Medusa

@Medusa0xf - 97 本の動画

チャンネル登録者数 9670人

API-heavy hacking content for aspiring bug bounty hunters and security researchers.

最近の動画

Hacking Blogs on Medium — Hits, Misses & WTF Moments 23:25

Hacking Blogs on Medium — Hits, Misses & WTF Moments

Train Your XSS Muscles With Me! 32:51

Train Your XSS Muscles With Me!

Exploiting Exact-match Cache Rules for Web Cache Deception | PortSwigger Lab | Explained 13:04

Exploiting Exact-match Cache Rules for Web Cache Deception | PortSwigger Lab | Explained

Grafana CVE-2025-4123: How XSS + Open Redirect Led to Full Account Takeover 14:52

Grafana CVE-2025-4123: How XSS + Open Redirect Led to Full Account Takeover

Exploiting Cache Server Normalization for Web Cache Deception | PortSwigger Lab | Explained 10:14

Exploiting Cache Server Normalization for Web Cache Deception | PortSwigger Lab | Explained

How to Exploit Uncommon HTTP Headers for Hacking & Bug Bounties? 11:34

How to Exploit Uncommon HTTP Headers for Hacking & Bug Bounties?

Mastering OAuth 2.0 Flows: Complete Guide + Security Testing Tips (Okta OAuth Playground) 29:40

Mastering OAuth 2.0 Flows: Complete Guide + Security Testing Tips (Okta OAuth Playground)

Why Bug Bounty Hunters Still Check xmlrpc.php in 2025? 9:43

Why Bug Bounty Hunters Still Check xmlrpc.php in 2025?

Exploiting Origin Server Normalization For Web Cache Deception | PortSwigger | Explained 10:13

Exploiting Origin Server Normalization For Web Cache Deception | PortSwigger | Explained

Exploiting Path Delimiters for Web Cache Deception | PortSwigger Lab | Explained 9:20

Exploiting Path Delimiters for Web Cache Deception | PortSwigger Lab | Explained

Exploiting Path Mapping For Web Cache Deception | PortSwigger Lab | Explained 4:28

Exploiting Path Mapping For Web Cache Deception | PortSwigger Lab | Explained

Web Cache Deception Made Simple – What You Need to Know! 12:55

Web Cache Deception Made Simple – What You Need to Know!

You Asked, I Answered: Anonymous Q&A And My Reaction 😳 22:04

You Asked, I Answered: Anonymous Q&A And My Reaction 😳

This Tiny Upload Flaw = Full RCE on Tomcat?! (CVE-2025-24813 Deep Dive) 11:19

This Tiny Upload Flaw = Full RCE on Tomcat?! (CVE-2025-24813 Deep Dive)

GraphQL Attacks in the Wild: IDOR, SQLi & More | PART 2 22:27

GraphQL Attacks in the Wild: IDOR, SQLi & More | PART 2

How Bug Hunters Map GraphQL APIs? | PART 1 17:28

How Bug Hunters Map GraphQL APIs? | PART 1

Bug Bounty Recon: Shadow APIs, Zombie Endpoints & How to Find Them? 15:25

Bug Bounty Recon: Shadow APIs, Zombie Endpoints & How to Find Them?

Epic Infosec Week! 4:45

Epic Infosec Week!

This Web Application is COOKED! Can we fix it? 37:32

This Web Application is COOKED! Can we fix it?

Bug Bounty Hunters, Can You Beat This Quiz? 16:59

Bug Bounty Hunters, Can You Beat This Quiz?

When 'Access Denied' Fails: Weird Authorization Bugs! 11:59

When 'Access Denied' Fails: Weird Authorization Bugs!

Explaining Random H1 Reports for 20 Minutes Straight! 22:19

Explaining Random H1 Reports for 20 Minutes Straight!

Testing for Password Reset Poisoning in APIs – A Bug Hunter’s Guide 12:00

Testing for Password Reset Poisoning in APIs – A Bug Hunter’s Guide

OWASP API Top 10 Breakdown | Study Session with CTF Challenges (DVAPI) 48:15

OWASP API Top 10 Breakdown | Study Session with CTF Challenges (DVAPI)

Authentication Bypass Via JKU Header Injection | JWT Hacking 6:20

Authentication Bypass Via JKU Header Injection | JWT Hacking

Authentication Bypass Via JWK Header Injection | JWT Hacking 9:05

Authentication Bypass Via JWK Header Injection | JWT Hacking

Subdomain Enumeration ALL KINDS! 9:36

Subdomain Enumeration ALL KINDS!

