What is CTF ( Capture the flag )
Hackmeritik
What is CTF ( Capture the flag )
4:06
Ai Security And LLM Attacks
Hackmeritik
Ai Security And LLM Attacks
0:59
What is security misconfiguration #bugbounty
Hackmeritik
What is security misconfiguration #bugbounty
0:41
Insecure design #bugbounty #cybersecuritycompany 
Hackmeritik
Insecure design #bugbounty #cybersecuritycompany 
0:58
Owasp top 10- Sql Injection #owasp #owasptop10
Hackmeritik
Owasp top 10- Sql Injection #owasp #owasptop10
0:57
Cryptographic failure | explain  #bugbounty
Hackmeritik
Cryptographic failure | explain  #bugbounty
0:58
Broken Access Control | Explain in 1 minute #bugbounty #cybersecurity
Hackmeritik
Broken Access Control | Explain in 1 minute #bugbounty #cybersecurity
0:43
OWASP TOP 10  #bugbounty #owasp #owasptop10
Hackmeritik
OWASP TOP 10 #bugbounty #owasp #owasptop10
0:42
What is Robots.txt file 🤔
Hackmeritik
What is Robots.txt file 🤔
0:52
what is google dork #bugbounty
Hackmeritik
what is google dork #bugbounty
0:59
What is Cyber Kill Chain  #bugbounty
Hackmeritik
What is Cyber Kill Chain #bugbounty
0:59
What is SQL Injection #sqlinjection #sql
Hackmeritik
What is SQL Injection #sqlinjection #sql
0:57
How Hacker use Raspberry pi #rasberry  #cybersecurity
Hackmeritik
How Hacker use Raspberry pi #rasberry #cybersecurity
0:44
Day 5 of Recon using Shodan tool in bug bounty #bugbounty #cybersecurity
Hackmeritik
Day 5 of Recon using Shodan tool in bug bounty #bugbounty #cybersecurity
0:46
Day 4 Of Recon in bug bounty using chaos repository by project discovery #bugbounty #cybersecurity
Hackmeritik
Day 4 Of Recon in bug bounty using chaos repository by project discovery #bugbounty #cybersecurity
0:44
Day 3 of recon in bug bounty using Net craft #bugbounty #cybersecurity
Hackmeritik
Day 3 of recon in bug bounty using Net craft #bugbounty #cybersecurity
0:52
Day 2 Recon in bugbounty using Subfinder #reconnaissance #bugbounty
Hackmeritik
Day 2 Recon in bugbounty using Subfinder #reconnaissance #bugbounty
0:47
Day 1 Rcon with crt.sh #reconnaissance #bugbounty
Hackmeritik
Day 1 Rcon with crt.sh #reconnaissance #bugbounty
0:45
What is Recon in Bug bounty and cyber security  #bugbounty #cybersecuritycompany
Hackmeritik
What is Recon in Bug bounty and cyber security #bugbounty #cybersecuritycompany
0:56
HTTP VS HTTPS | REAL Difference #https #http
Hackmeritik
HTTP VS HTTPS | REAL Difference #https #http
0:47
HTTP explained  #bugbounty #cybersecurity
Hackmeritik
HTTP explained #bugbounty #cybersecurity
0:42
Start Bugbounty #bugbounty
Hackmeritik
Start Bugbounty #bugbounty
1:03
Subdomain Enumeration in 50 sec #bugbounty #cybersecurity
Hackmeritik
Subdomain Enumeration in 50 sec #bugbounty #cybersecurity
0:45
Explain Brute force attack in 60 sec #bugbounty #cybersecurity #bruteforce
Hackmeritik
Explain Brute force attack in 60 sec #bugbounty #cybersecurity #bruteforce
1:06
Authentication VS Authorization
Hackmeritik
Authentication VS Authorization
0:43
Stored Xss vulnerability  #bugbounty #crosssitescripting #cybersecurity
Hackmeritik
Stored Xss vulnerability #bugbounty #crosssitescripting #cybersecurity
1:38
Naseeb ki baat hai Xss mil jaye toh
Hackmeritik
Naseeb ki baat hai Xss mil jaye toh
0:49