how hackers hack any websites in minutes?!

แชร์
ฝัง
  • เผยแพร่เมื่อ 30 ม.ค. 2025

ความคิดเห็น • 350

  • @megatronskneecap
    @megatronskneecap ปีที่แล้ว +115

    Hacker loi u sexy. EHEM anyways. As a web developer actively trying to create a social network on my own and release it to the public, it would be an understatement to say I'm frightened. But as long as Loi keeps producing these videos I can patch most of this stuff.

    • @Dahlah.FightMe
      @Dahlah.FightMe ปีที่แล้ว +1

      .-.

    • @Namrec_955
      @Namrec_955 ปีที่แล้ว +4

      I think thats the purpose anyways, not like teaching black hackers...

    • @hpi_anc
      @hpi_anc ปีที่แล้ว

      Hacking is illegal but u r ligal 😅😅 so I learnt with u ❤️😎

    • @localhost69
      @localhost69 ปีที่แล้ว

      i woukd edit that comment if i were u

    • @gabrielkenz
      @gabrielkenz ปีที่แล้ว +2

      most of these vulnerabilities are already patched by default if you use up to date frameworks.

  • @rodrigodifederico
    @rodrigodifederico ปีที่แล้ว +50

    As a developer for more than 25 years now, i always though that preventing these kind of "attacks" was basic web development. I never thought that in 2023, devs would still leave so many doors opened. I know it's just an example and dummy website, but if you used it like this, it's because you know devs do it LoL.

    • @Devilofthenights
      @Devilofthenights ปีที่แล้ว

      Sir can u help me please a little help

    • @luisfernando5998
      @luisfernando5998 ปีที่แล้ว

      @@Devilofthenightsu want me to hack Uranus ?

    • @andywest6062
      @andywest6062 ปีที่แล้ว

      You certainly would be surprised. Doing a google search for something like "&id=" would list any websites who haven't had their urls rewritten. 5 minutes later and I can have database access for a super user if they've also not encrypted their passwords, which is the next blunder.

    • @MrRaja
      @MrRaja ปีที่แล้ว

      @@Devilofthenights Trust me when i say... Nobody can help you... but yourself.

    • @genjioto
      @genjioto ปีที่แล้ว +1

      Welp, when companies are laying off more experienced developers in favor for young and cheap ones, this is what you get. 😅 and when there are no layoffs, developers are only interested in creating the minimum viable product and then moving on to the next job. Ofcourse this is the structure you end up with.

  • @willpape1625
    @willpape1625 ปีที่แล้ว +26

    Excellent video. A 40-hour course on this topic and technique would be a big hit!

  • @Ethical_Hacker216
    @Ethical_Hacker216 ปีที่แล้ว +6

    You're the teacher, the rest is zero ❤️

  • @risktakerrecordbreaker
    @risktakerrecordbreaker ปีที่แล้ว +19

    The way of explaining things is great. Its like a friend is explaining to me. Thankyou for giving us content

    • @amongusboi2032
      @amongusboi2032 ปีที่แล้ว

      Indeed, remote access to the victim computer is like holding remote searching through TV channels. Both are remotes.

  • @newyorkheart
    @newyorkheart ปีที่แล้ว +5

    This sort of thing is super interesting. Definitely going to be coming back to this channel when I have time.

  • @brettnathan9971
    @brettnathan9971 ปีที่แล้ว +52

    Bro someone is blackmailing my sister i
    want to hack his acc or just want to delete
    his acc nedd ur help plz help

  • @anonymous4298
    @anonymous4298 ปีที่แล้ว +3

    15:15 Why cd into db then run ls? Wouldn’t it be easier to just run “ls db”?

  • @StudioThirtyEight
    @StudioThirtyEight 3 หลายเดือนก่อน

    I don't even know anything about hacking, I just like listening to this ninja talk. I like how he says 'double-dash'. Just me?

  • @winstonpamela4161
    @winstonpamela4161 ปีที่แล้ว +12

    Leaving a relationship you’re not happy in is much easier than emotionally damaging someone. But selfish people don’t get that

    • @KasraKlassics
      @KasraKlassics ปีที่แล้ว +7

      Wrong video, ma’am

    • @KasraKlassics
      @KasraKlassics ปีที่แล้ว +2

      That said, leaving a relationship, specially if it’s toxic, is probably the most difficult of all!
      Selfish people don’t have to put effort in hurting others. They naturally just do.

