Profile avatar
hackery.bsky.social
Learn ethical hacking, bug Bounty hunting, penetration testing and other cybersecurity skills such as policies, and popular frameworks. With simple to follow and to the point videos. Follow https://www.youtube.com/c/HackeryTV on YouTube
19 posts 49 followers 1 following
Regular Contributor

While i know i am late my work kept me busy in combination with my PC deciding to die during the Christmas break. Here is the video i wanted to release during the holidays: Cybersecurity 2024: A year in review. youtu.be/dhSk96-3Xi8 #ethicalhacking #infosec #hacking #Cybersecurity #yearinreview

During pentesting, this happens every other week. Just #Infosec things...

What is the Mitre ATT&CK framework? Learn what it is and how it can help you with red teaming, blue teaming, purple teaming and threat hunting. To Become a better cybersecurity professional! youtu.be/U_FC0-J7hd4 #cybersecurity #hacking #blueteam #redteam #ethicalhacking #infosec

The big downside of normal scanners is that they will just scan according to predefined rules. Nuclei, is able to scan environments based on templates. This means YOU can define the rules. youtu.be/6FDKHewTP4A #cybersecurity #ethicalhacking #tech #informationsecurity #infosec #bugbounty

What is the CIA triad? Why does it exist? Who is it made for? How does it work? Why must I know it? How do I apply it? These questions and more will be answered in this video. youtu.be/GHWftMws1xM #cybersecurity #ethicalhacking #tech #informationsecurity #infosec #bugbounty

Collecting screenshots from large environments is horrible. I am thankful that we can use Eyewitness to take mass screenshots from large scopes. youtu.be/qy7aiEPtY-8 #cybersecurity #ethicalhacking #tech #informationsecurity #infosec #bugbounty

find folders by brute forcing can take some time. Especially with long wordlists. Dirbuster doesnt have multithreading, Gobuster has but has no recursive brute force. Feroxbuster has both. youtu.be/rhaQ-trlBho #cybersecurity #ethicalhacking #tech #informationsecurity #infosec #bugbounty

Most of us in cybersecurity have heard these questions: "Teach me how to hack Facebook", "Can you hack Facebook for me". Tired saying no, or explaining why not? Just link this video to them! youtu.be/_ti0N8_P-tc #cybersecurity #ethicalhacking #tech #informationsecurity #infosec #bugbounty

Sometimes you want to capture some packets but dont need a big application like Wireshark. Ngrep can be your solution. With it we can grep network traffic to get quick results. youtu.be/NuLpnhbCJGo #cybersecurity #ethicalhacking #tech #informationsecurity #infosec #bugbounty

Setting up a proxy server can be a big task. With this tool from it becomes very easy, this allows you to setup a quick proxy in seconds and not hours. youtu.be/_wn4KPmb_8c #cybersecurity #ethicalhacking #tech #informationsecurity #infosec #bugbounty

Nikto is a classic web application security scanner. While everybody knows about it, not many know how to properly use it. In this video we will go in depth into it. youtu.be/Nk_QCqSBzs0 #cybersecurity #ethicalhacking #tech #informationsecurity #infosec #bugbounty

Scoring vulnerabilities is one of the most annoying things to do. While not complicated there are some pitfalls. Check out the video to learn how to use CVSS 4.0 and avoid the pitfalls. youtu.be/AOVBrHdLcMQ #cybersecurity #ethicalhacking #tech #informationsecurity #infosec #bugbounty

How do i tunnel tools that do not have proxy support, how do i chain multiple proxies together to stay anonymous. We can use ProxyChains to do all of this! youtu.be/NzmirzuxI0s #cybersecurity #ethicalhacking #tech #informationsecurity #infosec #bugbounty

Tired of manually testing parameters during web application testing? WFuzz allows us to quickly fuzz parameters in websites. youtu.be/7tBo6qG62U4 #cybersecurity #ethicalhacking #tech #informationsecurity #infosec #bugbounty

Manually crawling websites during tests? I rather use Katana. A lightweight and fast crawler. Its the best I have seen so far. youtu.be/QLB4UX0f8cU #cybersecurity #ethicalhacking #tech #informationsecurity #infosec #bugbounty

Is searching for web content taking to long during Bug Bounty hunting? How about brute forcing subdomains? Gobuster is a multi threaded brute forcing tool to find content extremely fast! youtu.be/njoh22k3iO8 #ethicalhacking #CyberSecurity #tech #informationsecurity #infosec #bugbounty

Is Nmap to slow to find open ports at a large scale? Check out Naabu, the lightning fast port scanner! youtu.be/WPcCERcLD1c #ethicalhacking #cybersecurity #tech #informationsecurity #infosec

Wondering how to quickly create tunnels to get through firewalls? Check out the tool Chisel that can assist you with smashing them. youtu.be/4OqMihRLeLk #Cybersecurity #EthicalHacking #Tech #InformationSecurity #Infosec

Curious about the 5 Phases of Ethical Hacking? In my latest video, I break down the essential phases that professional hackers use to uncover vulnerabilities in real-world scenarios. Check it out! 🔗 youtu.be/VEukgTZcBps #Cybersecurity #EthicalHacking #Tech #InformationSecurity #Infosec