Hunting Open Redirects: A Pathway to Chaining XSS 7:59

Hunting Open Redirects: A Pathway to Chaining XSS

Unmasking the Ghost: The CWE-352 Dilemma🎙 Snake Bytes Ep. 4: Web Ghosts 10:24

Unmasking the Ghost: The CWE-352 Dilemma🎙 Snake Bytes Ep. 4: Web Ghosts

Web Cache Poisoning: Hunting Methodology & Real-World Examples 11:24

Web Cache Poisoning: Hunting Methodology & Real-World Examples

The Danger of CWE-922 🎙 Snake Bytes Ep. 3: Data Dumpster 9:22

The Danger of CWE-922 🎙 Snake Bytes Ep. 3: Data Dumpster

Loose Locks: A Podcast with  _smile_hacker_ 🎙 : Snake Bytes Ep. 2 19:02

Loose Locks: A Podcast with _smile_hacker_ 🎙 : Snake Bytes Ep. 2

How Missing Keys Leave Your Castle Open🎙 Snake Bytes Ep. 1: Barrier Bypass 7:09

How Missing Keys Leave Your Castle Open🎙 Snake Bytes Ep. 1: Barrier Bypass

How To Exploit SSRF To Fetch AWS Credentials 9:07

How To Exploit SSRF To Fetch AWS Credentials

OWASP API Top 10 - Broken Authentication 8:45

OWASP API Top 10 - Broken Authentication

XSS Using Indirect Prompt Injection | PART 5 6:17

XSS Using Indirect Prompt Injection | PART 5

LLM API Hacking | Indirect Prompt Injection in LLM APIs | PART 4 10:10

LLM API Hacking | Indirect Prompt Injection in LLM APIs | PART 4

LLM API Hacking | OS Command Injection in LLM APIs | PART 3 8:45

LLM API Hacking | OS Command Injection in LLM APIs | PART 3

LLM API Hacking | Excessive Agency | PART 2 5:50

LLM API Hacking | Excessive Agency | PART 2

LLM API Hacking  | Introduction | PART 1 5:04

LLM API Hacking | Introduction | PART 1

HTTP Parameter Pollution VS Mass Assignment 8:42

HTTP Parameter Pollution VS Mass Assignment

IDOR In Shopify GraphQL API | Report Explained 4:03

IDOR In Shopify GraphQL API | Report Explained

Server-Side Parameter Pollution in REST APIs 14:29

Server-Side Parameter Pollution in REST APIs

Exploring Server-Side Parameter Pollution: Real Case Scenario, Parameter Precedence, and More! 15:17

Exploring Server-Side Parameter Pollution: Real Case Scenario, Parameter Precedence, and More!

Performing CSRF exploits over GraphQL 13:28

Performing CSRF exploits over GraphQL

Bypassing GraphQL Brute-Force Protections 11:58

Bypassing GraphQL Brute-Force Protections

Finding a Hidden GraphQL Endpoint 9:02

Finding a Hidden GraphQL Endpoint

Accidental Exposure of Private GraphQL Fields 10:16

Accidental Exposure of Private GraphQL Fields

Accessing Private GraphQL Fields 7:46

Accessing Private GraphQL Fields

Exploiting Mass Assignment Vulnerability in API | PortSwigger 5:25

Exploiting Mass Assignment Vulnerability in API | PortSwigger

How Can Fuzzing Help You Find Hidden API Endpoints? 9:18

How Can Fuzzing Help You Find Hidden API Endpoints?

How Hackers Exploit API Endpoints Using Documentation? 7:13

How Hackers Exploit API Endpoints Using Documentation?

How To Perform DOS Attack in GraphQL | Circular Relationship | Prevention 6:26

How To Perform DOS Attack in GraphQL | Circular Relationship | Prevention

How Broken Functionality Level Authorization Occurs? | Code Analysis and Prevention 8:51

How Broken Functionality Level Authorization Occurs? | Code Analysis and Prevention

How to Discover API Subdomains? | Subdomain Enumeration | API Hacking 5:26

How to Discover API Subdomains? | Subdomain Enumeration | API Hacking

How Mass Assignment Gives You Admin Privileges? | APIs | Code Examples | 9:24

How Mass Assignment Gives You Admin Privileges? | APIs | Code Examples |

JWT authentication bypass via 'X-HTTP-Method-Override' Header 3:14

JWT authentication bypass via 'X-HTTP-Method-Override' Header

How BOLA in API Endpoint can lead to Account Takeover | Postman | API Security 4:38

