypass #exploitdev // Chapters 0:00 - Intro 0:48 - Payload Analysis 1:51 - Reverse engineering Crush FTP 2:34 - Creating the exploit 3:39 - Triggering the vulnerability 5:14 - Creating the regular user 7:40 - Making the user admin 8:44 - Why CrushFTP are being targeted by"  
[YouTube Link](https://youtube.com/watch?v=pdrLGPKkQCM)  2025-10-11T09:01Z 13.8K followers, [----] engagements


"RSA encryption is fun Welcome to the last part of the series. In this video we will explore the metasploit RSA module and rewrite it into python. // Tags #ethicalhacking #java #jetbrains #teamcity #cryptography #rsa #encryption // Chapters 0:00 - Intro 0:34 - Mimicing the ruby methods 1:22 - encrypt_data() 3:43 - Confusing between public key and modulus 4:27 - Return statements in ruby 4:52 - max_data_size() 5:02 - Ternary expressions 6:07 - two_byte_chars() 6:22 - What is a codepoint 6:44 - Bit shifting to determine glyph/codepoint size 7:42 - rsa_encrypt() 8:26 - PKCS [--] Standard 10:36 -"  
[YouTube Link](https://youtube.com/watch?v=phaqWxMx39k)  2025-03-31T09:48Z 10.9K followers, [---] engagements


"Ever leaked a secret in GIT This TOOL stops that. In this short video I will show you how to prevent committing sensitive data to a git repository using pre-commit hooks. // Tags #ethicalhacking #git #defense #passwords // Chapters 0:00 - Intro 0:16 - Intro to pre-commit 0:35 - Basic usage of pre-commit 2:37 - detect-secrets plugin 3:35 - Testing the detect-secrets plugin 3:57 - Scenario 1: Committing a an ssh private key 4:33 - Scenario 2: Passwords inside config files 5:06 - Scenario 3: Adding sensitive data inside commit message // Links * pre-commit: https://pre-commit.com/"  
[YouTube Link](https://youtube.com/watch?v=qbgBeyAWsoI)  2025-08-02T11:29Z 12.2K followers, [---] engagements


"Github Command and Control In this video we will see how hackers use github as a command and control framework to hide their presence and avoid detection. // Tags #ethicalhacking #python #c2 #github #lots #livingofftrustedsites // Chapters 0:00 - Intro 0:57 - Planning the Attack 3:16 - Authenticating to Github programmatically 4:22 - Creating the C2 modules 6:32 - Buildind the implant class 9:48 - Why pull modules from github 10:36 - Manipulating the Python Import System 15:08 - Preparing the Implant 16:01 - Running the Implant // Links * LOTS: https://lots-project.com/"  
[YouTube Link](https://youtube.com/watch?v=rR3RHUD27ow)  2024-12-26T09:02Z [----] followers, [----] engagements


"Hack The Box: NodeBlog In this video we will root an easy UHC qualifier box. The attack involved leaking server side code via External XML Entities (XXE) to uncover an Insecure Deserialization vulnerability. We will craft our payload and learn some basics of javascript functions and objects. Inside the machine we have a direct path to root via a weak permission model. // Tags #ethicalhacking #xml #blog #insecuredeserialization #xxe #javascript #nodejs #mongodb // Chapters 0:00 - Intro 0:37 - Scanning 1:44 - Web enumeration 3:38 - Intro to ZAP Proxy 4:45 - NoSQL injection 6:27 - XML file"  
[YouTube Link](https://youtube.com/watch?v=tcme3eRrUF0)  2025-09-07T09:10Z 12.6K followers, 52.5K engagements


"Sync and Backup method (Backy) Performing backups is a crucial task in managing the state of your system but if not implemented properly this will lead to full compromise. In this video I will show you a technique on how to perform privilege escalation via sync and backup method using a tool called Backy. // Tags #ethicalhacking #root #linux #tar #rsync #privesc #backy // Chapters 0:00 - Intro 0:17 - Exploring vulnerable script 3:14 - Planning the attack // Links None for now"  
[YouTube Link](https://youtube.com/watch?v=w8vlaCuBzO8)  2025-09-29T09:01Z 12.8K followers, [---] engagements


"Filter Bypass using String Manipulation in Online Code Editor Online code editors are one of the useful application for developers. In this video I will share a bypass technique that allows to run shell commands inside the backend server. // Tags #ethicalhacking #python #bypass // Chapters 0:00 - Intro 0:18 - Figuring out the logic 1:07 - Using sys.modules 2:14 - Technique 1: String reversing 3:04 - Technique 2: String concatenation // Links None for now"  
[YouTube Link](https://youtube.com/watch?v=zdE5no-ttGw)  2025-09-27T10:01Z 12.8K followers, [---] engagements


"Dont fall for these traps (spotting canary tokens) In this video we will analyze some canary tokens and see how they are hidden in different files. // Tags #ethicalhacking #honeypot #canarytoken // Chapters 0:00 - Intro 0:22 - How are tokens embedded in PDF files 1:46 - PDF structure 5:13 - Finding needle in a haystack of SQL dump file 7:37 - Kubernetes token // Links * QPDF: https://github.com/qpdf/qpdf"  
[YouTube Link](https://youtube.com/watch?v=zxhSKruln0A)  2025-04-18T01:16Z 11.1K followers, [----] engagements


"This Linux Directory Leaks Everything Attackers love /proc and most defenders ignore it. In [--] minutes see how /proc leaks ports env vars memory maps and more. // Chapters 0:00 - Intro 0:31 - Looking for binary path 0:55 - Looking for listening ports 1:34 - Looking for environment settings 1:51 - Looking for command parameters 2:09 - Looking for mounts 2:23 - Looking for executables 2:40 - Looking for kernel information 2:56 - Looking for memory maps 3:15 - Looking for connected hosts 3:30 - Looking for man-in-the middle device 3:46 - Looking for network devices // Links None for now. // Tags"  
[YouTube Link](https://youtube.com/watch?v=vgTpbMvImWs)  2026-02-14T09:00Z 20.9K followers, [----] engagements


"Confusing feature that makes It SAFER than other programming languages Rust ownership and borrowing are confusing at firstbut that complexity is exactly why Rust is safer than other languages. In this video I explain how ownership prevents bugs before your code even runs. // Chapters 0:00 - Intro 0:34 - Ownership System 1:35 - Code Analysis 2:36 - Fixing the issue: Borrowing // Links None for now. // Tags #rustlang #rustprogramming #learnrust #systemsprogramming #coding #exploitdevelopment"  
[YouTube Link](https://youtube.com/watch?v=7UBeM4K-5_Y)  2026-02-12T09:00Z 20.9K followers, [----] engagements


"Stop Guessing. Debug Faster with WITR. In this short demo I show howWITRhelps you instantly answer two painful questions: - why is this process running - why is this port listening Instead of grepping logs or digging through ps output youll see how witr gives you quick context so you can debug faster stay secure and keep your machine tidy. // Chapters 0:00 - Intro 0:34 - WITR and normal way of finding explanations 1:55 - Benefits of WITR 2:24 - Other uses // Links * WITR: https://github.com/pranshuparmar/witr // Tags #linux #devops #debugging #opensource #sysadmin"  
[YouTube Link](https://youtube.com/watch?v=gfskSUqILr0)  2026-02-10T09:00Z 20.9K followers, [----] engagements


"Stop Grepping ps: Smarter Linux Process Hunting Still using"ps aux grep"and missing malware In this 5minute demo Ill show you how hackers really use the"ps"command to hunt suspicious processes on Linux. Youll learn cleaner faster techniques to find shady commands users and start times without noisy grep hacks. // Chapters 0:00 - Intro 0:31 - PS [---] 1:24 - Hiding kernel threads 1:57 - Finding processes for another user 2:37 - Finding a user running a specific command 3:36 - Inverting the match 4:12 - Excluding ppid [--] 4:37 - Process start time // Links None for now. // Tags #linux #hacking"  
[YouTube Link](https://youtube.com/watch?v=ZSQC3165PZg)  2026-02-08T09:00Z 20.9K followers, [----] engagements


"These Google Searches Reveal WAY Too Much. Did you know Google can reveal live cameras exposed repositories and more all legally indexed In this short video I explain how Google Dorking works and why misconfigurations are dangerous. // Chapters 0:00 - Intro 0:22 - Google Dorking [---] 0:35 - Looking for SSH private keys 1:06 - Looking for Camera Live Feed 1:48 - Looking for git repositories 2:47 - Other interesting things // Links None for now. // Tags #googledorking #cybersecurity #osint #infosec #techawareness"  
[YouTube Link](https://youtube.com/watch?v=7TOuF6HQv3M)  2026-02-06T09:00Z 20.9K followers, [----] engagements


"Clawd Bot MOLT Sites Are Getting Out of Control Today we dive into the bizarre new world of ClawBot MOLT sites from moltbook and moltx to church of molt onlymolts and molthub. If youre into ClawBot lore and weird corners of the web this ones for you. PS. I may have some mistake in the Church of Molt part about context memory. // Chapters 0:00 - Intro 0:18 - ClawdBot/MoltBot/OpenClaw 0:36 - Moltbook 1:57 - MoltX 2:54 - Church of Molt 4:31 - OnlyMolts and MoltHub 4:55 - Other sites // Links * Moltbook: https://www.moltbook.com * MoltX: https://moltx.io * Church of Molt: https://molt.Church *"  
[YouTube Link](https://youtube.com/watch?v=nm3MWCUVrWs)  2026-02-04T09:00Z 20.9K followers, [----] engagements


"This Tool Finds Secrets Everywhere (GitHub /etc Bash History) Are your Git repos bash history or /etc leaking secrets without you knowing it In this demo I show how to use Noseyparker to quickly scan remote Git repositories local files and system directories for exposed secrets. // Chapters 0:00 - Intro 0:21 - Noseyparker 0:36 - Scanning a Git repository 1:18 - Understanding the report 1:51 - Scaning a file 2:21 - Scanning a directory 3:00 - Scanning repository for a github user 3:36 - TUI app // Links * Noseyparker: https://github.com/praetorian-inc/noseyparker * Noseyparker Explorer:"  
[YouTube Link](https://youtube.com/watch?v=SXOvNULLbXE)  2026-02-02T09:00Z 20.9K followers, [----] engagements


"The Most Cursed PDF: It Runs Linux Yes this PDF actually boots Linux. Not a meme a real OS running inside a document. In this video I dive into LinuxPDF a wild project that uses a RISCV emulator to run Linux inside a PDF file. I walk through how it works with a simple diagram explore the filesystem and then completely destroy the virtual system just to see what happens. // Chapters 0:00 - Intro 0:17 - What is Linux PDF 0:24 - Launching Linux PDF 0:52 - Implementation 1:38 - Exploring the system: Part [--] 2:49 - Exploring the system: Part [--] // Links * LinuxPDF:"  
[YouTube Link](https://youtube.com/watch?v=SPnaZM6OCJQ)  2026-01-31T09:00Z 20.9K followers, [----] engagements


"The WORST Telnet Vulnerability in Years CVE202624061 is a critical Telnet vulnerability that allows a trivial authentication bypass and can lead to unauthenticated root access on affected systems. // Chapters 0:00 - Intro 0:16 - Vulnerability overview 0:34 - Setting up POC environment 1:19 - Simulating the exploit 1:59 - Vulnerability Analysis: Telnet automatic login 2:52 - Vulnerability Analysis: Spotting the code // Links * CVE details: https://nvd.nist.gov/vuln/detail/CVE-2026-24061 * Github POC: https://github.com/JayGLXR/CVE-2026-24061-POC // Tags #cve202624061 #telnet #cybersecurity"  
[YouTube Link](https://youtube.com/watch?v=Gr4GdROJIZ8)  2026-01-29T09:00Z 20.9K followers, [----] engagements


"No curl. No wget. Just "Living off the Land" with BASH. In this 2minute demo I show how an attacker can use a simple Bash HTTP client to pull malware onto a target even when curl wget and python are all missing. // Chapters 0:00 - Intro 0:28 - Showing burl 0:47 - Code analysis // Links None for now. // Tags #bash #cybersecurity #malware #redteaming #linux"  
[YouTube Link](https://youtube.com/watch?v=bulJH9ZZf_k)  2026-01-27T09:00Z 20.9K followers, [----] engagements


"Rewriting Python exploit to RUST MongoBleed is a critical MongoDB vulnerability that can silently expose your data to anyone who knows how to poke at it. In this video I break down the root cause of the bug and show you exactly how the exploit works step by step. // Chapters 0:00 - Intro 0:19 - Vulnerability Overview 1:54 - Preparing the POC environment 2:34 - Running the exploit against a vulnerable container 3:15 - Running the exploit against a patched container 3:41 - Rust exploit code analysis: Part [--] 5:06 - Rust exploit code analysis: Part [--] 5:53 - Rust exploit code analysis: Part [--] //"  
[YouTube Link](https://youtube.com/watch?v=7lIRykDjaY8)  2026-01-25T09:00Z 20.9K followers, [----] engagements


"I Found the Perfect AI Workflow for Ethical Hacking Learn how to use Shell GPT forEthical Hackingworkflows from generating nmap scans and hunting malware on disk to analyzing attack logs and creating boilerplate tools like a password cracker. // Chapters 0:00 - Intro 0:40 - Asking questions 1:27 - Network scanning 1:47 - Looking for malware 2:23 - Analyzing a log file 3:07 - REPL mode 3:40 - Shell integration 4:21 - Code generation and scanning 4:52 - Will this bring any value // Links Shell GPT: https://github.com/TheR1D/shell_gpt // Tags #shellgpt #ethicalhacking #cybersecurity #pentesting"  
[YouTube Link](https://youtube.com/watch?v=AEMj-D6vPiY)  2026-01-23T09:00Z 20.9K followers, [----] engagements


"These Rust CLI Tools Make Linux Hacking Faster Rust isnt just for backend and systems its becoming a must-have toolkit for ethical hackers and security engineers. In this video youll discover powerful Rust CLI tools that make hacking workflows faster safer and more fun. // Chapters 0:00 - Intro 0:23 - bat 1:54 - tailspin 2:50 - lla 4:06 - havn 4:26 - motus 4:49 - navi 5:18 - domain-check 5:37 - kmon // Links * bat: https://github.com/sharkdp/bat * tailspin: https://github.com/bensadeh/tailspin * lla: https://github.com/chaqchase/lla * havn: https://github.com/mrjackwills/havn * motus:"  
[YouTube Link](https://youtube.com/watch?v=eWGSrRoKNis)  2026-01-21T09:00Z 20.9K followers, [----] engagements


"Powerful Hacking extensions you NEVER heard before Unlock powerful but lesserknown browser extensions that test your password strength speed up OSINT and reveal if the sites you visit have been breached. In this 5minute walkthrough youll see how tools like Time to Hack Vortimo OSINT Perplexity AI Hunter and Breached can quietly level up your daytoday security and research workflow without leaving your current tab. // Chapters 0:00 - Intro 0:23 - Time to Hack extension 1:22 - Perplexity AI extension 2:21 - FindSomething extension 2:59 - Vortimo OSINT Tool extension 3:21 - Wayback Machine"  
[YouTube Link](https://youtube.com/watch?v=kisVxSZ7fBc)  2026-01-19T09:00Z 20.9K followers, [----] engagements


"FREE features most people MISS DiscoverVirusTotalFREE features that most people never use. Learn how to search domains and IPs use the Chrome extension call the VirusTotal API and explore malware behavior with Threat Graph. // Chapters 0:00 - Intro 0:26 - Searching a hash 0:45 - Getting more details about the virus 1:38 - Threat graph 1:55 - Ransomware threat graph 3:23 - Searching an IP 3:33 - Browser Extension 3:43 - VirusTotal CLI 4:03 - VirusTotal API and Scripting // Links * VirusTotal: https://www.virustotal.com // Tags #virustotal #cybersecurity #malwareanalysis #blueteam #infosec"  
[YouTube Link](https://youtube.com/watch?v=RPt7dgS8ugI)  2026-01-17T09:00Z 20.9K followers, [----] engagements


"Dont click that LINK until you DO THIS Worried that the next link you click might be a scam In this short video youll learn simple practical ways to spot malicious links before they cause damage. // Chapters 0:00 - Intro 0:18 - Checking links from email 1:12 - Scan websites easily using Virus Total extension 1:39 - More quick ways of checking a link 2:41 - Typosquatting 3:50 - Analyzing typosquatting 4:49 - Other ways of detecting typosquatting 5:07 - Abuse IP checker // Links * Virus Total: https://www.virustotal.com * Official Virus Total Chrome Extension:"  
[YouTube Link](https://youtube.com/watch?v=WwWaZrsdP84)  2026-01-15T09:00Z 20.9K followers, [----] engagements


