TryHackMe React2Shell Exploit | CVE-2025-55182 Bangla Tutorial
OSA Security
TryHackMe React2Shell Exploit | CVE-2025-55182 Bangla Tutorial
22:53
Mastering FFUF HTTP Options 🔥 | Complete Bangla Guide for CTF & Pentesting
OSA Security
Mastering FFUF HTTP Options 🔥 | Complete Bangla Guide for CTF & Pentesting
12:06
FFUF Input & Output Options Deep Dive 🔥 | Bangla Tutorial | CTF / Pentesting
OSA Security
FFUF Input & Output Options Deep Dive 🔥 | Bangla Tutorial | CTF / Pentesting
12:44
FFUF FILTER OPTIONS Explained | -fc -fl -fs -fw -fr -fmode -ft | Bangla Tutorial
OSA Security
FFUF FILTER OPTIONS Explained | -fc -fl -fs -fw -fr -fmode -ft | Bangla Tutorial
10:04
FFUF Filter & Matcher Options Explained | -mc -ml -mr -ms -mw -mt | Bangla Tutorial
OSA Security
FFUF Filter & Matcher Options Explained | -mc -ml -mr -ms -mw -mt | Bangla Tutorial
10:16
PicoCTF Cookies Walkthrough | Web Exploitation | Bangla Tutorial
OSA Security
PicoCTF Cookies Walkthrough | Web Exploitation | Bangla Tutorial
6:08
PicoCTF GET aHEAD Walkthrough | Web Exploitation | Bangla Tutorial
OSA Security
PicoCTF GET aHEAD Walkthrough | Web Exploitation | Bangla Tutorial
1:34
Crack the Gate 1 Authentication Bypass via Custom HTTP Header PicoCTF Web Exploitation Walkthrough
OSA Security
Crack the Gate 1 Authentication Bypass via Custom HTTP Header PicoCTF Web Exploitation Walkthrough
4:04
When Hearts Collide – Love at First Breach 2026 CTF | Bangla Tutorial
OSA Security
When Hearts Collide – Love at First Breach 2026 CTF | Bangla Tutorial
9:00
Cupid’s Matchmaker | Love at First Breach 2026 CTF Walkthrough (Bangla Tutorial)
OSA Security
Cupid’s Matchmaker | Love at First Breach 2026 CTF Walkthrough (Bangla Tutorial)
7:51
TryHeartMe | Love at First Breach 2026 CTF Walkthrough | Bangla Tutorial
OSA Security
TryHeartMe | Love at First Breach 2026 CTF Walkthrough | Bangla Tutorial
14:28
Love Letter Lock | Love at First Breach 2026 CTF  TryHackme| Bangla Tutorial
OSA Security
Love Letter Lock | Love at First Breach 2026 CTF TryHackme| Bangla Tutorial
4:16
Valenfind | Love at First Breach 2026 CTF TryHackme | বাংলা Tutorial
OSA Security
Valenfind | Love at First Breach 2026 CTF TryHackme | বাংলা Tutorial
21:15
Hidden Deep Into My Heart | TryHackMe Love at First Breach 2026 CTF Walkthrough Bangla Tutorial
OSA Security
Hidden Deep Into My Heart | TryHackMe Love at First Breach 2026 CTF Walkthrough Bangla Tutorial
7:12
Love at First Breach: Exploiting CupidBot & CTF Labs Bangla Tutorial
OSA Security
Love at First Breach: Exploiting CupidBot & CTF Labs Bangla Tutorial
2:10
Detecting NoSQL Injection | PortSwigger Lab-01 Walkthrough (Step-by-Step)
OSA Security
Detecting NoSQL Injection | PortSwigger Lab-01 Walkthrough (Step-by-Step)
6:47
Manipulating WebSocket messages to exploit vulnerabilities |  Bangla Tutorial Lab-01
OSA Security
Manipulating WebSocket messages to exploit vulnerabilities | Bangla Tutorial Lab-01
11:55
Insecure direct object references | Lab-09 Bangla Tutorial
OSA Security
Insecure direct object references | Lab-09 Bangla Tutorial
6:33
User ID controlled by request parameter with password disclosure | Lab-08 Bangla
OSA Security
User ID controlled by request parameter with password disclosure | Lab-08 Bangla
5:52
User ID controlled by request parameter with data leakage in redirect | lab -07 Bangla
OSA Security
User ID controlled by request parameter with data leakage in redirect | lab -07 Bangla
3:47
User ID controlled by request parameter, with unpredictable user IDs | bangla lab-6
OSA Security
