Hack WhatsApp & Gmail of Anyone & Bypass 2FA / MFA This video shows how the Browser in the Browser attack is used by hackers to bypass two factor and multi-factor authentications (2FA / MFA) and one time passwords (OTP). …
How Hackers Track You Using Your IP Address Hey there, welcome to CyberSudo! I’m Saad Sarraj, and here we explore the world of OSINT and Cyber Security in a clear, beginner-friendly way. Ever land on a shady-looking website and wonder …
Run YOUR own UNCENSORED AI & Use it for Hacking Have you ever tried to use a popular AI for a cybersecurity project, only to be met with: “I’m sorry, I cannot fulfill this request”? Most commercial AI models have …
Technique to Discover Who is Running a Website Hey there, welcome to CyberSudo! I’m Saad Sarraj, and here we explore the world of OSINT and Cyber Security in a clear, beginner-friendly way. Ever land on a shady-looking website and wonder …
This video shows how hackers use command and control servers or C2 to manage hacked android devices. Resources:
ONE OSINT Tool for EVERYTHING! Hey there, welcome to CyberSudo! I’m Saad Sarraj, and here we explore the world of OSINT and Cyber Security in a clear, beginner-friendly way. Check out this new OSINT tool that you can use to …