"I tried scanning my machine with ClamAV Linux is not magically immune to malware. In this video youll learn how to scan your Linux system for malware and viruses using ClamAV step by step in just [--] minutes. In this ClamAV tutorial we cover: How to install ClamAV on NixOS How to run ondemand scans for files and directories How to read ClamAV scan results and what to do with detections Simple tips to keep your Linux machine safer Whether youre new to Linux security or setting up antivirus on a home server this video shows a practical fast workflow you can reuse on any distro that supports"  
[YouTube Link](https://youtube.com/watch?v=kOrFAJcXbdw)  2026-01-13T09:01Z 20.9K followers, [----] engagements


"Why it feels so much Better than BASH Fish shell is a modern alternative to bash. In this video I will show you the unique and interesting features of fish shell. // Tags #ethicalhacking #fishshell #linux #athenaos // Chapters 0:00 - Intro 0:21 - Terminal colors and syntax highlighting 1:29 - Abbrevations 2:30 - Setting variables 2:56 - Searching through command history 3:05 - Tab completion for command options 3:26 - Customizing themes easily 3:57 - Shell private mode 4:27 - Getting help // Links * fish shell: https://fishshell.com"  
[YouTube Link](https://youtube.com/watch?v=959WVXHu6Es)  2026-01-11T09:00Z 20.9K followers, [----] engagements


"How Hackers run BASH with NO files You can run bash scripts without touching the disk. In this video I will show you attacker techniques to evade detection when running malwares inside bashb *** Stealth and Evasion Techniques Playlist *** https://youtube.com/playlistlist=PL08nYpWQJ_zPpVXLgVlVn56i1Km4bArhv&si=kyJeRug-stJvyjCR // Tags #ethicalhacking #evasion #bash #linux // Chapters 0:00 - Using native tools 1:32 - Using 3rd party tools // Links None for now"  
[YouTube Link](https://youtube.com/watch?v=bXtTIjqSAA0)  2026-01-09T09:01Z 20.9K followers, 14.8K engagements


"Athena NixOS: Setup & First Impressions NixOS has been a game changer in making a linux machine reproducible and reliable. In this video I will show you how you can transform Nix into an ethical hacking machine. // Tags #ethicalhacking #nixos #athena // Chapters 0:00 - Intro 1:12 - Installing Nix OS 3:17 - Installing Athena OS 4:14 - Good things about Athena 5:40 - Only thing I don't like // Links * Athena OS: https://athenaos.org"  
[YouTube Link](https://youtube.com/watch?v=Gk_mEm-ISlI)  2026-01-07T09:00Z 20.9K followers, [----] engagements


"Stop manual CVE search: Automate it with Vulnx Vulnx is a free all-in-one vulnerability search tool. In this video I will show you how to hunt for vulnerabilities using its powerful filters and queries. // Tags #ethicalhacking #vulnx #cve #vulnerability // Chapters 0:00 - Intro 0:42 - Nice graphs 1:36 - Powerful queries // Links * Vulnx: https://github.com/projectdiscovery/cvemap"  
[YouTube Link](https://youtube.com/watch?v=qpcaEcRrwyA)  2026-01-05T09:01Z 20.9K followers, [----] engagements


"Linux Session Sniffer using eBPF eBPF is a powerul technology that makes the kernel programmable in a safe manner. In this video I will show you how eBPF can be used as an offensive security tool. // Tags #ethicalhacking #ebpf #kernel #linux #sniffing // Chapters 0:00 - Intro 0:49 - eBPF refresher 1:49 - eBPF program demo 3:20 - Understanding Linux pseudo terminals 6:27 - Understanding how the attack works 7:26 - Analyzing the eBPF progrm // Links * ptysnoop.bt: https://github.com/hackerschoice/bpfhacks/blob/main/ptysnoop.bt * bpftrace:"  
[YouTube Link](https://youtube.com/watch?v=hBpYNDy1wrY)  2026-01-03T09:01Z 20.9K followers, [----] engagements


"Real-Time Malware Tracing eBPF makes the kernel programmable without the need to install a module re-compile the kernel or reboot. In this video I will show you how we can use to detect hackers. // Tags #ethicalhacking #ebf #defense #linux #kernel #malware // Chapters 0:00 - Intro 0:25 - Traditional ways of adding kernel functionalities 1:12 - What is eBPF 3:23 - Checking for kernel support 3:44 - Installing the requirements 4:07 - Intro to bpftrace 5:35 - Creating a simple eBPF program // Links * eBPF: https://ebpf.io/"  
[YouTube Link](https://youtube.com/watch?v=HbPc8czi0qo)  2026-01-01T09:00Z 20.9K followers, [----] engagements


"Malware Analysis Made Easy Identifying a malware is a hard task and we often get false positives. In this video I will show you a tool that effectively determine of a binary is malicious or not. // Tags #ethicalhacking #malwareanalysis #linux #windows // Chapters 0:00 - Intro 0:41 - Analyzing a ransomware executable 2:52 - Querying virus total API 3:53 - Dynamic analysis // Links * Qu1cksc0pe: https://github.com/CYB3RMX/Qu1cksc0pe * TheZoo (Live malware samples): https://github.com/ytisf/theZoo"  
[YouTube Link](https://youtube.com/watch?v=4GXqBUBdUKM)  2025-12-30T09:00Z 20.9K followers, [----] engagements


"Things I learned when switching to Arch Using Linux doesnt make us immune to malwares and attacks. In this video I will show you how to harden a linux machine using Lynis auditing tool. // Tags #ethicalhacking #hardening #auditing #lynis #archlinux // Chapters 0:00 - Intro 0:49 - Running lynis // Links * Lynis: https://github.com/CISOfy/lynis"  
[YouTube Link](https://youtube.com/watch?v=Ef0PWSOeFqc)  2025-12-28T09:00Z 20.9K followers, [----] engagements


"Weaponizing ANSI: When "Text" Becomes Malware ANSI escape sequences are commonly used to make our terminal fonts look better. In this video I will show you how hackers can abuse it to hide their payloads. // Tags #ethicalhacking #linux #ansi #evasion #stealth // Chapters 0:00 - Intro 0:26 - ANSI escape code basics 1:14 - Erasing lines 1:50 - Hiding text inside files 2:36 - Hiding payloads inside crons // Links None for now"  
[YouTube Link](https://youtube.com/watch?v=Q_GgRJWp1i4)  2025-12-26T09:00Z 20.9K followers, [----] engagements


"Ultimate Linux Sandbox Demo Firejail is a linux sandbox that uses namespaces abnd seccomp-bpf filters. In this video I will show you how to lock down hackers to prevent unauthorize access to a linux machine. // Tags #ethicalhacking #firejail #sandbox #seccomp #namespaces // Chapters 0:00 - Intro 0:35 - Basic sandbox demo 2:16 - Restricting network acces // Links * Firejail: https://github.com/netblue30/firejail"  
[YouTube Link](https://youtube.com/watch?v=xdeF16xJX3E)  2025-12-24T09:01Z 20.9K followers, [----] engagements


"Making Files Disappear in LINUX A linux rootkit is used by hackers to perform various privileged actions. In this video I will show you how it can hide a file in local disk. // Tags #ethicalhacking #linux #rootkits #evasion #stealth // Chapters 0:00 - Intro 0:35 - Tying a simple rootkit 1:25 - How rootkits works // Links * Caraxes rootkit: https://github.com/ait-aecid/caraxes/tree/main"  
[YouTube Link](https://youtube.com/watch?v=00fI3TKtAN0)  2025-12-22T09:00Z 20.9K followers, [----] engagements


"Forensic Commands every LINUX user SHOULD know Hackers can leave artifacts such as malwares loaders and other temporary files inside a compromised linux system. In this video I will show you important commands on how to detect and recover them. // Tags #ethicalhacking #linux #forensics #investigation // Chapters 0:00 - Intro 0:19 - Finding recently modified files 1:47 - Finding by last metadata update time 2:51 - Finding immutable files 3:41 - Recovering files with open file descriptors 4:12 - Common writable directories 5:06 - Finding recently installed softwares and tools // Links None for"  
[YouTube Link](https://youtube.com/watch?v=EmMGyAccDL4)  2025-12-20T09:00Z 20.9K followers, [----] engagements


"Decoding a Stealthy one-liner Linux command Linux memory-based attacks are used to avoid detection. In this video I will show you how hackers run fileless malware my manipulating file descriptors. * Credit to THC for the wonderful trick * // Tags #ethicalhacking #linux #evasion #fileless #malware // Chapters 0:00 - Intro 0:37 - Breaking down the code // Links None for now"  
[YouTube Link](https://youtube.com/watch?v=78zRWUw9Rnw)  2025-12-18T09:00Z 20.9K followers, [----] engagements


"Browser-based Remote Shell SSHx is a collaborative tool that allows different people to access a remote shell over the internet. In this video I will show you how to use it as well as the hidden dangers. // Tags #ethicalhacking #sshx #shell // Chapters 0:00 - Intro 0:22 - Installation and Demo // Links * SSHX: https://sshx.io"  
[YouTube Link](https://youtube.com/watch?v=nUJylR4tY7k)  2025-12-16T09:01Z 20.9K followers, [----] engagements


"This Worm Harvests LINUX Credentials Worms are not only designed for Windows computers. In this video I will show you an example linux SSH worm that intercepts outgoing connections and harvest user credentials. // Tags #ethicalhacking #worm #malware #linux #ssh // Chapters 0:00 - Intro 0:37 - How the worm works 1:11 - Demo 3:27 - Figuring out how the code works // Links * SSH-IT: https://www.thc.org/ssh-it"  
[YouTube Link](https://youtube.com/watch?v=5JclOmTpRDI)  2025-12-14T09:00Z 20.9K followers, 13K engagements


"Finding and Monitoring Someones Activity using Sherlock Tools Hackers can easily hunt down their targets using various tools. In this video I will show you effective tools to search for a person online. // Tags #ethicalhacking #osint #social-media // Chapters 0:00 - Intro 0:31 - Sherlock CLI 1:02 - Sherlock Eye // Links * Sherlock CLI: https://github.com/sherlock-project/sherlock * Sherlock Eye: https://app.sherlockeye.io"  
[YouTube Link](https://youtube.com/watch?v=yIAaQqXuHjo)  2025-12-12T09:01Z 20.9K followers, [----] engagements


"My First Exploit in RUST React2Shell is a recent 0-day vulnerability that allows unauthenticated remote code execution using a single HTTP request. In this video we will analyze the vulnerability and develop an exploit written in rust. // Tags #ethicalhacking #rust #react2shell #CVE-2025-55182 #exploit-dev // Chapters 0:00 - Launching a vulnerable sever 2:20 - Analyzing the vulnerability 3:30 - Creating the rust exploit 10:44 - Running the code // Links * react2shell POC: https://github.com/freeqaz/react2shell"  
[YouTube Link](https://youtube.com/watch?v=BjeGCZhSpzY)  2025-12-10T10:04Z 20.9K followers, [----] engagements


"Youre Using Hashing Without Realizing It Most of us knows how to get the checksum of a file but only few knows how hashing is really used. In this video I will show you some of the interesting use cases of hashing. // Tags #ethicalhacking #hashing #checksum // Chapters 0:00 - Intro 0:24 - Common Use Cases 0:56 - Interesting Use Cases // Links None for now"  
[YouTube Link](https://youtube.com/watch?v=h0QNvpqQSj0)  2025-12-07T09:01Z 20.9K followers, [---] engagements


"Shai-Hulud 2.0: A Worm that DESTROYS User Data A worm is a self-replicating piece of malware. In this video I will show you one of the most brutal worm this year that destroys user data if it doesnt get what it wants. // Tags #ethicalhacking #malware #worm // Chapters 0:00 - Intro 0:37 - Installing bun runtime 1:07 - Looking for secrets 1:31 - Persistence 1:46 - Looking for more credentials 1:49 - Self propagate 2:06 - Destroying user data // Links * Great technical analysis from Datadog: https://securitylabs.datadoghq.com/articles/shai-hulud-2.0-npm-worm"  
[YouTube Link](https://youtube.com/watch?v=HdOYMLzFGqs)  2025-12-05T09:00Z 20.9K followers, [----] engagements


"SSH Honeypot that Traps Attackers Endless SSH is a great tool for catching bad actors. In this video I will show you how to run this and we will understand the mechanism behind. // Tags #ethicalhacking #ssh #honeypot #decoy #deception // Chapters 0:00 - Intro 0:39 - SSH protocol recap 1:38 - Demo 2:08 - Adding a troll message // Links * endlessh-go: https://github.com/shizunge/endlessh-go"  
[YouTube Link](https://youtube.com/watch?v=E9ONTdboYMw)  2025-12-03T09:00Z 20.9K followers, [----] engagements


"Single Packet Authorization: Firewall on STEROIDS Single Packet Authorization is a method for authorizing a client on the network level. In this video I will show you the mechanics on how this can level up your firewall protection. // Tags #ethicalhacking #firewall #defense // Chapters 0:00 - Intro 0:30 - How does SPA works 1:48 - Setting up and demo // Links * fwknop (Single Packet Authorization): https://github.com/mrash/fwknop"  
[YouTube Link](https://youtube.com/watch?v=ecBis6Tgq3U)  2025-12-01T09:01Z 20.9K followers, 46.3K engagements


"Linux Terminal Pagers: Hidden Dangers Giving users sudo access to terminal pagers is not a generally a good idea. In this video I will show why it makes your machine insecure and ways to prevent users bypass the security mechanims. // Tags #ethicalhacking #linux #sudo // Chapters 0:00 - Intro 0:49 - Security misconfiguration on less command 2:07 - How terminal pagers are used by other utilities // Links None for now"  
[YouTube Link](https://youtube.com/watch?v=u3uUhUXFvn8)  2025-11-29T09:01Z 20.9K followers, [----] engagements


"CAI: Autonomous Ethical Hacking CAI is a tool that allows autonomous ethical hacking. In this video I will show you how to command a red team agent to scan and exploit a vulnerability on a target. // Tags #ethicalhacking #agent #ai #autonomous // Chapters 0:00 - Intro 0:48 - Installation and Setup 2:38 - Commanding the agent // Links * CAI Framework: https://github.com/aliasrobotics/cai"  
[YouTube Link](https://youtube.com/watch?v=7VS577DYs9s)  2025-11-27T09:00Z 20.9K followers, [----] engagements


"Hacker Techniques to HIDE Linux Commands Hackers are experts in hiding their linux commands. In this video I will show you effective techniques in removing your commands in bash history. // Tags #ethicalhacking #bash #linux #evasion #stealth // Chapters 0:00 - Intro 0:14 - Prepending a whitespace 1:14 - Clearing history for current session 1:40 - Pointing history file to /dev/null 2:06 - Avoding sudo 2:19 - Persistence mechanism to clear history file 2:29 - History file for databases // Links None for now"  
[YouTube Link](https://youtube.com/watch?v=CP24udbWjYo)  2025-11-25T09:00Z 20.9K followers, [----] engagements


"Cloudflare Tunnel: How hackers abuse it Cloudflare Tunnel is an easy way to expose your application over the internet securely but hackers are abusing this to hide their cover operations. In this video I will show you different techniques hackers can use to leverage cloudflare tunnel for their malicious gains. // Tags #ethicalhacking #cloudflare #tunnel #evasion #stealth // Chapters 0:00 - Intro 1:15 - Launching cloudflare tunnel 1:55 - Using for fingerprinting 2:08 - Tunneling reverse shell and C2 connections 2:12 - Webshell on victim machine // Links * Cloudflare Tunnel:"  
[YouTube Link](https://youtube.com/watch?v=JMFcgGEqiG4)  2025-11-23T09:00Z 20.9K followers, [----] engagements


"Techniques Youve Never Heard Before Living Off The Land is a technique where attackers leverage built-in tools softwares inside operating systems or networks for their malicious gains. In this video I will show you the unique techniques you never heard before. // Tags #ethicalhacking #lotl #living-off-the-land #evasion // Chapters 0:00 - Intro 1:45 - Lolbas (Windows) 2:21 - LooBins (Mac OS) 3:15 - Living Off The Tunnels 3:54 - Living Off The Hardware 4:24 - Living Off The False Positive 5:42 - Living Off The Pipeline 6:42 - Living Off The Land Applications 7:04 - Living Off The Land Drivers"  
[YouTube Link](https://youtube.com/watch?v=MXYoG_IDy2w)  2025-11-21T09:00Z 20.9K followers, [----] engagements


