Channel Avatar

Robensive @[email protected]

1K subscribers - no pronouns :c

Welcome to our YouTube channel dedicated to red teaming and


01:17:27
Automated Armor || Integrating CI/CD with Attack Surface @MystikCON 2024
11:20
17 - Web4Shell - File Upload to Shell (Part - 2)
19:45
16 - Web4Shell - File Upload to Shell (Part - 1)
01:01
60-Sec-Hack: #password #mistakes ❌❌
19:29
Task-Ninja Automation - Passive Subdomain Discovery
51:47
Task-Ninja - Practical
30:33
Introduction to Task-Ninja
17:23
15 - Web4Shell - OS Command Injection (Part - 4)
16:05
14 - Web4Shell - OS Command Injection (Part - 3)
13:06
13 - Web4Shell - OS Command Injection (Part - 2)
12:00
12 - Web4Shell - OS Command Injection [The basics]
15:28
11 - Web4Shell - File Inclusion to RCE (part 6) [Remote]
12:34
10 - Web4Shell - File Inclusion to RCE (part 5) [Apache Log Poisoning ]
12:22
09 - Web4Shell - File Inclusion to RCE (part 4) [Abusing Permissions ]
12:12
08 - Web4Shell - File Inclusion to RCE (part 3) [Log Poisoning ]
17:23
07 - Web4Shell - File Inclusion to RCE (part 2)
01:44:15
Windows Privilege Escalation June 10, 2023 Cyber Secured India
21:58
06 - Web4Shell - File Inclusion to RCE (part 1)
26:01
05 - Web4Shell - SQL Injection to RCE (Final Part)
13:06
04 - Web4Shell - SQL Injection to RCE (Part 4)
16:53
03 - Web4Shell - SQL Injection to RCE (Part 3)
15:03
02 - Web4Shell - SQL Injection to RCE (Part 2)
21:21
01 - Web4Shell - SQL Injection to RCE (Part 1)
04:34
00 - Web4Shell - Introduction
09:08
15 - MetasploitAllTheThings - The course summary
13:16
14 - MetasploitAllTheThings - The Post Modules - Part 3 (Maintaining Privileged Access)
01:20
Advanced Network Exploitation Expert
17:37
13 - MetasploitAllTheThings - The Post Modules - Part 2 (Proxy pivoting)
11:54
12 - MetasploitAllTheThings - The Post Modules - Part 1
10:14
11 - MetasploitAllTheThings - The Exploits (Privilege Escalation)
11:32
10 - MetasploitAllTheThings - The Exploits (Known Credentials)
17:18
09 - MetasploitAllTheThings - The Exploits (Vuln Service)
48:56
MSSQL-Attacks for red teamers (The Final Exploitation)
29:55
MSSQL-Attacks for red teamers (Lab Setup - Part 3)
19:48
MSSQL-Attacks for red teamers (Lab Setup - Part 2)
42:35
MSSQL-Attacks for red teamers (Lab Setup - Part 1)
16:17
08 - MetasploitAllTheThings - The Auxiliary (Part - 3)
27:12
07 - MetasploitAllTheThings - The Auxiliary (Part - 2)
23:57
06 - MetasploitAllTheThings - The Auxiliary
37:57
05 - MetasploitAllTheThings - The Venom (Part - 3 )
17:22
04 - MetasploitAllTheThings - The Venom (Part - 2)
18:12
03 - MetasploitAllTheThings - The Venom (Part - 1)
01:01
60-Sec-Hack: Common Ports and Vulnerabilities (80 - HTTP).
16:29
02 - MetasploitAllTheThings - The Basics (Part 2)
11:42
01 - MetasploitAllTheThings - The Basics (Part 1)
24:45
12 Enumerate All The Things - Summary
17:12
11 Enumerate ATT- HTTP/S
15:51
10 Enumerate ATT- MS-SQL
11:46
09 Enumerate ATT- SNMP
01:03:58
DLL Hijacking Advanced || Knowledge Sharing Session @Mystiko 2020
01:12:07
DLL Hijacking Basics || Knowledge Sharing Session @Mystiko 2020
10:37
08 Enumerate ATT- NFS
11:15
07 Enumerate ATT- MySQL
17:06
06 Enumerate ATT- SMTP
07:20
04 Enumerate ATT- WinRM
04:52
03 Enumerate ATT- SSH
25:46
02 Enumerate ATT- SMB
11:49
01 Enumerate ATT- FTP
01:09
Enumerate AllThethings
02:28:40
Windows Privilege Escalation April 16, 2022 Cyber Secured India