watch this video to see how can you exploit using SQL injection. full video link in  first comment
Cyber Security Unplugged
watch this video to see how can you exploit using SQL injection. full video link in first comment
1:01
Exploitation With Windows God Mode
Cyber Security Unplugged
Exploitation With Windows God Mode
22:13
Camera And Process Explorer In Python Hack The Day
Cyber Security Unplugged
Camera And Process Explorer In Python Hack The Day
17:11
File System Commands In Kali Linux
Cyber Security Unplugged
File System Commands In Kali Linux
19:25
Reverse Shell (Exploit Development) In Python  Part 2
Cyber Security Unplugged
Reverse Shell (Exploit Development) In Python Part 2
44:09
Reverse Shell In Python (Exploit Development) Part 1
Cyber Security Unplugged
Reverse Shell In Python (Exploit Development) Part 1
26:33
A Ransomeware Attack Using Python
Cyber Security Unplugged
A Ransomeware Attack Using Python
23:42
Creating Luhn Algorithm In Java From Scratch
Cyber Security Unplugged
Creating Luhn Algorithm In Java From Scratch
24:37
How To Run Applications On Startup#Shorts
Cyber Security Unplugged
How To Run Applications On Startup#Shorts
0:50
How To Run Applications on Startup#shorts
Cyber Security Unplugged
How To Run Applications on Startup#shorts
0:50
TOR Can Put You In Danger
Cyber Security Unplugged
TOR Can Put You In Danger
14:48
Is TOR Provides Anynoumity
Cyber Security Unplugged
Is TOR Provides Anynoumity
8:18
How To Make Virtual Environments In Python
Cyber Security Unplugged
How To Make Virtual Environments In Python
12:12
Don't Delete System 32 Files Else You Are In Trouble
Cyber Security Unplugged
Don't Delete System 32 Files Else You Are In Trouble
6:20
Calculator In Java
Cyber Security Unplugged
Calculator In Java
7:51
Java Program Flow Structure [ Special Video ]
Cyber Security Unplugged
Java Program Flow Structure [ Special Video ]
10:50
Functions In Java [Functional Programming]
Cyber Security Unplugged
Functions In Java [Functional Programming]
16:28
primitive datatypes in java
Cyber Security Unplugged
primitive datatypes in java
6:16
more ways to use while loop
Cyber Security Unplugged
more ways to use while loop
9:16
multidimensional arrays in java part-2
Cyber Security Unplugged
multidimensional arrays in java part-2
12:40
Number Conversion System in Java Part 2
Cyber Security Unplugged
Number Conversion System in Java Part 2
13:48
Hide Your Identity With Proxychains
Cyber Security Unplugged
Hide Your Identity With Proxychains
21:09
Number Conversion System in Java Part-1
Cyber Security Unplugged
Number Conversion System in Java Part-1
31:18
multidimensional arrays in java Part-1
Cyber Security Unplugged
multidimensional arrays in java Part-1
30:17
guess number game in java
Cyber Security Unplugged
guess number game in java
15:15
reserved keywords in java
Cyber Security Unplugged
reserved keywords in java
10:33
Recovering Deleted Files
Cyber Security Unplugged
Recovering Deleted Files
16:55
Installing Kali Linux In Virtual Box
Cyber Security Unplugged
Installing Kali Linux In Virtual Box
13:35
Hospital Managment System In Java
Cyber Security Unplugged
Hospital Managment System In Java
25:32
String Methods In Java [ Java Video Number 19 ]
Cyber Security Unplugged
String Methods In Java [ Java Video Number 19 ]
20:20
Programium Intro Video
Cyber Security Unplugged
Programium Intro Video
1:09
Arrays in Java part-2 [Java Video Number 18]
Cyber Security Unplugged
Arrays in Java part-2 [Java Video Number 18]
13:18
Arrays in java Part-1 [ Java Video Number 17 ]
Cyber Security Unplugged
Arrays in java Part-1 [ Java Video Number 17 ]
21:26
Prime Number checker and Prime Number Up-to a Number in java [ Java Video Number 16 ]
Cyber Security Unplugged
Prime Number checker and Prime Number Up-to a Number in java [ Java Video Number 16 ]
23:01
break and continue statements in java  [ Java Video Number 15 ]
Cyber Security Unplugged
break and continue statements in java [ Java Video Number 15 ]
11:45
Debugging ,Syntax Error and Logical Error [ Video Number 14 ]
Cyber Security Unplugged
Debugging ,Syntax Error and Logical Error [ Video Number 14 ]
23:53
Practice video:  Sum-Up program, Average Program in Java [ Java video number 13 ]
Cyber Security Unplugged
Practice video: Sum-Up program, Average Program in Java [ Java video number 13 ]
21:05
Loops in java, for loop ,while loop ,do-while loop, tables [ Java video number 12]
Cyber Security Unplugged
Loops in java, for loop ,while loop ,do-while loop, tables [ Java video number 12]
28:57
Relational and Assignment Opearator , Operators part-3 [ Java Video Number 11 ]
Cyber Security Unplugged
Relational and Assignment Opearator , Operators part-3 [ Java Video Number 11 ]
22:25
Operators in Java part-2, [ logical operators :video number 10  ]
Cyber Security Unplugged
Operators in Java part-2, [ logical operators :video number 10 ]
31:05
Choose Your Programming Language After Watching This Video [ Guide For Beginners ]
Cyber Security Unplugged
Choose Your Programming Language After Watching This Video [ Guide For Beginners ]
13:27
Conditional Statements In Java [ Java Video Number 9 ]
Cyber Security Unplugged
Conditional Statements In Java [ Java Video Number 9 ]
31:57
Operators in java  part-1 [ Java Video number 8]
Cyber Security Unplugged
Operators in java part-1 [ Java Video number 8]
25:09
System Input Method, Taking Input From Users [Java Video Number 7 ]
Cyber Security Unplugged
System Input Method, Taking Input From Users [Java Video Number 7 ]
18:11
Java Variable Naming Convention [Java Video Number 6]
Cyber Security Unplugged
Java Variable Naming Convention [Java Video Number 6]
8:11
Full guide towards Variables and Comments  [ Java Video Number 5]
Cyber Security Unplugged
Full guide towards Variables and Comments [ Java Video Number 5]
37:27
Source Code, .class Files, Bytecode , Debugging And Lot More [ Java Video Numer 4]
Cyber Security Unplugged
Source Code, .class Files, Bytecode , Debugging And Lot More [ Java Video Numer 4]
10:59
Our Hello Wolrd Program, IDE and Notepad difference [ Java Video Number 3]
Cyber Security Unplugged
Our Hello Wolrd Program, IDE and Notepad difference [ Java Video Number 3]
26:26
Installing JDK and Intellij java [ Java Video Number 2]
Cyber Security Unplugged
Installing JDK and Intellij java [ Java Video Number 2]
7:14
Java Tutorial for Absolute Beginers [ java Video Number 1]
Cyber Security Unplugged
Java Tutorial for Absolute Beginers [ java Video Number 1]
6:52