JakSec
How Hidden Inheritance Can AffectJavaScript Objects #shorts
1:08
JakSec
Prototype Pollution with JSON Explained #shorts
1:22
JakSec
Using JS Feature Flags to Unlock Hidden Scope | Bug Bounty Explained
16:46
JakSec
JavaScript Inheritance: Changing After Declaration #shorts
1:24
JakSec
Root Cause of HackerOne IDOR Vulnerability #shorts
1:00
JakSec
PayPal IDOR Vulnerability Explained #shorts
1:02
JakSec
HackerOne IDOR Allows Access to Private Reports #shorts
0:48
JakSec
Firefox Vulnerability: Delete Accounts Via Single Sign-On #shorts
1:25
JakSec
JavaScript Prototype Pollution | Bug Bounty Explained
25:43
JakSec
IDOR Infinite Money Glitch? | Bug Bounty Hacktivity Explained
15:29
JakSec
Achieving XSS via Google Drive ThumbnailLink Injection #bugbounty
1:03
JakSec
Google Drive XSS via JavaScript URL #bugbounty
1:03
JakSec
Google Drive Exploit Techniques Explained #bugbounty
1:03
JakSec
Hacking Google Drive Integrations | Bug Bounty Explained
30:30
JakSec
Bug Bounty First Year Earnings: Realistic Numbers #bugbounty
1:14
JakSec
Focus on 2-3 Programs for Critical Vulnerabilities #bugbounty
0:35
JakSec
Focus on New Features for Better Bug Bounties #bugbounty
1:14
JakSec
How did I do? | 2025 Bug Bounty Year Review
17:40
JakSec
Achieving XSS with JavaScript URL and PostMessage #bugbounty
1:14
JakSec
JavaScript Reveals AWS API Keys #bugbounty
0:48
JakSec
Turn a $2000 Bug Bounty Into $10000 #bugbounty
0:49
JakSec
JavaScript For Hackers [FIXES] | Bug Bounty Explained
24:20
JakSec
How Infrastructure is Reused via Iframes #bugbounty #bugbounty
0:52
JakSec
Finding Vulnerabilities With JavaScript | Bug Bounty Hacktivity Explained
16:25
JakSec
PostMessage Implementation and Vulnerabilities #bugbounty
0:59
JakSec
DOM Cross-Site Scripting Explained #bugbounty
0:49
JakSec
Cross-Site Scripting Explained #bugbounty
0:58
JakSec
JavaScript For Hackers | Bug Bounty Explained
28:57
JakSec
The Ideal Way to Prevent Subdomain Takeovers #bugbounty #hacker
0:42
JakSec
Subdomain Takeover Explained: CNAME Records & DNS Magic #bugbounty #hacker
1:14
JakSec
Hijack Domains using Misconfigured DNS #bugbounty #hacker
0:59
JakSec
Subdomain Takeover: Exploiting 'Page Not Found' Vulnerabilities #bugbounty #hacker
1:22
JakSec
Subdomain Takeover | Bug Bounty Explained
15:10
JakSec
Recon: Sort Useless APIs Fast with AI #bugbounty #hacker
1:10
JakSec
Custom Recon Tools: Find Hidden Web APIs with Regex #bugbounty #hacker
1:07
JakSec
Using API Docs for Bug Bounty #bugbounty #hacker
1:15
JakSec
Web Security Recon: Wide Attack Surface vs. Deep Dive Strategy #bugbounty #hacker
0:58
JakSec
Finding Leads With Manual Recon | Bug Bounty Explained
25:37
JakSec
Learn to Approach GraphQL Endpoints | Bug Bounty Explained
28:27
JakSec
Understand JSON Web Tokens (JWTs) | Bug Bounty Explained
17:35
JakSec
S3 Bucket Vulnerability: Find API Keys & Sensitive Data #bugbounty #cybersecurity #hacker
1:05
JakSec
How to Test for Presigned URLs in File Upload Functionality #bugbounty #hacker #cybersecurity
1:04
JakSec
Showing Impact For Customers with Client-Side Vulnerabilities #hacker #bugbounty #cybersecurity
0:33
JakSec
How I Made $2,500 From a High Severity Vulnerability | Bug Bounty Hacktivity Explained
20:48
JakSec
