![Muhammad Waseem](/img/default-banner.jpg)
- 42
- 136 331
Muhammad Waseem
Pakistan
เข้าร่วมเมื่อ 11 เม.ย. 2024
Assalam o Alaikum! Welcome to Muhammad Waseem's channel, your go-to source for Cybersecurity and Ethical Hacking. Here, we explore the latest security trends, dive into practical hacking techniques, and share tips to protect your digital world. Join us to enhance your skills, stay safe online, and become a cybersecurity expert. Subscribe now!
Reverse Shell Poc
Disclaimer:
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking, penetration testing, and bug hunting so that we can protect ourselves against real hackers.
#LiveBugBounty #BugBountyLive #LiveHacking #RealTimeBugHunting #liveethicalhacking #BugBountyBugBounty #ProofOfConcept #EthicalHacking#BugBountyHunter
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking, penetration testing, and bug hunting so that we can protect ourselves against real hackers.
#LiveBugBounty #BugBountyLive #LiveHacking #RealTimeBugHunting #liveethicalhacking #BugBountyBugBounty #ProofOfConcept #EthicalHacking#BugBountyHunter
มุมมอง: 1 319
วีดีโอ
Command Injection | Poc Video
มุมมอง 1.4K2 หลายเดือนก่อน
Disclaimer: Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking, penetration testing, and bug hunting so that we can protect ourselves against real hackers. #LiveBugBounty #BugBountyLive #LiveHacking #RealTimeBugHunting #LiveEthicalHacking#BugBountyBugBounty #ProofOfConcept #EthicalHacking#BugBountyHunter
Easy to Find Sql injection
มุมมอง 2.9K2 หลายเดือนก่อน
Disclaimer: Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking, penetration testing, and bug hunting so that we can protect ourselves against real hackers. #BugBountyPoC #BugBountyExploitPoC #PoCBugBounty #BugBountyProofOfConcept #LiveBugBounty #LiveBugHunting
CVE-2024-8963 Path Traversal | Poc Video
มุมมอง 2.4K3 หลายเดือนก่อน
Disclaimer: Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking, penetration testing, and bug hunting so that we can protect ourselves against real hackers. #BugBountyPoC #BugBountyExploitPoC #PoCBugBounty #BugBountyProofOfConcept #LiveBugBounty #LiveBugHunting
Secrets of Bug Hunters | Live Bug Bounty Advanced GitHub Recon #bugbounty
มุมมอง 3K3 หลายเดือนก่อน
Disclaimer: Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking, penetration testing, and bug hunting so that we can protect ourselves against real hackers. #LiveBugBounty #BugBountyLive #LiveHacking #RealTimeBugHunting #LiveEthicalHacking#BugBountyBugBounty #ProofOfConcept #EthicalHacking#BugBountyHunter
Find Git Secrets and API Keys | Trufflehog #bugbounty
มุมมอง 3.6K3 หลายเดือนก่อน
Disclaimer: Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking, penetration testing, and bug hunting so that we can protect ourselves against real hackers. #LiveBugBounty #BugBountyLive #LiveHacking #RealTimeBugHunting #LiveEthicalHacking#BugBountyBugBounty #ProofOfConcept #EthicalHacking#BugBountyHunter
RCE (Remote Code Execution) | Poc Video | CVE-2024-7954
มุมมอง 4.7K4 หลายเดือนก่อน
Disclaimer: Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking, penetration testing, and bug hunting so that we can protect ourselves against real hackers. Github Repo github.com/MuhammadWaseem29/RCE-CVE-2024-7954 #LiveBugBounty #BugBountyLive #LiveHacking #RealTimeBugHunting #LiveEthicalHacking#BugBounty...
Remote Code Execution /../etc/passwd | Poc video
มุมมอง 3.8K4 หลายเดือนก่อน
Disclaimer: Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking, penetration testing, and bug hunting so that we can protect ourselves against real hackers. #LiveBugBounty #BugBountyLive #LiveHacking #RealTimeBugHunting #LiveEthicalHacking#BugBounty
How to find Origin Ip of any website | Easy find Origin ips
มุมมอง 3.3K4 หลายเดือนก่อน
Disclaimer: Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking, penetration testing, and bug hunting so that we can protect ourselves against real hackers. #LiveBugBounty #RealTimeHacking #BugBountyLive #LiveHacking #BountyHunter#BugBounty #EthicalHacking #CyberSecurity #VulnerabilityHunting #InfoSec #Pen...