"How hackers abuse Linux for Persistence Attackers abuse various Linux functionalities to maintain persistence. In this video I will show you some basic and advance techniques using a tool called Panix. // Tags #ethicalhacking #linux #persistence #rootkits #backdoor // Chapters 0:00 - Intro 1:08 - Creating system backdoor user 2:03 - Reverting persistence 2:37 - Persistence using sytemd generators 3:31 - Persistence using udev rules // Links * Panix: https://github.com/Aegrah/PANIX"  
[YouTube Link](https://youtube.com/watch?v=ZaAxeaRt_P8)  2025-11-19T09:00Z 20.9K followers, [----] engagements


"How hackers HIDE their CODE Bincrypter is a tool that obfuscates and encrypt an ELF binary or a shell script. In this video I will show you the interesting features of this tool and analyze the obfuscation process. PS. Thanks to THC for this nice program. I learned a lot during code analysis. // Tags #ethicalhacking #obfuscation #encryption #linux // Chapters 0:00 - Intro to Bincrypter 2:43 - Analyzing the obfuscation process // Links * bincrypter: https://github.com/hackerschoice/bincrypter"  
[YouTube Link](https://youtube.com/watch?v=ehDJUCTjd5E)  2025-11-17T09:01Z 20.9K followers, [----] engagements


"How hackers HIDE in DNS DNS is one of the widely used protocol and attackers can leverage it for covert operations. In this video I will show you how they can abuse the text queries to send malicious commands to a victim machine. // Tags #ethicalhacking #dns #reverse-shell #covert-operations #stealth // Chapters 0:00 - Intro 0:32 - What is a DNS TXT record 1:18 - Understanding the attack 2:52 - Demo of the attack 5:17 - How client malware send back the output 5:47 - How attacker decodes the output // Links * revshellDns: https://github.com/LucaReggiannini/revshellDns"  
[YouTube Link](https://youtube.com/watch?v=JO7OP5pV7w8)  2025-11-15T09:00Z 20.9K followers, [----] engagements


"Rapid Note-Taking System for Hackers: Find Info FAST Being an ethical hacker means being able to take good notes and retrieve relevant information quickly. In this video I will share to you all the techniques I do to make my note taking workflow fast and efficient. // Tags #ethicalhacking #obsidian // Chapters 0:00 - Intro 0:39 - Obsidian Intro 1:08 - Tags headings TOC note linking 1:37 - Omnisearch dynamic highlights 2:11 - Flat naming technique avoiding duplicate tabs 2:49 - Git and some subfolders // Links None for now"  
[YouTube Link](https://youtube.com/watch?v=hS3LXIyVMOI)  2025-11-13T09:01Z 20.9K followers, [----] engagements


"Web Check: An All-in-One OSINT Tool Webcheck is an all-in-one OSINT tool that analyze a website for misconfiguration security vulnerabilities and performance. In this video I will show you the various scans it can perform. // Tags #ethicalhacking #web-check #osint // Chapters 0:00 - Intro 0:28 - Trying out the public instance 2:46 - Diagnosing and fixing some errors 4:28 - Trying out more features // Links * Web Check project: https://github.com/Lissy93/web-check * Web Check publick instance: https://web-check.xyz"  
[YouTube Link](https://youtube.com/watch?v=nBjLzimVoSY)  2025-11-11T09:01Z 20.9K followers, [----] engagements


"This CHECKLIST will save you from Digital Threats Digital defense is something all of us should know in order to protect ourselves from bad actors. In this video I will show you a great tool that aids us in assessing the state of our personal digital security. // Tags #ethicalhacking #personal-security #checklist #digital-defense // Chapters 0:00 - Intro 0:39 - Starting the checklist 1:43 - Exploring the authentication checklist 4:04 - Different security requirements for each person 4:47 - High security requirements // Links * Digital Defense Personal Security Checklist:"  
[YouTube Link](https://youtube.com/watch?v=ceTQQcgdpmE)  2025-11-09T09:00Z 20.9K followers, [----] engagements


"Get ROOT with ONE command Traitor is tool that automates machine exploitation. This is really useful in time-crunch situations like red team assessments or if you are competing in capture the flag events. // Tags #ethicalhacking #exploit #traitor #backdoor // Chapters 0:00 - Intro 0:16 - Exploring traitor 1:20 - Planting backdoors // Links * traitor: https://github.com/liamg/traitor"  
[YouTube Link](https://youtube.com/watch?v=vEl1BPLrMeM)  2025-11-07T09:01Z 20.9K followers, [----] engagements

Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing

@hacktheclown Avatar @hacktheclown Hack the Clown

Hack the Clown posts on YouTube about hack, how to, shell, code the most. They currently have [------] followers and [---] posts still getting attention that total [------] engagements in the last [--] hours.

Engagements: [------] #

Engagements Line Chart

  • [--] Week [------] +58%
  • [--] Month [------] +28%
  • [--] Months [-------] +2,453%
  • [--] Year [-------] +680%

Mentions: [--] #

Mentions Line Chart

Followers: [------] #

Followers Line Chart

  • [--] Week [------] +2%
  • [--] Month [------] +7.80%
  • [--] Months [------] +69%
  • [--] Year [------] +102%

CreatorRank: [-------] #

CreatorRank Line Chart

Social Influence

Social category influence stocks technology brands cryptocurrencies

Social topic influence hack, how to, shell, code, command, intro #89, hide, stealth, tools, what is

Top assets mentioned Alphabet Inc Class A (GOOGL) Cloudflare, Inc. (NET)

Top Social Posts

Top posts by engagements in the last [--] hours

"These Google Searches Reveal WAY Too Much. Did you know Google can reveal live cameras exposed repositories and more all legally indexed In this short video I explain how Google Dorking works and why misconfigurations are dangerous. // Chapters 0:00 - Intro 0:22 - Google Dorking [---] 0:35 - Looking for SSH private keys 1:06 - Looking for Camera Live Feed 1:48 - Looking for git repositories 2:47 - Other interesting things // Links None for now. // Tags #googledorking #cybersecurity #osint #infosec #techawareness"
YouTube Link 2026-02-06T09:00Z 20.9K followers, [----] engagements

"SSH Honeypot that Traps Attackers Endless SSH is a great tool for catching bad actors. In this video I will show you how to run this and we will understand the mechanism behind. // Tags #ethicalhacking #ssh #honeypot #decoy #deception // Chapters 0:00 - Intro 0:39 - SSH protocol recap 1:38 - Demo 2:08 - Adding a troll message // Links * endlessh-go: https://github.com/shizunge/endlessh-go"
YouTube Link 2025-12-03T09:00Z 20.9K followers, [----] engagements

"Things I learned when switching to Arch Using Linux doesnt make us immune to malwares and attacks. In this video I will show you how to harden a linux machine using Lynis auditing tool. // Tags #ethicalhacking #hardening #auditing #lynis #archlinux // Chapters 0:00 - Intro 0:49 - Running lynis // Links * Lynis: https://github.com/CISOfy/lynis"
YouTube Link 2025-12-28T09:00Z 20.9K followers, [----] engagements

"The WORST Telnet Vulnerability in Years CVE202624061 is a critical Telnet vulnerability that allows a trivial authentication bypass and can lead to unauthenticated root access on affected systems. // Chapters 0:00 - Intro 0:16 - Vulnerability overview 0:34 - Setting up POC environment 1:19 - Simulating the exploit 1:59 - Vulnerability Analysis: Telnet automatic login 2:52 - Vulnerability Analysis: Spotting the code // Links * CVE details: https://nvd.nist.gov/vuln/detail/CVE-2026-24061 * Github POC: https://github.com/JayGLXR/CVE-2026-24061-POC // Tags #cve202624061 #telnet #cybersecurity"
YouTube Link 2026-01-29T09:00Z 20.9K followers, [----] engagements

"Stop Grepping ps: Smarter Linux Process Hunting Still using"ps aux grep"and missing malware In this 5minute demo Ill show you how hackers really use the"ps"command to hunt suspicious processes on Linux. Youll learn cleaner faster techniques to find shady commands users and start times without noisy grep hacks. // Chapters 0:00 - Intro 0:31 - PS [---] 1:24 - Hiding kernel threads 1:57 - Finding processes for another user 2:37 - Finding a user running a specific command 3:36 - Inverting the match 4:12 - Excluding ppid [--] 4:37 - Process start time // Links None for now. // Tags #linux #hacking"
YouTube Link 2026-02-08T09:00Z 20.9K followers, [----] engagements

"How Hackers run BASH with NO files You can run bash scripts without touching the disk. In this video I will show you attacker techniques to evade detection when running malwares inside bashb *** Stealth and Evasion Techniques Playlist *** https://youtube.com/playlistlist=PL08nYpWQJ_zPpVXLgVlVn56i1Km4bArhv&si=kyJeRug-stJvyjCR // Tags #ethicalhacking #evasion #bash #linux // Chapters 0:00 - Using native tools 1:32 - Using 3rd party tools // Links None for now"
YouTube Link 2026-01-09T09:01Z 20.9K followers, 14.8K engagements

"Prevent hackers from decrypting your HTTPS traffic In this video we will discuss some of the most common techniques attackers use to install fake root certificates on our devices to decrypt our TLS traffic. // Tags #ethicalhacking #tls #ssl #https #metasploit #c2 #bufferoverflow #eternalblue // Chapters 0:00 - Intro 0:47 - Why are CAs important 3:51 - Fake root cert installation via Classic Network Attacks (LLMR poisioning/Brute Force) 09:54 - Fake root cert installation via OS Vulnerability (Eternal Blue) 14:04 - Fake root cert installation via App Vulnerability (Buffer Overflow) 17:29 -"
YouTube Link 2024-12-21T04:43Z 20.5K followers, [----] engagements

"Clawd Bot MOLT Sites Are Getting Out of Control Today we dive into the bizarre new world of ClawBot MOLT sites from moltbook and moltx to church of molt onlymolts and molthub. If youre into ClawBot lore and weird corners of the web this ones for you. PS. I may have some mistake in the Church of Molt part about context memory. // Chapters 0:00 - Intro 0:18 - ClawdBot/MoltBot/OpenClaw 0:36 - Moltbook 1:57 - MoltX 2:54 - Church of Molt 4:31 - OnlyMolts and MoltHub 4:55 - Other sites // Links * Moltbook: https://www.moltbook.com * MoltX: https://moltx.io * Church of Molt: https://molt.Church *"
YouTube Link 2026-02-04T09:00Z 20.9K followers, [----] engagements

"Stop manual CVE search: Automate it with Vulnx Vulnx is a free all-in-one vulnerability search tool. In this video I will show you how to hunt for vulnerabilities using its powerful filters and queries. // Tags #ethicalhacking #vulnx #cve #vulnerability // Chapters 0:00 - Intro 0:42 - Nice graphs 1:36 - Powerful queries // Links * Vulnx: https://github.com/projectdiscovery/cvemap"
YouTube Link 2026-01-05T09:01Z 20.9K followers, [----] engagements

"Confusing feature that makes It SAFER than other programming languages Rust ownership and borrowing are confusing at firstbut that complexity is exactly why Rust is safer than other languages. In this video I explain how ownership prevents bugs before your code even runs. // Chapters 0:00 - Intro 0:34 - Ownership System 1:35 - Code Analysis 2:36 - Fixing the issue: Borrowing // Links None for now. // Tags #rustlang #rustprogramming #learnrust #systemsprogramming #coding #exploitdevelopment"
YouTube Link 2026-02-12T09:00Z 20.9K followers, [----] engagements

"Stop Guessing. Debug Faster with WITR. In this short demo I show howWITRhelps you instantly answer two painful questions: - why is this process running - why is this port listening Instead of grepping logs or digging through ps output youll see how witr gives you quick context so you can debug faster stay secure and keep your machine tidy. // Chapters 0:00 - Intro 0:34 - WITR and normal way of finding explanations 1:55 - Benefits of WITR 2:24 - Other uses // Links * WITR: https://github.com/pranshuparmar/witr // Tags #linux #devops #debugging #opensource #sysadmin"
YouTube Link 2026-02-10T09:00Z 20.9K followers, [----] engagements

"This Linux Directory Leaks Everything Attackers love /proc and most defenders ignore it. In [--] minutes see how /proc leaks ports env vars memory maps and more. // Chapters 0:00 - Intro 0:31 - Looking for binary path 0:55 - Looking for listening ports 1:34 - Looking for environment settings 1:51 - Looking for command parameters 2:09 - Looking for mounts 2:23 - Looking for executables 2:40 - Looking for kernel information 2:56 - Looking for memory maps 3:15 - Looking for connected hosts 3:30 - Looking for man-in-the middle device 3:46 - Looking for network devices // Links None for now. // Tags"
YouTube Link 2026-02-14T09:00Z 20.9K followers, [----] engagements

"Cloudflare Tunnel: How hackers abuse it Cloudflare Tunnel is an easy way to expose your application over the internet securely but hackers are abusing this to hide their cover operations. In this video I will show you different techniques hackers can use to leverage cloudflare tunnel for their malicious gains. // Tags #ethicalhacking #cloudflare #tunnel #evasion #stealth // Chapters 0:00 - Intro 1:15 - Launching cloudflare tunnel 1:55 - Using for fingerprinting 2:08 - Tunneling reverse shell and C2 connections 2:12 - Webshell on victim machine // Links * Cloudflare Tunnel:"
YouTube Link 2025-11-23T09:00Z 20.9K followers, [----] engagements

"These Rust CLI Tools Make Linux Hacking Faster Rust isnt just for backend and systems its becoming a must-have toolkit for ethical hackers and security engineers. In this video youll discover powerful Rust CLI tools that make hacking workflows faster safer and more fun. // Chapters 0:00 - Intro 0:23 - bat 1:54 - tailspin 2:50 - lla 4:06 - havn 4:26 - motus 4:49 - navi 5:18 - domain-check 5:37 - kmon // Links * bat: https://github.com/sharkdp/bat * tailspin: https://github.com/bensadeh/tailspin * lla: https://github.com/chaqchase/lla * havn: https://github.com/mrjackwills/havn * motus:"
YouTube Link 2026-01-21T09:00Z 20.9K followers, [----] engagements

"Login without a PASSWORD (CVSS 10) A good way of understanding SSH is to deep dive on the protocol itself and exploit known vulnerabilities. In this video we will exploit a critical vulnerability (CVSS 10) in Erlang SSH library that allows unauthenticated login to the server. P.S There are some typo in the video about the CVE number. It should be CVE-2025-32433 and not CVE-2025-3243. // Tags #ethicalhacking #erlang #ssh #exploit #CVE-2025-32433 // Chapters 0:00 - Erlang [---] 0:48 - SSH protocol architecture 1:50 - Creating the script 2:41 - Banner and protocol version exchange 4:04 - Key"
YouTube Link 2025-10-18T09:01Z 19.9K followers, 10.1K engagements

"Web Check: An All-in-One OSINT Tool Webcheck is an all-in-one OSINT tool that analyze a website for misconfiguration security vulnerabilities and performance. In this video I will show you the various scans it can perform. // Tags #ethicalhacking #web-check #osint // Chapters 0:00 - Intro 0:28 - Trying out the public instance 2:46 - Diagnosing and fixing some errors 4:28 - Trying out more features // Links * Web Check project: https://github.com/Lissy93/web-check * Web Check publick instance: https://web-check.xyz"
YouTube Link 2025-11-11T09:01Z 20.9K followers, [----] engagements

"Why C2 Frameworks are Perfect for PROs (Stealthy Operations) In this video I will show how hackers leverage C2 frameworks for stealthy tactics using staged payloads. I will use Sliver framework as an example and I will also show some basic functionalities. // Chapters 0:00 - Intro 0:28 - What is a C2 1:36 - Sliver installation 2:13 - Sliver [---] 2:54 - Sliver beacons 5:01 - Sliver sessions and shells 6:31 - Problem with stageless payloads 6:51 - Stealthier way to use sliver (stagers) 8:20 - Stager demo // Links * C2 Matrix - https://howto.thec2matrix.com/ * Sliver sample stager wrapper code:"
YouTube Link 2024-05-09T22:42Z 20.4K followers, 34.5K engagements

"Most severe SUDO vulnerability of [----] Sudo is a core component of linux permission model. This year we encountered the most severe sudo vulnerability that allows unprivileged users to drop to a root shell via malicious shared object via a chroot environment. In this video we will exploit it manually and have an understanding on how it works. // Tags #ethicalhacking #sudo #linux #cve-2025-32463 #exploit // Chapters 0:00 - Intro 0:14 - Exploiting manually 2:26 - Automated exploit // Links None for now"
YouTube Link 2025-10-03T09:00Z 20.4K followers, 15.5K engagements