User ID controlled by request parameter, with unpredictable user IDs | bangla lab-6
4:29
SQL Injection Attack: Querying Database Type and Version on MySQL and Microsoft SQL Server lab-04
OSA Security
SQL Injection Attack: Querying Database Type and Version on MySQL and Microsoft SQL Server lab-04
6:09
SQL Injection Attack | Querying Database Type & Version on Oracle | PortSwigger Lab-03
OSA Security
SQL Injection Attack | Querying Database Type & Version on Oracle | PortSwigger Lab-03
10:43
httpx Commands Tutorial for Bug Bounty Hunters part-01
OSA Security
httpx Commands Tutorial for Bug Bounty Hunters part-01
17:40
SSRF Filter Bypass via Open Redirection | SSRF Exploitation Explained Lab-05
OSA Security
SSRF Filter Bypass via Open Redirection | SSRF Exploitation Explained Lab-05
10:04
SSRF with Blacklist-Based Input Filter | Bypassing Filters | Web Security Lab-4
OSA Security
SSRF with Blacklist-Based Input Filter | Bypassing Filters | Web Security Lab-4
6:29
Blind SSRF with Out-of-Band Detection | SSRF Explained | Web Security Lab-3 Walkthrough
OSA Security
Blind SSRF with Out-of-Band Detection | SSRF Explained | Web Security Lab-3 Walkthrough
3:57
Google Dorking Explained | TryHackMe Google Dorking Lab Walkthrough
OSA Security
Google Dorking Explained | TryHackMe Google Dorking Lab Walkthrough
28:59
Exploiting an API Endpoint Using Documentation | API Security Lab-01 Walkthrough
OSA Security
Exploiting an API Endpoint Using Documentation | API Security Lab-01 Walkthrough
6:14
NoSQL Injection Explained part-1| Authentication Bypass Lab Walkthrough | Web Security
OSA Security
NoSQL Injection Explained part-1| Authentication Bypass Lab Walkthrough | Web Security
26:46
Linux Fundamentals Part 1 | TryHackMe Walkthrough | Beginner Linux Tutorial
OSA Security
Linux Fundamentals Part 1 | TryHackMe Walkthrough | Beginner Linux Tutorial
19:49
Basic SSRF against Another Back-End System | Lab-02 Solution
OSA Security
Basic SSRF against Another Back-End System | Lab-02 Solution
4:25
Server-Side Request Forgery (SSRF) | Basic Concept Explained
OSA Security
Server-Side Request Forgery (SSRF) | Basic Concept Explained
3:55
This Is Sparta | CyberTalents Web Security Lab Solution
OSA Security
This Is Sparta | CyberTalents Web Security Lab Solution
9:25
#ethicalhacking #clientside #webexploitation #cybersecuritycompany #cybersecurity #programming
OSA Security
#ethicalhacking #clientside #webexploitation #cybersecuritycompany #cybersecurity #programming
0:52
SQL Injection Login Bypass | Authentication Bypass | PortSwigger Lab-02 Walkthrough
OSA Security
SQL Injection Login Bypass | Authentication Bypass | PortSwigger Lab-02 Walkthrough
2:17
SQL Injection in WHERE Clause | Retrieve Hidden Data | PortSwigger Lab-1 Walkthrough
OSA Security
SQL Injection in WHERE Clause | Retrieve Hidden Data | PortSwigger Lab-1 Walkthrough
7:27
User ID Controlled by Request Parameter | Broken Access Control | PortSwigger Lab-05
OSA Security
User ID Controlled by Request Parameter | Broken Access Control | PortSwigger Lab-05
2:52
User Role Can Be Modified in User Profile | Broken Access Control | PortSwigger Lab-04
OSA Security
User Role Can Be Modified in User Profile | Broken Access Control | PortSwigger Lab-04
4:07
User Role Controlled by Request Parameter | Broken Access Control | PortSwigger Lab-03
OSA Security
User Role Controlled by Request Parameter | Broken Access Control | PortSwigger Lab-03
6:41
Unprotected Admin Functionality with Unpredictable URL | Broken Access Control | PortSwigger Lab-02
OSA Security
Unprotected Admin Functionality with Unpredictable URL | Broken Access Control | PortSwigger Lab-02
