All
Search
Images
Videos
Shorts
Maps
News
Copilot
More
Shopping
Flights
Travel
Notebook
Report an inappropriate content
Please select one of the options below.
Not Relevant
Offensive
Adult
Child Sexual Abuse
Length
All
Short (less than 5 minutes)
Medium (5-20 minutes)
Long (more than 20 minutes)
Date
All
Past 24 hours
Past week
Past month
Past year
Resolution
All
Lower than 360p
360p or higher
480p or higher
720p or higher
1080p or higher
Source
All
Dailymotion
Vimeo
Metacafe
Hulu
VEVO
Myspace
MTV
CBS
Fox
CNN
MSN
Price
All
Free
Paid
Clear filters
SafeSearch:
Moderate
Strict
Moderate (default)
Off
Filter
7:35
METASPLOIT EXPLAINED: The Most Powerful Hacking Framework
1 day ago
YouTube
ZT
1:43
Zero day exploite real world example
2 days ago
YouTube
Hacker lab
8:08
Massive AutoMapper Vulnerability in .NET
13.7K views
3 days ago
YouTube
Nick Chapsas
15:56
25 - Exploitation WebDAV Using Metasploitable | eJPT Course Vide
…
8 views
2 days ago
YouTube
Cy3er
0:41
.NET AOT Malware Bypasses Antivirus: Uncovering New Tricks
…
2 views
4 days ago
YouTube
Hacked dAily
0:33
Network Breach: Access, Execute, Communicate #shorts
1 views
1 day ago
YouTube
Mustafa Ekinci
17:46
Web Application Security Vulnerabilities & Exploit
1 views
3 days ago
YouTube
Kunsang Grg
10:03
Metasploit For Beginners - How To Scan And Pwn A Computer | Lear
…
642.7K views
Apr 15, 2021
YouTube
Loi Liang Yang
6:01:31
Master Advanced Web Application Hacking
1 views
1 day ago
YouTube
The Exploit Lab
1:21:04
Hacking Tools (with demos) that you need to learn in 2025
227.8K views
Jan 5, 2025
YouTube
David Bombal
9:31
Cross-Site Scripting (XSS) Explained And Demonstrated By
…
552.9K views
Apr 18, 2021
YouTube
Loi Liang Yang
8:54
Cross-Site Scripting (XSS) Explained And Demonstrated!
117.6K views
Jan 24, 2022
YouTube
Loi Liang Yang
2:24
What is an exploit and how you can protect yourself
17.6K views
Jul 14, 2015
YouTube
ESET
Actively exploited vulnerability gives extraordinary control over s
…
9 months ago
arstechnica.com
1:00
Most attacks don’t start with exploits, they start with identity.
212 views
3 days ago
YouTube
SpecterOps
0:20
Attackers exploit a new critical SharePoint vulnerability
3 days ago
YouTube
Saeb Masarwa Eng
2:31
telnetd: GNU inetutils telnetd buffer overflow (CVE-2026-32746)
3 days ago
YouTube
HackNinja
2:48
How to use .NET AI agent skills in Visual Studio 2026 and GitHub Co
…
6 views
15 hours ago
YouTube
Authorised Territory
12:21
Xbox One Bliss Exploit Explained — The First Real Hardware Hack
1 views
1 day ago
YouTube
CGameDev
55:57
🚨 Crypto Longs Getting Crushed — Bitcoin's $70K Is the Line in the S
…
24 views
3 days ago
YouTube
OnChain Revolution Media
1:10
Thretasploit 90+ editions
4 views
4 days ago
YouTube
Briskinfosec - Cybersecurity Built in India
16:02
Introduction to .NET | C#.NET Tutorial | Mr. Bangar Raju
1.6M views
Aug 17, 2016
YouTube
Naresh i Technologies
Windows 10/11 Hacking with Metasploit 2026 | Full Course Mast
…
58 views
1 day ago
YouTube
Full Course
6:03:03
.Net Tutorial | .Net Framework Tutorial | Asp.net Tutorial | Learn
…
1.3M views
Feb 9, 2021
YouTube
Intellipaat
6:40
⚠️SEVERE NEW WINDOWS EXPLOIT⚠️ Do This Now! [Patch
…
255.1K views
Jun 1, 2022
YouTube
ThioJoe
2:50
🚨UPDATE NOW🚨- New Exploit Found in Chrome (Also Edge/Brave/Opera)
133.8K views
4 months ago
YouTube
ThioJoe
6:13:20
.Net Tutorial | .Net Full Course | .Net Framework Tutorial | Intellipaat
59.8K views
Jun 25, 2021
YouTube
Intellipaat
8:25
Hackers Target Microsoft SharePoint | Critical Vulnerability
…
11.8K views
8 months ago
YouTube
CBT Nuggets
29:58
Working with Visual Studio .NET | C#.NET Tutorial | Mr. Bangar Raju
640.8K views
Sep 3, 2016
YouTube
Naresh i Technologies
Learning center | .NET
Nov 30, 2021
microsoft.com
See more videos
More like this
Feedback