"Athena NixOS: Setup & First Impressions NixOS has been a game changer in making a linux machine reproducible and reliable. In this video I will show you how you can transform Nix into an ethical hacking machine. // Tags #ethicalhacking #nixos #athena // Chapters 0:00 - Intro 1:12 - Installing Nix OS 3:17 - Installing Athena OS 4:14 - Good things about Athena 5:40 - Only thing I don't like // Links * Athena OS: https://athenaos.org"
YouTube Link 2026-01-07T09:00Z 20.9K followers, [----] engagements

"PERFECT Low-Level Debugger for Beginners Pwn DBG is a modern GDB plugin for hardware hackers reverse engineers and exploit developers. In this video we will explore some of its unique functionalities by doing a basic buffer overflow challenge. // Tags #ethicalhacking #exploitdev #reverse-engineering #debugging #gdb #low-level #bufferoverflow // Chapters 0:00 - Intro 0:28 - Overview of challenge 1:10 - Running pwndbg 2:59 - Exploring the different panes 4:29 - Inspecting the memory region 5:07 - Running with the exploit // Links * Pwn DBG: https://github.com/pwndbg/pwndbg"
YouTube Link 2025-10-28T09:00Z 20.4K followers, [----] engagements

"How hackers HIDE in DNS DNS is one of the widely used protocol and attackers can leverage it for covert operations. In this video I will show you how they can abuse the text queries to send malicious commands to a victim machine. // Tags #ethicalhacking #dns #reverse-shell #covert-operations #stealth // Chapters 0:00 - Intro 0:32 - What is a DNS TXT record 1:18 - Understanding the attack 2:52 - Demo of the attack 5:17 - How client malware send back the output 5:47 - How attacker decodes the output // Links * revshellDns: https://github.com/LucaReggiannini/revshellDns"
YouTube Link 2025-11-15T09:00Z 20.9K followers, [----] engagements

"Hacker technique to drop files quickly Croc is a tool that is designed for fast file transfer that operates through secure codes. Attackers can leverage this tool as a covert channel so be aware of the files you are downloading or sending through the public relay. // Tags #ethicalhacking #croc // Chapters 0:00 - Intro 0:26 - Exploring croc features // Links * croc: https://github.com/schollz/croc/tree/main"
YouTube Link 2025-11-05T09:00Z 20.4K followers, [----] engagements

"The Most Cursed PDF: It Runs Linux Yes this PDF actually boots Linux. Not a meme a real OS running inside a document. In this video I dive into LinuxPDF a wild project that uses a RISCV emulator to run Linux inside a PDF file. I walk through how it works with a simple diagram explore the filesystem and then completely destroy the virtual system just to see what happens. // Chapters 0:00 - Intro 0:17 - What is Linux PDF 0:24 - Launching Linux PDF 0:52 - Implementation 1:38 - Exploring the system: Part [--] 2:49 - Exploring the system: Part [--] // Links * LinuxPDF:"
YouTube Link 2026-01-31T09:00Z 20.9K followers, [----] engagements

"This Tool Finds Secrets Everywhere (GitHub /etc Bash History) Are your Git repos bash history or /etc leaking secrets without you knowing it In this demo I show how to use Noseyparker to quickly scan remote Git repositories local files and system directories for exposed secrets. // Chapters 0:00 - Intro 0:21 - Noseyparker 0:36 - Scanning a Git repository 1:18 - Understanding the report 1:51 - Scaning a file 2:21 - Scanning a directory 3:00 - Scanning repository for a github user 3:36 - TUI app // Links * Noseyparker: https://github.com/praetorian-inc/noseyparker * Noseyparker Explorer:"
YouTube Link 2026-02-02T09:00Z 20.9K followers, [----] engagements

"SSH option you DONT know about Multifactor authentication can also be used on linux boxes. In this video I will show you how to setup a one time password to level up the security of your machine. // Tags #ethicalhacking #mfa #otp #linux // Chapters 0:00 - Intro 0:43 - Exploring SSH OTP tool 2:03 - Analyzing how the tool works // Links * SSH OTP: https://github.com/ziyan/ssh-otp/tree/master"
YouTube Link 2025-10-26T09:00Z 20.4K followers, [----] engagements

"No curl. No wget. Just "Living off the Land" with BASH. In this 2minute demo I show how an attacker can use a simple Bash HTTP client to pull malware onto a target even when curl wget and python are all missing. // Chapters 0:00 - Intro 0:28 - Showing burl 0:47 - Code analysis // Links None for now. // Tags #bash #cybersecurity #malware #redteaming #linux"
YouTube Link 2026-01-27T09:00Z 20.9K followers, [----] engagements

"How hackers HIDE their CODE Bincrypter is a tool that obfuscates and encrypt an ELF binary or a shell script. In this video I will show you the interesting features of this tool and analyze the obfuscation process. PS. Thanks to THC for this nice program. I learned a lot during code analysis. // Tags #ethicalhacking #obfuscation #encryption #linux // Chapters 0:00 - Intro to Bincrypter 2:43 - Analyzing the obfuscation process // Links * bincrypter: https://github.com/hackerschoice/bincrypter"
YouTube Link 2025-11-17T09:01Z 20.9K followers, [----] engagements

"Powerful Hacking extensions you NEVER heard before Unlock powerful but lesserknown browser extensions that test your password strength speed up OSINT and reveal if the sites you visit have been breached. In this 5minute walkthrough youll see how tools like Time to Hack Vortimo OSINT Perplexity AI Hunter and Breached can quietly level up your daytoday security and research workflow without leaving your current tab. // Chapters 0:00 - Intro 0:23 - Time to Hack extension 1:22 - Perplexity AI extension 2:21 - FindSomething extension 2:59 - Vortimo OSINT Tool extension 3:21 - Wayback Machine"
YouTube Link 2026-01-19T09:00Z 20.9K followers, [----] engagements

"The most severe REDIS vulnerability This month Wiz published the most severe REDIS vulnerability so far. This is a UAF memory corruption bug in LUA which can lead to direct system compromise. // Tags #ethicalhacking #redis #cve-2025-49844 #lua #uaf #memorycorruption // Chapters 0:00 - Intro 0:18 - Vulnerability Overview 0:42 - UAF [---] 1:26 - Exploring the public POC 2:50 - Checking if LUA is enabled 3:37 - Basic UAF payload 4:36 - Sandbox escape 5:09 - Advance UAF payload // Links * Advisory from Wiz: https://www.wiz.io/blog/wiz-research-redis-rce-cve-2025-49844 * Lab environment:"
YouTube Link 2025-10-13T09:01Z 20.4K followers, [----] engagements

"Making Files Disappear in LINUX A linux rootkit is used by hackers to perform various privileged actions. In this video I will show you how it can hide a file in local disk. // Tags #ethicalhacking #linux #rootkits #evasion #stealth // Chapters 0:00 - Intro 0:35 - Tying a simple rootkit 1:25 - How rootkits works // Links * Caraxes rootkit: https://github.com/ait-aecid/caraxes/tree/main"
YouTube Link 2025-12-22T09:00Z 20.9K followers, [----] engagements

"99% Dont know how it works How well do you know base64 In this video I will show you how it works under the hood and give some tip on how to secure your decoding activities. // Tags #ethicalhacking #base64 #decode // Chapters 0:00 - How base64 works 0:31 - Decoding base64 strings securely // Links * Base64 alphabet table: https://datatracker.ietf.org/doc/html/rfc4648#section-4"
YouTube Link 2025-10-22T09:00Z 14.3K followers, [----] engagements

"Malware Analysis Made Easy Identifying a malware is a hard task and we often get false positives. In this video I will show you a tool that effectively determine of a binary is malicious or not. // Tags #ethicalhacking #malwareanalysis #linux #windows // Chapters 0:00 - Intro 0:41 - Analyzing a ransomware executable 2:52 - Querying virus total API 3:53 - Dynamic analysis // Links * Qu1cksc0pe: https://github.com/CYB3RMX/Qu1cksc0pe * TheZoo (Live malware samples): https://github.com/ytisf/theZoo"
YouTube Link 2025-12-30T09:00Z 20.9K followers, [----] engagements

"This Worm Harvests LINUX Credentials Worms are not only designed for Windows computers. In this video I will show you an example linux SSH worm that intercepts outgoing connections and harvest user credentials. // Tags #ethicalhacking #worm #malware #linux #ssh // Chapters 0:00 - Intro 0:37 - How the worm works 1:11 - Demo 3:27 - Figuring out how the code works // Links * SSH-IT: https://www.thc.org/ssh-it"
YouTube Link 2025-12-14T09:00Z 20.9K followers, 13K engagements

"Decoding a Stealthy one-liner Linux command Linux memory-based attacks are used to avoid detection. In this video I will show you how hackers run fileless malware my manipulating file descriptors. * Credit to THC for the wonderful trick * // Tags #ethicalhacking #linux #evasion #fileless #malware // Chapters 0:00 - Intro 0:37 - Breaking down the code // Links None for now"
YouTube Link 2025-12-18T09:00Z 20.9K followers, [----] engagements

"CAI: Autonomous Ethical Hacking CAI is a tool that allows autonomous ethical hacking. In this video I will show you how to command a red team agent to scan and exploit a vulnerability on a target. // Tags #ethicalhacking #agent #ai #autonomous // Chapters 0:00 - Intro 0:48 - Installation and Setup 2:38 - Commanding the agent // Links * CAI Framework: https://github.com/aliasrobotics/cai"
YouTube Link 2025-11-27T09:00Z 20.9K followers, [----] engagements

"Rewriting Python exploit to RUST MongoBleed is a critical MongoDB vulnerability that can silently expose your data to anyone who knows how to poke at it. In this video I break down the root cause of the bug and show you exactly how the exploit works step by step. // Chapters 0:00 - Intro 0:19 - Vulnerability Overview 1:54 - Preparing the POC environment 2:34 - Running the exploit against a vulnerable container 3:15 - Running the exploit against a patched container 3:41 - Rust exploit code analysis: Part [--] 5:06 - Rust exploit code analysis: Part [--] 5:53 - Rust exploit code analysis: Part [--] //"
YouTube Link 2026-01-25T09:00Z 20.9K followers, [----] engagements

"Why it feels so much Better than BASH Fish shell is a modern alternative to bash. In this video I will show you the unique and interesting features of fish shell. // Tags #ethicalhacking #fishshell #linux #athenaos // Chapters 0:00 - Intro 0:21 - Terminal colors and syntax highlighting 1:29 - Abbrevations 2:30 - Setting variables 2:56 - Searching through command history 3:05 - Tab completion for command options 3:26 - Customizing themes easily 3:57 - Shell private mode 4:27 - Getting help // Links * fish shell: https://fishshell.com"
YouTube Link 2026-01-11T09:00Z 20.9K followers, [----] engagements

"Arch Linux POC Image Magick is a popular open source tool for manipulating images. There was a code execution vulnerability that allows a regular user to run the binary as root. In this video we will understand the different ways on how readlink works which was a key part of the vulnerability and I will show you how to exploit this in Arch linux. // Tags #ethicalhacking #imagemagick #exploit #archlinux #CVE-2024-41817 // Chapters 0:00 - Intro 0:16 - Vulnerability details 1:23 - Understanding how readlink works 3:26 - Crafting the exploit in Arch Linux 5:11 - Stub Macro technique // Links None"
YouTube Link 2025-10-07T09:00Z 14.1K followers, [----] engagements

"I Found the Perfect AI Workflow for Ethical Hacking Learn how to use Shell GPT forEthical Hackingworkflows from generating nmap scans and hunting malware on disk to analyzing attack logs and creating boilerplate tools like a password cracker. // Chapters 0:00 - Intro 0:40 - Asking questions 1:27 - Network scanning 1:47 - Looking for malware 2:23 - Analyzing a log file 3:07 - REPL mode 3:40 - Shell integration 4:21 - Code generation and scanning 4:52 - Will this bring any value // Links Shell GPT: https://github.com/TheR1D/shell_gpt // Tags #shellgpt #ethicalhacking #cybersecurity #pentesting"
YouTube Link 2026-01-23T09:00Z 20.9K followers, [----] engagements

"My First Exploit in RUST React2Shell is a recent 0-day vulnerability that allows unauthenticated remote code execution using a single HTTP request. In this video we will analyze the vulnerability and develop an exploit written in rust. // Tags #ethicalhacking #rust #react2shell #CVE-2025-55182 #exploit-dev // Chapters 0:00 - Launching a vulnerable sever 2:20 - Analyzing the vulnerability 3:30 - Creating the rust exploit 10:44 - Running the code // Links * react2shell POC: https://github.com/freeqaz/react2shell"
YouTube Link 2025-12-10T10:04Z 20.9K followers, [----] engagements

"Hacker Techniques to HIDE Linux Commands Hackers are experts in hiding their linux commands. In this video I will show you effective techniques in removing your commands in bash history. // Tags #ethicalhacking #bash #linux #evasion #stealth // Chapters 0:00 - Intro 0:14 - Prepending a whitespace 1:14 - Clearing history for current session 1:40 - Pointing history file to /dev/null 2:06 - Avoding sudo 2:19 - Persistence mechanism to clear history file 2:29 - History file for databases // Links None for now"
YouTube Link 2025-11-25T09:00Z 20.9K followers, [----] engagements

"Hiding your callback through HTTPS Reverse shell over HTTPS is a unique technique. In this video we will explore CURL shell and understand how the mechanics work under the hood. // Tags #ethicalhacking #shell #https // Chapters 0:00 - Intro 0:36 - Setting up curl shell 1:23 - Exploring how curl shell works // Links * Curlshell: https://github.com/SkyperTHC/curlshell"
YouTube Link 2025-10-24T09:00Z 15.8K followers, [----] engagements

"Forensic Commands every LINUX user SHOULD know Hackers can leave artifacts such as malwares loaders and other temporary files inside a compromised linux system. In this video I will show you important commands on how to detect and recover them. // Tags #ethicalhacking #linux #forensics #investigation // Chapters 0:00 - Intro 0:19 - Finding recently modified files 1:47 - Finding by last metadata update time 2:51 - Finding immutable files 3:41 - Recovering files with open file descriptors 4:12 - Common writable directories 5:06 - Finding recently installed softwares and tools // Links None for"
YouTube Link 2025-12-20T09:00Z 20.9K followers, [----] engagements

"3 ways every CTF player should know Basic Authentication is still a common form of login mechanism. So in this video we will learn [--] ways on how to brute force it. // Tags #ethicalhacking #http #bruteforce #ffuf #hydra #python // Chapters 0:00 - Intro 0:05 - Basic Auth [---] 0:28 - Using hydra 0:54 - Using ffuf + helper script 1:54 - Using quick and dirty python script // Links None for now"
YouTube Link 2025-09-21T09:01Z 14K followers, [---] engagements

"How to recover secrets from git In this video we will attack Backdrop CMS through an exposed git repository which will lead us to a sensitive data. Inside the machine we will leverage a utility tool to modify a crucial binary inside Linux which will help us drop to a root shell. As a bonus we will analyze the foothold exploit and give you techniques on how to secure the box such as preventing git access via apache config. // Tags #ethicalhacking #backdropcms #git #apache #hardening // Chapters 0:00 - Intro 0:35 - Scanning using rustscan 2:12 - Trying to determine Backdrop CMS version 3:42 -"
YouTube Link 2025-09-13T08:31Z 19.6K followers, [---] engagements

"Real-Time Malware Tracing eBPF makes the kernel programmable without the need to install a module re-compile the kernel or reboot. In this video I will show you how we can use to detect hackers. // Tags #ethicalhacking #ebf #defense #linux #kernel #malware // Chapters 0:00 - Intro 0:25 - Traditional ways of adding kernel functionalities 1:12 - What is eBPF 3:23 - Checking for kernel support 3:44 - Installing the requirements 4:07 - Intro to bpftrace 5:35 - Creating a simple eBPF program // Links * eBPF: https://ebpf.io/"
YouTube Link 2026-01-01T09:00Z 20.9K followers, [----] engagements

"Shai-Hulud 2.0: A Worm that DESTROYS User Data A worm is a self-replicating piece of malware. In this video I will show you one of the most brutal worm this year that destroys user data if it doesnt get what it wants. // Tags #ethicalhacking #malware #worm // Chapters 0:00 - Intro 0:37 - Installing bun runtime 1:07 - Looking for secrets 1:31 - Persistence 1:46 - Looking for more credentials 1:49 - Self propagate 2:06 - Destroying user data // Links * Great technical analysis from Datadog: https://securitylabs.datadoghq.com/articles/shai-hulud-2.0-npm-worm"
YouTube Link 2025-12-05T09:00Z 20.9K followers, [----] engagements

