Films
Videos
Live
Login
Home
Films
Videos
Live
Đăng nhập
Films
Movies
Movies 2025
Movies 2024
Movies 2023
Movies 2022
Movies 2021
Movies 2020
Movies before 2020
TV Dramas
United States of America
Korea
Japan
China
Hong Kong
India
Thailand
France
Taiwan
Australia
England
Canada
Russia
Best on Vidoe
Hoang Giang Share
Janusz
办美国文凭加拿大文凭澳洲文凭英国文凭学位证毕业证成绩单
Veinas bọt EPE máy móc
Wendy Ye
Medusa
Videos
About
Learning and Sharing stuff on API Hacking!
6:20
Authentication Bypass Via JKU Header Injection | JWT Hacking
9:05
Authentication Bypass Via JWK Header Injection | JWT Hacking
9:36
Subdomain Enumeration ALL KINDS!
7:59
Hunting Open Redirects: A Pathway to Chaining XSS
10:24
Unmasking the Ghost: The CWE-352 Dilemma🎙 Snake Bytes Ep. 4: Web Ghosts
11:24
Web Cache Poisoning: Hunting Methodology & Real-World Examples
9:22
The Danger of CWE-922 🎙 Snake Bytes Ep. 3: Data Dumpster
19:02
Loose Locks: A Podcast with _smile_hacker_ 🎙 : Snake Bytes Ep. 2
7:09
How Missing Keys Leave Your Castle Open🎙 Snake Bytes Ep. 1: Barrier Bypass
9:07
How To Exploit SSRF To Fetch AWS Credentials
8:45
OWASP API Top 10 - Broken Authentication
6:17
XSS Using Indirect Prompt Injection | PART 5
10:10
LLM API Hacking | Indirect Prompt Injection in LLM APIs | PART 4
8:45
LLM API Hacking | OS Command Injection in LLM APIs | PART 3
5:50
LLM API Hacking | Excessive Agency | PART 2
5:04
LLM API Hacking | Introduction | PART 1
8:42
HTTP Parameter Pollution VS Mass Assignment
4:03
IDOR In Shopify GraphQL API | Report Explained
14:29
Server-Side Parameter Pollution in REST APIs
15:17
Exploring Server-Side Parameter Pollution: Real Case Scenario, Parameter Precedence, and More!
13:28
Performing CSRF exploits over GraphQL
11:58
Bypassing GraphQL Brute-Force Protections
9:02
Finding a Hidden GraphQL Endpoint
10:16
Accidental Exposure of Private GraphQL Fields
7:46
Accessing Private GraphQL Fields
5:25
Exploiting Mass Assignment Vulnerability in API | PortSwigger
9:18
How Can Fuzzing Help You Find Hidden API Endpoints?
7:13
How Hackers Exploit API Endpoints Using Documentation?
6:26
How To Perform DOS Attack in GraphQL | Circular Relationship | Prevention
8:51
How Broken Functionality Level Authorization Occurs? | Code Analysis and Prevention
Show more
ViDoe Login
×
Upload videos, create your own free channel with ViDoe.Top after login
Login with Google
Login with Discord