2:23
Unprotected Admin Functionality | Broken Access Control Vulnerability | PortSwigger Lab-01
OSA Security
Unprotected Admin Functionality | Broken Access Control Vulnerability | PortSwigger Lab-01
8:25
Auto Change IP Address In Every 3 Seconds on Kali Linux 2026
OSA Security
Auto Change IP Address In Every 3 Seconds on Kali Linux 2026
9:53
Source Code Disclosure via Backup Files | Apprentice Lab | Bangla Tutorial
OSA Security
Source Code Disclosure via Backup Files | Apprentice Lab | Bangla Tutorial
2:22
Information Disclosure on Debug Page | Web Vulnerability Explained | Bangla Tutorial
OSA Security
Information Disclosure on Debug Page | Web Vulnerability Explained | Bangla Tutorial
3:25
Information Disclosure in Error Messages | Web Vulnerability Explained | Bangla Tutorial
OSA Security
Information Disclosure in Error Messages | Web Vulnerability Explained | Bangla Tutorial
2:11
WHOIS Record Explained | Domain Reconnaissance for Pentesting | Bangla Tutorial
OSA Security
WHOIS Record Explained | Domain Reconnaissance for Pentesting | Bangla Tutorial
14:58
ইমু শো না করলে যে ভাবে অন্য কারো ইমু একাউন্ট কানেক্ট করবেন
OSA Security
ইমু শো না করলে যে ভাবে অন্য কারো ইমু একাউন্ট কানেক্ট করবেন
1:26
Blind XXE with Out-of-Band Interaction via XML Parameter Entities | PortSwigger Lab-04
OSA Security
Blind XXE with Out-of-Band Interaction via XML Parameter Entities | PortSwigger Lab-04
4:41
Blind XXE with Out-of-Band Interaction | PortSwigger Lab -03
OSA Security
Blind XXE with Out-of-Band Interaction | PortSwigger Lab -03
10:11
Blind OS Command Injection with Out-of-Band Data Exfiltration | PortSwigger Lab Walkthrough
OSA Security
Blind OS Command Injection with Out-of-Band Data Exfiltration | PortSwigger Lab Walkthrough
5:24
Blind OS Command Injection with Out-of-Band Interaction | PortSwigger Lab Walkthrough
OSA Security
Blind OS Command Injection with Out-of-Band Interaction | PortSwigger Lab Walkthrough
6:10
Blind OS Command Injection with Output Redirection | Web Exploitation | Bangla Tutorial
OSA Security
Blind OS Command Injection with Output Redirection | Web Exploitation | Bangla Tutorial
6:04
Blind OS Command Injection with Time Delays | PortSwigger Lab Walkthrough
OSA Security
Blind OS Command Injection with Time Delays | PortSwigger Lab Walkthrough
5:18
OS Command Injection | Simple Case Explained | PortSwigger Lab | Bangla
OSA Security
OS Command Injection | Simple Case Explained | PortSwigger Lab | Bangla
4:47
ddos attack 2nd part attack exploit done tutorial bangla
OSA Security
ddos attack 2nd part attack exploit done tutorial bangla
9:59
DDOS attack explain 1st part tutorial Bangla
OSA Security
DDOS attack explain 1st part tutorial Bangla
16:15
Kali Linux Basic Commands Tutorial in Bangla | Learn Linux Commands in Bengali
OSA Security
Kali Linux Basic Commands Tutorial in Bangla | Learn Linux Commands in Bengali
18:03
Exploiting XXE to perform SSRF attacks | Lab-02
OSA Security
Exploiting XXE to perform SSRF attacks | Lab-02
3:28
Exploiting XXE using external entities to retrieve files| PortSwigger Web Security Lab-01
OSA Security
Exploiting XXE using external entities to retrieve files| PortSwigger Web Security Lab-01
6:24
PicoCTF SOAP Walkthrough | Web Exploitation | Bangla Tutorial
OSA Security
PicoCTF SOAP Walkthrough | Web Exploitation | Bangla Tutorial
2:55
PicoCTF dont-use-client-side Walkthrough | Web Exploitation | Bangla Tutorial
OSA Security
PicoCTF dont-use-client-side Walkthrough | Web Exploitation | Bangla Tutorial
3:47