  • @jefflucas_life
    @jefflucas_life ปีที่แล้ว +1

    13:43 Great example, thumbs up, subbed!!

  • @ferasm96
    @ferasm96 ปีที่แล้ว +9

    Nice tutorial, but I would have done wget command to a php shell and done everything through it, much easier though..

    • @xt355
      @xt355 ปีที่แล้ว +1

      explain please in detail if possible

  • @devilbawa0316
    @devilbawa0316 5 หลายเดือนก่อน

    CRYPTO SCAM VICTIM ? As a Retired combat Marine I want to tell you that as what you are doing is just as important as any warrior on the battlefield. You are waging warfare against these criminals and terrorists on the digital battlefield. You are defending and protecting the most vulnerable of our society against these predators. Keep up the good work *TECH SAFE GUARDIAN on the WEB*

  • @icocraft-k2b
    @icocraft-k2b ปีที่แล้ว +7

    Very good video, but i hope that you remove the music in the backround in future videos because its very distracting and annoying. Thanks

  • @SixthGod
    @SixthGod ปีที่แล้ว +5

    Great video. I will like to know how you trace someone via IP. Educational purpose

  • @Z10Nmap
    @Z10Nmap ปีที่แล้ว +2

    That database picture looks juicy 😲😅

  • @ebohgoodness1302
    @ebohgoodness1302 ปีที่แล้ว +3

    you're the best hacker loi I feel like you dont get much credit for your work I wish I could be home schooled like you

  • @Ethical_Hacker216
    @Ethical_Hacker216 ปีที่แล้ว

    I have a question please 🙏 should my ip addres be the same as in the burp proxy settings?

  • @f_gaming_killer_f
    @f_gaming_killer_f ปีที่แล้ว +1

    Loi Liang Yang what is the name of the app you used for commanding injections

  • @poupeuu
    @poupeuu ปีที่แล้ว +97

    Scrolling trough these comments makes my brain rot

    • @Kirt44
      @Kirt44 ปีที่แล้ว +2

      Mine too

    • @amongusboi2032
      @amongusboi2032 ปีที่แล้ว +2

      You'll be fine, besides you don't have to read such brain-washing comment section.

    • @abeliscool7950
      @abeliscool7950 ปีที่แล้ว

      Why lol

    • @moonselanac357
      @moonselanac357 ปีที่แล้ว

      I'll take your word for it

    • @mileshall5795
      @mileshall5795 ปีที่แล้ว

      ​@@amongusboi2032brainwashing?....Now I admit it's all connected, & 1/2 of these were not even submitted by a human being....but you are concerned about the comments section?!?😅😅 I would think that it was a given that brainwashing was the overall object of the entire platform....but that's just me

  • @IqbalHatteea
    @IqbalHatteea ปีที่แล้ว

    Hey Mr Loi. I really need your help. It’s very important for me. Thanking you in advance

  • @tebeckcollins9720
    @tebeckcollins9720 ปีที่แล้ว +4

    You didn’t give recommendations/solutions on how to protect against these kinds of attacks

    • @ACasualCustomer
      @ACasualCustomer ปีที่แล้ว

      I believe changing your website URLs to random strings of letter and numbers might help.

  • @Ansh_kalahandi_explorer
    @Ansh_kalahandi_explorer 5 หลายเดือนก่อน

    The way you approached this project added so much to it. It’s great to see how your unique perspective contributed to the outcome. The role you play on your job *Adrian hacks online on the WEB* is crucial. I really appreciate the constructive feedback you give to me regularly

  • @2684dennis
    @2684dennis ปีที่แล้ว

    Would you give online one on one lessons, i would love to learn from you via a stream room where i can share screan and learn ethical hacking.

  • @toxic_me904
    @toxic_me904 ปีที่แล้ว +4

    First download as usual❤😅

  • @RoyceAchilike
    @RoyceAchilike ปีที่แล้ว +1

    Please sir, I can't run monitor mode and packet injection on my internal wireless card. I'm using Nexus 6p device. I've flashed the nexmon patch but doesn't work still.

  • @Skips456
    @Skips456 ปีที่แล้ว +6

    bro is making us next him 💀💀

  • @zrizzy6958
    @zrizzy6958 ปีที่แล้ว +2

    Liked the video, but how can you change the html?

