Похожие видео
array(10) {
[0]=>
object(stdClass)#5189 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "lSa_wHW1pgQ"
["related_video_title"]=>
string(25) "Fake CAPTCHA Runs Malware"
["posted_time"]=>
string(27) "9 месяцев назад"
["channelName"]=>
string(12) "John Hammond"
}
[1]=>
object(stdClass)#5162 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "7lKDTaPVyIU"
["related_video_title"]=>
string(87) "Introduction to Ethical Hacking & Cybersecurity: Roles, Scope & Laws Explained!"
["posted_time"]=>
string(25) "4 месяца назад"
["channelName"]=>
string(9) "hacklearn"
}
[2]=>
object(stdClass)#5187 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "b3hUQ62X8C0"
["related_video_title"]=>
string(81) "From Zero to Bug Hunter Hero 🦸 | Learn Bug Bounty | Free Tools + Tricks part 1"
["posted_time"]=>
string(25) "2 месяца назад"
["channelName"]=>
string(9) "hacklearn"
}
[3]=>
object(stdClass)#5194 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "teIaFOQjpcE"
["related_video_title"]=>
string(112) "Как шпионить за любым Android-устройством с помощью AndroRAT в Kali Linux?"
["posted_time"]=>
string(25) "2 месяца назад"
["channelName"]=>
string(26) "Tech Sky - Ethical Hacking"
}
[4]=>
object(stdClass)#5173 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "ZZn7EXec_ik"
["related_video_title"]=>
string(43) "Mobile Hacking Methods EXPOSED by an Expert"
["posted_time"]=>
string(25) "2 недели назад"
["channelName"]=>
string(15) "Shield Spectrum"
}
[5]=>
object(stdClass)#5191 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "4t4kBkMsDbQ"
["related_video_title"]=>
string(45) "Nmap Tutorial to find Network Vulnerabilities"
["posted_time"]=>
string(21) "4 года назад"
["channelName"]=>
string(12) "NetworkChuck"
}
[6]=>
object(stdClass)#5186 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "g3TCd9iPqzs"
["related_video_title"]=>
string(42) "Destroying SCAMMER Computers Live On CCTV!"
["posted_time"]=>
string(25) "4 месяца назад"
["channelName"]=>
string(10) "Scambaiter"
}
[7]=>
object(stdClass)#5196 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "dCFHjdhhsNI"
["related_video_title"]=>
string(120) "Дуглас Макгрегор: Иран против Израиля: На пороге ядерного кризиса"
["posted_time"]=>
string(23) "7 часов назад"
["channelName"]=>
string(16) "Stewart Mitchell"
}
[8]=>
object(stdClass)#5172 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "GNT7uqpf-bQ"
["related_video_title"]=>
string(42) "4Chan Hacked, Admins Doxxed, Site SHUTDOWN"
["posted_time"]=>
string(25) "2 месяца назад"
["channelName"]=>
string(13) "Mental Outlaw"
}
[9]=>
object(stdClass)#5190 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "O4Hyb5HtD3s"
["related_video_title"]=>
string(103) "Что говорят СМИ Ирана о войне с Израилем (English subtitles) @Max_Katz"
["posted_time"]=>
string(21) "3 часа назад"
["channelName"]=>
string(19) "Максим Кац"
}
}
Fake CAPTCHA Runs Malware
Introduction to Ethical Hacking & Cybersecurity: Roles, Scope & Laws Explained!
From Zero to Bug Hunter Hero 🦸 | Learn Bug Bounty | Free Tools + Tricks part 1
Как шпионить за любым Android-устройством с помощью AndroRAT в Kali Linux?
Mobile Hacking Methods EXPOSED by an Expert
Nmap Tutorial to find Network Vulnerabilities
Destroying SCAMMER Computers Live On CCTV!
Дуглас Макгрегор: Иран против Израиля: На пороге ядерного кризиса
4Chan Hacked, Admins Doxxed, Site SHUTDOWN
Что говорят СМИ Ирана о войне с Израилем (English subtitles) @Max_Katz