How BOLA in API Endpoint can lead to Account Takeover | Postman | API Security

Bypass JWT Authentication By Bruteforcing Secret Key | PortSwigger | 6:54

Bypass JWT Authentication By Bruteforcing Secret Key | PortSwigger |

Bypass JWT Signature via Flawed Authentication | Access Admin Panel | 5:57

Bypass JWT Signature via Flawed Authentication | Access Admin Panel |

Exploiting Stored XSS in GraphQL | DVGA | 3:43

Exploiting Stored XSS in GraphQL | DVGA |

Exploiting Command Injection in GraphQL | DVGA | 5:03

Exploiting Command Injection in GraphQL | DVGA |

Exploiting SQL Injection in GraphQL | DVGA | 7:00

Exploiting SQL Injection in GraphQL | DVGA |

Graphql Endpoint Analysis | Damn Vulnerable Graphql Application | 17:21

Graphql Endpoint Analysis | Damn Vulnerable Graphql Application |

Horror Story but CTF Like! | Steganography | TryHackMe 18:04

Horror Story but CTF Like! | Steganography | TryHackMe

Horror Story but CTF Like! | Cryptography | TryHackMe 11:37

Horror Story but CTF Like! | Cryptography | TryHackMe

TryHackMe: Wireshark Basics | Part 3 | 13:40

TryHackMe: Wireshark Basics | Part 3 |

TryHackMe: Wireshark Basics | Part 2 | 10:50

TryHackMe: Wireshark Basics | Part 2 |

TryHackMe: Wireshark Basics | Part 1 | 13:09

TryHackMe: Wireshark Basics | Part 1 |

Phases of Penetration Testing | WebApp Pentest | Privilege Escalation 19:14

Phases of Penetration Testing | WebApp Pentest | Privilege Escalation

XXE Injection to Database Takeover | CVE-2021-29447 | RCE | 13:53

XXE Injection to Database Takeover | CVE-2021-29447 | RCE |

Exploiting SQL Injection in API Endpoint | API Hacking | crAPI 5:24

Exploiting SQL Injection in API Endpoint | API Hacking | crAPI

Exploiting Mass Assignment Vulnerability | API Hacking | crAPI 5:22

Exploiting Mass Assignment Vulnerability | API Hacking | crAPI

Broken Object Level Authorization | Excessive Data Exposure | crAPI 7:09

Broken Object Level Authorization | Excessive Data Exposure | crAPI

Exploiting Rate Limiting to Brute-Force OTP  | crAPI | 8:22

Exploiting Rate Limiting to Brute-Force OTP | crAPI |

Discovering API and Analyzing Endpoints Using Postman and Browser | crAPI | 14:42

Discovering API and Analyzing Endpoints Using Postman and Browser | crAPI |

How to Install crAPI in Kali Linux | OWASP | API Testing | 3:27

How to Install crAPI in Kali Linux | OWASP | API Testing |

Exploiting File Upload To Get a Root Shell | Hacker vs Hacker | CTF 15:34

Exploiting File Upload To Get a Root Shell | Hacker vs Hacker | CTF

PentesterLab Recon Challanges From 16-20 | CTF | 4:03

PentesterLab Recon Challanges From 16-20 | CTF |

Installation and Usage of Subjack | Subdomain Takeover | Kali Linux Tool 3:11

Installation and Usage of Subjack | Subdomain Takeover | Kali Linux Tool

Find Hidden Domain, Subdomain or IP addresses through TLS SANs Certificate 7:08

Find Hidden Domain, Subdomain or IP addresses through TLS SANs Certificate

PentesterLab Recon Challanges From 11-15 | CTF | 5:47

PentesterLab Recon Challanges From 11-15 | CTF |

Create your Own Hash Cracking Tool Using Python | With Slides | Explained 9:36

Create your Own Hash Cracking Tool Using Python | With Slides | Explained

Create your Own Port Scanning Tool Using Python | With Slides | Explained 9:55

Create your Own Port Scanning Tool Using Python | With Slides | Explained

Create Your Own Subdomain Enumeration Tool Using Python | With Slides | Explained 8:10

Create Your Own Subdomain Enumeration Tool Using Python | With Slides | Explained

Exploiting Stack Buffer Overflow | Step by Step | Immunity Debugger | Explained | 28:12

