Channel Avatar

Techno Science @UCZ_LaTg9cmb6-kxZv2--OUA@youtube.com

subscribers - no pronouns set

This is the official Techno Science YouTube channel. My prev


12:30
LazySysAdmin: 1 || VulnHub Walkthrough
16:39
Lampiao: 1 || VulnHub Walkthrough
17:40
Healthcare: 1 || VulnHub Walkthrough
33:55
GoldenEYE v1 || VulnHub Walkthrough
25:11
Findingmyfriend: 1 || VulnHub Walkthrough
15:11
Corpvision:1 || VulnHub Walkthrough
20:58
BlackWidow: 1 || VulnHub Walkthrough
17:51
The Planet: Venus || VulnHub Walkthrough
18:51
Blogger: Blogger 1 || VulnHub Complete walkthrough
11:18
Illuminating the Inner Workings of SQL Injection Through Examples
10:01
Pentester Lab: Padding Oracle || VulnHub Pentester Lab Walkthrough
10:55
Pentester Lab: S2-052 || VulnHub PentesterLab Walkthrough
15:20
Mastering OpenVAS: Ultimate Guide to Cybersecurity Vulnerability Assessment
08:34
Vega: Web Applications Scanner with Proxy Features
10:29
WPScan: Deep Dive into WordPress Security
11:23
WebDAV Security Exploration with Cadaver and Davtest
09:39
Wapiti: Powerful and Automated Web Vulnerability Scanner
06:54
Nikto: Web application Security Scanner
07:10
Skipfish: Web application Security Scanner
07:49
Exploring Web Vulnerability Scanners: Enhancing Web Application Security
11:24
Cisco Packet Tracer - Intro to Networking
07:51
Understanding android sandboxing
08:52
Fundamental concepts that power the Android ecosystem
05:26
Building DEX files from the command line
04:21
Process of constructing Android Apps
01:59
Exploring Android App Components: A Simple Guide
09:32
Understanding APK File Storage and Extraction
06:39
Fundamental Aspects of Android Apps
01:52
Fundamental building block of android App
13:38
[Recap] Setting up Android Penetration Testing and Reverse Engineering for Linux Environment
05:04
Build Your First Android App with Android Studio
03:14
Setting Up JAVA for Android Studio on Windows
01:53
Setting up lab for Android Penetration Testing and Reverse Engineering
16:26
Understanding John The Ripper and Johnny with Example
19:42
Mastering Web Paths in Laravel: Installation Guide on Windows and Linux for CTF Enthusiasts
35:57
Flick Series: flick I || VulnHub Complete Walkthrough
21:05
Evilbox: 1 || VulnHub Complete Walkthrough
21:15
Inferno 1 || VulnHub Complete Walkthrough
15:03
Gaara: 1 || VulnHub Complete Walkthrough
06:47
Getting Started with MOBEXLER: Easy Installation Guide on VirtualBox for Mobile App Security Testing
12:35
Parrot Security OS Installation and Comparison with Kali Linux || Step-by-Step Guide and Features
18:43
Finding and Exploiting Cross-Site Scripting (XSS) Vulnerabilities
06:12
Installing Broken Web Application (BWA) on VirtualBox
09:52
Surprising Trick to Set Up Raspberry Pi OS on Pi Zero W - No Monitor Needed!
09:35
Uncover the Benefits of Docker & Learn How to Install it on Alpine Linux!
06:50
Kali NetHunter Lite: Easily Install on any rooted Android Device
04:30
Is chntpw and OPHCrack Still work with Windows 11 or not?
06:41
Steps to create a Bootable Kali Live USB Persistence
16:02
File Upload Vulnerabilities: DVFU Lab Shows You How to Protect Yourself
19:26
[Nokia 6.1 Plus] Install Kali Nethunter (NetHunter-specific kernel) on Rooted Android Device
08:02
ChatGPT: Is It Effective For Information Security & Ethical Hacking?
02:20
#2.8 SQLMap: Summery || What we have Covered up?
02:36
#2.7 Bypass Web Application Firewall (WAFs) using Tamper Script via SQLMap
05:16
#2.6 Operating System TakeOver with SQLMap
03:37
#2.5 Handling injections in a post request via SQLMap
07:24
#2.4 Reading and Writing Files from the File System via SQLMap
09:12
#2.3 Speeding up the Process (in blind and time-based scenarios) in SQLMap
06:25
#2.2 Dumping The Data (in an Error-based Scenario) via SQLMap
09:25
#2.1 Getting Started With SQLMap
06:04
#1 What is SQL Injection? Setup SQLi-labs Lab Environment for SQL Injection