How hackers hack with an image Trojan?!

  Рет қаралды 119,747

Loi Liang Yang

Loi Liang Yang

4 ай бұрын

// Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: / @loiliangyang
// Courses //
Full Ethical Hacking Course: www.udemy.com/course/full-web...
Full Web Ethical Hacking Course: www.udemy.com/course/full-web...
Full Mobile Hacking Course: www.udemy.com/course/full-mob...
// Books //
Kali Linux Hacking: amzn.to/3IUXaJv
Linux Basics for Hackers: amzn.to/3EzRPV6
The Ultimate Kali Linux Book: amzn.to/3m7cutD
// Social Links //
Website: www.loiliangyang.com
Facebook: / loiliangyang
Instagram: / loiliangyang
LinkedIn: / loiliangyang
// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.

Пікірлер: 386
@rohitchandel3546
@rohitchandel3546 17 күн бұрын
I'm a Maldives born and living in UK and I cannot express enough how much I despise these scumbags. Literally whenever people ask me my nationality I just tell them I'm British because idiots like these give us a horrendous reputation, not to also mention they scam other Europeans too. It warms my heart to see stuff like this, please Adrian Ruthnik keep up the great work destroying these scammers!!!
@Deepakpal-rx7dj
@Deepakpal-rx7dj 17 күн бұрын
Hey ppl, I'm a retired computer/IT person, Yet I still find Adrian Ruthnik so informative and straight forward. Thanks for your advise and helping the people...........Great work and love watching.
@user-jr7np6qy6d
@user-jr7np6qy6d 17 күн бұрын
Congratulations, Adrian Ruthnik I am relieved that you are out there fighting these thugs, We musttake every precaution to protect the elderly and the general public from these despicable con artists. Congratulations to You!! You deserve the Nobel Peace Prize for ensuring our security.
@ShrikantAdsul-ti4bg
@ShrikantAdsul-ti4bg 17 күн бұрын
Y’all should stop calling everything “the bare minimum” when it’s literally not. Respect is the bare minimum, actually going out of your way to comfort and have an open ear for someone isn’t. Doing something like this is truly very nice and a great thing of him to do. I hope shit gets better for you and I salute Adrian Ruthnik for being mature when it’s needed!
@Ramurajpoot205
@Ramurajpoot205 17 күн бұрын
Everyone should have a dedicated person like you Adrian Ruthnik .
@VipTharun
@VipTharun 17 күн бұрын
I just wanted to say thank you for sharing this. Because you're right. The worst thing that you can feel is hopelessness. And I hope that someone who is on the verge of losing hope finds Adrian Ruthnik and realizes that as long as you're still alive and breathing, there's a chance, there's HOPE that the future is brighter then the present day.
@Samarthff007
@Samarthff007 17 күн бұрын
The efficiency of this Adrian Ruthnik is next level. To juggle walk throughs of various angles on the topic delivered to-camera, differnet content per topic from various folks underneath the umbrella of the track list of the larger big band concert itself is engaging and refined. To make a dense taccess like this so digestible is really something. Awesome work jack!!
@vikasjaware6246
@vikasjaware6246 17 күн бұрын
Amazing job! Adrian Ruthnik I wasn’t able to see my account name at first because the name was changed. Also I really valued this information but thanks Jon even tho it showed a lots of error at my ends you still tried in helping fixing it. Happy I got it back y’all.
@user-xk5oy6pi1j
@user-xk5oy6pi1j 17 күн бұрын
We need more immeasurably wise and compassionate humans like you on this planet. Thank you for sharing Adrian Ruthnik , Jon. I bet I'm not alone when I say this video found me at the perfect moment, and there are a lot of things here that I needed to hear right now.
