This media is not supported in your browser
VIEW IN TELEGRAM
Hi Everyone! Apologies for the delays in video uploads. I am actually at my hometown and been really busy because of some personal reason. But finally got some time to work on a new video and trust me, You will definitely like it!!! It will be very useful when you are hacking modern apps developed in node, python etc
Keep learning & Keep Hacking!
Keep learning & Keep Hacking!
❤🔥20❤7👍4🔥3🐳1
How Dependency Confusion Exposed Millions: The Hack Every Developer Should Know
Ever heard of Dependency Confusion? It’s a clever way attackers can exploit package managers to infiltrate systems—and it’s a serious threat to software supply chains.
In my latest video, I break it all down: what it is, how it works, and how you can protect yourself. There’s even a live demo to make it super easy to follow.
If you’re into bug bounty hunting, ethical hacking, or just want to level up your security knowledge, this one’s for you.
Check it out and let me know what you think!
Video Link: https://www.youtube.com/watch?v=7ZcRNvmRz6E
Ever heard of Dependency Confusion? It’s a clever way attackers can exploit package managers to infiltrate systems—and it’s a serious threat to software supply chains.
In my latest video, I break it all down: what it is, how it works, and how you can protect yourself. There’s even a live demo to make it super easy to follow.
If you’re into bug bounty hunting, ethical hacking, or just want to level up your security knowledge, this one’s for you.
Check it out and let me know what you think!
Video Link: https://www.youtube.com/watch?v=7ZcRNvmRz6E
🔥12👍7
Hi everyone, which topic do you want me to create a new video on?
Anonymous Poll
56%
RCE with Dependency Confusion
38%
Cross Site Scripting
6%
Other(mention in comment)
🐳7
This media is not supported in your browser
VIEW IN TELEGRAM
Thinking on creating some videos on iOS Pentesting. Let me know what you all think
❤44🔥6👏6⚡3👍2
Hi everyone! Hope you all are having a great day! For the past two days, I have been creating a challenge based on my recent findings in a web app pentest which was highly secured. The video of it will be releasing soon on our official channel. However, For anyone who is going to solve the challenge, their name will be mention on our new video
Target: http://portal.bepractical.tech
Credential:
username: local
password: bepractical
Hint: We already have two videos on this topic already..maybe you can use it for reference😉
You can send us the report at: business@bepractical.tech
Target: http://portal.bepractical.tech
Credential:
username: local
password: bepractical
Hint: We already have two videos on this topic already..maybe you can use it for reference😉
You can send us the report at: business@bepractical.tech
❤13👍2😁1
Just wanted to let you all know that stored xss is now a known issue. Your goal is to find other vulnerabilities on the application
👍7❤5🔥2👎1
Let me rephrase the challenge for you all: Can you create more than 3 dashboard using your local account?
Website: http://portal.bepractical.tech
Username: local
Password: bepractical
Website: http://portal.bepractical.tech
Username: local
Password: bepractical
❤9👍3🔥2🙏2
Hi everyone, hope you all are doing well. I wanted to share something intriguing that I recently uncovered. There’s a vulnerability lurking in applications that most people completely overlook. It’s subtle, sneaky, and has the potential to cause significant damage if exploited—but hardly anyone talks about it.
Check out the video and let me know—have you ever encountered something like this? I’d love to hear your thoughts.
Video Link: https://www.youtube.com/watch?v=p7XxFeqNDko
#cybersecurity #bugbounty #bugbountytips #ethicalhacking #informationsecurity #privacy #security
Check out the video and let me know—have you ever encountered something like this? I’d love to hear your thoughts.
Video Link: https://www.youtube.com/watch?v=p7XxFeqNDko
#cybersecurity #bugbounty #bugbountytips #ethicalhacking #informationsecurity #privacy #security
YouTube
This Overlooked Vulnerability Can Cause Massive Damage (Live Demonstration) | Bug Bounty | 2024
There's a vulnerability hiding in plain sight—one that most people completely overlook. It's subtle, it's sneaky, and when exploited, it can wreak havoc on applications in ways you might not expect.
In this video, I uncover the secrets of this underrated…
In this video, I uncover the secrets of this underrated…
❤11👍7
Hi everyone, Thank you so much for showing your support on this latest video.. By far it is ranked at number 1 video in terms of views & engagement
I worked 7 days on this video creating lab, video editing etc and I couldn't express my happiness seeing that all the work paid off! Once again, Thank you for your support💪
Keep hacking, Keep learning and we will meet in another video with something more interesting
-Faiyaz
I worked 7 days on this video creating lab, video editing etc and I couldn't express my happiness seeing that all the work paid off! Once again, Thank you for your support💪
Keep hacking, Keep learning and we will meet in another video with something more interesting
-Faiyaz
❤38👍4
Happy New Year Everyone🥳
I hope this year, we will find more vulnerabilities, secure more application and become a better version of ourselves
I hope this year, we will find more vulnerabilities, secure more application and become a better version of ourselves
❤26🤣3👍2😇1
Hey everyone, Just started working on another video now! I am 100% certain that this video will help you all to understand how we can dive deep into a target through a practical demonstration
🔥24❤8👍3
Hey everyone! First video of 2025 is out!!! I hope this will help you in your bug bounty & ethical hacking journey!
Video Link: https://www.youtube.com/watch?v=S9wDmZjmD9E
Video Link: https://www.youtube.com/watch?v=S9wDmZjmD9E
YouTube
Chaining Vulnerabilities Like a Pro Bug Bounty Hunter! | Live Demonstration | 2025
Chaining vulnerabilities is an advanced skill that separates good hackers from the pros! In this video, I’ll show you how to take your bug bounty and penetration testing skills to the next level by combining multiple vulnerabilities for maximum impact. Watch…
🔥14👍6❤1
Hey everyone, I just released a new video diving into a subtle but dangerous web flaw. Here’s the interesting part – this vulnerability was once present in ChatGPT itself.
If you’re into bug bounty hunting or ethical hacking, this is a must-watch. In the video, I cover:
What makes this vulnerability so unique and sneaky
How to identify it during your hunts
Why even major platforms have fallen victim to it
This is one of those bugs that can easily be overlooked, but if you know what to look for, it can lead to serious findings. I’ve also included a live demonstration to help you better understand how it works and how to approach it.
Video Link: https://www.youtube.com/watch?v=FCvAxQyjUCE
If you’re into bug bounty hunting or ethical hacking, this is a must-watch. In the video, I cover:
What makes this vulnerability so unique and sneaky
How to identify it during your hunts
Why even major platforms have fallen victim to it
This is one of those bugs that can easily be overlooked, but if you know what to look for, it can lead to serious findings. I’ve also included a live demonstration to help you better understand how it works and how to approach it.
Video Link: https://www.youtube.com/watch?v=FCvAxQyjUCE
YouTube
Could This Hidden Flaw Be in Your Target’s Scope? | Finding Underrated Vulnerabilities | 2025
In this video, we uncover a subtle yet impactful web vulnerability that often goes unnoticed, even by seasoned bug bounty hunters. Watch as we dive deep into how this flaw works, why it’s dangerous, and how it was once present in ChatGPT itself.
You'll learn:…
You'll learn:…
👍8❤1