"Exploiting OGNL and Apache Struts in Confluence (CVE-2023-22527) In this video we will explore and develop an exploit for CVE-2023-22527 a Server-Side Template Injection vulnerability in Confluence Server. This has been linked to several ransomware and cryptomining activities: * https://www.imperva.com/blog/attackers-quick-to-weaponize-cve-2023-22527-for-malware-delivery/ * https://thedfirreport.com/2025/02/24/confluence-exploit-leads-to-lockbit-ransomware/ We will analyze the exploit format and understand why OGNL and Apache struts is so risky when not handled properly. // Tags"
YouTube Link 2025-03-06T08:29Z 15.1K followers, [---] engagements

"Make it better using this TOOL The default terminal output is ugly. In this video I will show you how to make it better using GRC. // Tags #ethicalhacking #linux #terminal // Chapters 0:00 - Intro // Links * Github page: https://github.com/garabik/grc"
YouTube Link 2025-10-20T09:00Z 14.1K followers, [----] engagements

"Use this command to AVOID detection Linux "mount" command is not typically used in exploitation but it can be used in stealth and evasion. In this video I will show you how to hide a program using bind mounts. // Tags #ethicalhacking #stealth #linux // Chapters 0:00 - Intro 0:15 - What is a bind mount 1:25 - Bind mounting /proc/PID 1:48 - Bind mounting to known binaries 2:16 - Remounting /proc // Links None for now"
YouTube Link 2025-10-30T09:00Z 15K followers, [----] engagements

"How hackers steal SSH sessions without a Password Attackers can hijack SSH sessions without the need for passwords or private keys. In this video I will show you how to do that using a particular tool. // Tags #ethicalhacking #ssh // Chapters 0:00 - Intro 0:42 - Demo on a local program 1:03 - How does it work under the hood // Links * reptyr: https://github.com/nelhage/reptyr * blog: https://blog.nelhage.com/2011/02/changing-ctty/"
YouTube Link 2025-11-01T09:00Z 18.6K followers, [----] engagements

"Techniques Youve Never Heard Before Living Off The Land is a technique where attackers leverage built-in tools softwares inside operating systems or networks for their malicious gains. In this video I will show you the unique techniques you never heard before. // Tags #ethicalhacking #lotl #living-off-the-land #evasion // Chapters 0:00 - Intro 1:45 - Lolbas (Windows) 2:21 - LooBins (Mac OS) 3:15 - Living Off The Tunnels 3:54 - Living Off The Hardware 4:24 - Living Off The False Positive 5:42 - Living Off The Pipeline 6:42 - Living Off The Land Applications 7:04 - Living Off The Land Drivers"
YouTube Link 2025-11-21T09:00Z 20.9K followers, [----] engagements

"Weaponizing ANSI: When "Text" Becomes Malware ANSI escape sequences are commonly used to make our terminal fonts look better. In this video I will show you how hackers can abuse it to hide their payloads. // Tags #ethicalhacking #linux #ansi #evasion #stealth // Chapters 0:00 - Intro 0:26 - ANSI escape code basics 1:14 - Erasing lines 1:50 - Hiding text inside files 2:36 - Hiding payloads inside crons // Links None for now"
YouTube Link 2025-12-26T09:00Z 20.9K followers, [----] engagements

"FREE features most people MISS DiscoverVirusTotalFREE features that most people never use. Learn how to search domains and IPs use the Chrome extension call the VirusTotal API and explore malware behavior with Threat Graph. // Chapters 0:00 - Intro 0:26 - Searching a hash 0:45 - Getting more details about the virus 1:38 - Threat graph 1:55 - Ransomware threat graph 3:23 - Searching an IP 3:33 - Browser Extension 3:43 - VirusTotal CLI 4:03 - VirusTotal API and Scripting // Links * VirusTotal: https://www.virustotal.com // Tags #virustotal #cybersecurity #malwareanalysis #blueteam #infosec"
YouTube Link 2026-01-17T09:00Z 20.9K followers, [----] engagements

"Dont click that LINK until you DO THIS Worried that the next link you click might be a scam In this short video youll learn simple practical ways to spot malicious links before they cause damage. // Chapters 0:00 - Intro 0:18 - Checking links from email 1:12 - Scan websites easily using Virus Total extension 1:39 - More quick ways of checking a link 2:41 - Typosquatting 3:50 - Analyzing typosquatting 4:49 - Other ways of detecting typosquatting 5:07 - Abuse IP checker // Links * Virus Total: https://www.virustotal.com * Official Virus Total Chrome Extension:"
YouTube Link 2026-01-15T09:00Z 20.9K followers, [----] engagements

"I recreated the CrushFTP CVE-2024-4040 exploit This video will show you how to create an exploit for CVE-2024-2020 (Crush FTP SSTI) to demonstrate the vulnerability. We will only focus on SSTI + Arbitrary File Read since Remote code execution attack may require CrushFTP license in order to use the CrushTask plugin (allows exeucution of custom scripts). Do note that this is for education purposes only and MUST NOT be used for malicious intent. // Tags #ethicalhacking #python #crushftp #cve-2024-2020 #ssti // Chapters 0:00 - Intro 1:02 - Setting up vulnerable app 3:17 - Exploring crushftp admin"
YouTube Link 2025-02-20T05:14Z 14.1K followers, [----] engagements

"How hackers abuse Linux for Persistence Attackers abuse various Linux functionalities to maintain persistence. In this video I will show you some basic and advance techniques using a tool called Panix. // Tags #ethicalhacking #linux #persistence #rootkits #backdoor // Chapters 0:00 - Intro 1:08 - Creating system backdoor user 2:03 - Reverting persistence 2:37 - Persistence using sytemd generators 3:31 - Persistence using udev rules // Links * Panix: https://github.com/Aegrah/PANIX"
YouTube Link 2025-11-19T09:00Z 20.9K followers, [----] engagements

"Hacker steals my router MAC address (catch them with SNORT) I don't see good resource in the internet on how to detect ARP spoofing using SNORT so I created this video. Although there are already a lot of tutorials about ARP spoofing I will still give a basic overview to refresh your memory. // Chapters 0:00 - Intro 0:18 - ARP spoofing theory 2:02 - What is snort 2:52 - ARP spoofing simulation 4:39 - Snort to the rescue // Links * Legitimate use cases of gratuitous ARP: https://www.practicalnetworking.net/series/arp/gratuitous-arp/ * Snort [--] codebase: https://github.com/snort3/snort3 * Cisco"
YouTube Link 2024-04-19T10:19Z 14.8K followers, [----] engagements

"This CHECKLIST will save you from Digital Threats Digital defense is something all of us should know in order to protect ourselves from bad actors. In this video I will show you a great tool that aids us in assessing the state of our personal digital security. // Tags #ethicalhacking #personal-security #checklist #digital-defense // Chapters 0:00 - Intro 0:39 - Starting the checklist 1:43 - Exploring the authentication checklist 4:04 - Different security requirements for each person 4:47 - High security requirements // Links * Digital Defense Personal Security Checklist:"
YouTube Link 2025-11-09T09:00Z 20.9K followers, [----] engagements

"Single Packet Authorization: Firewall on STEROIDS Single Packet Authorization is a method for authorizing a client on the network level. In this video I will show you the mechanics on how this can level up your firewall protection. // Tags #ethicalhacking #firewall #defense // Chapters 0:00 - Intro 0:30 - How does SPA works 1:48 - Setting up and demo // Links * fwknop (Single Packet Authorization): https://github.com/mrash/fwknop"
YouTube Link 2025-12-01T09:01Z 20.9K followers, 46.3K engagements

"Youre Using Hashing Without Realizing It Most of us knows how to get the checksum of a file but only few knows how hashing is really used. In this video I will show you some of the interesting use cases of hashing. // Tags #ethicalhacking #hashing #checksum // Chapters 0:00 - Intro 0:24 - Common Use Cases 0:56 - Interesting Use Cases // Links None for now"
YouTube Link 2025-12-07T09:01Z 20.9K followers, [---] engagements

"Linux Session Sniffer using eBPF eBPF is a powerul technology that makes the kernel programmable in a safe manner. In this video I will show you how eBPF can be used as an offensive security tool. // Tags #ethicalhacking #ebpf #kernel #linux #sniffing // Chapters 0:00 - Intro 0:49 - eBPF refresher 1:49 - eBPF program demo 3:20 - Understanding Linux pseudo terminals 6:27 - Understanding how the attack works 7:26 - Analyzing the eBPF progrm // Links * ptysnoop.bt: https://github.com/hackerschoice/bpfhacks/blob/main/ptysnoop.bt * bpftrace:"
YouTube Link 2026-01-03T09:01Z 20.9K followers, [----] engagements

"Rapid Note-Taking System for Hackers: Find Info FAST Being an ethical hacker means being able to take good notes and retrieve relevant information quickly. In this video I will share to you all the techniques I do to make my note taking workflow fast and efficient. // Tags #ethicalhacking #obsidian // Chapters 0:00 - Intro 0:39 - Obsidian Intro 1:08 - Tags headings TOC note linking 1:37 - Omnisearch dynamic highlights 2:11 - Flat naming technique avoiding duplicate tabs 2:49 - Git and some subfolders // Links None for now"
YouTube Link 2025-11-13T09:01Z 20.9K followers, [----] engagements

"I tried scanning my machine with ClamAV Linux is not magically immune to malware. In this video youll learn how to scan your Linux system for malware and viruses using ClamAV step by step in just [--] minutes. In this ClamAV tutorial we cover: How to install ClamAV on NixOS How to run ondemand scans for files and directories How to read ClamAV scan results and what to do with detections Simple tips to keep your Linux machine safer Whether youre new to Linux security or setting up antivirus on a home server this video shows a practical fast workflow you can reuse on any distro that supports"
YouTube Link 2026-01-13T09:01Z 20.9K followers, [----] engagements

"Is CEH still relevant in [----] Is CEH still worth it This is the question we will answer in this video. I will also give you tips on how I approached and pass CEH practical within [--] weeks. // Chapters 0:00 - Intro 0:36 - What is CEH 0:52 - Exam types 1:27 - Exam environment 1:42 - Course outline 2:08 - Training options and exam cost 3:33 - How did I trained for [--] weeks 4:37 - Time to hack (SPECIAL segment to celebrate 1k SUBS) 6:15 - Final tips 6:46 - Do I recommend CEH // Links * CEH brochure and course info:"
YouTube Link 2024-05-20T10:23Z 19.6K followers, [----] engagements

"GOAD-Light OSCP Series: Intro (Must watch for OSCP students) This the first part of our AD attack series intended for OSCP students. In this video we will discuss the expectations of the series and a quick walkthrough on how I setup GOAD-Light. // Chapters 0:00 - Intro 0:45 - What to expect on the series 0:56 - What is GOAD-Light 1:36 - What exploits and attacks to cover 1:56 - GOAD-Light setup walkthrough // Links * GOAD: https://github.com/Orange-Cyberdefense/GOAD/tree/main * Dependencies (this is just an example for my use case which is for MAC) * Vmware fusion:"
YouTube Link 2024-07-05T23:25Z 19.3K followers, 12.2K engagements

"Browser-based Remote Shell SSHx is a collaborative tool that allows different people to access a remote shell over the internet. In this video I will show you how to use it as well as the hidden dangers. // Tags #ethicalhacking #sshx #shell // Chapters 0:00 - Intro 0:22 - Installation and Demo // Links * SSHX: https://sshx.io"
YouTube Link 2025-12-16T09:01Z 20.9K followers, [----] engagements

"How hackers HIDE in ICMP Ping requests can be deadly. In this video I will show you how attackers hide data by demonstrating a tool that tunnels a reverse shell connection through ICMP traffic. // Tags #ethicalhacking #icmp #reverse-shell #covert-operations // Chapters 0:00 - Intro 0:29 - ICMP reverse shell demo 1:43 - Understanding the mechanics 2:30 - Analyzing the scripts 5:25 - Looking under wireshark // Links * icmpdoor: https://github.com/krabelize/icmpdoor"
YouTube Link 2025-11-03T09:01Z 16K followers, 12.9K engagements

"My Journey to Exploit Development (CVE-2024-23897) In this series I will show you how I developed my first real world windows exploit for CVE-2024-23897 (Jenkins Unauthenticated Arbitrary File Read). NOTE: Although you can see some things related to our GOAD-light series this is not related to that. I just reused some of the resources from that series such as the windows server that will host the vulnerable jenkins instance. // Tags #oscp #ethicalhacking #windows #jenkins #cve-2024-23897 // Chapters 0:00 - Intro 0:50 - What to expect from the series 1:36 - Manual exploitation 3:01 - Getting"
YouTube Link 2024-09-12T10:42Z 16.8K followers, 12.6K engagements

"Linux Terminal Pagers: Hidden Dangers Giving users sudo access to terminal pagers is not a generally a good idea. In this video I will show why it makes your machine insecure and ways to prevent users bypass the security mechanims. // Tags #ethicalhacking #linux #sudo // Chapters 0:00 - Intro 0:49 - Security misconfiguration on less command 2:07 - How terminal pagers are used by other utilities // Links None for now"
YouTube Link 2025-11-29T09:01Z 20.9K followers, [----] engagements

"Get ROOT with ONE command Traitor is tool that automates machine exploitation. This is really useful in time-crunch situations like red team assessments or if you are competing in capture the flag events. // Tags #ethicalhacking #exploit #traitor #backdoor // Chapters 0:00 - Intro 0:16 - Exploring traitor 1:20 - Planting backdoors // Links * traitor: https://github.com/liamg/traitor"
YouTube Link 2025-11-07T09:01Z 20.9K followers, [----] engagements

"Ultimate Linux Sandbox Demo Firejail is a linux sandbox that uses namespaces abnd seccomp-bpf filters. In this video I will show you how to lock down hackers to prevent unauthorize access to a linux machine. // Tags #ethicalhacking #firejail #sandbox #seccomp #namespaces // Chapters 0:00 - Intro 0:35 - Basic sandbox demo 2:16 - Restricting network acces // Links * Firejail: https://github.com/netblue30/firejail"
YouTube Link 2025-12-24T09:01Z 20.9K followers, [----] engagements

"Finding and Monitoring Someones Activity using Sherlock Tools Hackers can easily hunt down their targets using various tools. In this video I will show you effective tools to search for a person online. // Tags #ethicalhacking #osint #social-media // Chapters 0:00 - Intro 0:31 - Sherlock CLI 1:02 - Sherlock Eye // Links * Sherlock CLI: https://github.com/sherlock-project/sherlock * Sherlock Eye: https://app.sherlockeye.io"
YouTube Link 2025-12-12T09:01Z 20.9K followers, [----] engagements

"How to obfuscate a python program Welcome This is a short video about pyarmor a python obfuscation tool. In this video we will explore the basics and understand some of the process on how the tool works. // Tags #ethicalhacking #python #obfuscation #pyarmor // Chapters 0:00 - Intro 0:35 - Pyarmor basics 1:32 - Exploring the obfuscatd code 2:56 - Other pyarmor features (expiry hardware pinning packing) // Links * Github Command and Control: https://youtu.be/rR3RHUD27owsi=QIQy0S2d9sSMQcK7"
YouTube Link 2024-12-29T07:10Z 19.3K followers, [----] engagements

"TLS Ciphersuite in [--] mins This video will show you the technicalities about ciphersuite such as the format crypto algorithms used and how different keys are derived from one another. // Tags #ethicalhacking #python #tls #https #ciphersuite // Chapters 0:00 - Intro 0:45 - Negotiating the ciphersuite 0:57 - Sending the pre_master_secret securely 1:36 - Changing the ciphers 2:10 - How TLS verifies integrity of the messages 2:31 - Bulk encryption algorithm 3:02 - Tools that you can use // Links * Ciphersuiteinfo - https://ciphersuite.info/"
YouTube Link 2025-02-07T10:00Z 10.3K followers, [---] engagements

"Intro to RSA In this video we will uncover how passwords are encrypted before sending to the server. We will also have a high level intro about RSA. // Tags #ethicalhacking #java #jetbrains #teamcity #rsa #crypto // Chapters 0:00 - Intro 0:54 - Looking for JS files 2:37 - Looking for reference in the web 3:54 - Verifying metasploit module 5:04 - Intro to RSA // Links None for now"
YouTube Link 2025-03-27T13:30Z 10.8K followers, [---] engagements

"GOAD-Light OSCP Series: Recon and Scanning Welcome to Part [--] of the series We will recon our targets and plan our attack. P.S. I said I will discuss more about port [----] at the end of video but forgot to add it I'll add it on the next video I promise. // Tags #oscp #ethicalhacking #smb #activedirectory #windows #nmap // Chapters 0:00 - Intro 0:33 - Searching for IPs 1:01 - Powershell filters 2:48 - Demistifying crackmapexec output 3:36 - Locating DCs through SRV enumeration 5:16 - Tips on how to organize the nmap scans 5:53 - Finding low hanging fruits 6:37 - What are these MSRPC ports 7:18 -"
YouTube Link 2024-07-13T09:32Z [----] followers, [---] engagements