@rohangamar2627
@rohangamar2627 17 күн бұрын
Thank you, Adrian Ruthnik for consistently being so approachable and open-minded. Your friendly demeanor and willingness to listen and understand serve as a constant source of motivation. Your support and guidance have been especially meaningful to me during the recent account issue I encountered. Your willingness to assist and offer valuable advice speaks volumes about your character and the supportive environment you cultivate. I’m incredibly grateful to have someone like you. Your assistance played a crucial role in resolving the issue and getting my account back.
@Nawab_ayan_307
@Nawab_ayan_307 17 күн бұрын
Having someone like you who’s not only a great innovator but also pulls his best to get the work done so beautifully needs nothing but appreciation. Adrian Ruthnik Thanks for the well off work you consistently bring your all and I truly appreciate that. Thank you for making corporate life so smooth. Proud to have you on our team. Great work as always.
@bikramnahak2538
@bikramnahak2538 17 күн бұрын
Incredible efforts by Adrian Ruthnik I'll be transparent - distinguishing between legitimacy and legality can be tricky for many. Grateful for the assistance with my account - it's back in my hands. Keep up the commendable work, aiming to minimize the impact caused by the system. We could use more individuals like Jon in our world.
@SpyroTheEternalNight
@SpyroTheEternalNight 4 ай бұрын
the fact file extensions are hidden _by default_ still stuns me to this day. like yes, i'm well aware there are people who will get confused and corrupt their own files, but instead of hiding the feature it should be a basic part of learning how to use the computer.
@TequilaDave
@TequilaDave 4 ай бұрын
Why Windows still relies on file extensions rather than the first few magic bytes still baffles me! 😀
@rameshagarwal2861
@rameshagarwal2861 11 күн бұрын
As a Maldivian living in the UK, I am proud to see efforts to combat scammers. Keep up the excellent work, Adrian Ruthnik.
@nikoskoufaliotis7702
@nikoskoufaliotis7702 4 ай бұрын
Thank you. Very interesting and helpful. Any instructions about how to fix a similar problem in Android? It would be very nice. Thanks again for the awesome video
@user-oc1ty3hc8o
@user-oc1ty3hc8o 11 күн бұрын
As a Maldivian living in the UK, I despise these scammers. It warms my heart to see efforts like Adrian Ruthnik's. Keep up the excellent work.
@apristen
@apristen 4 ай бұрын
btw, PyInstaller may compile Python to EXEs (or ELFs for Linux) and that files contains Python runtime itself (which is OK for antivirus) plus Python bytecode .pyc files inside which could be written different ways, so antivirus can't detect that by logic of the (byte)code because it analyzes machine code logic, not Python bytecode logic which is "data" not "program" for antivirus.
@shadowrl7637
@shadowrl7637 4 ай бұрын
Actually python exes get flagged a lot.
@tasosm.380
@tasosm.380 4 ай бұрын
Yeah, having the entire python runtime inside the exe isn’t a good look for av’s
@apristen
@apristen 4 ай бұрын
@@tasosm.380 PyInstaller generates only "viruses" ? Strange assumption for av :-)))
@itsmesai8689
@itsmesai8689 4 ай бұрын
Bro I need your help please reply
@apristen
@apristen 4 ай бұрын
@@itsmesai8689 help with what, bro? :-)
@ReachChrisYoung
@ReachChrisYoung 3 ай бұрын
This would be an excellent presentation at a business event to illustrate the importance of cybersecurity awareness training and actually, seriously analyzing business email inbox content before getting "expediently click-happy" during working hours; interesting enough, this is outstanding wisdom that the company employees and contractors can take home and use the awareness from this presentation, alone, in their every day life and discuss this with family during holiday and special event gatherings... not just at the family dining table.
@Bhavikkushwaha-ir1lt
@Bhavikkushwaha-ir1lt 11 күн бұрын
Respect should not be underestimated. Your mature and thoughtful actions are commendable. Thank you, Adrian Ruthnik.
@timvid565
@timvid565 4 ай бұрын
Can also use LTR or RTL unicode for the naming confusion 👍
@justinmorales4635
@justinmorales4635 4 ай бұрын
what is that?