  • @DASLEVINFRMDAO
    @DASLEVINFRMDAO ปีที่แล้ว

    Ma G . Best teacher 😂❤❤

  • @Billy_1882
    @Billy_1882 ปีที่แล้ว

    Great video! I just started your Udemy course and it's full of great information! Thank you for all you do!

  • @adrianayuzaidi5216
    @adrianayuzaidi5216 ปีที่แล้ว

    Hi, can you tell what's the coding for withdraw money from website account to another account. Please

  • @cydream
    @cydream ปีที่แล้ว +1

    DB in the Open_basedir ? Who does that ?

  • @ishanahmed429
    @ishanahmed429 ปีที่แล้ว +2

    What would be the technic in real site, cause its a demo website and it has no ssl also.😊

    • @amongusboi2032
      @amongusboi2032 ปีที่แล้ว

      I believe more time and more repeatedly processes.

  • @geeksified
    @geeksified ปีที่แล้ว +2

    Yow thanks. Can I have the link of this owaspb dummy project rather than git-ting it on my machine?

  • @vialobo
    @vialobo ปีที่แล้ว +1

    Im trying to replicate your OS command injection - how do you get the commands to execute from the file name? How does the filename have shell access?

  • @manichand5556
    @manichand5556 ปีที่แล้ว +2

    Sir,that page doesn't follow the DES algorithm so we can bypass that what if it follows DES algorithm?

    • @architech5940
      @architech5940 11 หลายเดือนก่อน +1

      These techniques don't actually work in practice. While these tools are rudimentary to understanding how common vulnerabilities work to exploit them, applying these concepts in the field requires proficiency in DevOps and programming.
      A proficiency in DevOps provides the necessary skills and knowledge required to understand these systems and their vulnerabilities at large. This includes how these servers are designed and maintained in production, and how the project/server files are structured and how they are accessible to different users. To gain proficiency in the skill, practice by building a simple chat client that utilizes a variety of protocols. Once you've done this, you need to host a Linux server on the cloud and deploy you client application to this server. Make sure to read documentation thoroughly to make sure you have everything running the way it should. Furthermore, you enable several protocols to your server for practice in hacking them, and securing them, then repeat.
      Programming proficiency is a critical step and is trivial to your success in penetrating any system "out in the wild" (uncontrolled environment). Although scripting with pre build tools on Kali can be effective in theory, any antivirus out there can detect these attempts to infiltrate their system with these common techniques and thus requires you to get creative with your own code to evade detection. Think of it like this: if team read has built it, team blue has reverse engineered it; if team red has seen it, so has team blue; if team red has updated OffSec tools, likewise team blue has updated antivirus.
      In conclusion, learn these prerequisites of engineering and become very familiar with these systems and how they are maintained, and you should be on your way to becoming a(n) "ethical" hacker.

  • @nasim993
    @nasim993 5 หลายเดือนก่อน

    Where should the such web page be found?

  • @technicalcraftsman4021
    @technicalcraftsman4021 ปีที่แล้ว

    Hacker kLi you are genuis. I am Linux administrator and your tutorials are fucking awesome. Please keep making these types of videos. Thanks to youtube algorithm which suggests your channel.

  • @assasingaming3406
    @assasingaming3406 ปีที่แล้ว +3

    Make a tutorial on kali Linux

    • @NekoLoliChan
      @NekoLoliChan 10 หลายเดือนก่อน

      My linux looks so different

  • @victorpatrickgammon
    @victorpatrickgammon ปีที่แล้ว

    My competitor has assigned him self as my developer and is merging and taking over my account and controlling my network messages and internet. What do I do for help ?

    • @elizabethwindley166
      @elizabethwindley166 ปีที่แล้ว +1

      *Tracebackassets is an exceptional private investigator specializing in cryptocurrency theft cases. They have a team of highly skilled professionals who are dedicated to solving these types of crimes. With their expertise in blockchain technology, they can trace stolen funds and identify the culprits behind the theft.*

    • @John-zt6lc
      @John-zt6lc 7 หลายเดือนก่อน

      ur cooked lol

  • @rrrrq630
    @rrrrq630 ปีที่แล้ว +2

    I love your videos 🇵🇭🇵🇭🇵🇭❤️

  • @djremixlampung
    @djremixlampung ปีที่แล้ว +1

    I want learn hacking for hack gambling site, but so hard to me

  • @AnoneplayerCyberReaml
    @AnoneplayerCyberReaml ปีที่แล้ว

    Can I use these website for learning?