Exploiting Stack Buffer Overflow | Step by Step | Immunity Debugger | Explained |

PROMPT.ML | 0x9 | XSS Challange | Level 9 | Explained 2:34

PROMPT.ML | 0x9 | XSS Challange | Level 9 | Explained

PROMPT.ML | 0x8 | XSS Challange | Level 8 | Explained 5:30

PROMPT.ML | 0x8 | XSS Challange | Level 8 | Explained

PROMPT.ML | 0x7 | XSS Challange | Level 7 | Explained 3:47

PROMPT.ML | 0x7 | XSS Challange | Level 7 | Explained

PROMPT.ML | 0x6 | XSS Challange | Level 6 | Explained 8:03

PROMPT.ML | 0x6 | XSS Challange | Level 6 | Explained

PROMPT.ML | 0x5 | XSS Challange | Level 5 | Explained 2:38

PROMPT.ML | 0x5 | XSS Challange | Level 5 | Explained

PROMPT.ML | 0x4 | XSS Challange | Level 4 | Explained 5:34

PROMPT.ML | 0x4 | XSS Challange | Level 4 | Explained

PROMPT.ML | 0x3 | XSS Challange | Level 3 | 0:52

PROMPT.ML | 0x3 | XSS Challange | Level 3 |

PROMPT.ML | 0x2 | XSS Challange | Level 2 | Explained 2:58

PROMPT.ML | 0x2 | XSS Challange | Level 2 | Explained

PROMPT.ML | 0x1 | XSS Challange | Level 1 | Explained 1:58

PROMPT.ML | 0x1 | XSS Challange | Level 1 | Explained

PROMPT.ML | 0x0 | XSS Challange | Level 0 | Explained 1:16

PROMPT.ML | 0x0 | XSS Challange | Level 0 | Explained

How to install gau tool and use it | Fetch URLS | Github 3:23

How to install gau tool and use it | Fetch URLS | Github

動画

Hacking Blogs on Medium — Hits, Misses & WTF Moments 23:25

Hacking Blogs on Medium — Hits, Misses & WTF Moments

1085 回視聴 - 6 日前

Train Your XSS Muscles With Me! 32:51

Train Your XSS Muscles With Me!

2807 回視聴 - 11 日前

Exploiting Exact-match Cache Rules for Web Cache Deception | PortSwigger Lab | Explained 13:04

Exploiting Exact-match Cache Rules for Web Cache Deception | PortSwigger Lab | Explained

613 回視聴 - 2 週間前

Grafana CVE-2025-4123: How XSS + Open Redirect Led to Full Account Takeover 14:52

Grafana CVE-2025-4123: How XSS + Open Redirect Led to Full Account Takeover

2629 回視聴 - 3 週間前

Exploiting Cache Server Normalization for Web Cache Deception | PortSwigger Lab | Explained 10:14

Exploiting Cache Server Normalization for Web Cache Deception | PortSwigger Lab | Explained

761 回視聴 - 1 か月前

How to Exploit Uncommon HTTP Headers for Hacking & Bug Bounties? 11:34

How to Exploit Uncommon HTTP Headers for Hacking & Bug Bounties?

1.3万 回視聴 - 1 か月前

Mastering OAuth 2.0 Flows: Complete Guide + Security Testing Tips (Okta OAuth Playground) 29:40

Mastering OAuth 2.0 Flows: Complete Guide + Security Testing Tips (Okta OAuth Playground)

2070 回視聴 - 1 か月前

Why Bug Bounty Hunters Still Check xmlrpc.php in 2025? 9:43

Why Bug Bounty Hunters Still Check xmlrpc.php in 2025?

2494 回視聴 - 1 か月前

Exploiting Origin Server Normalization For Web Cache Deception | PortSwigger | Explained 10:13

Exploiting Origin Server Normalization For Web Cache Deception | PortSwigger | Explained

607 回視聴 - 1 か月前

Exploiting Path Delimiters for Web Cache Deception | PortSwigger Lab | Explained 9:20

Exploiting Path Delimiters for Web Cache Deception | PortSwigger Lab | Explained

665 回視聴 - 1 か月前

Exploiting Path Mapping For Web Cache Deception | PortSwigger Lab | Explained 4:28

Exploiting Path Mapping For Web Cache Deception | PortSwigger Lab | Explained

780 回視聴 - 1 か月前

Web Cache Deception Made Simple – What You Need to Know! 12:55

Web Cache Deception Made Simple – What You Need to Know!

3837 回視聴 - 1 か月前