@Medusa0xf - 97 本の動画
チャンネル登録者数 9670人
API-heavy hacking content for aspiring bug bounty hunters and security researchers.
Hacking Blogs on Medium — Hits, Misses & WTF Moments
Train Your XSS Muscles With Me!
Exploiting Exact-match Cache Rules for Web Cache Deception | PortSwigger Lab | Explained
Grafana CVE-2025-4123: How XSS + Open Redirect Led to Full Account Takeover
Exploiting Cache Server Normalization for Web Cache Deception | PortSwigger Lab | Explained
How to Exploit Uncommon HTTP Headers for Hacking & Bug Bounties?
Mastering OAuth 2.0 Flows: Complete Guide + Security Testing Tips (Okta OAuth Playground)
Why Bug Bounty Hunters Still Check xmlrpc.php in 2025?
Exploiting Origin Server Normalization For Web Cache Deception | PortSwigger | Explained
Exploiting Path Delimiters for Web Cache Deception | PortSwigger Lab | Explained
Exploiting Path Mapping For Web Cache Deception | PortSwigger Lab | Explained
Web Cache Deception Made Simple – What You Need to Know!
You Asked, I Answered: Anonymous Q&A And My Reaction 😳
This Tiny Upload Flaw = Full RCE on Tomcat?! (CVE-2025-24813 Deep Dive)
GraphQL Attacks in the Wild: IDOR, SQLi & More | PART 2
How Bug Hunters Map GraphQL APIs? | PART 1
Bug Bounty Recon: Shadow APIs, Zombie Endpoints & How to Find Them?
Epic Infosec Week!
This Web Application is COOKED! Can we fix it?
Bug Bounty Hunters, Can You Beat This Quiz?
When 'Access Denied' Fails: Weird Authorization Bugs!
Explaining Random H1 Reports for 20 Minutes Straight!
Testing for Password Reset Poisoning in APIs – A Bug Hunter’s Guide
OWASP API Top 10 Breakdown | Study Session with CTF Challenges (DVAPI)
Authentication Bypass Via JKU Header Injection | JWT Hacking
Authentication Bypass Via JWK Header Injection | JWT Hacking
Subdomain Enumeration ALL KINDS!
Hunting Open Redirects: A Pathway to Chaining XSS
Unmasking the Ghost: The CWE-352 Dilemma🎙 Snake Bytes Ep. 4: Web Ghosts
Web Cache Poisoning: Hunting Methodology & Real-World Examples
The Danger of CWE-922 🎙 Snake Bytes Ep. 3: Data Dumpster
Loose Locks: A Podcast with _smile_hacker_ 🎙 : Snake Bytes Ep. 2
How Missing Keys Leave Your Castle Open🎙 Snake Bytes Ep. 1: Barrier Bypass
How To Exploit SSRF To Fetch AWS Credentials
OWASP API Top 10 - Broken Authentication
XSS Using Indirect Prompt Injection | PART 5
LLM API Hacking | Indirect Prompt Injection in LLM APIs | PART 4
LLM API Hacking | OS Command Injection in LLM APIs | PART 3
LLM API Hacking | Excessive Agency | PART 2
LLM API Hacking | Introduction | PART 1
HTTP Parameter Pollution VS Mass Assignment
IDOR In Shopify GraphQL API | Report Explained
Server-Side Parameter Pollution in REST APIs
Exploring Server-Side Parameter Pollution: Real Case Scenario, Parameter Precedence, and More!
Performing CSRF exploits over GraphQL
Bypassing GraphQL Brute-Force Protections
Finding a Hidden GraphQL Endpoint
Accidental Exposure of Private GraphQL Fields
Accessing Private GraphQL Fields
Exploiting Mass Assignment Vulnerability in API | PortSwigger
How Can Fuzzing Help You Find Hidden API Endpoints?
How Hackers Exploit API Endpoints Using Documentation?
