ATGVIDEO
Home
Hot video
Now watching
Search
News
Sport
Music
Games
Humor
Animals
Movies
Auto
Home
Cristi Vlad
Cristi Vlad
Latest Videos
How I Hack or Pentest Mobile Apps feat @BugBountyReportsExplained
Burp Suite - Part 15 - Intruder VI
My Favorite Burp Suite Extensions and How I use Them feat @BugBountyReportsExplained
My Favorite Tool for Web App Security
The Most Common Vulns I Find in Pentests feat. @BugBountyReportsExplained
Burp Suite - Part 8 - Repeater I
Burp Suite - Part 6 - Advanced Scoping
Recon in Cybersecurity #14 - Recon is a Door Opener Not a Goal
Recon in Cybersecurity #13 - A Primer on Reporting - Dont Sabotage Yourself
Recon in Cybersecurity #11 - The Never Ending JS Files
Recon in Cybersecurity #9 - Buckets Dorks Github and Shodan Research
Bug Insider GPT - Turn Any Bug Bounty Report into PRO Tips
Recon in Cybersecurity #8 - Directory Bruteforcing - Attack from Multiple Fronts
Recon in Cybersecurity #5 - The Importance of Coding in Recon
Recon in Cybersecurity #4 - How to Approach Recon - Manual vs. Automated
Google Bard vs. GPT4 - Hands-On First Look Cybersecurity
You Can’t Hack Them All - Master of One - From Noob to Clients
Ultimate GraphQL Recon - A Tactical Approach
Paid to Hack - Salaries in Cybersecurity
How to Detect & Bypass Detection of ChatGPT and GPT3 Generated Text
How I Use ChatGPT as a Cybersecurity Professional
From Hacker to Hero - The Exciting World of Cybersecurity Careers
How to Bypass Authentication Multiple Ways
How to Get Pentesting and Appsec Clients Unconventionally
Practical Web Application Security - Part 28 - Password Mismanagement Attacks Hacksplaining
From Practice Labs to Real Targets - and No Bug Bounties
Practical Web Application Security - Part 27 - information Leakage Defenses Hacksplaining
Practical Web Application Security - Part 26 - information Leakage Attacks Hacksplaining
Practical Web Application Security - Part 25 - User Enumeration Defenses Hacksplaining
Practical Web Application Security - Part 24 - User Enumeration Attacks Hacksplaining
Insights from my 55 Appsec Assessments and Pentests in 2022
Practical Web Application Security - Part 23 - Unencrypted Communication Defenses Hacksplaining
Practical Web Application Security - Part 22 - Unencrypted Communication Attacks Hacksplaining
Practical Web Application Security - Part 21 - Open Redirect Defenses Hacksplaining
Practical Web Application Security - Part 20 - Open Redirect Attacks Hacksplaining
Practical Web Application Security - Part 19 - Broken Access Controls Defenses Hacksplaining
Practical Web Application Security - Part 18 - Broken Access Controls Attacks Hacksplaining
Practical Web Application Security - Part 17 - File Upload Defenses Hacksplaining
Practical Web Application Security - Part 16 - File Upload Attacks Hacksplaining
Practical Web Application Security - Part 15 - DOM XSS Defenses Hacksplaining
Practical Web Application Security - Part 14 - DOM XSS Attacks Hacksplaining
Practical Web Application Security - Part 13 - Reflected XSS Defenses Hacksplaining
Practical Web Application Security - Part 12 - Reflected XSS Attacks Hacksplaining
Practical Web Application Security - Part 11 - Directory Traversal Attacks Hacksplaining
Practical Web Application Security - Part 10 - Directory Traversal Attacks Hacksplaining
Practical Web Application Security - Part 9 - CSRF Defenses Hacksplaining
Practical Web Application Security - Part 8 - CSRF Attacks Hacksplaining
Practical Web Application Security - Part 7 - Clickjacking Defenses Hacksplaining
Practical Web Application Security - Part 6 - Clickjacking Attacks Hacksplaining
Practical Web Application Security - Part 5 - Command Injection Defenses Hacksplaining