  • @ikpambesebenjamin9358
    @ikpambesebenjamin9358 12 วันที่ผ่านมา

    please kindly make repoting template video on how to document findings

  • @sneha_234
    @sneha_234 ปีที่แล้ว +3

    I need you help sir..😢😢😢😢

    • @tasharogers9141
      @tasharogers9141 ปีที่แล้ว

      I need some help also

    • @abhigameryt4859
      @abhigameryt4859 ปีที่แล้ว

      𝐇𝐞𝐥𝐥𝐨

    • @abhigameryt4859
      @abhigameryt4859 ปีที่แล้ว

      𝐀𝐚𝐩 𝐦𝐮𝐣𝐡𝐞 𝐛𝐚𝐭𝐚𝐨 𝐤𝐲𝐚 𝐡𝐞𝐥𝐩 𝐤𝐚𝐫𝐧𝐢

  • @FranklinFinds
    @FranklinFinds ปีที่แล้ว

    What screen recorder do you use please

  • @alphazozo2260
    @alphazozo2260 ปีที่แล้ว

    Hey, i have froxy poxy and burp suite, but how do i connect froxy to it?

  • @anonymous4298
    @anonymous4298 ปีที่แล้ว

    19:50 WAF (Web Application Firewall)

  • @mohammadaminhabib5269
    @mohammadaminhabib5269 ปีที่แล้ว

    How to get membership, is there any channel link?

  • @Kapalatus
    @Kapalatus ปีที่แล้ว +2

    I just subscribed and liked the video, just cause I’m scared of being hacked

  • @BlueSpirit_YT
    @BlueSpirit_YT ปีที่แล้ว

    please show how to make undetectable metasploitable payload

  • @akhildubey8925
    @akhildubey8925 ปีที่แล้ว +1

    How to recover Facebook id recover, and change password , hacker was set up a bot in id

  • @eshakumari-tl9dn
    @eshakumari-tl9dn 5 หลายเดือนก่อน

    Everyone should have a dedicated person like you *Adrian hacks online on the WEB* . People dream of hiring such a talented expert like you. Keep up the hard work.

  • @juliusrowe9374
    @juliusrowe9374 ปีที่แล้ว +3

    Awesome Tutorial Loi!

  • @Patinhow100
    @Patinhow100 ปีที่แล้ว

    If you hadn't written on the screen, I wouldn't have understood.
    Thank you.

  • @MdRihan-ei4yz
    @MdRihan-ei4yz 5 หลายเดือนก่อน

    The efficiency of this *TECH SAFE GUARDIAN* is next level. To juggle walk throughs of various angles on the topic delivered to-camera, different content per topic from various folks underneath the umbrella of the track list of the larger big band concert itself is engaging and refined. To make a dense access like this so digestible is really something. Awesome work james!!

  • @ismail-devland
    @ismail-devland ปีที่แล้ว

    Damn homie Loi, you made make IT shacking when you are around, thanks for you videos man, I'm a programmer and I 'm learning always great things to secure my apps, so thanks brother ! continue blowing our minds with your snacky methods of creating backdoors.

  • @Ahmed95406
    @Ahmed95406 ปีที่แล้ว

    Awesome 🤩🤩😍

  • @Schultz-wc6xy
    @Schultz-wc6xy ปีที่แล้ว

    Good morning to you sir. Please my browser isn’t working in Kali Linus. Kindly help me

  • @sunnydhakane9392
    @sunnydhakane9392 ปีที่แล้ว

    When I send the request for the listener in burpsuite, i get a error of 413 entity too large to execute please help

  • @johhnybrah3726
    @johhnybrah3726 ปีที่แล้ว +4

    You should do a video on iPhone lockscreen bypass, and disabled iPhone removal. I've had found my old iPhone I lost years ago would be nice to open it! Thanks

    • @stefanjohansson2373
      @stefanjohansson2373 ปีที่แล้ว

      There’s hundreds of programs that solves that easily (depending on iPhone model). Just find the latest version, otherwise Apple may have fixed the vulnerability.
      Google is your friend. 😂

  • @jozefvalas
    @jozefvalas ปีที่แล้ว

    may i ask is there someway to get or legally hack my steam account back as someone hacked it and changed the password email and phone do u have any tips as steam support aint very helpful

