Channel Avatar

Netsec Explained @[email protected]

13K subscribers - no pronouns :c

Unlock the secrets of leading security consultants! Netsec


14:57
Get Started in AI CTFs
39:03
Real-world Attacks on LLM Applications
12:19
3 Things You Need to Know for Modern Application Hacking
06:18
What Time is the 3 O' Clock Parade? | Soft Skills for Hackers
21:49
STRIDE Threat Modeling for Beginners - In 20 Minutes
10:57
Little Known Web Hack for Quick Admin Access
51:29
Master Burp Suite Like A Pro In Just 1 Hour
04:48
Hitting the Digital Wall - How to Deal With Burnout
09:52
Pivot Through Multiple Networks | Master Network Pivoting
46:10
ChatGPT for Cybersecurity | Step-by-Step Guide
14:12
Tunneling Through Protected Networks | Master Network Pivoting
29:37
Full SQL Injection Tutorial | Episode 3: Blind SQL Injection A-Z
21:21
Full SQL Injection Tutorial | Episode 2: In-band SQL Injection
15:01
Full SQL Injection Tutorial | Episode 1: SQL Basics in 15 Minutes
31:31
Cloud Pentesting - IAM Enumeration for Privilege Escalation
11:19
Advanced Local and Remote File Inclusion - PHP Wrappers
24:12
Bug Bounties with Bash
14:25
Bug Bounty and Pentesting with Docker
10:11
Exploit Java Deserialization | Exploiting JBoss 6.1.0
11:17
Exploit Java Deserialization | Discovering Insecure Deserialization
08:18
Exploit Java Deserialization | Understanding Serialized Data
27:46
Top 10 Tips for Passing Your OSCP
11:23
Advanced Nmap - Scanning Large Scale Networks
10:37
6 Types of Hackers That Don't Exist (and 5 More That Do)
16:36
Machine Learning for Security Analysts - Part 3: Malicious URL Predictor
23:45
Machine Learning for Security Analysts - Part 2: Building a Spam Filter
15:02
Machine Learning for Security Analysts - Part 1: The Machine Learning Process
12:00
Advanced Wireshark Network Forensics - Part 3/3
13:58
Advanced Wireshark Network Forensics - Part 2/3
07:27
Advanced Wireshark Network Forensics - Part 1/3
07:42
Web Hacker Basics 08 (Blind SQL Injection); featuring SQLmap
07:16
Web Hacker Basics 07 (CSRF); chaining attacks together
06:37
Web Hacker Basics 06 (Parameter Tampering); featuring Burp Proxy
08:37
Web Hacker Basics 05 (Brute Forcing); featuring THC Hydra
09:52
Web Hacker Basics 04 (Local and Remote File Inclusion)
05:06
Web Hacker Basics 03 (Command Injection)
09:45
Web Hacker Basics 02 (XSS)
10:11
Web Hacker Basics 01 (SQL Injection)
07:42
Building a Web Hacking Lab (w/ XAMPP and DVWA)
02:17
Web Hacker Basics 00 (Intro)