@superbaggio87
@superbaggio87 4 ай бұрын
Broooo...this is crazy!! very useful tutorial and info! one question is...can an antivirus detect such files when downloaded from the net? EG: mail attachment etc? if not how can we be sure that an image is a real image if we have any doubt ? Thanks btw
@TheCalmbAndLonelyGuy
@TheCalmbAndLonelyGuy 4 ай бұрын
Bro is getting more and more crazy with every Video 💀
@Ryudmilla
@Ryudmilla 4 ай бұрын
Yeah, he do this for more viewers and subscribers😂😂
@maxmuster7003
@maxmuster7003 4 ай бұрын
It is not his fault that the world is going crazy. And somebody have to warn you for traps.
@jacobhoffman2553
@jacobhoffman2553 4 ай бұрын
nope its sensationalism@@maxmuster7003
@amongusboi2032
@amongusboi2032 3 ай бұрын
I have no idea how to preserve that crazy as in mentally crazy, not okay or joking? Don't get me wrong but I need ensure that I comprehend what is being typed.
@LoiLiangYang
@LoiLiangYang 21 күн бұрын
I think so too
@nemizy
@nemizy 4 ай бұрын
The evolution of cinge video, thats why john hammond is the best KZfaq channel
@thammaiahr4656
@thammaiahr4656 11 күн бұрын
It's amazing what you do, Adrian Ruthnik. We need more people with your skills and good intentions. Thank you for sharing, Jon.
@alwalid7972
@alwalid7972 4 ай бұрын
Another awesome tutorial from the well respected hacker, however, it would require a deep understanding of the target software and the underlying system, as well as advanced techniques such as memory corruption, heap spraying, and shellcode injection. Do not follow all the tuts blindly.
@UNcommonSenseAUS
@UNcommonSenseAUS 4 ай бұрын
All the l337 script kiddies gonna love this untill they try it on anyone with a firewall of any calibre or any ids
@user-lx9jm1wo3h
@user-lx9jm1wo3h 4 ай бұрын
It would be nice if you could also show us how to identify these malicious files as well.
@bobrossopinions
@bobrossopinions 4 ай бұрын
Hackers are mad geniuses in mommy's basement. So they are almost always one step ahead of everyone. Even ways to detect the hack maybe changed after he makes video on how to detect it. It is an endless fight against the havking community. For all I know, my IP, email, and other content is publicly available because some children want to make extra bucks (corporations can buy the info for advertising). Also as for how to get porn on people, it is simple. Hack the phone and take unauthorized pictures to sell. People use their phones in the bathroom. The police need to crack down on these losers!
@user-dt7hy5tu4r
@user-dt7hy5tu4r 4 ай бұрын
some ass did this to me recently . factory reset'ed and chanced os to make sure it was gone. Need help. Gonna get this his ass legally.
@lordnekron5676
@lordnekron5676 4 ай бұрын
@@user-dt7hy5tu4r Damn, which operating system did he get you on? And did manage to take any samples of the virus or any info about how you ended up downloading it? If you're lucky he slipped up along the way somewhere.
@xylemroze
@xylemroze 4 ай бұрын
Correct me if i am wrong I think these kind of attacks works on personal computers. Those who are using pc with root or Admin account and logged in with standard user cannot be hacked with this tricks as it requires root or admin privileges to execute the cmd.
@maxmuster7003
@maxmuster7003 4 ай бұрын
Good work, the true is painfull if nobody give a warning what is going on. Thx.
@user-up8hh7km8u
@user-up8hh7km8u 4 ай бұрын
thank you i will use this only for "educational prepose only"
@amongusboi2032
@amongusboi2032 3 ай бұрын
Haha, that joke never gets old. And then FBI is at your door before you know it.
