Channel Avatar

DevSec Hacker @[email protected]

1.4K subscribers - no pronouns :c

Hi guys! 🔐 Welcome to DevSec Hacker - Your Gateway to Full


08:40
AI Hacking: Uncovering Secrets | Prompt Injection | Ep-02
04:54
Prompt Injection | CTF challenge
05:49
Malware Protection for S3 Bucket
06:26
Broken Access Control Vulnerability: How Hackers Exploit
03:29
New Burp Suite Feature: Manual Record an Issue - Walkthrough
07:01
Protecting Tokens from XSS Attacks: Secure Storage with Web Workers in JavaScript
13:36
Bugbounty: Host Header Injection to Account Takeover | Hands on | Practical
06:54
0.0.0.0 Browser Vulnerability Exploit | Proof of Concept (POC) Made by ME
05:26
Bug Bounty: Find sensitive information in JS files | Burp Extension | JS Miner | gmaps scanner
17:08
My Interview Experience as a Senior Security Engineer | 6+ YOE | Cyber Security Engineer
07:33
Remote Code Execution via File Upload | RCE | Unrestricted File Upload
01:30
Who Am I ?
26:07
Episode 03: Security Meet-up | Ft. Security Engineer at Bugcrowd
11:05
Auto Authentication using BurpSuite Extension
12:27
Bug Bounty: how to find & exploit Server Side Template Injection || SSTI to RCE
15:37
Vulnerability Scanning with OpenVAS
17:54
Episode 02: Security Meet Up | Ft. Security Engineer - II
08:36
Bug Bounty: Automated Web Asset Scanner and Vulnerability Analyzer | Security Automation
12:25
Security Monitoring Tool - Dark Web Exposure
03:48
How to access the Dark Web | Introduction
03:38
Hacking with AI Tool - WhiteRabbitNeo
09:34
How to create and configure AWS WAF
18:00
Episode 01: Meet up with Security Folks | Ft. Lead Security Engineer
06:53
Bug bounty: Bypass Limits via Race Conditions
06:20
Part 02: Content Security Policy Explained - Practical
08:31
SSRF bypass using DNS rebinding
13:06
Content Security Policy Explained - Practical
16:28
How to Automate Penetration Test Report Writing
14:29
Fuzzing with FFUF | Web Fuzzing
04:58
How to create static website using aws s3
07:48
How to implement cloudwatch monitoring for a web server
04:32
How to setup AWS S3 Replication - Including Cross Region Replication
08:58
how to automate aws with cloudformation #aws #awslearning #awssecurity #automation
09:14
AWS Secrets Manager and Lambda: How to store and retrieve secrets #aws #awslearning #awssecurity
09:11
Get location details from photos || EXIF Tool || Python Script
07:53
Unlocking the secrets: How chrome extension access local storage without storage permission
03:18
Find secrets with TruffleHog
12:20
Security Review made easy with Iriusrisk + Chatgpt
23:25
Automated Threat Modeling using IRIUSRISK
09:58
Bug Bounty: XSS leads to Session Hijacking || Stealing Cookies || Session Hijacking || XSS POC
25:53
Bug Bounty: Insecure Direct Object Reference || IDOR #appsec #bugbounty #vulnerability
14:29
Bug Bounty: Mass Assignment leads to privilege escalation || Mass Assignment explained
12:40
Bug Bounty: Injection leads to Authentication Bypass || Injection || Login Bypass || Nosql Injection