Vickie Li Dev
Scanning for hardcoded secrets in source code | Security Simplified
5:39
Vickie Li Dev
Career and Community building with Bug Bounties | NahamCon Panel
1:05:08
Vickie Li Dev
How to conduct a basic security code review | Security Simplified
9:27
Vickie Li Dev
Launching an InfoSec Career: My six essential tips | Security Simplified
40:53
Vickie Li Dev
Building a secure application in five steps | Security Simplified
8:47
Vickie Li Dev
How to learn anything in Computer Science or Cybersecurity | Security Simplified
9:21
Vickie Li Dev
Building a secure application: the first step | Security Simplified
3:05
Vickie Li Dev
They are all Injection Vulnerabilities! - Security Simplified
6:39
Vickie Li Dev
Getting into a Development Career with Seho Lim
31:52
Vickie Li Dev
Working in AppSec and Getting into Cybersecurity with Ozioma "Ozy" Aghamba
56:12
Vickie Li Dev
Chatting with @Hacksplained about Bug Bounties and Infosec Jobs
24:02
Vickie Li Dev
Attacking Sites Using CSRF - Security Simplified
6:22
Vickie Li Dev
Intro to CSRF (Cross-Site Request Forgery) - Security Simplified
3:55
Vickie Li Dev
Hacking banks with race conditions
5:49
Vickie Li Dev
How to prevent PHP type juggling vulnerabilities
2:39
Vickie Li Dev
Exploiting PHP Type Juggling Vulnerabilities - Security Simplified
4:27
Vickie Li Dev
How Attackers Bypass MFA (Multi-Factor Authentication) - Security Simplified
5:22
Vickie Li Dev
Why Is Validating URLs So Hard?
5:52
Vickie Li Dev
How to Prevent Open Redirects in your Applications
3:31
Vickie Li Dev
Hacking SSO: Authentication Bypass by Stealing OAuth Tokens
5:57
Vickie Li Dev
How to Prevent Command Injections
3:57
Vickie Li Dev
Intro to Command Injection | Security Simplified
2:45
Vickie Li Dev
How To Prevent IDORs | Security Simplified
3:04
Vickie Li Dev
How to Prevent SSRF Vulnerabilities (Server-Side Request Forgery)
4:08
Vickie Li Dev
Understanding Insecure Deserialization Vulnerabilities: Security Simplified
7:35
Vickie Li Dev
What are IDORs (Insecure Direct Object References)?
4:09
Vickie Li Dev
Hacking SSO: SAML Signature Misconfigurations
6:01
Vickie Li Dev
Hacking SSO: Stealing Cookies With Subdomain Takeovers
3:27
Vickie Li Dev
Hacking SSO: Overview
3:57
Vickie Li Dev
Wildcard Injection Privilege Escalation: Linux Security 07
5:27
Vickie Li Dev
Misconfigured PATH Privilege Escalation: Linux Security 06
6:15
Vickie Li Dev
SUDO Privilege Escalation: Linux Security 05
5:33
Vickie Li Dev
Overprivileged Processes Privilege Escalation: Linux Security 04
4:57
Vickie Li Dev
Intro to Open Source Recon
32:51
Vickie Li Dev
SUID Privilege Escalation: Linux Security 03
4:26
Vickie Li Dev
Cron Privilege Escalation: Linux Security 02
5:49
Vickie Li Dev
Linux Permissions: Linux Security 01
5:27
Vickie Li Dev
Forging Requests With SSRF: Security Simplified
8:06
Vickie Li Dev
SQL Injection Prevention: Security Simplified
9:44
Vickie Li Dev
What is SQL Injection? -- Security Simplified
5:33