@timecop1983Two
@timecop1983Two 4 ай бұрын
The problem is anti-virus will detect it... And there are other ways to do it better. But greate JOB!
@ronald9542
@ronald9542 4 ай бұрын
let me know if u find out pls @LolWare_Exploits
@rogerdarkman157
@rogerdarkman157 4 ай бұрын
Anti virus is scan the picture files?
@redrabitff5941
@redrabitff5941 4 ай бұрын
it not a pik it only show jpg buy it exe@@rogerdarkman157
@swati_clothing5073
@swati_clothing5073 4 ай бұрын
Which other way?
@MixbOOsted
@MixbOOsted 4 ай бұрын
So that's a problem !? 💀
@forgiveness555
@forgiveness555 4 ай бұрын
U are the best bro I hope you have great day
@NarendraKumar-lo8ue
@NarendraKumar-lo8ue 11 күн бұрын
Thank you, Adrian Ruthnik, for your help. Although the video tutorial was challenging, your guidance was invaluable. I appreciate your efforts.
@jimposey8542
@jimposey8542 4 ай бұрын
Brother, I'm just a 70 year old retired individual who wishes to learn ethical hacking. Already have my Kali Linux but having a hard time learning the linux way of communicating. I'm trying to install the FakeImageExploiter program fro GIT. Is this the same as what your demonstrating in this video ? Your work is awesome ! And way above my knowledge. Keep up the good work.
@user-xn8xe4ci5f
@user-xn8xe4ci5f 3 ай бұрын
Hello, i can help you, i hace Alr been learning 2 years
@rogerdarkman157
@rogerdarkman157 4 ай бұрын
I hope more will come. This is very useful.
@ClearPurgeDestroy
@ClearPurgeDestroy 4 ай бұрын
Awesome video. Question for you, would the hidden .exe need admin rights to launch the power shell script to gain the reverse shell?
@TechnoEveryday
@TechnoEveryday 2 ай бұрын
😂😂😂
@S0a0m0i0r
@S0a0m0i0r 13 күн бұрын
Mr LoI that is what ethical hackings must be your family provided of you thanks 🙏🙏🙏
@silentlover6238
@silentlover6238 4 ай бұрын
Love ❤ from India Kashmir
@pramodkumar-yh5sj
@pramodkumar-yh5sj 11 күн бұрын
We need more wise and compassionate individuals like you, Adrian Ruthnik. Your support arrived at the perfect moment, and your contributions are deeply appreciated.
@keerthishetty4513
@keerthishetty4513 11 күн бұрын
Big thanks, Adrian Ruthnik, for your assistance. Although the steps were challenging, your guidance was invaluable. Thank you, Jon.
@Nochymusic
@Nochymusic 4 ай бұрын
Nice video teach us how to use beef+stored xss but not using the petty theft
@user-eo3iv4pn3k
@user-eo3iv4pn3k 11 күн бұрын
The efficiency of Adrian Ruthnik is next level. Managing walkthroughs from various angles with such clarity is remarkable. Making complex topics easy to understand is really something. Awesome work!
@user-sp9kl4vq1j
@user-sp9kl4vq1j 3 ай бұрын
Hi, Mr. Hackerloi! I am one of your KZfaq writings and I come to help your video and are very good. Congratulations to the stather. Have one of your video with the title: How Hackers Hack With An Image Trojan? I tested on my computer with your class cripto did not give enough to cost me a crypt base and how to set up
@TuphanMal
@TuphanMal 11 күн бұрын
The video tutorial kept glitching on me, but thank you for it. Also, thank you, Adrian Ruthnik. Meeting you was a blessing in disguise. Keep up the good work; many people will need your help in the future.
@Lemon-mu8rb
@Lemon-mu8rb 4 ай бұрын
I was waiting for it so bad... Finally :3
@barackyunus
@barackyunus 4 ай бұрын
This is the first time you have given a solution to the hacks😅
@amongusboi2032
@amongusboi2032 3 ай бұрын
Not the first Time, I assure you. I have viewed his video posts.
