ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

74 results

Wild Rescue Ops
The Python Powered Attack Dog!

Watch the unbelievable fusion of programming and protection as we introduce the Python Attack Dog — a cutting-edge concept ...

0:06
The Python Powered Attack Dog!

22,403 views

6 months ago

Piotr Wojczyński - Cybersecurity
🐍 Python in Cybersecurity: Automate, Analyze, and Attack! 🛡️

Ready to supercharge your cybersecurity skills? Python isn't just a general-purpose programming language—it's the secret ...

1:59
🐍 Python in Cybersecurity: Automate, Analyze, and Attack! 🛡️

9 views

3 weeks ago

The Debug Zone
Making TLS Requests with Python Using Smartcards: A Step-by-Step Guide

In this video, we delve into the fascinating world of secure communications by exploring how to make TLS requests using Python ...

2:53
Making TLS Requests with Python Using Smartcards: A Step-by-Step Guide

8 views

2 months ago

Talking Sasquach
Forget Flipper Zero – Make Your Own Ethical Hacking Tools!

I love my Flipper Zero, but not everyone wants to drop $160+ on an ethical hacking tool. Well, you can actually make your OWN ...

19:26
Forget Flipper Zero – Make Your Own Ethical Hacking Tools!

347,644 views

10 months ago

Declan Middleton
Metasploit framework commands that you probably didn’t know, for penetration testers.

Want to dive deep into cybersecurity and master the art of ethical hacking? Become a member today and unlock hacking tutorials ...

1:10
Metasploit framework commands that you probably didn’t know, for penetration testers.

1,445 views

8 months ago

BSides Belfast
Show Me The Honey: Creating Elasticsearch Honeypots Powered By LLMs - Claire Dickson (Burn)

A honeypot is a fake instance of a software platform, designed to intentionally attract attackers to log and monitor their behaviour.

21:39
Show Me The Honey: Creating Elasticsearch Honeypots Powered By LLMs - Claire Dickson (Burn)

0 views

10 days ago

Ai Guru
K-Fold in 60 Seconds! #MachineLearning #DataScience #Python #AI #CrossValidation #Coding #MLTips

Stop overfitting your models! K-Fold Cross Validation is the essential ML technique to get a TRUE measure of your model's ...

0:42
K-Fold in 60 Seconds! #MachineLearning #DataScience #Python #AI #CrossValidation #Coding #MLTips

170 views

2 months ago

Adam Goss
Jupyter Notebooks for Cyber Threat Intelligence: A Practical Guide

Tired of jumping between static playbooks and multiple security tools during an investigation? This video shows how to use ...

21:56
Jupyter Notebooks for Cyber Threat Intelligence: A Practical Guide

302 views

2 months ago

Gnar Coding
Bash Scripting makes Project Configs EASY

cybersecurity #bash #networking #ai.

0:59
Bash Scripting makes Project Configs EASY

2,289 views

11 months ago

Codeically
Training AI On Old Nintendo Sprites

Ever wondered if AI could recreate those classic NES pixel art styles? In this tutorial, I show you how to extract CHR data from ...

5:18
Training AI On Old Nintendo Sprites

1,987 views

4 months ago

Ivander “Andreas” Wijaya
CVE Sentinel: The Autonomous Multi-Agent Security Analyst

CVE Sentinel is an autonomous multi-agent security system designed to accelerate vulnerability analysis. Built using the Google ...

8:58
CVE Sentinel: The Autonomous Multi-Agent Security Analyst

9 views

3 weeks ago

ojamboshop
Run WizardLM2 7B on Your Own PC — FREE AI Chatbot!

Want to run a powerful AI chatbot on your own computer in under 60 seconds? Meet WizardLM2 7B — an open-source LLM you ...

1:29
Run WizardLM2 7B on Your Own PC — FREE AI Chatbot!

91 views

4 months ago

Deepanshu Udhwani
How to Choose the Best Language & Project for GSoC 2026  🚀

One of the biggest mistakes applicants make when preparing for Google Summer of Code (GSoC) is choosing the wrong ...

4:25
How to Choose the Best Language & Project for GSoC 2026 🚀

7,017 views

9 months ago

DevTrev
Encrypt & Decrypt Files with Python | My Silent Safe CLI App

Link to Silent Safe: ...

8:32
Encrypt & Decrypt Files with Python | My Silent Safe CLI App

80 views

7 months ago

B Cyber H
Can You Make a Keylogger in Python in Just 5 Steps?

In this video, we build an Advanced Keylogger in Python from scratch—for educational and ethical hacking purposes only. You'll ...

15:13
Can You Make a Keylogger in Python in Just 5 Steps?

33 views

5 months ago

Ai Guru
ML In Three Steps  #ai #datascience #machinelearning #artificialintelligence #python #dataanalysis

Unlock the core framework of every Machine Learning project. Learn how to choose the right model (Representation), measure its ...

1:03
ML In Three Steps #ai #datascience #machinelearning #artificialintelligence #python #dataanalysis

172 views

1 month ago

Dihazi Echo
How to start Coding | Start programming know |How become  programmer

In this video, we'll walk you through the essential steps to get started with programming, whether you're a complete beginner or ...

1:28
How to start Coding | Start programming know |How become programmer

154 views

8 months ago

PahechanCoding
Cybersecurity ❤️❤️❤️❤️ cybersecurity #networking #shorts

Welcome to PahechanCoding – Your Shortcut to Smarter Coding! ‍ My name is Bheesham Mahesh Maharaj, and I'm a ...

0:12
Cybersecurity ❤️❤️❤️❤️ cybersecurity #networking #shorts

1,940 views

5 months ago

OWASP Foundation
OWASP Nettacker - Arkadii Yakovets, Sam Stepanyan

OWASP Nettacker project (a portmanteau of "Network Attacker") is a relatively new yet an awesome and powerful ...

33:43
OWASP Nettacker - Arkadii Yakovets, Sam Stepanyan

226 views

9 months ago

DevOps-Playbook
Join our #LIVE hands-on #DevOps Training and work on #GenAl Project in its #PRODUCTION environment!

Welcome to DevOps Playbook – your ultimate destination for mastering GenAI, DevOps, and Kubernetes with hands-on corporate ...

0:22
Join our #LIVE hands-on #DevOps Training and work on #GenAl Project in its #PRODUCTION environment!

21 views

10 months ago