Showing Server-Side Impact with API Keys & Variables #hacker #bugbounty #cybersecurity
0:40
JakSec
Actionable Steps to Get Your First 4 Digit Bounty #hacker #bugbounty #cybersecurity
0:51
JakSec
Four Digit Payout Methodology | Bug Bounty Explained
11:41
JakSec
Server-Side Path Traversal Explained #bugbounty #hacker #cybersecurity
1:13
JakSec
$9000 Client-Side Path Traversals in Gitlab/Acronis | Bug Bounty Hacktivity Explained
19:59
JakSec
Showing Impact with Client Side Path Traversal #bugbounty #hacker
0:49
JakSec
Client Side Path Traversal Explained #bugbounty #hacker
0:40
JakSec
Client-Side Path Traversals | Bug Bounty Explained
20:22
JakSec
'Feature-Centric' Methodology for Bug Bounty #bugbounty #hacker
1:03
JakSec
Finding an IDOR using the Feature-Centric Methodology #bugbounty #hacker
1:20
JakSec
Hunt for Features not Vulnerability Types #bugbounty #hacker
0:43
JakSec
Getting Started on a New Program | Bug Bounty Methodology
16:20
JakSec
Why Choosing a Familiar Target Matters #bugbounty #bugcrowd #hacker
1:09
JakSec
What to Look For Before Selecting a Bug Bounty Target #bugbounty #bugcrowd
1:05
JakSec
What to Consider When Selecting a Target | Bug Bounty Essentials
8:44
JakSec
Attacking Kubernetes Clusters with SSRF #bugbounty
1:06
JakSec
SSRF Cloud Metadata Exploit #bugbounty
1:17
JakSec
Exploiting Blind Server Side Request Forgery #bugbounty
1:09
JakSec
$25000 SSRF in Shopify + AppSheet Metadata Leak | Bug Bounty Hacktivity Explained
14:50
JakSec
Localhost Port Scan | Find Hidden Services & Vulnerabilities #bugbounty
0:59
JakSec
Server Side Request Forgery Explained #bugbounty
1:09
JakSec
Server Side Request Forgery (SSRF) | Bug Bounty Explained
21:24
JakSec
Uploading Files to an S3 Bucket with Presigned URLs
1:03
JakSec
Insecure Direct Object Reference (IDOR) Methodology | Bug Bounty Explained
21:38
JakSec
S3 Bucket Vulnerability: Accessing Files with Presigned URLs
1:17
JakSec
SQL Injection with SqlMap
0:29
JakSec
Finding High Severity Vulnerabilities in Amazon S3 Buckets | Bug Bounty Explained
24:09
JakSec
CORS Headers Explained
1:16
JakSec
Where is SQLi in Modern Websites? | Bug Bounty Hacktivity Explained
20:49
JakSec
Bug Bounty Recon Basics: Find More Attack Surface with Fuzzing
16:27
JakSec
Python for Hackers and Bug Bounty Hunters
27:28
JakSec
Bug Bounty Essentials: Microservices vs Monoliths
18:32
JakSec
Bug Bounty Essentials: Websockets Protocol
12:10
JakSec
5 Tips to Get Your Bug Bounty Reports Triaged Faster
12:01
JakSec
Bug Bounty Hacktivity Explained #3: How Misconfigured Caches Led to XSS and DoS
16:45
JakSec
Cross-Site Request Forgery in Bug Bounty
26:34
JakSec
Bug Bounty Essentials: Analysing and Understanding HTTP Requests
19:40
JakSec
What and Where: Cross Site Leaks
23:22
JakSec
Bug Bounty Hacktivity Explained #2: Critical Bugs on Confluence and Evernote
12:35
JakSec
What and Where: CORS Misconfigurations
17:44
JakSec
Bug Bounty Essentials: Reading and Understanding HTML
16:32
JakSec
Prompt Injection: How Bug Bounty Hunters are Exploiting LLMs
11:41
JakSec
What Is Bug Bounty?
9:18
JakSec
Bug Bounty Hacktivity Explained #1: 10000$ Account Takeover on Uber and Zenly
7:28
JakSec
Race Conditions: Exploiting Websites with Concurrent Requests
9:23