@rathasahamed9992
@rathasahamed9992 4 ай бұрын
i like your making videos Mr.Loi
@user-mg8ep3tx4i
@user-mg8ep3tx4i 11 күн бұрын
Even as a retired IT professional, I find Adrian Ruthnik’s work highly informative and straightforward. Thank you for your advice and support.
@Aarna-ue4lt
@Aarna-ue4lt 2 ай бұрын
That is useful information. Can this be done for android as well?
@juzzwAA003
@juzzwAA003 4 ай бұрын
Most of malware now can't be kill at task manager even installing an anti malware blocked
@JakaJaka-kx2qj
@JakaJaka-kx2qj 4 ай бұрын
Mr Do you want to make a series that is different from the others? The series that will break the views even more? The series I mean is the malware analysis series
@engineer0111
@engineer0111 4 ай бұрын
Great show!😃
@JazoorInfortech
@JazoorInfortech 4 ай бұрын
This video tutorial is awesome thanks for uploading bro
@serverroot8361
@serverroot8361 4 ай бұрын
Really thank you for this information. But how can this be detected by antivirus or defense software? Can you make a video about this? Thank you very much in advance.☺🙏🙏
@jardak3582
@jardak3582 3 ай бұрын
unfortunately windows defender detects netcat and removes it immediately, plus you cannot send that kind of file online (gmail) simply because you cannot send exe files (even zipping it wont work).
@poktop5
@poktop5 3 ай бұрын
How do we get a hold of your shell script?
@TechnoEveryday
@TechnoEveryday 2 ай бұрын
My pc was hacked like this 30 years ago 😂😂😂😂
@ZEROBOY-gw4xj
@ZEROBOY-gw4xj 4 ай бұрын
hi ! can you please give the code which are you showing in ps1 file or tell me where you from take this code ? thanks
@dont_get_me_wrong
@dont_get_me_wrong 4 ай бұрын
The bestt 🎉🎉
@MrDiggy007
@MrDiggy007 4 ай бұрын
The most fundamental one of all!!!!😅 Free 4 You
@hevilchaudhari2910
@hevilchaudhari2910 4 ай бұрын
Bro can you make a video of how we can access tcp handler from world with port forwarding in mobile hostpot
@lifeoftraderlot5647
@lifeoftraderlot5647 4 ай бұрын
Anything for Android or iPhone
@abhishekmishra2694
@abhishekmishra2694 4 ай бұрын
This is more like using of netcat tool..it's just got delivered to target machine via image ...and behaves like RAT..but netcat gets detected by defender usually as hacking tool..but it's good video for practice and entertainment 😊
@shadowrl7637
@shadowrl7637 4 ай бұрын
Well this is steganography actually.
@DJKAM044
@DJKAM044 4 ай бұрын
Sir request a totorial for security plug in for application?
@grow-up-pro5274
@grow-up-pro5274 4 ай бұрын
That powershell code have to be obfuscated. Otherwise this tutorial will be a joke. Netcat is easily detected by windows defender. Otherwise you can also do one thing on the begining of the script u can add the c drive of target to the exclusion path by ps commands . I have one complain , why u don't show to ur video that ur defender get turned off or already its into the exclusion path.sorry to say loi but u r giving half information to the viewers.
@rohitmini9026
@rohitmini9026 4 ай бұрын
yeah..sir
@allenmejia1114
@allenmejia1114 2 ай бұрын
Hey I have a question about all this if you don’t mind
@flowa2788
@flowa2788 3 ай бұрын
But you must be with admin account logged in?? Otherwise you neet to pass the UAC (user account control)....
@sakibahmed2021
@sakibahmed2021 4 ай бұрын
LOVE FROM BANGLADESH
@Compute_and_Hack
@Compute_and_Hack 4 ай бұрын
hey Mr Loi, pls help me with how you transformed that voice at the beginning of the Video.... Thanks for the upskill you made for me through your content
@amongusboi2032
@amongusboi2032 3 ай бұрын
So you're technically a...