    • @UCXWmsx-oM-WKahAKSNy-ATw
      @UCXWmsx-oM-WKahAKSNy-ATw ปีที่แล้ว

      If ur sure there’s no way to recover ur account as the rightful owner then contact support. If they’re no help then oh well. try to be more careful online so it doesn’t happen again

  • @peterwryter
    @peterwryter ปีที่แล้ว

    Is it possible to block a video using cmd

  • @NekuroMC
    @NekuroMC ปีที่แล้ว

    im not even a newbie im just watching to recall my memory XD

  • @iamagastya0
    @iamagastya0 ปีที่แล้ว

    That's Amazing method

  • @funstop6669
    @funstop6669 ปีที่แล้ว +1

    How to bypass Snapchat suspicious login code thing without code?

  • @II_icope_II
    @II_icope_II ปีที่แล้ว

    Love you Loi. your my best friend now bro.

  • @marat477
    @marat477 ปีที่แล้ว

    trop bien mais trop vite... 😕 difficile à suivre le texte. dommage.

  • @tefomodisagae4915
    @tefomodisagae4915 ปีที่แล้ว +2

    How can i learn ethical hacking for free??

  • @L1Q8
    @L1Q8 ปีที่แล้ว +2

    I love u bro ❤

  • @ajaykumar1
    @ajaykumar1 ปีที่แล้ว +1

    Title should be "How hackers hack any website in 23 minutes ??"
    BTW informative Video man !!!!!!

  • @michaelreang2994
    @michaelreang2994 ปีที่แล้ว

    Big bro till date you didn't teach me to hack by your termux videos. I need yours faithfully help

  • @Mortal_To_Immortal
    @Mortal_To_Immortal ปีที่แล้ว +1

    @loi i have been reading n watching many hacking videos and none of them are useful
    they are bunch of view eater.
    In my case i have a normal target just to find about hostname n target machine ip.
    i had search there website and i got every details like ip dns email of the website
    in every video they just give little bit of information.
    They dont tell how to find about target machine ip n hostname from website

  • @anixff
    @anixff ปีที่แล้ว +1

    Hi, how to root android phone?

    • @NekoLoliChan
      @NekoLoliChan 10 หลายเดือนก่อน

      I think you misclicked a video

  • @sultanadilkhan-3008
    @sultanadilkhan-3008 2 หลายเดือนก่อน

    this link is not working

  • @user-rs5lg7du5z
    @user-rs5lg7du5z ปีที่แล้ว

    Can we use dev tool instead of burpsuit?

    • @NekoLoliChan
      @NekoLoliChan 10 หลายเดือนก่อน

      I dont think so. I mean maybe through a lot of coding know how and make it harder for you but burp makes it easy

  • @Lover-boy-gi2td
    @Lover-boy-gi2td 9 หลายเดือนก่อน

    does it work on windows11?

  • @AtharvAware-w8f
    @AtharvAware-w8f 5 หลายเดือนก่อน

    There is no doubt that you will rise fast at the apex of your career *TECH SAFE GUARDIAN* . Because you are a very intelligent, smart, hard worker and your work ethic par excellence. Keep going People like you take the IM out of Impossible by becoming PRO at tackling Problems. You Rock!

  • @DerMannmitdenvielenlegenden
    @DerMannmitdenvielenlegenden ปีที่แล้ว

    loi please u must learn better to draw, my engllish as german guy is not the yellow from the egg and when i must endkrypto ur Artwork it is very hard to learn from u, but i find u are a very good teacher... so please better draw in german we say du hast ne sauklaue die kein schwein lesen kann... thanks fpr teaching me loi

  • @princeshin9603
    @princeshin9603 ปีที่แล้ว

    How did you do the lookz like an 8 but not how 5:49

  • @hakmat1769
    @hakmat1769 ปีที่แล้ว

    if you forget your password you know where to find it

  • @stefanjohansson2373
    @stefanjohansson2373 ปีที่แล้ว +1

    Question from a total newbie:
    Doesn’t the AIO security (WP plug-in) block these kind of attempts immediately? My thoughts are that this maybe was easier some years ago when many websites didn’t update their security automatically.
    Today a website in shared hosting often gets blocked automatically by the hosting company if the sites refusing to update WP theme, plugins, php and so on.
    Someone with skills that mind to inform this lost newbie soul?! 😂

    • @John-zt6lc
      @John-zt6lc 7 หลายเดือนก่อน

      wordpress is shit all the wafs fucking suck

  • @الوقايةخيرمنالعلاج-ظ1ق
    @الوقايةخيرمنالعلاج-ظ1ق ปีที่แล้ว

    What need hacker to hack laptop or desktop?

