Vickie Li Dev
Secure development and web security, simplified!
Subscribe for videos about hacking, infosec, and more.
Scanning for hardcoded secrets in source code | Security Simplified
Career and Community building with Bug Bounties | NahamCon Panel
How to conduct a basic security code review | Security Simplified
Launching an InfoSec Career: My six essential tips | Security Simplified
Building a secure application in five steps | Security Simplified
How to learn anything in Computer Science or Cybersecurity | Security Simplified
Building a secure application: the first step | Security Simplified
They are all Injection Vulnerabilities! - Security Simplified
Getting into a Development Career with Seho Lim
Working in AppSec and Getting into Cybersecurity with Ozioma "Ozy" Aghamba
Chatting with @Hacksplained about Bug Bounties and Infosec Jobs
Attacking Sites Using CSRF - Security Simplified
Intro to CSRF (Cross-Site Request Forgery) - Security Simplified
Hacking banks with race conditions
How to prevent PHP type juggling vulnerabilities
Exploiting PHP Type Juggling Vulnerabilities - Security Simplified
How Attackers Bypass MFA (Multi-Factor Authentication) - Security Simplified
Why Is Validating URLs So Hard?
How to Prevent Open Redirects in your Applications
Hacking SSO: Authentication Bypass by Stealing OAuth Tokens
How to Prevent Command Injections
Intro to Command Injection | Security Simplified
How To Prevent IDORs | Security Simplified
How to Prevent SSRF Vulnerabilities (Server-Side Request Forgery)
Understanding Insecure Deserialization Vulnerabilities: Security Simplified
What are IDORs (Insecure Direct Object References)?
Hacking SSO: SAML Signature Misconfigurations
Hacking SSO: Stealing Cookies With Subdomain Takeovers
Hacking SSO: Overview
Wildcard Injection Privilege Escalation: Linux Security 07