@Compute_and_Hack
@Compute_and_Hack 2 ай бұрын
@@amongusboi2032 learner
@Roger-wh2dn
@Roger-wh2dn 4 ай бұрын
So block powershell from going to the outbound internet firewall rule
@Some1323
@Some1323 4 ай бұрын
You The Best
@evenstevener
@evenstevener 4 ай бұрын
Can you show how this attack would work in real world scenario where we have public IPs sent through internet
@animalpulao3313
@animalpulao3313 4 ай бұрын
show a video for windows 10 only
@ReligionAndMaterialismDebunked
@ReligionAndMaterialismDebunked 4 ай бұрын
Early crew. Fellow ethical hackers. Shalom.
@ProGraGamer
@ProGraGamer 4 ай бұрын
Free Palestine
@aI_roasting
@aI_roasting 4 ай бұрын
I'm enjoying your video and learn more about hacking Thanks for giving knowledge ❤
@rishalchand9510
@rishalchand9510 4 ай бұрын
The image may be compressed if sent via any social media platform unless you’re emailing the attachment
@emefianauzor4166
@emefianauzor4166 3 ай бұрын
Gmail don't allow you to send and exe file
@jardak3582
@jardak3582 3 ай бұрын
even zipping the file wouldnt work, gmail detects zips with .exe files on the inside
@Debiure
@Debiure 4 ай бұрын
Hello sir i need some information how can i protect malware files of quasar Clint from antivirus software detection?
@DaveTechCA
@DaveTechCA 4 ай бұрын
So many reasons NOT to use windows. As Einstein said, "Unlike genius, stupidity has no limits."
@fatihtt8507
@fatihtt8507 4 ай бұрын
Nice also on ios???
@user-ic4cg1yb8v
@user-ic4cg1yb8v 4 ай бұрын
Helo, i installed kali on my tablet Samsung. How can i delete knox system? (I don't want to be track in peranti sis.....) Pls respnd
@didyouknowamazingfacts2790
@didyouknowamazingfacts2790 2 ай бұрын
I'm pretty sure most email providers will pick this up as malicious.
@umerfarrukh7067
@umerfarrukh7067 4 ай бұрын
can we sent it to any mobile ?? please guide ...
@yenuX999
@yenuX999 4 ай бұрын
Love from Sri lanka
@mediasm6868
@mediasm6868 4 ай бұрын
I didn't understand what's happened in 1min45sec!!! Frome where you get that little window of rename the file?
@swishhydrotrip6299
@swishhydrotrip6299 4 ай бұрын
If the image was sent on discord would this work if the user only copied the image and pasted it in a new chat
@everything6800
@everything6800 4 ай бұрын
Does he even read our comments??? whoareyou
@sugoi5240
@sugoi5240 4 ай бұрын
*Just for educational purposes*: if I upload this image to a signup process of a website lets say will it work? unless the database is sandboxed?
@Inoinovation
@Inoinovation 4 ай бұрын
100% No
@tecnoexpert9541
@tecnoexpert9541 4 ай бұрын
There are some dependency to execute this attack on victim system. Port forwarding so victim can download the netcat through this script and will also need victim Email-id and script must be run on window system.
@gregorylepoux7873
@gregorylepoux7873 15 күн бұрын
Exuse me is it possible to send the file file via email and windows defender isn't triggered?
@Boolap1337
@Boolap1337 4 ай бұрын
Where can I find the ps1 script?
@aldrinlastimoza6340
@aldrinlastimoza6340 4 ай бұрын
can this seen by microsoft defender or not ?
@technical_magician
@technical_magician 4 ай бұрын
How to do that for android? I mean in .apk format? please reply.