2FA Bypass | How to Bypass OTP with Burp Suite | bug bounty poc | 2 Methods to bypass 2FA #bugbounty
มุมมอง 10K4 หลายเดือนก่อน
Disclaimer: Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking, penetration testing, and bug hunting so that we can protect ourselves against real hackers. #BugBounty #BurpSuite #EthicalHacking #CyberSecurity #OTPbypass #VulnerabilityTesting #OTP_Bypass #How_To_Bypass_OTP_Burp_suite #bypass_otp_2022 #burp...
SQL Injection in WordPress Plugin | Poc video
มุมมอง 3K4 หลายเดือนก่อน
Disclaimer: Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking, penetration testing, and bug hunting so that we can protect ourselves against real hackers. github repo github.com/MuhammadWaseem29/SQL-Injection-in-WordPress-Plugin/ #LiveBugBounty #RealTimeHacking #BugBountyLive #LiveHacking #BountyHunter#B...
bug bounty with Google Dorking | this secret trick everybody need to know
มุมมอง 3.2K4 หลายเดือนก่อน
Disclaimer: Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking, penetration testing, and bug hunting so that we can protect ourselves against real hackers. #LiveBugBounty #GoogleDorking #EthicalHacking #CyberSecurity #BugHunting #PenetrationTesting
Critical Command Injection : CVE-2024-1212 | bug bounty poc
มุมมอง 6K5 หลายเดือนก่อน
Disclaimer: Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking, penetration testing, and bug hunting so that we can protect ourselves against real hackers. Github Repo github.com/MuhammadWaseem29/CVE-2024-1212 #CVE20241212 #CommandInjection #BugBounty #EthicalHacking #CyberSecurity #BugBountyHunter #BugBo...
Remote Code Execution Exploit in Spider-Flow | CVE-2024-0195 POC
มุมมอง 3.8K5 หลายเดือนก่อน
Disclaimer: Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking, penetration testing, and bug hunting so that we can protect ourselves against real hackers. repo github.com/MuhammadWaseem29/CVE-2024-0195-SpiderFlow #CyberSecurity #EthicalHacking #Exploit #CVE20240195 #SpiderFlow #RCE #BugBounty #LiveHackin...
how find a vulnarability with shell scripts
มุมมอง 3.4K5 หลายเดือนก่อน
Disclaimer: Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking, penetration testing, and bug hunting so that we can protect ourselves against real hackers. #LiveBugBounty #BugBountyLive #LiveHacking #RealTimeBugHunting #LiveEthicalHacking
how to find vulnerability | live bug bounty part 2
มุมมอง 26K5 หลายเดือนก่อน
how to find vulnerability | live bug bounty part 2
bug bounty poc | local file inclusion lfi | FFUF’s Secret Functions You Must Know
มุมมอง 5K5 หลายเดือนก่อน
bug bounty poc | local file inclusion lfi | FFUF’s Secret Functions You Must Know
Live 403 Bypass: How to Bypass 403 Web Access Controls in Real-Time
มุมมอง 9K5 หลายเดือนก่อน
Live 403 Bypass: How to Bypass 403 Web Access Controls in Real-Time
How to Approach Live Bug Bounty Target for beginner | etsy.com | part-1
มุมมอง 15K5 หลายเดือนก่อน
How to Approach Live Bug Bounty Target for beginner | etsy.com | part-1
Magic Recon | Secrets Of Bug Bounty Hunter
มุมมอง 2.2K6 หลายเดือนก่อน
Magic Recon | Secrets Of Bug Bounty Hunter
Live Bug Bounty Hunting : My Methodology Live Bug Hunting On Comcast Xfinity BBP Program
มุมมอง 5K6 หลายเดือนก่อน
Live Bug Bounty Hunting : My Methodology Live Bug Hunting On Comcast Xfinity BBP Program
Account Takeover Through Reset Password | P1 Vulnerability Solved | PortSwigger Lab
มุมมอง 5616 หลายเดือนก่อน
Account Takeover Through Reset Password | P1 Vulnerability Solved | PortSwigger Lab
Live Bug Hunting on Self-Hosted Programs and Finding Live Vulnerabilities Using the Ghauri Tool
มุมมอง 1.4K6 หลายเดือนก่อน
