Medusa
Report Writing Tips to Maximize Your Bounty
8:41
Medusa
How to Discover High-Paying IDOR Bugs in Real Apps?
11:45
Medusa
Bug Bounty Tip: Advanced GitHub Dorking for Maximum Results!
16:43
Medusa
Don’t Sleep on Race Conditions – Easy Miss, Big Impact
13:58
Medusa
Unboxing the Trap: The Dependency Confusion Hack🎙 Snake Bytes Ep. 5: Package Trap
11:33
Medusa
Stop Ignoring These Business Logic Issues!
17:46
Medusa
Hacking Blogs on Medium — Hits, Misses & WTF Moments
23:25
Medusa
Train Your XSS Muscles With Me!
32:51
Medusa
Exploiting Exact-match Cache Rules for Web Cache Deception | PortSwigger Lab | Explained
13:04
Medusa
Grafana CVE-2025-4123: How XSS + Open Redirect Led to Full Account Takeover
14:52
Medusa
Exploiting Cache Server Normalization for Web Cache Deception | PortSwigger Lab | Explained
10:14
Medusa
How to Exploit Uncommon HTTP Headers for Hacking & Bug Bounties?
11:34
Medusa
Mastering OAuth 2.0 Flows: Complete Guide + Security Testing Tips (Okta OAuth Playground)
29:40
Medusa
Why Bug Bounty Hunters Still Check xmlrpc.php in 2025?
9:43
Medusa
Exploiting Origin Server Normalization For Web Cache Deception | PortSwigger | Explained
10:13
Medusa
Exploiting Path Delimiters for Web Cache Deception | PortSwigger Lab | Explained
9:20
Medusa
Exploiting Path Mapping For Web Cache Deception | PortSwigger Lab | Explained
4:28
Medusa
Web Cache Deception Made Simple – What You Need to Know!
12:55
Medusa
You Asked, I Answered: Anonymous Q&A And My Reaction 😳
22:04
Medusa
This Tiny Upload Flaw = Full RCE on Tomcat?! (CVE-2025-24813 Deep Dive)
11:19
Medusa
GraphQL Attacks in the Wild: IDOR, SQLi & More | PART 2
22:27
Medusa
How Bug Hunters Map GraphQL APIs? | PART 1
17:28
Medusa
Bug Bounty Recon: Shadow APIs, Zombie Endpoints & How to Find Them?
15:25
Medusa
Epic Infosec Week!
4:45
Medusa
This Web Application is COOKED! Can we fix it?
37:32
Medusa
Bug Bounty Hunters, Can You Beat This Quiz?
16:59
Medusa
When 'Access Denied' Fails: Weird Authorization Bugs!
11:59
Medusa
Explaining Random H1 Reports for 20 Minutes Straight!
22:19
Medusa
Testing for Password Reset Poisoning in APIs – A Bug Hunter’s Guide
12:00
Medusa
OWASP API Top 10 Breakdown | Study Session with CTF Challenges (DVAPI)
48:15
Medusa
Authentication Bypass Via JKU Header Injection | JWT Hacking
6:20
Medusa
Authentication Bypass Via JWK Header Injection | JWT Hacking
9:05
Medusa
Subdomain Enumeration ALL KINDS!
9:36
Medusa
Hunting Open Redirects: A Pathway to Chaining XSS
7:59
Medusa
Unmasking the Ghost: The CWE-352 Dilemma🎙 Snake Bytes Ep. 4: Web Ghosts
10:24
Medusa
Web Cache Poisoning: Hunting Methodology & Real-World Examples
11:24
Medusa
The Danger of CWE-922 🎙 Snake Bytes Ep. 3: Data Dumpster
9:22
Medusa
Loose Locks: A Podcast with _smile_hacker_ 🎙 : Snake Bytes Ep. 2
19:02
Medusa
How Missing Keys Leave Your Castle Open🎙 Snake Bytes Ep. 1: Barrier Bypass
7:09
Medusa
How To Exploit SSRF To Fetch AWS Credentials
9:07
Medusa
OWASP API Top 10 - Broken Authentication
8:45
Medusa
XSS Using Indirect Prompt Injection | PART 5
6:17
Medusa
LLM API Hacking | Indirect Prompt Injection in LLM APIs | PART 4
10:10
Medusa
LLM API Hacking | OS Command Injection in LLM APIs | PART 3
8:45
Medusa
LLM API Hacking | Excessive Agency | PART 2
5:50
Medusa
LLM API Hacking | Introduction | PART 1
5:04
Medusa
HTTP Parameter Pollution VS Mass Assignment
8:42
Medusa
IDOR In Shopify GraphQL API | Report Explained
4:03
Medusa
Server-Side Parameter Pollution in REST APIs
14:29
Medusa
Exploring Server-Side Parameter Pollution: Real Case Scenario, Parameter Precedence, and More!
