cbhackers
channel for catching cb hackers (on their main)
@cbhackers7506 subscribers
cbhackers
@SuperCbh subscribers
Useful Idiots
CIA Whistleblower John Kiriakou: "They DESTROYED Epstein Files” | Useful Idiots
1 day ago - 1:24:31
Bladaid
cbhacker.exe
4 years ago - 1:28
Peter Schneider
Why is physical security key helpful, since most accounts have alternative 2FA methods a hacker c...
2 years ago - 2:10
p0ntikka
Maplestory CB hacking.
17 years ago - 3:22
FunkyTownCommunity
Funkyfations: Yetifighter, albert_Craft and troypunk15 are CB Hacking!
12 years ago - 0:34
Peter Schneider
Security: What does Windows do to prevent dll hijacking?
2 years ago - 2:27
Peter Schneider
Security: Displaying on screen without being recordable by another app
2 years ago - 2:22
Peter Schneider
Can a UUID or GUID be matched back to the originating computer?
2 years ago - 2:43
Peter Schneider
Security: OAuth2 authorization code grant: how does redirection work for mobile applications?
7 months ago - 2:41
Peter Schneider
Security: HTTPonly token without CSRF is safe?
1 year ago - 3:21
Peter Schneider
Security: Not requiring POST requests... results in a CSRF vulnerability?
1 year ago - 3:26
Peter Schneider
Security: Verification of Password without Storing Hash - Security Considerations
1 year ago - 3:06
Peter Schneider
Does a password policy with a restriction of repeated characters increase security?
2 years ago - 3:45
Sophia Wagner
Security: Exploit user controllable C# code in webapp
1 year ago - 2:06
Peter Schneider
Encrypted instead of signed access tokens in OAuth2
2 years ago - 3:02
Peter Schneider
Security: HTTPs compression, CSRF and mobile apps
10 months ago - 4:22
Peter Schneider
Security: What file extensions are specific to qualified and advanced seals?
1 year ago - 1:56
Peter Schneider
Security: Why wouldn't a site's cookies be sent in this scenario?
1 year ago - 2:09
Peter Schneider
Security: Why are TOTP seeds rarely leaked in data breaches?
5 months ago - 4:02
Peter Schneider
Security: How can I block localhost access from other computers on the same local network?
7 months ago - 2:59
Peter Schneider
Security: Why is the boot key used to access the encrypted SAM database hashes?
1 year ago - 2:30
Peter Schneider
Security: How to check user password against list of weak passwords when I use client-side hashing?
10 months ago - 2:49
Peter Schneider
Security: How to determine hashing algorithm of a public key in the certificate?
7 months ago - 2:12
Peter Schneider
Security: What are the security related challenges in implementing something like Unix sudo?
1 year ago - 2:21
Peter Schneider
Security: Recommended temporary key size for communication
1 year ago - 3:40
Peter Schneider
Security: Key difference between DoS & DDoS
1 year ago - 1:56
Peter Schneider
Security: How to safely download files from Telegram using Sandboxie?
1 year ago - 1:51
Peter Schneider
How do I best share a shared account's private key?
2 years ago - 1:56
Sophia Wagner
Security: Displaying on screen without being recordable by another app
1 year ago - 2:16
Nida Karagoz
Is my encryption format secure? (3 SOLUTIONS!!)
2 months ago - 2:50
Sophia Wagner
Security: OAuth2 authorization code grant: how does redirection work for mobile applications?
2 months ago - 2:18
Sophia Wagner
Security: Benefit of permissive Content-Security-Policy
1 year ago - 2:20
Peter Schneider
If JWT tokens are stateless how does the auth server know a token is revoked?
2 years ago - 4:35
Peter Schneider
Exploit user controllable C# code in webapp
2 years ago - 2:27
Peter Schneider
Security: JWT - Able to change signature and its still verified?
1 year ago - 1:53