Похожие видео
array(10) {
[0]=>
object(stdClass)#4419 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "ifTsiU45-7A"
["related_video_title"]=>
string(50) "Stored Cross-Site Scripting (Stored XSS) Explained"
["posted_time"]=>
string(21) "3 года назад"
["channelName"]=>
string(14) "Andrew Hoffman"
}
[1]=>
object(stdClass)#4392 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "ojiOCfg-FXU"
["related_video_title"]=>
string(32) "How To Search For DOM-Based XSS!"
["posted_time"]=>
string(21) "3 года назад"
["channelName"]=>
string(9) "Intigriti"
}
[2]=>
object(stdClass)#4417 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "ej2O4lOUzRc"
["related_video_title"]=>
string(58) "Cross-Site Scripting (XSS) Explained! // How to Bug Bounty"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
string(8) "NahamSec"
}
[3]=>
object(stdClass)#4424 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "Iaq4m0XOPew"
["related_video_title"]=>
string(48) "5 DIFFERENT PAYLOADS to Find XSS Vulnerabilities"
["posted_time"]=>
string(27) "5 месяцев назад"
["channelName"]=>
string(21) "Bug Bounty With Marco"
}
[4]=>
object(stdClass)#4403 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "z4LhLJnmoZ0"
["related_video_title"]=>
string(65) "Cross-Site Scripting: A 25-Year Threat That Is Still Going Strong"
["posted_time"]=>
string(27) "7 месяцев назад"
["channelName"]=>
string(14) "IBM Technology"
}
[5]=>
object(stdClass)#4421 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "MjtMLbRw0lI"
["related_video_title"]=>
string(56) "The Beginner's Guide to Blind XSS (Cross-Site Scripting)"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
string(8) "NahamSec"
}
[6]=>
object(stdClass)#4416 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "blWdjRUPP6E"
["related_video_title"]=>
string(72) "Разведчик о том, как использовать людей"
["posted_time"]=>
string(25) "2 недели назад"
["channelName"]=>
string(18) "Коллектив"
}
[7]=>
object(stdClass)#4426 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "cfkb3nltZ4o"
["related_video_title"]=>
string(49) "Stored & DOM-Based XSS (Cross Site Scripting)"
["posted_time"]=>
string(27) "8 месяцев назад"
["channelName"]=>
string(47) "Infosec Mastery - Ethical Hacking for Beginners"
}
[8]=>
object(stdClass)#4402 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "KljtU2vJKPA"
["related_video_title"]=>
string(53) "Detecting & Exploiting Cross-Site Scripting (XSS)"
["posted_time"]=>
string(27) "8 месяцев назад"
["channelName"]=>
string(28) "Tyler Ramsbey - Hack Smarter"
}
[9]=>
object(stdClass)#4420 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "EoaDgUgS6QA"
["related_video_title"]=>
string(36) "Cross-Site Scripting (XSS) Explained"
["posted_time"]=>
string(19) "5 лет назад"
["channelName"]=>
string(11) "PwnFunction"
}
}
Stored Cross-Site Scripting (Stored XSS) Explained
How To Search For DOM-Based XSS!
Cross-Site Scripting (XSS) Explained! // How to Bug Bounty
5 DIFFERENT PAYLOADS to Find XSS Vulnerabilities
Cross-Site Scripting: A 25-Year Threat That Is Still Going Strong
The Beginner's Guide to Blind XSS (Cross-Site Scripting)
Разведчик о том, как использовать людей
Stored & DOM-Based XSS (Cross Site Scripting)
Detecting & Exploiting Cross-Site Scripting (XSS)
Cross-Site Scripting (XSS) Explained