Channel Avatar

NahamSec @[email protected]

173K subscribers - no pronouns :c

HACK THE PLANET!! Hi! I'm NahamSec. I think everyone can b


09:35
This Browser Hack Scored Me a $20,000 Bug Bounty
09:00
This Tiny Chrome Behavior Leads to an Account Takeover
11:42
How I Got an AI Chatbot to Spill Its Secrets Using Just a Prompt
21:05
This Is How Hackers Evade Detection with PowerShell Obfuscation
14:35
The No BS Bug Bounty & Web Hacking Roadmap
21:46
PowerShell for Hackers
18:49
This CTF Teaches You Everything About Hacking an API
12:13
This Hacker Scored $5,000 with a Remote Code Execution Exploit!
06:31
I Scanned 100,000+ Subdomains For CVE-2025-29927
10:05
This Simple URL Encoding Made me $50,000 in Bounties
06:41
This is How a Simple IDOR Earned Me a Max Bug Bounty Payout
12:23
How Ethical Hackers ACTUALLY Use ChatGPT With Real Examples
13:37
Which AI Can Fully Hack This Website?
13:10
Give Me 13 Minutes and This Will Be Your Best Bug Bounty Year
13:14
I Used AI To Hack This Site
15:07
Build a Recon & Lead Generation Box for Under $60
14:42
These Vulnerabilities WILL Make you $100K in 2025 (Bug Bounty Tutorial)
07:54
Stop Submitting Duplicate Bug Reports in 2025 (Bug Bounty) 🎯
19:26
How to Write Great Bug Bounty & Pentest Report (Proof of Concepts)
13:07
Understanding ⛔️403 Bypass Techniques⛔️ (With Examples)
20:30
How To Write A Pentest Report That Gets Your Findings Fixed
12:14
The Blueprint to Your First $1,000+ Bounty
09:53
5 Lessons That Made Me $1M Since 2022
11:11
Do This For Your First $100,000 in Bounties
12:56
How To Scan The Entire Cloud
19:54
Is This The Best Recon Framework?
16:18
Amazon Paid Hackers $2.1M+ in Bounties (h1-0131 vlog)
12:41
This Bug Got Me A $30,000 Bounty
13:19
Hacking Websites With A Zip File (Zip Slip)
13:19
The Hacker Mentality
14:31
Hacking GitLab Instances For A $5,000 Bounty (2 Examples)
18:56
What is OSINT? (With Examples)
09:48
Scanning All Vulnerability Disclosure Programs For Automated API Hacking
07:31
I Became HackerOne's Latest Most Valuable Hacker (h1-702 vlog)
17:49
SQL Injection Explained With @BuildHackSecure + FREE LABS!
06:41
DEFCON 32 Vlog
10:45
Running Nuclei On All My Bug Bounty Programs
10:03
This is The Fastest Hacking & Recon Tool
01:27:44
Live Recon: Hacking With STOK
01:24:45
Live Recon: Hacking Tinder's Bug Bounty Program (with @Rhynorater)
01:34:34
Live Recon: Hacking Dell's Bug Bounty Program
20:01
I SCANNED EVERY BUG BOUNTY PROGRAM
13:31
Hacking Large Corporations (Recon)
10:08
My Favorite API Hacking Vulnerabilities & Tips
16:26
#NahamCon2024: Sluicing Scripts | @TomNomNomDotCom@TomNomNomDotCom
10:39
My Favorite Ethical Hacking Books
37:26
#NahamCon2024: Practical AI for Bounty Hunters | @jhaddix
10:58
Day in the Life of an Ethical Hacker/Penetration Tester
24:04
#NahamCon2024: .js Files Are Your Friends | @zseano
23:36
This 'Realistic' Web CTF Was Impossible!
20:44
#NahamCon2024: OAuth Secret | @BugBountyReportsExplained
18:30
#NahamCon2024: Deep Dive Into AWS Instance Metadata | @congon4tor
26:17
#NahamCon2024: GraphQL is the New PHP | @0xlupin
15:54
This is How You Scan Large Infrastructures
01:08:48
#NahamCon2024: The Art of Bypassing WAFs (with live demos!) | @Brumens2
19:02
#NahamCon2024: Building A Caido Plugin Using AI | @rez0__
18:52
#NahamCon2024: Subdomain Takeover Can Be So Much Worse Than Phishing | @insecurenature @JoeLeonJr
13:40
If I Were to Start in Cyber Security, I'd Do This
20:30
#NahamCon2024: Shodan & WAF Evasion Techniques | @godfatherOrwa
33:56
#NahamCon2024: Modern WAF Bypass Techniques on Large Attack Surfaces