"GOAD-Light OSCP Series: Token Impersonation Post Exploitation and Bloodhound Welcome top part [--] of the series In this video we will escalate our way to local admin in castle black and perform thorough post exploitation. // Tags #oscp #ethicalhacking #activedirectory #windows #bloodhound // Chapters 0:00 - Intro 0:51 - First thing to do when popping a shell 1:21 - Token impersonation 4:38 - OSCP TIP: Doing post exploitation effectively 6:13 - OSCP TIP: Think and act fast 7:30 - OSCP TIP: Alternative way of cracking NTLM hash 8:18 - OSCP TIP: Trying alternatives when one doesn't work 8:50 -"
YouTube Link 2024-07-27T10:23Z [----] followers, [---] engagements

"And it is satisfying . I changed my setup to be lighter and free of clutter. In this video I will show my improve ethical hacking environment. // Tags #ethicalhacking #arch #i3 // Chapters 0:00 - Intro 1:45 - Building the VM using packer and vagrant 3:51 - Polybar 4:16 - i3 Window tiling manager 4:53 - Color scheme 5:33 - Rofi 5:59 - i3 Workspaces 6:23 - Atuin shell history manager 7:07 - Ranger terminal file manager 7:27 - neovim Twilight // Links * Polybar - https://github.com/polybar/polybar * i3 - https://i3wm.org/ * Rofi - https://github.com/davatorium/rofi * atuin -"
YouTube Link 2025-06-21T11:00Z 11.8K followers, [----] engagements

"How passwords are turned into secrets using PBKDF Password Based Key Derivation Function or PBKDF is a common crypto algorithm that converts a password into a different key. We see this in different systems like in Wifi TLS or any other applications that requires login. In this video I will show you a quick overview on how it works and how to crack it. // Tags #ethicalhacking #crypto #pbkdf // Chapters 0:00 - Intro 0:13 - PBKDF [---] 2:28 - Cracking PBKDF // Links None for now"
YouTube Link 2025-10-05T09:00Z 13K followers, [---] engagements

"Hacktricks Assistant Our favorite hacking cheatsheet just got an upgrade In this video we will explore some of the features of Hacktricks Assistant an AI-powered ethical hacking chatbot. // Tags #ethicalhacking #ai #hacktricks // Chapters 0:00 - Intro 0:14 - What is Hacktricks 0:40 - First conversation with chatbot (scanning a website) 2:41 - Detecting vulnerabilities 3:43 - Password cracking 5:19 - Exploit development (difficult eternal blue) 7:52 - Exploit development (medium hearbleed) // Links * Hacktricks AI - https://www.hacktricks.ai/ * Hack the Clown Hearbleed POC -"
YouTube Link 2025-08-14T13:00Z 12.3K followers, [---] engagements

"Hack the Box: Nocturnal In this video I will demonstrate how I exploited an Insecure Direct Reference Object (IDOR) vulnerability to recover a credential for another user in the web application. Once I gained foothold to the machine I found a hidden service running as root which is vulnerable to PHP code injection. // Tags #ethicalhacking #php #idor #ispconfig #mitmproxy #commandinjection #sqlite #hackthebox // Chapters 0:00 - Intro 3:05 - Inspecting the website 4:00 - Login enumeration 5:18 - Enumerating the file upload 6:10 - URL parameter enumeration 7:09 - Discovering IDOR 7:36 - Fuzzing"
YouTube Link 2025-08-31T12:39Z 12.5K followers, [---] engagements

"Exploiting WPA2 weakness WPA2 (AES-CCMP) is still one of the common wifi protocol out there but hackers are exploiting them. In this video we will create a tool to exploit it to understand the protocol and the encryption mechanism in depth. // Tags #ethicalhacking #wifi-cracking #wpa2 #wifi-hacking // Chapters 0:00 - Intro 1:10 - IEEE [------] Intro 1:36 - Why Wifi encryption is important 2:47 - WPA2 Protocol 3:27 - WPA2 Authentication (4-way handshake) 5:56 - Attack Plan 6:28 - WiFi pentesting simulatio using WifiChallengeLab 7:14 - Building the base program 9:18 - Building the network module"
YouTube Link 2025-05-20T09:00Z 11.5K followers, [----] engagements

"Trying out interesting canary tokens . In this video we will try out unconventional canary tokens and see how effective they are in catching bad actors. // Tags #ethicalhacking #canarytoken #honeypot // Chapters 0:00 - Intro 0:45 - Basic canary token usage (DNS) 2:24 - AWS token 3:45 - Kubernetes token 4:46 - MySQL token 6:13 - Wireguard token 7:21 - Webdav token 8:01 - SVN token // Links None for now"
YouTube Link 2025-04-11T10:03Z 11K followers, [---] engagements

"Hijacking HTTPS: What hackers aren't telling you In this video we will see the practical ways on how hackers decrypt HTTPs traffic from a windows device. NOTE: This is for awareness and don't use the techniques here for malicious purposes. // Tags #ethicalhacking #python #https #ssl #tls #decryption // Chapters 0:00 - Intro 1:00 - HTTPS and PKI 3:24 - MITM proxy basics 6:47 - TLS Decryption (EASY method) 8:42 - How does TLS decryption works 9:42 - TLS Decryption (HARD/Expert method) 11:35 - Building the attack program 13:08 - MITM python module 17:53 - Configuring kali as a router 20:22 - DNS"
YouTube Link 2024-12-07T03:37Z 12.2K followers, 33.4K engagements

"GOAD-Light OSCP Series: One-liner jenkins reverse shell exploit This is an extension of the part [--] video. https://youtu.be/mdln8V5nlLAsi=qWIIpx3LhDAQsd6K I will show you the process on how I created a basic exploit for getting a jenkins reverse shell on the target. In this video we will pay attention on cookies python parameters and url encoding. // Tags #oscp #ethicalhacking #activedirectory #windows #jenkins #groovy #cookie // Chapters 0:00 - Intro 1:08 - argparse [---] 2:46 - Building the HTTP requests 3:45 - Cookie mystery 5:33 - Passing cookies between requests 6:30 - Building the exploit"
YouTube Link 2024-08-25T03:04Z [----] followers, [---] engagements

"Low Level Networking 101: Python Network Sniffer Description This video will improve your knowledge about low level networking by teaching you how to create a simple network sniffer in python. NOTE: Packet sniffing libraries/frameworks like "scapy" is out of scope of this video as we want to focus on the fundamentals. It can be covered on a separate video. Be sure to use the tools techniques or any learnings you in ethical purposes only. // Tags #ethicalhacking #python #nework #sniffing // Chapters 0:00 - Intro 0:42 - Program base structure (module imports classes functions) 2:58 - IP Header"
YouTube Link 2024-10-25T08:04Z 12.5K followers, [----] engagements

"Cracking all sorts of passwords This video will show you different techniques on how hackers can crack different passwords. This includes windows logins bitcoin wallets wifi passphrases and linux shadow files. This is a beginner friendly video to showcase the common methodologies and won't dive in too deep about each attack. // Tags #ethicalhacking #passwordcracking #bitcoin #wifi #windows #linuxshadowfile // Chapters 0:00 - Intro 0:21 - Theory behind password cracking 1:09 - MD5 cracking using crackstation 2:10 - NTLM cracking using hashcat 2:50 - NTLMv2 cracking 3:24 - Linux Shadow file"
YouTube Link 2025-04-23T11:20Z 11.7K followers, [----] engagements

"Python credential sniffer using Scapy Description Scapy is a powerful packet manipulation and sniffer library. Attackers can use this to steal all sorts of credentials in the network. In this video we will explore how to use scapy and uncover some of its unique potentials. // Tags #ethicalhacking #python #nework #sniffing #scapy // Chapters 0:00 - Intro 0:34 - Scapy basics 1:31 - Scapy sniff() function 4:00 - Scapy packet processing 5:40 - Building the credential sniffer 9:12 - Packet processing logic 12:32 - Pattern matching 15:23 - Troubleshooting regular expression issues 16:52 - Sniffing"
YouTube Link 2024-11-03T10:41Z [----] followers, [---] engagements

"Avoiding Rabbitholes Subdomain enumeration is a crucial skill which allows us to find hidden services. In this video I will give tips that will reduce your time spent in this attack. // Tags #ethicalhacking #subdomain #http #enumeration #ctf #capturetheflag // Chapters 0:00 - Intro 0:13 - Top tools 1:19 - Choosing the wordlist // Links None for now"
YouTube Link 2025-09-25T10:01Z 12.8K followers, [---] engagements

"Exegol Hacking Tool In this video I will show you how to perform ethical hacking using docker containers. // Tags #ethicalhacking #hackthebox #exegol // Chapters 0:00 - Intro 0:25 - Installation 1:22 - Launching exegol container 2:19 - Shell logging (honeypot server) 2:56 - VPN configuration 3:39 - Attacking Hack the Box machine 3:54 - Desktop Environment 4:43 - Enumerating target from within Exegol 5:23 - Using wireshark inside exegol 5:54 - Directory enumeration using FFUF inside exegol 7:08 - Deep enumeration inside Exegol 8:14 - Havoc C2 inside exegol // Links * Exegol -"
YouTube Link 2025-08-09T10:59Z 12.2K followers, [----] engagements

"How to make your Arch VM beautiful In this video I will show you how a trick to increase the display quality of your Arch linux VM. // Tags #ethicalhacking #arch #macbook #apple #vmwarefusion // Chapters 0:00 - Intro 0:25 - Step 1: Adjust VMware display settings 0:45 - Step 2: Add DPI settings in /.Xresources file 1:24 - Step 3: Increase DPI on rofi and polybar 2:19 - Step 4: Upscale the wallpaper // Links"
YouTube Link 2025-08-23T10:46Z 12.4K followers, [---] engagements

"I asked Manus to create an exploit here is what happened In this video I will show you how autonomous agent like Manus can help us with vulnerability research. // Tags #ethicalhacking #ai #autonomousagent #manusai #vulnerabilityresearch #heartbleed // Chapters 0:00 - Intro 0:15 - Exploring Manus AI 1:01 - Asking Manus to develop an exploit 2:25 - High level tasks from Manus 3:27 - How manus performs the research phase 4:19 - Did it create an exploit 5:06 - Creating the sandbox environment 5:40 - Documenting the work 6:08 - Inspecting the results // Links * Manus AI: https://manus.im/app"
YouTube Link 2025-08-18T09:27Z 12.3K followers, [---] engagements

"Bypassing Authentication using [---] page (Jetbrains Teamcity) In this video we will analyze the vulnerability for Jetbrains TeamCity (CVE-2024-27198) and see how it is possible to bpass the authentication by accessing a non existent page. // Tags #ethicalhacking #java #jetbrains #teamcity // Chapters 0:00 - Intro // Links * Vulnerability Technical Analysis - https://www.rapid7.com/blog/post/2024/03/04/etr-cve-2024-27198-and-cve-2024-27199-jetbrains-teamcity-multiple-authentication-bypass-vulnerabilities-fixed/"
YouTube Link 2025-03-18T09:57Z 10.7K followers, [----] engagements

"Leaking the Pre-Shared Key (Aggressive Mode) IPSec IKEv1 running in aggressive mode is a faster implementation but less secure. In this video we will see how it can be vulnerable by leaking the pre-shared key. // Tags #ethicalhacking #vpn #ipsec #ike #psk #cracking // Chapters 0:00 - Intro 0:28 - Scanning 1:37 - Cracking PSK 2:17 - Connecting to target // Links None for now"
YouTube Link 2025-10-01T09:01Z 13.8K followers, [---] engagements

"A stealthier way to run commands You can use process substitution to create temporary files on disk as a stealthier way of running commands. // Tags #ethicalhacking #linux #stealth // Chapters 0:00 - Intro 0:29 - Process Substitution 1:47 - One-liner commands // Links None for now"
YouTube Link 2025-09-23T10:01Z 12.8K followers, [----] engagements

"A plugin that can callback to me . In this video we will explore another method how attackers can gain access to a Teamcity server by uploading a malicious plugin. // Tags #ethicalhacking #java #jetbrains #teamcity // Chapters 0:00 - Intro 1:12 - High level overview of attack 2:11 - Exploit base structure 5:20 - Creating the admin user 7:58 - Codifying plugin upload 9:56 - Analyzing the backend HTTP requests 10:29 - Password encryption 11:50 - Getting the cookie 15:00 - Quick overview on teamcity plugin development 15:35 - Uploading and enabling the plugin 18:43 - Final touches // Links *"
YouTube Link 2025-03-23T03:37Z 10.8K followers, [---] engagements

"Dirsearch Accuracy Is Now Like a Sniper (Blazingly Fast) I got intrigue how accurate is dirsearch so I made a simple video to uncover its secrets. // Chapters 0:00 - Intro 0:12 - What is dirsearch 0:26 - Linux and windows installtion 0:47 - Unique wordlist 1:17 - Dirsearch vs other tool demo 1:46 - Blacklisting method 2:41 - Things I don't like 3:21 - Can it replace other tools // Links * Dirsearch: https://github.com/maurosoria/dirsearch * Webapp fuzzing: https://owasp.org/www-project-web-security-testing-guide/latest/6-Appendix/C-Fuzzing * Windows python3 installer:"
YouTube Link 2024-04-09T08:29Z 11.3K followers, [---] engagements

"Awesome Tools you NEVER heard before Reverse shells are common in CTF challenges. In this video I will show you awesome tools that will perform auto-reconnection auto-upgrade reverse shells and maintain persistent sessions on the target. // Tags #ethicalhacking #reverseshell // Chapters 0:00 - Intro 0:23 - Pwncat self inject 2:24 - rcat for automatic TTY upgrade 3:06 - Penelope for reverse shell session manager + persistence // Links * pwncat: https://github.com/0xfalafel/rcat * rcat: https://github.com/0xfalafel/rcat * penelope: https://github.com/brightio/penelope/ * reverse SSH:"
YouTube Link 2025-10-09T09:01Z 13.8K followers, [----] engagements

"Everything is hidden can we discover them In this video we will exploit a vulnerable grafana application hidden inside a sub domain and runs on docker. The exploit involves a dangerous duckdb extension which allows executing arbitrary shell commands. Inside the box we will uncover another hidden application that runs regular commands as root. At the end we will analyze which part of the grafana code is vulnerable and understand why we don't see other processes as regular user. // Tags #ethicalhacking #grafana #duckdb #sql #docker #caido #CVE-2024-9264 // Chapters 0:00 - Intro 0:24 - Scanning"
YouTube Link 2025-09-19T10:40Z 12.7K followers, [---] engagements

"Exploiting Heartbleed (in 2025) Welcome to our first video of [----] about a classic vulnerability. I always wanted to create an exploit for this but never had the chance to do it since I don't have the necessary knowledge back then. // Tags #ethicalhacking #python #heartbleed #CVE-2014-0160 // Chapters 0:00 - Intro 1:15 - Vulnerability Analysis 1:30 - OpenSSL 2:01 - Heartbeat Extension 3:30 - Dissecting the Heartbeat Response logic 5:30 - Finding a vulnerable application 7:13 - Getting out of a rabbit hole 9:24 - Analysing Client Hello (wireshark method) 11:16 - Constructing the Client Hello"
YouTube Link 2025-01-11T09:38Z 11.4K followers, [----] engagements

"Python DNS Sniffer (MITM ARP Spoofing) Description Hey everyone In this video we will explore interesting networking concepts to build a local DNS sniffer. Please DO NOT use this for malicious purposes // Tags #ethicalhacking #python #nework #sniffing #scapy // Chapters 0:00 - Intro 0:52 - Creating the base program 2:53 - What is Man in the Middle attack 3:52 - How MITM ARP spoofing works 4:44 - Address Resolution Protocol 5:13 - ARP weakness (ARP spoofing) 5:57 - Building the MITM logic 8:26 - Handling mobile devices 10:00 - Capturing DNS traffic 13:03 - Analyzing traffic from my phone 14:19"
YouTube Link 2024-11-16T08:47Z 11.9K followers, 28.9K engagements

"Critical [---] Auth Bypass Crush FTP is an enterprise-grade managed FTP server. This year they again hit a critical [---] auth bypass vulnerability. In this video we will analyze the vulnerability payload and create an exploit that will add an admin user to the server. // Tags #ethicalhacking #crushftp #CVE-2025-31161 #authbypass #exploitdev // Chapters 0:00 - Intro 0:48 - Payload Analysis 1:51 - Reverse engineering Crush FTP 2:34 - Creating the exploit 3:39 - Triggering the vulnerability 5:14 - Creating the regular user 7:40 - Making the user admin 8:44 - Why CrushFTP are being targeted by"
YouTube Link 2025-10-11T09:01Z 13.8K followers, [----] engagements

