Cyberwings Security

Cyberwings Security

Welcome to Cyberwings Security! Your ultimate destination for all things cybersecurity. Formerly known as Masters in IT, we've ...

@cyberwingssecurity subscribers

Cybersecurity Exam? WATCH THIS! | Security Analyst Exam SAL1 Tryhackme

Cyberwings Security

Cybersecurity Exam? WATCH THIS! | Security Analyst Exam SAL1 Tryhackme

8 days ago - 8:50

Kali Linux Full Course in Hindi | Kali Linux For Ethical Hacking || Linux Full Course For Beginners

Cyberwings Security

Kali Linux Full Course in Hindi | Kali Linux For Ethical Hacking || Linux Full Course For Beginners

5 years ago - 2:40:04

OWASP Top 10 Vulnerabilities in Hindi

Cyberwings Security

OWASP Top 10 Vulnerabilities in Hindi

1 year ago - 17:22

Network Scanning Complete Course in Hindi | Beginner to Advanced Nmap Course

Cyberwings Security

Network Scanning Complete Course in Hindi | Beginner to Advanced Nmap Course

2 years ago - 2:32:12

SSRF EXPLAINED in Simple Steps! | How Hackers Exploit Websites

Cyberwings Security

SSRF EXPLAINED in Simple Steps! | How Hackers Exploit Websites

2 months ago - 7:22

Cyber Security Awareness Program | National Cyber Security Awareness Month | Cyberwings Security LLP

Cyberwings Security

Cyber Security Awareness Program | National Cyber Security Awareness Month | Cyberwings Security LLP

4 years ago - 0:24

Malware Analysis Live | Real-Time Threat Analysis

Cyberwings Security

Malware Analysis Live | Real-Time Threat Analysis

1 month ago - 13:36

How Hackers Exploit Poor Logging & Monitoring | OWASP TOP-10 Explained

Cyberwings Security

How Hackers Exploit Poor Logging & Monitoring | OWASP TOP-10 Explained

4 months ago - 4:38

Top Cybersecurity Jobs in 2025 | Cybersecurity Career 2025

Cyberwings Security

Top Cybersecurity Jobs in 2025 | Cybersecurity Career 2025

5 months ago - 9:10

Best Cyber Security Certifications 2024 | Top Certifications

Cyberwings Security

Best Cyber Security Certifications 2024 | Top Certifications

11 months ago - 12:21

Masters in Cyber Security | Abroad Studies | Best University

Cyberwings Security

Masters in Cyber Security | Abroad Studies | Best University

2 years ago - 8:12

How to Start in Cybersecurity in 2025 | Cybersecurity Complete Roadmap in Hindi

Cyberwings Security

How to Start in Cybersecurity in 2025 | Cybersecurity Complete Roadmap in Hindi

1 year ago - 21:39

Lab: 1.1 SQL injection vulnerability in WHERE clause allowing retrieval of hidden data — 1 | 2023

Cyberw1ng

Lab: 1.1 SQL injection vulnerability in WHERE clause allowing retrieval of hidden data — 1 | 2023

9 months ago - 0:22

11.4 Lab: Blind XXE with out-of-band interaction via XML parameter entities | 2024

Cyberw1ng

11.4 Lab: Blind XXE with out-of-band interaction via XML parameter entities | 2024

1 year ago - 0:52

20.9 Lab: Developing a custom gadget chain for PHP deserialization

Cyberw1ng

20.9 Lab: Developing a custom gadget chain for PHP deserialization

10 months ago - 2:37

4.5 Lab: Blind OS command injection with out-of-band data exfiltration - Karthikeyan Nagaraj  | 2024

Cyberw1ng

4.5 Lab: Blind OS command injection with out-of-band data exfiltration - Karthikeyan Nagaraj | 2024

1 year ago - 2:58

17.1 Lab: Manipulating WebSocket messages to exploit vulnerabilities 2023

Cyberw1ng

17.1 Lab: Manipulating WebSocket messages to exploit vulnerabilities 2023

1 year ago - 0:37

Exploring Network Vulnerabilities: A Nessus Scanner Tutorial in Hindi | Masters in IT

Cyberwings Security

Exploring Network Vulnerabilities: A Nessus Scanner Tutorial in Hindi | Masters in IT

1 year ago - 14:46

5.11 Lab: Authentication bypass via flawed state machine - Karthikeyan Nagaraj | 2024

Cyberw1ng

5.11 Lab: Authentication bypass via flawed state machine - Karthikeyan Nagaraj | 2024

1 year ago - 1:04

27.4 Lab: DOM-based open redirection - Karthikeyan Nagaraj | 2024

Cyberw1ng

27.4 Lab: DOM-based open redirection - Karthikeyan Nagaraj | 2024

1 year ago - 1:37

24.1 Lab: Exploiting an API endpoint using documentation - Karthikeyan Nagaraj | 2024

Cyberw1ng

24.1 Lab: Exploiting an API endpoint using documentation - Karthikeyan Nagaraj | 2024

1 year ago - 1:33

10.1 Lab: Basic SSRF against the local server | 2023

Cyberw1ng

10.1 Lab: Basic SSRF against the local server | 2023

9 months ago - 2:05

Master Windows File Systems & Registry | Hindi

Cyberwings Security

Master Windows File Systems & Registry | Hindi

7 months ago - 18:41

24.2 Lab: Finding and exploiting an unused API endpoint - Karthikeyan Nagaraj | 2024

Cyberw1ng

24.2 Lab: Finding and exploiting an unused API endpoint - Karthikeyan Nagaraj | 2024

1 year ago - 2:18

7.3.1 Lab: User role controlled by request parameter | 2023

Cyberw1ng

7.3.1 Lab: User role controlled by request parameter | 2023

9 months ago - 0:33

5.6 Lab: Inconsistent handling of exceptional input | 2024

Cyberw1ng

5.6 Lab: Inconsistent handling of exceptional input | 2024

1 year ago - 1:37

Lab: 1.2 SQL injection vulnerability allowing login bypass — 2 | Karthikeyan Nagaraj | 2023

Cyberw1ng

Lab: 1.2 SQL injection vulnerability allowing login bypass — 2 | Karthikeyan Nagaraj | 2023

8 months ago - 0:20

7.8 Lab: Referer-based access control - Karthikeyan Nagaraj | 2024

Cyberw1ng

7.8 Lab: Referer-based access control - Karthikeyan Nagaraj | 2024

1 year ago - 1:58

7.7 Lab: Multi-step process with no access control on one step - Karthikeyan Nagaraj  | 2024

Cyberw1ng

7.7 Lab: Multi-step process with no access control on one step - Karthikeyan Nagaraj | 2024

1 year ago - 2:08

Cybersecurity Careers | Find Cybersecurity Job

Cyberwings Security

Cybersecurity Careers | Find Cybersecurity Job

9 months ago - 5:03

24.3 Lab: Exploiting a mass assignment vulnerability - Karthikeyan Nagaraj | 2024

Cyberw1ng

24.3 Lab: Exploiting a mass assignment vulnerability - Karthikeyan Nagaraj | 2024

1 year ago - 1:43