@OmairAhmadTemurian-oi8nt
@OmairAhmadTemurian-oi8nt 4 ай бұрын
Thsi only works on LAN network it doesn’t work for remote access
@Scorpionevaa
@Scorpionevaa 4 ай бұрын
In 2003 me used magic Ps ver 1.5 trojan horse 😅 in my teen years ...
@EGM_0001
@EGM_0001 4 ай бұрын
We need a software like quasar but you can put image in
@tntomega
@tntomega 4 ай бұрын
the problem is i "hacker" need to be online listener and the "target" need to klick it all time? its a "sniper" attack ? and windows defender not detect it ?
@fatmat4747
@fatmat4747 4 ай бұрын
obfuscate it for it not to be detected
@MmMm-xx5by
@MmMm-xx5by 3 ай бұрын
And how to. Can you explain ​@fatmat4747
@GenevieveTibona
@GenevieveTibona 2 ай бұрын
Good job, but that can't be send by email
@sifurce
@sifurce 4 ай бұрын
Sir, how apply it for android phone...??
@MrLalramchhana
@MrLalramchhana 4 ай бұрын
Not gonna work on social media..because evey image you upload is recheck and trim and removed metadata
@sliemtechkenya
@sliemtechkenya 3 ай бұрын
true. but you can overcome this problem by hosting the file on a file server or a cloud storage and then posting the link to it on socials instead of the image itself. this will make it harder to convince anyone to click but if successful, it will work
@user-tp5yg6gl1b
@user-tp5yg6gl1b 20 күн бұрын
Is there a way to enable debugging mode in Android through the command line?
@infinitybrutal
@infinitybrutal 4 ай бұрын
Now I can send my pic for school form
@XDsickEditz
@XDsickEditz 4 ай бұрын
what about firewall of window 11?
Remotely Control Any PC with an image?!
12:42
Loi Liang Yang
Рет қаралды 99 М.
Hackers Are Waiting For You to Open This Image
15:18
zSecurity
Рет қаралды 184 М.
WHY IS A CAR MORE EXPENSIVE THAN A GIRL?
00:37
Levsob
Рет қаралды 21 МЛН
Василиса наняла личного массажиста 😂 #shorts
00:22
Денис Кукояка
Рет қаралды 6 МЛН
ТАМАЕВ vs ВЕНГАЛБИ. Самая Быстрая BMW M5 vs CLS 63
1:15:39
Асхаб Тамаев
Рет қаралды 4 МЛН
Её Старший Брат Настоящий Джентельмен ❤️
00:18
Глеб Рандалайнен
Рет қаралды 8 МЛН
Hide Information in JPEG Files
16:19
NeuralNine
Рет қаралды 174 М.
virus.pdf
10:20
Loi Liang Yang
Рет қаралды 189 М.
Python The Hacker's Secret Weapon | Importance Of Python in Hacking
11:06
11 Most Dangerous Hacking Gadgets in 2023 #hacker #gadgets
10:01
BEST COOL TECH
Рет қаралды 578 М.
I got hacked by an iPhone Cable.
10:07
Mrwhosetheboss
Рет қаралды 9 МЛН
Access Location, Camera  & Mic of any Device 🌎🎤📍📷
15:48
zSecurity
Рет қаралды 2,1 МЛН
How hackers hacking any android mobile ?
16:44
PBER ACADEMY
Рет қаралды 23 М.
Learn Reverse Engineering (for hacking games)
7:26
cazz
Рет қаралды 985 М.
How Hackers Hack CCTV Cameras
15:00
zSecurity
Рет қаралды 719 М.
Main filter..
0:15
CikoYt
Рет қаралды 5 МЛН
📦Он вам не медведь! Обзор FlyingBear S1
18:26
Bluetooth Desert Eagle
0:27
ts blur
Рет қаралды 7 МЛН
iPhone 12 socket cleaning #fixit
0:30
Tamar DB (mt)
Рет қаралды 37 МЛН