"RSA encryption is fun Welcome to the last part of the series. In this video we will explore the metasploit RSA module and rewrite it into python. // Tags #ethicalhacking #java #jetbrains #teamcity #cryptography #rsa #encryption // Chapters 0:00 - Intro 0:34 - Mimicing the ruby methods 1:22 - encrypt_data() 3:43 - Confusing between public key and modulus 4:27 - Return statements in ruby 4:52 - max_data_size() 5:02 - Ternary expressions 6:07 - two_byte_chars() 6:22 - What is a codepoint 6:44 - Bit shifting to determine glyph/codepoint size 7:42 - rsa_encrypt() 8:26 - PKCS [--] Standard 10:36 -"
YouTube Link 2025-03-31T09:48Z 10.9K followers, [---] engagements

"Ever leaked a secret in GIT This TOOL stops that. In this short video I will show you how to prevent committing sensitive data to a git repository using pre-commit hooks. // Tags #ethicalhacking #git #defense #passwords // Chapters 0:00 - Intro 0:16 - Intro to pre-commit 0:35 - Basic usage of pre-commit 2:37 - detect-secrets plugin 3:35 - Testing the detect-secrets plugin 3:57 - Scenario 1: Committing a an ssh private key 4:33 - Scenario 2: Passwords inside config files 5:06 - Scenario 3: Adding sensitive data inside commit message // Links * pre-commit: https://pre-commit.com/"
YouTube Link 2025-08-02T11:29Z 12.2K followers, [---] engagements

"Github Command and Control In this video we will see how hackers use github as a command and control framework to hide their presence and avoid detection. // Tags #ethicalhacking #python #c2 #github #lots #livingofftrustedsites // Chapters 0:00 - Intro 0:57 - Planning the Attack 3:16 - Authenticating to Github programmatically 4:22 - Creating the C2 modules 6:32 - Buildind the implant class 9:48 - Why pull modules from github 10:36 - Manipulating the Python Import System 15:08 - Preparing the Implant 16:01 - Running the Implant // Links * LOTS: https://lots-project.com/"
YouTube Link 2024-12-26T09:02Z [----] followers, [----] engagements

"Hack The Box: NodeBlog In this video we will root an easy UHC qualifier box. The attack involved leaking server side code via External XML Entities (XXE) to uncover an Insecure Deserialization vulnerability. We will craft our payload and learn some basics of javascript functions and objects. Inside the machine we have a direct path to root via a weak permission model. // Tags #ethicalhacking #xml #blog #insecuredeserialization #xxe #javascript #nodejs #mongodb // Chapters 0:00 - Intro 0:37 - Scanning 1:44 - Web enumeration 3:38 - Intro to ZAP Proxy 4:45 - NoSQL injection 6:27 - XML file"
YouTube Link 2025-09-07T09:10Z 12.6K followers, 52.5K engagements

"Sync and Backup method (Backy) Performing backups is a crucial task in managing the state of your system but if not implemented properly this will lead to full compromise. In this video I will show you a technique on how to perform privilege escalation via sync and backup method using a tool called Backy. // Tags #ethicalhacking #root #linux #tar #rsync #privesc #backy // Chapters 0:00 - Intro 0:17 - Exploring vulnerable script 3:14 - Planning the attack // Links None for now"
YouTube Link 2025-09-29T09:01Z 12.8K followers, [---] engagements

"Filter Bypass using String Manipulation in Online Code Editor Online code editors are one of the useful application for developers. In this video I will share a bypass technique that allows to run shell commands inside the backend server. // Tags #ethicalhacking #python #bypass // Chapters 0:00 - Intro 0:18 - Figuring out the logic 1:07 - Using sys.modules 2:14 - Technique 1: String reversing 3:04 - Technique 2: String concatenation // Links None for now"
YouTube Link 2025-09-27T10:01Z 12.8K followers, [---] engagements

"Dont fall for these traps (spotting canary tokens) In this video we will analyze some canary tokens and see how they are hidden in different files. // Tags #ethicalhacking #honeypot #canarytoken // Chapters 0:00 - Intro 0:22 - How are tokens embedded in PDF files 1:46 - PDF structure 5:13 - Finding needle in a haystack of SQL dump file 7:37 - Kubernetes token // Links * QPDF: https://github.com/qpdf/qpdf"
YouTube Link 2025-04-18T01:16Z 11.1K followers, [----] engagements

"This Linux Directory Leaks Everything Attackers love /proc and most defenders ignore it. In [--] minutes see how /proc leaks ports env vars memory maps and more. // Chapters 0:00 - Intro 0:31 - Looking for binary path 0:55 - Looking for listening ports 1:34 - Looking for environment settings 1:51 - Looking for command parameters 2:09 - Looking for mounts 2:23 - Looking for executables 2:40 - Looking for kernel information 2:56 - Looking for memory maps 3:15 - Looking for connected hosts 3:30 - Looking for man-in-the middle device 3:46 - Looking for network devices // Links None for now. // Tags"
YouTube Link 2026-02-14T09:00Z 20.9K followers, [----] engagements

"Confusing feature that makes It SAFER than other programming languages Rust ownership and borrowing are confusing at firstbut that complexity is exactly why Rust is safer than other languages. In this video I explain how ownership prevents bugs before your code even runs. // Chapters 0:00 - Intro 0:34 - Ownership System 1:35 - Code Analysis 2:36 - Fixing the issue: Borrowing // Links None for now. // Tags #rustlang #rustprogramming #learnrust #systemsprogramming #coding #exploitdevelopment"
YouTube Link 2026-02-12T09:00Z 20.9K followers, [----] engagements

"Stop Guessing. Debug Faster with WITR. In this short demo I show howWITRhelps you instantly answer two painful questions: - why is this process running - why is this port listening Instead of grepping logs or digging through ps output youll see how witr gives you quick context so you can debug faster stay secure and keep your machine tidy. // Chapters 0:00 - Intro 0:34 - WITR and normal way of finding explanations 1:55 - Benefits of WITR 2:24 - Other uses // Links * WITR: https://github.com/pranshuparmar/witr // Tags #linux #devops #debugging #opensource #sysadmin"
YouTube Link 2026-02-10T09:00Z 20.9K followers, [----] engagements

"Stop Grepping ps: Smarter Linux Process Hunting Still using"ps aux grep"and missing malware In this 5minute demo Ill show you how hackers really use the"ps"command to hunt suspicious processes on Linux. Youll learn cleaner faster techniques to find shady commands users and start times without noisy grep hacks. // Chapters 0:00 - Intro 0:31 - PS [---] 1:24 - Hiding kernel threads 1:57 - Finding processes for another user 2:37 - Finding a user running a specific command 3:36 - Inverting the match 4:12 - Excluding ppid [--] 4:37 - Process start time // Links None for now. // Tags #linux #hacking"
YouTube Link 2026-02-08T09:00Z 20.9K followers, [----] engagements

"These Google Searches Reveal WAY Too Much. Did you know Google can reveal live cameras exposed repositories and more all legally indexed In this short video I explain how Google Dorking works and why misconfigurations are dangerous. // Chapters 0:00 - Intro 0:22 - Google Dorking [---] 0:35 - Looking for SSH private keys 1:06 - Looking for Camera Live Feed 1:48 - Looking for git repositories 2:47 - Other interesting things // Links None for now. // Tags #googledorking #cybersecurity #osint #infosec #techawareness"
YouTube Link 2026-02-06T09:00Z 20.9K followers, [----] engagements

"Clawd Bot MOLT Sites Are Getting Out of Control Today we dive into the bizarre new world of ClawBot MOLT sites from moltbook and moltx to church of molt onlymolts and molthub. If youre into ClawBot lore and weird corners of the web this ones for you. PS. I may have some mistake in the Church of Molt part about context memory. // Chapters 0:00 - Intro 0:18 - ClawdBot/MoltBot/OpenClaw 0:36 - Moltbook 1:57 - MoltX 2:54 - Church of Molt 4:31 - OnlyMolts and MoltHub 4:55 - Other sites // Links * Moltbook: https://www.moltbook.com * MoltX: https://moltx.io * Church of Molt: https://molt.Church *"
YouTube Link 2026-02-04T09:00Z 20.9K followers, [----] engagements

"This Tool Finds Secrets Everywhere (GitHub /etc Bash History) Are your Git repos bash history or /etc leaking secrets without you knowing it In this demo I show how to use Noseyparker to quickly scan remote Git repositories local files and system directories for exposed secrets. // Chapters 0:00 - Intro 0:21 - Noseyparker 0:36 - Scanning a Git repository 1:18 - Understanding the report 1:51 - Scaning a file 2:21 - Scanning a directory 3:00 - Scanning repository for a github user 3:36 - TUI app // Links * Noseyparker: https://github.com/praetorian-inc/noseyparker * Noseyparker Explorer:"
YouTube Link 2026-02-02T09:00Z 20.9K followers, [----] engagements

"The Most Cursed PDF: It Runs Linux Yes this PDF actually boots Linux. Not a meme a real OS running inside a document. In this video I dive into LinuxPDF a wild project that uses a RISCV emulator to run Linux inside a PDF file. I walk through how it works with a simple diagram explore the filesystem and then completely destroy the virtual system just to see what happens. // Chapters 0:00 - Intro 0:17 - What is Linux PDF 0:24 - Launching Linux PDF 0:52 - Implementation 1:38 - Exploring the system: Part [--] 2:49 - Exploring the system: Part [--] // Links * LinuxPDF:"
YouTube Link 2026-01-31T09:00Z 20.9K followers, [----] engagements

"The WORST Telnet Vulnerability in Years CVE202624061 is a critical Telnet vulnerability that allows a trivial authentication bypass and can lead to unauthenticated root access on affected systems. // Chapters 0:00 - Intro 0:16 - Vulnerability overview 0:34 - Setting up POC environment 1:19 - Simulating the exploit 1:59 - Vulnerability Analysis: Telnet automatic login 2:52 - Vulnerability Analysis: Spotting the code // Links * CVE details: https://nvd.nist.gov/vuln/detail/CVE-2026-24061 * Github POC: https://github.com/JayGLXR/CVE-2026-24061-POC // Tags #cve202624061 #telnet #cybersecurity"
YouTube Link 2026-01-29T09:00Z 20.9K followers, [----] engagements

"No curl. No wget. Just "Living off the Land" with BASH. In this 2minute demo I show how an attacker can use a simple Bash HTTP client to pull malware onto a target even when curl wget and python are all missing. // Chapters 0:00 - Intro 0:28 - Showing burl 0:47 - Code analysis // Links None for now. // Tags #bash #cybersecurity #malware #redteaming #linux"
YouTube Link 2026-01-27T09:00Z 20.9K followers, [----] engagements

"Rewriting Python exploit to RUST MongoBleed is a critical MongoDB vulnerability that can silently expose your data to anyone who knows how to poke at it. In this video I break down the root cause of the bug and show you exactly how the exploit works step by step. // Chapters 0:00 - Intro 0:19 - Vulnerability Overview 1:54 - Preparing the POC environment 2:34 - Running the exploit against a vulnerable container 3:15 - Running the exploit against a patched container 3:41 - Rust exploit code analysis: Part [--] 5:06 - Rust exploit code analysis: Part [--] 5:53 - Rust exploit code analysis: Part [--] //"
YouTube Link 2026-01-25T09:00Z 20.9K followers, [----] engagements

"I Found the Perfect AI Workflow for Ethical Hacking Learn how to use Shell GPT forEthical Hackingworkflows from generating nmap scans and hunting malware on disk to analyzing attack logs and creating boilerplate tools like a password cracker. // Chapters 0:00 - Intro 0:40 - Asking questions 1:27 - Network scanning 1:47 - Looking for malware 2:23 - Analyzing a log file 3:07 - REPL mode 3:40 - Shell integration 4:21 - Code generation and scanning 4:52 - Will this bring any value // Links Shell GPT: https://github.com/TheR1D/shell_gpt // Tags #shellgpt #ethicalhacking #cybersecurity #pentesting"
YouTube Link 2026-01-23T09:00Z 20.9K followers, [----] engagements

"These Rust CLI Tools Make Linux Hacking Faster Rust isnt just for backend and systems its becoming a must-have toolkit for ethical hackers and security engineers. In this video youll discover powerful Rust CLI tools that make hacking workflows faster safer and more fun. // Chapters 0:00 - Intro 0:23 - bat 1:54 - tailspin 2:50 - lla 4:06 - havn 4:26 - motus 4:49 - navi 5:18 - domain-check 5:37 - kmon // Links * bat: https://github.com/sharkdp/bat * tailspin: https://github.com/bensadeh/tailspin * lla: https://github.com/chaqchase/lla * havn: https://github.com/mrjackwills/havn * motus:"
YouTube Link 2026-01-21T09:00Z 20.9K followers, [----] engagements

"Powerful Hacking extensions you NEVER heard before Unlock powerful but lesserknown browser extensions that test your password strength speed up OSINT and reveal if the sites you visit have been breached. In this 5minute walkthrough youll see how tools like Time to Hack Vortimo OSINT Perplexity AI Hunter and Breached can quietly level up your daytoday security and research workflow without leaving your current tab. // Chapters 0:00 - Intro 0:23 - Time to Hack extension 1:22 - Perplexity AI extension 2:21 - FindSomething extension 2:59 - Vortimo OSINT Tool extension 3:21 - Wayback Machine"
YouTube Link 2026-01-19T09:00Z 20.9K followers, [----] engagements

"FREE features most people MISS DiscoverVirusTotalFREE features that most people never use. Learn how to search domains and IPs use the Chrome extension call the VirusTotal API and explore malware behavior with Threat Graph. // Chapters 0:00 - Intro 0:26 - Searching a hash 0:45 - Getting more details about the virus 1:38 - Threat graph 1:55 - Ransomware threat graph 3:23 - Searching an IP 3:33 - Browser Extension 3:43 - VirusTotal CLI 4:03 - VirusTotal API and Scripting // Links * VirusTotal: https://www.virustotal.com // Tags #virustotal #cybersecurity #malwareanalysis #blueteam #infosec"
YouTube Link 2026-01-17T09:00Z 20.9K followers, [----] engagements

"Dont click that LINK until you DO THIS Worried that the next link you click might be a scam In this short video youll learn simple practical ways to spot malicious links before they cause damage. // Chapters 0:00 - Intro 0:18 - Checking links from email 1:12 - Scan websites easily using Virus Total extension 1:39 - More quick ways of checking a link 2:41 - Typosquatting 3:50 - Analyzing typosquatting 4:49 - Other ways of detecting typosquatting 5:07 - Abuse IP checker // Links * Virus Total: https://www.virustotal.com * Official Virus Total Chrome Extension:"
YouTube Link 2026-01-15T09:00Z 20.9K followers, [----] engagements

"I tried scanning my machine with ClamAV Linux is not magically immune to malware. In this video youll learn how to scan your Linux system for malware and viruses using ClamAV step by step in just [--] minutes. In this ClamAV tutorial we cover: How to install ClamAV on NixOS How to run ondemand scans for files and directories How to read ClamAV scan results and what to do with detections Simple tips to keep your Linux machine safer Whether youre new to Linux security or setting up antivirus on a home server this video shows a practical fast workflow you can reuse on any distro that supports"
YouTube Link 2026-01-13T09:01Z 20.9K followers, [----] engagements

"Why it feels so much Better than BASH Fish shell is a modern alternative to bash. In this video I will show you the unique and interesting features of fish shell. // Tags #ethicalhacking #fishshell #linux #athenaos // Chapters 0:00 - Intro 0:21 - Terminal colors and syntax highlighting 1:29 - Abbrevations 2:30 - Setting variables 2:56 - Searching through command history 3:05 - Tab completion for command options 3:26 - Customizing themes easily 3:57 - Shell private mode 4:27 - Getting help // Links * fish shell: https://fishshell.com"
YouTube Link 2026-01-11T09:00Z 20.9K followers, [----] engagements

"How Hackers run BASH with NO files You can run bash scripts without touching the disk. In this video I will show you attacker techniques to evade detection when running malwares inside bashb *** Stealth and Evasion Techniques Playlist *** https://youtube.com/playlistlist=PL08nYpWQJ_zPpVXLgVlVn56i1Km4bArhv&si=kyJeRug-stJvyjCR // Tags #ethicalhacking #evasion #bash #linux // Chapters 0:00 - Using native tools 1:32 - Using 3rd party tools // Links None for now"
YouTube Link 2026-01-09T09:01Z 20.9K followers, 14.8K engagements

