Channel Avatar

Vickie Li Dev @UCjQHiY2JeOkBamHSg_6UeFw@youtube.com

10K subscribers - no pronouns :c

Secure development and web security, simplified! Subscribe f


05:39
Scanning for hardcoded secrets in source code | Security Simplified
01:05:08
Career and Community building with Bug Bounties | NahamCon Panel
09:27
How to conduct a basic security code review | Security Simplified
40:53
Launching an InfoSec Career: My six essential tips | Security Simplified
08:47
Building a secure application in five steps | Security Simplified
09:21
How to learn anything in Computer Science or Cybersecurity | Security Simplified
03:05
Building a secure application: the first step | Security Simplified
06:39
They are all Injection Vulnerabilities! - Security Simplified
31:52
Getting into a Development Career with Seho Lim
56:12
Working in AppSec and Getting into Cybersecurity with Ozioma "Ozy" Aghamba
24:02
Chatting with @Hacksplained about Bug Bounties and Infosec Jobs
06:22
Attacking Sites Using CSRF - Security Simplified
03:55
Intro to CSRF (Cross-Site Request Forgery) - Security Simplified
05:49
Hacking banks with race conditions
02:39
How to prevent PHP type juggling vulnerabilities
04:27
Exploiting PHP Type Juggling Vulnerabilities - Security Simplified
05:22
How Attackers Bypass MFA (Multi-Factor Authentication) - Security Simplified
05:51
Why Is Validating URLs So Hard?
03:31
How to Prevent Open Redirects in your Applications
05:57
Hacking SSO: Authentication Bypass by Stealing OAuth Tokens
03:57
How to Prevent Command Injections
02:45
Intro to Command Injection | Security Simplified
03:04
How To Prevent IDORs | Security Simplified
04:08
How to Prevent SSRF Vulnerabilities (Server-Side Request Forgery)
07:35
Understanding Insecure Deserialization Vulnerabilities: Security Simplified
04:09
What are IDORs (Insecure Direct Object References)?
06:01
Hacking SSO: SAML Signature Misconfigurations
03:27
Hacking SSO: Stealing Cookies With Subdomain Takeovers
03:57
Hacking SSO: Overview
05:27
Wildcard Injection Privilege Escalation: Linux Security 07
06:15
Misconfigured PATH Privilege Escalation: Linux Security 06
05:33
SUDO Privilege Escalation: Linux Security 05
04:57
Overprivileged Processes Privilege Escalation: Linux Security 04
32:51
Intro to Open Source Recon
04:26
SUID Privilege Escalation: Linux Security 03
05:49
Cron Privilege Escalation: Linux Security 02
05:27
Linux Permissions: Linux Security 01
08:06
Forging Requests With SSRF: Security Simplified
09:44
SQL Injection Prevention: Security Simplified
05:33
What is SQL Injection? -- Security Simplified