Live Bug Hunting on Self-Hosted Programs and Finding Live Vulnerabilities Using the Ghauri Tool
Live Bug Hunting with Python: Real-Time Walkthrough
มุมมอง 5666 หลายเดือนก่อน
Live Bug Hunting with Python: Real-Time Walkthrough
My Bug Bounty Journey: The Reality of Bug Bounties & Bugcrowd Achievements
มุมมอง 9106 หลายเดือนก่อน
My Bug Bounty Journey: The Reality of Bug Bounties & Bugcrowd Achievements
Complete Beginner's Guide: How to Write a Bug Bounty Report
มุมมอง 4426 หลายเดือนก่อน
Complete Beginner's Guide: How to Write a Bug Bounty Report
Live Recon: Hacking Seagate's Bug Bounty Program | Find XSS During Live bug Hunting | Live Hacking
มุมมอง 3K6 หลายเดือนก่อน
Live Recon: Hacking Seagate's Bug Bounty Program | Find XSS During Live bug Hunting | Live Hacking
Find S3 Buckets | Exploiting S3 Bucket Misconfigurations | s3scanner | bug bounty
มุมมอง 6826 หลายเดือนก่อน
Find S3 Buckets | Exploiting S3 Bucket Misconfigurations | s3scanner | bug bounty
Automation XSS Vulnerability Scanner Tool | Xss Strike | bug hunting
มุมมอง 1.1K6 หลายเดือนก่อน
Automation XSS Vulnerability Scanner Tool | Xss Strike | bug hunting
amazing brother 😘
ye to koi bug hua hi nahi and ye accept bhinahi hota hai
Bro please make a video on how you can approach today ...... Because now you are Changed
bhai apny "cgi-bin/account_mgr.cgi?cmd=cgi_user_add&group=" kaise nikala katana or way back sy ya fuzzing or kia i mean bina login kiye kaise apko mila
Great!
where can I get pentest gpt for windows
is this the only tool that we can use in bug bounty and is a useful in bug bounty??
katana -u subdomain_alive.txt -d 5 -ps -pss waybackarchive, commoncrawl, alienvault -hf -jc -fx -ef woff, css, png, svg, jpg, woff2, jpeg, gif, svg -o allurls.txt flag provided but not defined: -ps how to overcome it?
Use logout and -cos
inspired by lostsec ?
Why did you choose this specific IP as the target, but didn’t find it through Fofa or something?
shodan
@@MuhammadWaseem17397 I scanned tens of thousands of sites with Nuclei, but it didn’t find anything. What should I do to verify the vulnerability?
🥶🗿
which cve??
CVE-2024-50603
I have also got that type of response pages but i ignored them can you please tell how can we know that the response are vulnerable or not???
are you got response in collaborator
I didn't try@@MuhammadWaseem17397
But how you know that it's vulnerable🎉❤
What is the affected technology?
Aviatrix Controller
Love you my brother. From Bangladesh.
nice video waseem bhai
good
Mantap
GREAT ❤ Love from Bangladesh ❤❤❤
Hello brother your telegram
Just think its same as intruder in burpsuite
What is the impact on cgi bin files
Assalamualaikum brother I'm from Bangladesh 💖💖 Facebook otp code bypass? Or how can I talk to you Sorry my English is little bit bad 😅
Aby gunga h kia mu me zban ni bolne k lye ya phttu h tu
Bro make a video on how to install wsl2 in windows like yours..
why you use brave as default browser instead firefox or chrome ?
@@ChillMusikLofi i like brave
what is the bounty??!!🫡
waseem bhai burp suite pr advance tutorail bnao for website vulnerabilty
Man, this kali is on Virtualbox or Docker??? I'm begginer
It's on Windows if you want to know more google WSL2
🥷🧠🃏
bhai hackerone ko lekar bug submit and kon kon site site scan kare clear guideline dedijiye....take love from Bangladesh
@@Fiazceh Bhai Waha bohat se target Hai Ap kisi pr Bhi hunt Kar ke report submitted Kar Sakta Hai ✨🍃
@MuhammadWaseem17397 ok bhai... But I am begginner ... Which targets should I target in hacker one bro?
AY MashALlah bhaijan
It's working onl😮 entry level website
🥷🃏
🥷🃏