"Athena NixOS: Setup & First Impressions NixOS has been a game changer in making a linux machine reproducible and reliable. In this video I will show you how you can transform Nix into an ethical hacking machine. // Tags #ethicalhacking #nixos #athena // Chapters 0:00 - Intro 1:12 - Installing Nix OS 3:17 - Installing Athena OS 4:14 - Good things about Athena 5:40 - Only thing I don't like // Links * Athena OS: https://athenaos.org"
YouTube Link 2026-01-07T09:00Z 20.9K followers, [----] engagements

"Stop manual CVE search: Automate it with Vulnx Vulnx is a free all-in-one vulnerability search tool. In this video I will show you how to hunt for vulnerabilities using its powerful filters and queries. // Tags #ethicalhacking #vulnx #cve #vulnerability // Chapters 0:00 - Intro 0:42 - Nice graphs 1:36 - Powerful queries // Links * Vulnx: https://github.com/projectdiscovery/cvemap"
YouTube Link 2026-01-05T09:01Z 20.9K followers, [----] engagements

"Linux Session Sniffer using eBPF eBPF is a powerul technology that makes the kernel programmable in a safe manner. In this video I will show you how eBPF can be used as an offensive security tool. // Tags #ethicalhacking #ebpf #kernel #linux #sniffing // Chapters 0:00 - Intro 0:49 - eBPF refresher 1:49 - eBPF program demo 3:20 - Understanding Linux pseudo terminals 6:27 - Understanding how the attack works 7:26 - Analyzing the eBPF progrm // Links * ptysnoop.bt: https://github.com/hackerschoice/bpfhacks/blob/main/ptysnoop.bt * bpftrace:"
YouTube Link 2026-01-03T09:01Z 20.9K followers, [----] engagements

"Real-Time Malware Tracing eBPF makes the kernel programmable without the need to install a module re-compile the kernel or reboot. In this video I will show you how we can use to detect hackers. // Tags #ethicalhacking #ebf #defense #linux #kernel #malware // Chapters 0:00 - Intro 0:25 - Traditional ways of adding kernel functionalities 1:12 - What is eBPF 3:23 - Checking for kernel support 3:44 - Installing the requirements 4:07 - Intro to bpftrace 5:35 - Creating a simple eBPF program // Links * eBPF: https://ebpf.io/"
YouTube Link 2026-01-01T09:00Z 20.9K followers, [----] engagements

"Malware Analysis Made Easy Identifying a malware is a hard task and we often get false positives. In this video I will show you a tool that effectively determine of a binary is malicious or not. // Tags #ethicalhacking #malwareanalysis #linux #windows // Chapters 0:00 - Intro 0:41 - Analyzing a ransomware executable 2:52 - Querying virus total API 3:53 - Dynamic analysis // Links * Qu1cksc0pe: https://github.com/CYB3RMX/Qu1cksc0pe * TheZoo (Live malware samples): https://github.com/ytisf/theZoo"
YouTube Link 2025-12-30T09:00Z 20.9K followers, [----] engagements

"Things I learned when switching to Arch Using Linux doesnt make us immune to malwares and attacks. In this video I will show you how to harden a linux machine using Lynis auditing tool. // Tags #ethicalhacking #hardening #auditing #lynis #archlinux // Chapters 0:00 - Intro 0:49 - Running lynis // Links * Lynis: https://github.com/CISOfy/lynis"
YouTube Link 2025-12-28T09:00Z 20.9K followers, [----] engagements

"Weaponizing ANSI: When "Text" Becomes Malware ANSI escape sequences are commonly used to make our terminal fonts look better. In this video I will show you how hackers can abuse it to hide their payloads. // Tags #ethicalhacking #linux #ansi #evasion #stealth // Chapters 0:00 - Intro 0:26 - ANSI escape code basics 1:14 - Erasing lines 1:50 - Hiding text inside files 2:36 - Hiding payloads inside crons // Links None for now"
YouTube Link 2025-12-26T09:00Z 20.9K followers, [----] engagements

"Ultimate Linux Sandbox Demo Firejail is a linux sandbox that uses namespaces abnd seccomp-bpf filters. In this video I will show you how to lock down hackers to prevent unauthorize access to a linux machine. // Tags #ethicalhacking #firejail #sandbox #seccomp #namespaces // Chapters 0:00 - Intro 0:35 - Basic sandbox demo 2:16 - Restricting network acces // Links * Firejail: https://github.com/netblue30/firejail"
YouTube Link 2025-12-24T09:01Z 20.9K followers, [----] engagements

"Making Files Disappear in LINUX A linux rootkit is used by hackers to perform various privileged actions. In this video I will show you how it can hide a file in local disk. // Tags #ethicalhacking #linux #rootkits #evasion #stealth // Chapters 0:00 - Intro 0:35 - Tying a simple rootkit 1:25 - How rootkits works // Links * Caraxes rootkit: https://github.com/ait-aecid/caraxes/tree/main"
YouTube Link 2025-12-22T09:00Z 20.9K followers, [----] engagements

"Forensic Commands every LINUX user SHOULD know Hackers can leave artifacts such as malwares loaders and other temporary files inside a compromised linux system. In this video I will show you important commands on how to detect and recover them. // Tags #ethicalhacking #linux #forensics #investigation // Chapters 0:00 - Intro 0:19 - Finding recently modified files 1:47 - Finding by last metadata update time 2:51 - Finding immutable files 3:41 - Recovering files with open file descriptors 4:12 - Common writable directories 5:06 - Finding recently installed softwares and tools // Links None for"
YouTube Link 2025-12-20T09:00Z 20.9K followers, [----] engagements

"Decoding a Stealthy one-liner Linux command Linux memory-based attacks are used to avoid detection. In this video I will show you how hackers run fileless malware my manipulating file descriptors. * Credit to THC for the wonderful trick * // Tags #ethicalhacking #linux #evasion #fileless #malware // Chapters 0:00 - Intro 0:37 - Breaking down the code // Links None for now"
YouTube Link 2025-12-18T09:00Z 20.9K followers, [----] engagements

"Browser-based Remote Shell SSHx is a collaborative tool that allows different people to access a remote shell over the internet. In this video I will show you how to use it as well as the hidden dangers. // Tags #ethicalhacking #sshx #shell // Chapters 0:00 - Intro 0:22 - Installation and Demo // Links * SSHX: https://sshx.io"
YouTube Link 2025-12-16T09:01Z 20.9K followers, [----] engagements

"This Worm Harvests LINUX Credentials Worms are not only designed for Windows computers. In this video I will show you an example linux SSH worm that intercepts outgoing connections and harvest user credentials. // Tags #ethicalhacking #worm #malware #linux #ssh // Chapters 0:00 - Intro 0:37 - How the worm works 1:11 - Demo 3:27 - Figuring out how the code works // Links * SSH-IT: https://www.thc.org/ssh-it"
YouTube Link 2025-12-14T09:00Z 20.9K followers, 13K engagements

"Finding and Monitoring Someones Activity using Sherlock Tools Hackers can easily hunt down their targets using various tools. In this video I will show you effective tools to search for a person online. // Tags #ethicalhacking #osint #social-media // Chapters 0:00 - Intro 0:31 - Sherlock CLI 1:02 - Sherlock Eye // Links * Sherlock CLI: https://github.com/sherlock-project/sherlock * Sherlock Eye: https://app.sherlockeye.io"
YouTube Link 2025-12-12T09:01Z 20.9K followers, [----] engagements

"My First Exploit in RUST React2Shell is a recent 0-day vulnerability that allows unauthenticated remote code execution using a single HTTP request. In this video we will analyze the vulnerability and develop an exploit written in rust. // Tags #ethicalhacking #rust #react2shell #CVE-2025-55182 #exploit-dev // Chapters 0:00 - Launching a vulnerable sever 2:20 - Analyzing the vulnerability 3:30 - Creating the rust exploit 10:44 - Running the code // Links * react2shell POC: https://github.com/freeqaz/react2shell"
YouTube Link 2025-12-10T10:04Z 20.9K followers, [----] engagements

"Youre Using Hashing Without Realizing It Most of us knows how to get the checksum of a file but only few knows how hashing is really used. In this video I will show you some of the interesting use cases of hashing. // Tags #ethicalhacking #hashing #checksum // Chapters 0:00 - Intro 0:24 - Common Use Cases 0:56 - Interesting Use Cases // Links None for now"
YouTube Link 2025-12-07T09:01Z 20.9K followers, [---] engagements

"Shai-Hulud 2.0: A Worm that DESTROYS User Data A worm is a self-replicating piece of malware. In this video I will show you one of the most brutal worm this year that destroys user data if it doesnt get what it wants. // Tags #ethicalhacking #malware #worm // Chapters 0:00 - Intro 0:37 - Installing bun runtime 1:07 - Looking for secrets 1:31 - Persistence 1:46 - Looking for more credentials 1:49 - Self propagate 2:06 - Destroying user data // Links * Great technical analysis from Datadog: https://securitylabs.datadoghq.com/articles/shai-hulud-2.0-npm-worm"
YouTube Link 2025-12-05T09:00Z 20.9K followers, [----] engagements

"SSH Honeypot that Traps Attackers Endless SSH is a great tool for catching bad actors. In this video I will show you how to run this and we will understand the mechanism behind. // Tags #ethicalhacking #ssh #honeypot #decoy #deception // Chapters 0:00 - Intro 0:39 - SSH protocol recap 1:38 - Demo 2:08 - Adding a troll message // Links * endlessh-go: https://github.com/shizunge/endlessh-go"
YouTube Link 2025-12-03T09:00Z 20.9K followers, [----] engagements

"Single Packet Authorization: Firewall on STEROIDS Single Packet Authorization is a method for authorizing a client on the network level. In this video I will show you the mechanics on how this can level up your firewall protection. // Tags #ethicalhacking #firewall #defense // Chapters 0:00 - Intro 0:30 - How does SPA works 1:48 - Setting up and demo // Links * fwknop (Single Packet Authorization): https://github.com/mrash/fwknop"
YouTube Link 2025-12-01T09:01Z 20.9K followers, 46.3K engagements

"Linux Terminal Pagers: Hidden Dangers Giving users sudo access to terminal pagers is not a generally a good idea. In this video I will show why it makes your machine insecure and ways to prevent users bypass the security mechanims. // Tags #ethicalhacking #linux #sudo // Chapters 0:00 - Intro 0:49 - Security misconfiguration on less command 2:07 - How terminal pagers are used by other utilities // Links None for now"
YouTube Link 2025-11-29T09:01Z 20.9K followers, [----] engagements

"CAI: Autonomous Ethical Hacking CAI is a tool that allows autonomous ethical hacking. In this video I will show you how to command a red team agent to scan and exploit a vulnerability on a target. // Tags #ethicalhacking #agent #ai #autonomous // Chapters 0:00 - Intro 0:48 - Installation and Setup 2:38 - Commanding the agent // Links * CAI Framework: https://github.com/aliasrobotics/cai"
YouTube Link 2025-11-27T09:00Z 20.9K followers, [----] engagements

"Hacker Techniques to HIDE Linux Commands Hackers are experts in hiding their linux commands. In this video I will show you effective techniques in removing your commands in bash history. // Tags #ethicalhacking #bash #linux #evasion #stealth // Chapters 0:00 - Intro 0:14 - Prepending a whitespace 1:14 - Clearing history for current session 1:40 - Pointing history file to /dev/null 2:06 - Avoding sudo 2:19 - Persistence mechanism to clear history file 2:29 - History file for databases // Links None for now"
YouTube Link 2025-11-25T09:00Z 20.9K followers, [----] engagements

"Cloudflare Tunnel: How hackers abuse it Cloudflare Tunnel is an easy way to expose your application over the internet securely but hackers are abusing this to hide their cover operations. In this video I will show you different techniques hackers can use to leverage cloudflare tunnel for their malicious gains. // Tags #ethicalhacking #cloudflare #tunnel #evasion #stealth // Chapters 0:00 - Intro 1:15 - Launching cloudflare tunnel 1:55 - Using for fingerprinting 2:08 - Tunneling reverse shell and C2 connections 2:12 - Webshell on victim machine // Links * Cloudflare Tunnel:"
YouTube Link 2025-11-23T09:00Z 20.9K followers, [----] engagements

"Techniques Youve Never Heard Before Living Off The Land is a technique where attackers leverage built-in tools softwares inside operating systems or networks for their malicious gains. In this video I will show you the unique techniques you never heard before. // Tags #ethicalhacking #lotl #living-off-the-land #evasion // Chapters 0:00 - Intro 1:45 - Lolbas (Windows) 2:21 - LooBins (Mac OS) 3:15 - Living Off The Tunnels 3:54 - Living Off The Hardware 4:24 - Living Off The False Positive 5:42 - Living Off The Pipeline 6:42 - Living Off The Land Applications 7:04 - Living Off The Land Drivers"
YouTube Link 2025-11-21T09:00Z 20.9K followers, [----] engagements

"How hackers abuse Linux for Persistence Attackers abuse various Linux functionalities to maintain persistence. In this video I will show you some basic and advance techniques using a tool called Panix. // Tags #ethicalhacking #linux #persistence #rootkits #backdoor // Chapters 0:00 - Intro 1:08 - Creating system backdoor user 2:03 - Reverting persistence 2:37 - Persistence using sytemd generators 3:31 - Persistence using udev rules // Links * Panix: https://github.com/Aegrah/PANIX"
YouTube Link 2025-11-19T09:00Z 20.9K followers, [----] engagements

"How hackers HIDE their CODE Bincrypter is a tool that obfuscates and encrypt an ELF binary or a shell script. In this video I will show you the interesting features of this tool and analyze the obfuscation process. PS. Thanks to THC for this nice program. I learned a lot during code analysis. // Tags #ethicalhacking #obfuscation #encryption #linux // Chapters 0:00 - Intro to Bincrypter 2:43 - Analyzing the obfuscation process // Links * bincrypter: https://github.com/hackerschoice/bincrypter"
YouTube Link 2025-11-17T09:01Z 20.9K followers, [----] engagements

"How hackers HIDE in DNS DNS is one of the widely used protocol and attackers can leverage it for covert operations. In this video I will show you how they can abuse the text queries to send malicious commands to a victim machine. // Tags #ethicalhacking #dns #reverse-shell #covert-operations #stealth // Chapters 0:00 - Intro 0:32 - What is a DNS TXT record 1:18 - Understanding the attack 2:52 - Demo of the attack 5:17 - How client malware send back the output 5:47 - How attacker decodes the output // Links * revshellDns: https://github.com/LucaReggiannini/revshellDns"
YouTube Link 2025-11-15T09:00Z 20.9K followers, [----] engagements

"Rapid Note-Taking System for Hackers: Find Info FAST Being an ethical hacker means being able to take good notes and retrieve relevant information quickly. In this video I will share to you all the techniques I do to make my note taking workflow fast and efficient. // Tags #ethicalhacking #obsidian // Chapters 0:00 - Intro 0:39 - Obsidian Intro 1:08 - Tags headings TOC note linking 1:37 - Omnisearch dynamic highlights 2:11 - Flat naming technique avoiding duplicate tabs 2:49 - Git and some subfolders // Links None for now"
YouTube Link 2025-11-13T09:01Z 20.9K followers, [----] engagements

"Web Check: An All-in-One OSINT Tool Webcheck is an all-in-one OSINT tool that analyze a website for misconfiguration security vulnerabilities and performance. In this video I will show you the various scans it can perform. // Tags #ethicalhacking #web-check #osint // Chapters 0:00 - Intro 0:28 - Trying out the public instance 2:46 - Diagnosing and fixing some errors 4:28 - Trying out more features // Links * Web Check project: https://github.com/Lissy93/web-check * Web Check publick instance: https://web-check.xyz"
YouTube Link 2025-11-11T09:01Z 20.9K followers, [----] engagements

"This CHECKLIST will save you from Digital Threats Digital defense is something all of us should know in order to protect ourselves from bad actors. In this video I will show you a great tool that aids us in assessing the state of our personal digital security. // Tags #ethicalhacking #personal-security #checklist #digital-defense // Chapters 0:00 - Intro 0:39 - Starting the checklist 1:43 - Exploring the authentication checklist 4:04 - Different security requirements for each person 4:47 - High security requirements // Links * Digital Defense Personal Security Checklist:"
YouTube Link 2025-11-09T09:00Z 20.9K followers, [----] engagements

"Get ROOT with ONE command Traitor is tool that automates machine exploitation. This is really useful in time-crunch situations like red team assessments or if you are competing in capture the flag events. // Tags #ethicalhacking #exploit #traitor #backdoor // Chapters 0:00 - Intro 0:16 - Exploring traitor 1:20 - Planting backdoors // Links * traitor: https://github.com/liamg/traitor"
YouTube Link 2025-11-07T09:01Z 20.9K followers, [----] engagements

Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing

@hacktheclown
/creator/youtube::hacktheclown