PicoCTF Scavenger Hunt Walkthrough | Web Exploitation | Bangla Tutorial
OSA Security
PicoCTF Scavenger Hunt Walkthrough | Web Exploitation | Bangla Tutorial
5:59
PicoCTF logon Walkthrough | Web Exploitation | Bangla Tutorial
OSA Security
PicoCTF logon Walkthrough | Web Exploitation | Bangla Tutorial
2:42
PicoCTF Insp3ct0r Walkthrough | Web Exploitation | Bangla Tutorial
OSA Security
PicoCTF Insp3ct0r Walkthrough | Web Exploitation | Bangla Tutorial
2:50
PicoCTF where are the robots | Web Exploitation | Bangla Tutorial
OSA Security
PicoCTF where are the robots | Web Exploitation | Bangla Tutorial
1:35
rimik keyboard use to google translate
OSA Security
rimik keyboard use to google translate
2:15
picoCTF Network Forensics  | Ph4nt0m 1ntrud3r  PCAP Analysis Explained
OSA Security
picoCTF Network Forensics | Ph4nt0m 1ntrud3r PCAP Analysis Explained
4:37
picoCTF Red Challenge Walkthrough | Forensics CTF Tutorial
OSA Security
picoCTF Red Challenge Walkthrough | Forensics CTF Tutorial
2:36
picoCTF Disko-1 Challenge Solution | CTF Forensics Tutorial
OSA Security
picoCTF Disko-1 Challenge Solution | CTF Forensics Tutorial
3:25
picoCTF values.txt Lab Solve | Cryptography & ROT13 Explained Step by Step
OSA Security
picoCTF values.txt Lab Solve | Cryptography & ROT13 Explained Step by Step
1:04
picoCTF interencdec Challenge Solve | Encryption & Decryption Explained Step by Step
OSA Security
picoCTF interencdec Challenge Solve | Encryption & Decryption Explained Step by Step
2:53
picoCTF ROT13 Challenge Solve | Lab 13 Explained Step by Step | Beginner Friendly
OSA Security
picoCTF ROT13 Challenge Solve | Lab 13 Explained Step by Step | Beginner Friendly
1:39
picoCTF Forensics | Flag in Flame | Bangla Tutorial
OSA Security
picoCTF Forensics | Flag in Flame | Bangla Tutorial
3:00
picoCTF Forensics | Hidden in Plain Sight | Bangla Tutorial
OSA Security
picoCTF Forensics | Hidden in Plain Sight | Bangla Tutorial
3:07
picoCTF Forensics | Riddle Registry Solve | Bangla Tutorial
OSA Security
picoCTF Forensics | Riddle Registry Solve | Bangla Tutorial
2:36
Osint  CyberTalents airport lab
OSA Security
Osint CyberTalents airport lab
4:18
kali linux to esay way golang installation
OSA Security
kali linux to esay way golang installation
5:50
subdomain collect duplicate separate |  anew tools
OSA Security
subdomain collect duplicate separate | anew tools
4:27
Cryptography » CyberTalents   lab sloved
OSA Security
Cryptography » CyberTalents lab sloved
4:37
vmare of kali linux cursor invisible problems fix |  bangla tutorial
OSA Security
vmare of kali linux cursor invisible problems fix | bangla tutorial
4:50
ডিলিট করা ম্যাসেজ দেখার টেকনিক
OSA Security
ডিলিট করা ম্যাসেজ দেখার টেকনিক
7:04
kali user to root user  | tutorial
OSA Security
kali user to root user | tutorial
3:50
PicoCTF Unminify Walkthrough | Web Exploitation | Bangla Tutorial
OSA Security
PicoCTF Unminify Walkthrough | Web Exploitation | Bangla Tutorial
1:38
PicoCTF Web Decode Walkthrough | Web Exploitation | Bangla Tutorial
OSA Security
PicoCTF Web Decode Walkthrough | Web Exploitation | Bangla Tutorial
1:56
PicoCTF Includes Walkthrough | Web Exploitation | Bangla Tutorial
OSA Security
PicoCTF Includes Walkthrough | Web Exploitation | Bangla Tutorial
1:56
PicoCTF Inspect HTML Walkthrough | Web Exploitation | Bangla Tutorial
OSA Security
PicoCTF Inspect HTML Walkthrough | Web Exploitation | Bangla Tutorial
1:30
Learn Web Exploitation with PicoCTF 2025 | Local Authority Challenge Walkthrough
OSA Security
Learn Web Exploitation with PicoCTF 2025 | Local Authority Challenge Walkthrough
2:39