How To Perform DOS Attack in GraphQL | Circular Relationship | Prevention
How Broken Functionality Level Authorization Occurs? | Code Analysis and Prevention
How to Discover API Subdomains? | Subdomain Enumeration | API Hacking
How Mass Assignment Gives You Admin Privileges? | APIs | Code Examples |
JWT authentication bypass via 'X-HTTP-Method-Override' Header
How BOLA in API Endpoint can lead to Account Takeover | Postman | API Security
Bypass JWT Authentication By Bruteforcing Secret Key | PortSwigger |
Bypass JWT Signature via Flawed Authentication | Access Admin Panel |
Exploiting Stored XSS in GraphQL | DVGA |
Exploiting Command Injection in GraphQL | DVGA |
Exploiting SQL Injection in GraphQL | DVGA |
Graphql Endpoint Analysis | Damn Vulnerable Graphql Application |
Horror Story but CTF Like! | Steganography | TryHackMe
Horror Story but CTF Like! | Cryptography | TryHackMe
TryHackMe: Wireshark Basics | Part 3 |
TryHackMe: Wireshark Basics | Part 2 |
TryHackMe: Wireshark Basics | Part 1 |
Phases of Penetration Testing | WebApp Pentest | Privilege Escalation
XXE Injection to Database Takeover | CVE-2021-29447 | RCE |
Exploiting SQL Injection in API Endpoint | API Hacking | crAPI
Exploiting Mass Assignment Vulnerability | API Hacking | crAPI
Broken Object Level Authorization | Excessive Data Exposure | crAPI
Exploiting Rate Limiting to Brute-Force OTP | crAPI |
Discovering API and Analyzing Endpoints Using Postman and Browser | crAPI |
How to Install crAPI in Kali Linux | OWASP | API Testing |
Exploiting File Upload To Get a Root Shell | Hacker vs Hacker | CTF
PentesterLab Recon Challanges From 16-20 | CTF |
Installation and Usage of Subjack | Subdomain Takeover | Kali Linux Tool
Find Hidden Domain, Subdomain or IP addresses through TLS SANs Certificate
PentesterLab Recon Challanges From 11-15 | CTF |
Create your Own Hash Cracking Tool Using Python | With Slides | Explained
Create your Own Port Scanning Tool Using Python | With Slides | Explained
Create Your Own Subdomain Enumeration Tool Using Python | With Slides | Explained
Exploiting Stack Buffer Overflow | Step by Step | Immunity Debugger | Explained |
PROMPT.ML | 0x9 | XSS Challange | Level 9 | Explained
PROMPT.ML | 0x8 | XSS Challange | Level 8 | Explained
PROMPT.ML | 0x7 | XSS Challange | Level 7 | Explained
PROMPT.ML | 0x6 | XSS Challange | Level 6 | Explained
PROMPT.ML | 0x5 | XSS Challange | Level 5 | Explained
PROMPT.ML | 0x4 | XSS Challange | Level 4 | Explained
PROMPT.ML | 0x3 | XSS Challange | Level 3 |
PROMPT.ML | 0x2 | XSS Challange | Level 2 | Explained
PROMPT.ML | 0x1 | XSS Challange | Level 1 | Explained
PROMPT.ML | 0x0 | XSS Challange | Level 0 | Explained
How to install gau tool and use it | Fetch URLS | Github
Exploiting Exact-match Cache Rules for Web Cache Deception | PortSwigger Lab | Explained
613 回視聴 - 2 週間前
Exploiting Cache Server Normalization for Web Cache Deception | PortSwigger Lab | Explained
761 回視聴 - 1 か月前
Mastering OAuth 2.0 Flows: Complete Guide + Security Testing Tips (Okta OAuth Playground)
2070 回視聴 - 1 か月前
Exploiting Origin Server Normalization For Web Cache Deception | PortSwigger | Explained
607 回視聴 - 1 か月前
Exploiting Path Delimiters for Web Cache Deception | PortSwigger Lab | Explained
665 回視聴 - 1 か月前