  • @defimine
    @defimine ปีที่แล้ว

    Hi Shal we discuss about the defimine usdt jingchen now

  • @RajuKeMama1122
    @RajuKeMama1122 ปีที่แล้ว +1

    We need this

  • @dany2685
    @dany2685 ปีที่แล้ว +2

    Bro... user ids in url? That s the dumbest thing I have ever seen and still people are using these things. In my university for example in their site there was a few years ago this issue.

    • @SachinRajpurohit-o7u
      @SachinRajpurohit-o7u ปีที่แล้ว

      Now we have slugs in the place of user I'd

    • @SachinRajpurohit-o7u
      @SachinRajpurohit-o7u ปีที่แล้ว

      I think developer income is less that's why he is using I'd instant of slugs

    • @dany2685
      @dany2685 ปีที่แล้ว

      Yeah. One secure way is to use the auth token after login to get data for a specific user. Tho if the site has some XSS problems you could get the session id and replicate the session of others or make sql injection that will get you the user data. Sessions must have a timespan of 30 min or less to be harder to break.

  • @nirbhaymishra4222
    @nirbhaymishra4222 ปีที่แล้ว +2

    Thanks man
    Exciting to watch your videos

  • @yungx811
    @yungx811 ปีที่แล้ว +1

    how to hack api's plz

  • @aothman979
    @aothman979 ปีที่แล้ว

    Should you use any VPN so that they do not come to your home to discuss your level of intelligence?

    • @John-zt6lc
      @John-zt6lc 7 หลายเดือนก่อน

      no hit it home wifi and deface the site with ur addy like

  • @JohnDoe-l2m
    @JohnDoe-l2m ปีที่แล้ว

    A lot of this is confusing. What terminal are you using? Is this terminal application an app, or can be? What Kali Linux app do you recommend downloading for Androids and Windows desktops, & laptops? Have a basics getting started playlist? Have a legend guide explaining what all these symbols mean and do, such as < or - or " or etc. ?

    • @orcundinlerr
      @orcundinlerr ปีที่แล้ว +1

      it is default terminal in kali linux. all apps in this video already satisfied in kali linux.

  • @pppkenken6610
    @pppkenken6610 ปีที่แล้ว

    Thanks

  • @Sodaduhking
    @Sodaduhking ปีที่แล้ว

    bros a network chuck rip off and i respect that

    • @John-zt6lc
      @John-zt6lc 7 หลายเดือนก่อน

      loi>networkchuck

  • @AmbeFilms76
    @AmbeFilms76 ปีที่แล้ว

    Only mobile number se phone Ko all control kaise kare?

  • @demotedc0der
    @demotedc0der ปีที่แล้ว +1

    I'm really confused
    , because I see that beef cookie everywhere as well, and I don't know how to get rid of. Is there anyone who has sorted it out?

    • @weirdlyelectric7332
      @weirdlyelectric7332 ปีที่แล้ว

      Are you talking about the cookie puller BeEf?

    • @demotedc0der
      @demotedc0der ปีที่แล้ว

      6:32 that BEEFHOOK:xxxxx
      cookie I mean

    • @demotedc0der
      @demotedc0der ปีที่แล้ว

      only if Im on incognito ,its not there

  • @asifjaved9844
    @asifjaved9844 ปีที่แล้ว

    Great sir

  • @adnangraphicsjobsgroup455
    @adnangraphicsjobsgroup455 ปีที่แล้ว

    Sir we hack any website database and inseart data How it is posibal, sir you should make a video for this topic. I request to you please make a video on this topic, How to hack a website database and inseart data.

  • @gamer-xf1hf
    @gamer-xf1hf ปีที่แล้ว

    iam also learing u r course

  • @iabyang-4533
    @iabyang-4533 10 หลายเดือนก่อน

    why your last name is Yang , are you hmong or not

  • @Mikodo_games
    @Mikodo_games ปีที่แล้ว +1

    Dwi mkad wla sir thwa

  • @factonview
    @factonview ปีที่แล้ว

    Bhai jab hackers ek min mae bhi website hack kar sakte hae to tu 1 min ki hi video banata 😊