2:05 Forced Tampering leads to Admin panel access | Bug Bounty POC | Lazy Pentester Lazy Pentester 2.8K views - 1 year ago
1:08:52 Finding criticals in mobile apps - Joel Margolis (0xteknogeek) from @criticalthinkingpodcast Bug Bounty Reports Explained 9.2K views - 1 year ago
3:00 CVE Exploit Vulnerability in Live Website || Intigriti Programme || Bug Bounty POC || 2022 THE BBH 1.3K views - 3 years ago
5:34 Don’t Study CYBERSECURITY – Just F**king Hack and Make Money! HackersArsenal 330.8K views - 9 months ago
4:51 Session Management - 01 | Low Hanging Fruit Series | Lazy Pentester Lazy Pentester 995 views - 2 years ago
4:50 Directory Listing | Low Hanging Fruit Series | Lazy Pentester Lazy Pentester 1.1K views - 2 years ago
6:03 Back Button Enabled Vulnerability | Low Hanging Fruit Series | Lazy Pentester Lazy Pentester 1.2K views - 2 years ago
12:37 BUG BOUNTY: ANDROID APPLICATION PENETRATION TESTING #1 | 2023 BePractical 22.9K views - 2 years ago
3:50 $25,000 Bounty 😲|| API keys Exposed || JavaScript Source mapping || AJAK Cybersecurity 2.8K views - 2 years ago
7:41 Secret Bug Bounty Extensions Every Hackers Must Have Part-2 || #bugbounty #hacking #cybersecurity AJAK Cybersecurity 483 views - 2 years ago