15:17
Medusa
Performing CSRF exploits over GraphQL
13:28
Medusa
Bypassing GraphQL Brute-Force Protections
11:58
Medusa
Finding a Hidden GraphQL Endpoint
9:02
Medusa
Accidental Exposure of Private GraphQL Fields
10:16
Medusa
Accessing Private GraphQL Fields
7:46
Medusa
Exploiting Mass Assignment Vulnerability in API | PortSwigger
5:25
Medusa
How Can Fuzzing Help You Find Hidden API Endpoints?
9:18
Medusa
How Hackers Exploit API Endpoints Using Documentation?
7:13
Medusa
How To Perform DOS Attack in GraphQL | Circular Relationship | Prevention
6:26
Medusa
How Broken Functionality Level Authorization Occurs? | Code Analysis and Prevention
8:51
Medusa
How to Discover API Subdomains? | Subdomain Enumeration | API Hacking
5:26
Medusa
How Mass Assignment Gives You Admin Privileges? | APIs | Code Examples |
9:24
Medusa
JWT authentication bypass via 'X-HTTP-Method-Override' Header
3:14
Medusa
How BOLA in API Endpoint can lead to Account Takeover | Postman | API Security
4:38
Medusa
Bypass JWT Authentication By Bruteforcing Secret Key | PortSwigger |
6:54
Medusa
Bypass JWT Signature via Flawed Authentication | Access Admin Panel |
5:57
Medusa
Exploiting Stored XSS in GraphQL | DVGA |
3:43
Medusa
Exploiting Command Injection in GraphQL | DVGA |
5:03
Medusa
Exploiting SQL Injection in GraphQL | DVGA |
7:00
Medusa
Graphql Endpoint Analysis | Damn Vulnerable Graphql Application |
17:21
Medusa
TryHackMe: Wireshark Basics | Part 3 |
13:40
Medusa
TryHackMe: Wireshark Basics | Part 2 |
10:50
Medusa
TryHackMe: Wireshark Basics | Part 1 |
13:09
Medusa
Phases of Penetration Testing | WebApp Pentest | Privilege Escalation
19:14
Medusa
XXE Injection to Database Takeover | CVE-2021-29447 | RCE |
13:53
Medusa
Exploiting SQL Injection in API Endpoint | API Hacking | crAPI
5:24
Medusa
Exploiting Mass Assignment Vulnerability | API Hacking | crAPI
5:22
Medusa
Broken Object Level Authorization | Excessive Data Exposure | crAPI
7:09
Medusa
Exploiting Rate Limiting to Brute-Force OTP | crAPI |
8:22
Medusa
Discovering API and Analyzing Endpoints Using Postman and Browser | crAPI |
14:42
Medusa
How to Install crAPI in Kali Linux | OWASP | API Testing |
3:27
Medusa
Exploiting File Upload To Get a Root Shell | Hacker vs Hacker | CTF
15:34
Medusa
PentesterLab Recon Challanges From 16-20 | CTF |
4:03
Medusa
Installation and Usage of Subjack | Subdomain Takeover | Kali Linux Tool
3:11
Medusa
PentesterLab Recon Challanges From 11-15 | CTF |
5:47
Medusa
Create your Own Hash Cracking Tool Using Python | With Slides | Explained
9:36
Medusa
Create your Own Port Scanning Tool Using Python | With Slides | Explained
9:55
Medusa
Create Your Own Subdomain Enumeration Tool Using Python | With Slides | Explained
8:10
Medusa
PROMPT.ML | 0x9 | XSS Challange | Level 9 | Explained
2:34
Medusa
PROMPT.ML | 0x8 | XSS Challange | Level 8 | Explained
5:30
Medusa
PROMPT.ML | 0x7 | XSS Challange | Level 7 | Explained
3:47
Medusa
PROMPT.ML | 0x6 | XSS Challange | Level 6 | Explained
8:03
Medusa
PROMPT.ML | 0x5 | XSS Challange | Level 5 | Explained
2:38
Medusa
PROMPT.ML | 0x4 | XSS Challange | Level 4 | Explained
5:34
Medusa
PROMPT.ML | 0x3 | XSS Challange | Level 3 |
0:52
Medusa
PROMPT.ML | 0x2 | XSS Challange | Level 2 | Explained
2:58
Medusa
PROMPT.ML | 0x1 | XSS Challange | Level 1 | Explained
1:58
Medusa
PROMPT.ML | 0x0 | XSS Challange | Level 0 | Explained
1:16
Medusa
How to install gau tool and use it | Fetch URLS | Github
3:23