Channel Avatar

Cybrainium @[email protected]

9.6K subscribers - no pronouns :c

Welcome to Cybrainium – your destination for simplified expl


02:41
WhatsApp 2FA 2025: How to Enable Two-Step Verification & Secure Your Account
04:42
Install Nmap in 5 Minutes on Windows 10/11 | How to Install nmap on Windows | 2025
08:12
WSL Kali Linux: Ethical Hacking | Installation on Windows #cybersecurity #hacking #cybrainium
09:00
Bug Bounty Roadmap 2025: Start Hunting Bugs Today!
07:33
How a cyber attack crippled the Colonial Pipeline
08:32
AZ-900 Microsoft Certification | Course Introduction | Lecture #1 #azure #az900 #cloud
08:37
Azure Free Account: Quick Setup Guide to Unlock Cloud Power | #Azure #FreeTrial #Cloud
06:10
How I Cracked My First Cybersecurity Interview: Tips and Strategies
01:14
Top 5 Programming languages for Cyber Security | #hacking #shorts #viralhacker
03:48
SolarWinds Supply Chain Attack Exposed: Are You Next?
06:52
How to add Burp Suite PROXY SERVER in Firefox | Configure #burpsuite with #firefox
06:02
World's Biggest Cyber Attack: Colonial Pipeline Ransomware Explained
07:58
The Most Wanted Hacker 🕵 Kevin Mitnick | Father of Hacking
04:22
Snowden | Hacking Movies Explained In Hindi | Computer Hacking | Mobile Hacking | Cybersecurity
08:32
#35 | (XXE) XML External Entity Injection Concept | Bug Bounty Offensive Hunting #xxe #bugbounty
03:22
Fix error 0x80010135 | Path too long error while extracting ZIP in Windows 11
20:19
#34 | Hostile Subdomain takeover Hunting Live | Bug Bounty Offensive Hunting
08:55
#33 | Subdomain Takeover Vulnerability Checking via GitHub | Bug Bounty Offensive Hunting
24:44
#32| Tools Installation & find Vulnerable subdomain | Bug Bounty Offensive Hunting #bugbount
03:48
#31| How to Find Subdomain Takeover vulnerability | Bug Bounty Offensive Hunting #bugbounty
06:46
#30 | Subdomain Takeover Concept | Bug Bounty Offensive Hunting #bugbounty #subdomain #hacking
08:33
#29 | CSRF Jockey Website Live Hunting | Bug Bounty Offensive Hunting #bugbounty #csrf #live
03:58
#28 | CSRF On Peter England Website Logout Button | Bug Bounty Offensive Hunting #bugbounty #csrf
07:28
#27 | CSRF LAB | Bug Bounty Offensive Hunting #bugbounty #csrf #lab
03:28
#26 | CSRF Injection Point | Bug Bounty Offensive Hunting #bugbounty #csrf
06:14
#25 | CSRF Concepts | Bug Bounty Offensive Hunting #bugbounty #csrf
08:07
#24 | XSS Hackerone Bounty | Cross Site Scripting Hunting | Bug Bounty Offensive Hunting #XSS
04:19
Cyber Crime | Short Movie #hacking #crime #cybercrime #cybercommunity #trending #viral
12:35
#23 | XSS Hunting Live | Cross Site Scripting Hunting | Bug Bounty Offensive Hunting #XSS
09:27
#22 | Reflected XSS concepts and Practical | Bug Bounty Offensive Hunting #XSS
05:09
#21 | XSS (Cross Site Scripting) LAB | Practica | Bug Bounty Offensive Hunting #XSS
07:00
#20 | What is XSS (Cross Site Scripting) | How XSS works | Bug Bounty Offensive Hunting #XSS
10:47
#19 | No rate limit | Bounty & Rewards | Impact | mitigation | Bug Bounty Offensive Hunting
18:39
#18 | How to find No Rate limit Vulnerability ( 100 $ Earn) | Bug Bounty Offensive Hunting
18:48
#17 | No Rate limit POC & Reporting ( 100 $ Earn) | Bug Bounty Offensive Hunting
12:45
#16 | No Rate limit Practical POC | Bug Bounty Offensive Hunting
04:31
#15 | No Rate limit Attacks Concept | Bug Bounty Offensive Hunting
17:29
#14 | Webcam Hack Live, GHDB | Bug Bounty Offensive Hunting
11:36
#13 | 15 Recon tools BBHT | Bug Bounty Offensive Hunting #subdomain #bbht #cybercommunity
10:06
#12 | Subdomain Finding via Burp Suite | Bug Bounty Offensive Hunting #subdomain #burpsuite
15:57
#11 | SubDomain Tools & Practical| Bug Bounty Offensive Hunting #subdomain
10:16
#10 | SubDomain SubFinder Installation| Bug Bounty Offensive Hunting #subfinder
29:12
#9 | Maltego tutorial for beginners | Bug Bounty Offensive Hunting
14:55
#8 | Kali Linux & Virtual Box Installation | Bug Bounty Offensive Hunting
05:15
#7 | HTTP Status Code | Bug Bounty Offensive Hunting
17:55
#6 | Hackerone & Other Platform Roadmap | Bug Bounty Offensive Hunting
08:03
#5 | BugCrowd Roadmap | Bug Bounty Offensive Hunting
22:34
#4 | Bug Bounty Concept | Bug Bounty Offensive Hunting
26:38
#3 Lab Setup | Bug Bounty Offensive Hunting
00:57
#2 Course Disclaimer| Bug Bounty Offensive Hunting
05:55
#1 | Course Introduction | Bug Bounty Offensive Hunting
01:28:31
Cyber Security Full Course 2024 | Cyber Security Course Training For Beginners 2024 | CyberCommunity
04:56
Cyber Security Beginner's Course | Cyber Security Best practices | Lecture-19
03:47
Cyber Security Beginner's Course | Internet of Things (IOT) Security| Lecture-18
06:06
Cyber Security Beginner's Course | Cloud Security | Lecture-17
04:54
Cyber Security Beginner's Course | Access control and authentication | Lecture-16
05:08
Cyber Security Beginner's Course | Antivirus vs Antimalware | Lecture-15
04:39
Cyber Security Beginner's Course | Encryption and Cryptography | Lecture-14
02:51
Cyber Security Beginner's Course | Wireless Network Security | Lecture-13
04:25
Cyber Security Beginner's Course | IDS & Firewall | Lecture-12