videoandmovie.top logo
  • Films
  • Videos
  • Live
  • Login
  • Home
  • Films
  • Videos
  • Live
  • Đăng nhập
  • Films
    Movies Movies 2025Movies 2024Movies 2023Movies 2022Movies 2021Movies 2020Movies before 2020 TV Dramas United States of AmericaKoreaJapanChinaHong KongIndiaThailandFranceTaiwanAustraliaEnglandCanadaRussia
  • Best on Vidoe
    • Hoang Giang Share
    • Janusz
    • 办美国文凭加拿大文凭澳洲文凭英国文凭学位证毕业证成绩单
    • Veinas bọt EPE máy móc
    • Wendy Ye
Ali Issa
  • Videos
  • About
 

My name is Ali Issa and I work as the head of AI in a company based in Sweden. In this channel you will learn about AI, ethical hacking, leadership, and much more.

You can reach me on Linkedin: www.linkedin.com/in/
ali-issa-b266474a

Connect Semantic Kernel to Open Source models via Ollama
4:58
Connect Semantic Kernel to Open Source models via Ollama
Run Llama 3.1 or Any Open-Source Model Locally with LM Studio
3:57
Run Llama 3.1 or Any Open-Source Model Locally with LM Studio
Introduction to Semantic Kernel
5:00
Introduction to Semantic Kernel
Extracting Data from Documents with Document Intelligence and GPT-3.5
7:46
Extracting Data from Documents with Document Intelligence and GPT-3.5
Portswigger Lab: Exploiting LLM APIs with excessive agency
7:24
Portswigger Lab: Exploiting LLM APIs with excessive agency
PortSwigger Lab Walkthrough: Web Cache Poisoning with an Unkeyed Header Using Param Miner
9:07
PortSwigger Lab Walkthrough: Web Cache Poisoning with an Unkeyed Header Using Param Miner
Portswigger Lab: CSRF where token validation depends on request method
8:06
Portswigger Lab: CSRF where token validation depends on request method
Exploring CSRF Vulnerability: Theory and Hands-On Lab using CSRF generator in Burp Suite
7:23
Exploring CSRF Vulnerability: Theory and Hands-On Lab using CSRF generator in Burp Suite
Mastering DOM XSS via Client-Side Prototype Pollution in Under 3 Minutes with DOM Invader
3:06
Mastering DOM XSS via Client-Side Prototype Pollution in Under 3 Minutes with DOM Invader
Pentesting JWTs: Cracking weak keys using JWT_TOOL
5:55
Pentesting JWTs: Cracking weak keys using JWT_TOOL
Understanding JWT Vulnerabilities: JWT Crack Attack
5:02
Understanding JWT Vulnerabilities: JWT Crack Attack
Understanding JWT Vulnerabilities: The 'None' Vulnerability
19:25
Understanding JWT Vulnerabilities: The 'None' Vulnerability
Hunting Input Validation Vulnerabilities in Juice Shop
4:54
Hunting Input Validation Vulnerabilities in Juice Shop
Mastering IDOR Vulnerability Hunting: Find IDORs in less than 10 minutes with Autorize!
8:44
Mastering IDOR Vulnerability Hunting: Find IDORs in less than 10 minutes with Autorize!
In-band SQL injection - What is it, and why should we care?
12:16
In-band SQL injection - What is it, and why should we care?
Cross-Site Scripting (XSS) Explained And Demonstrated
32:35
Cross-Site Scripting (XSS) Explained And Demonstrated
Genomgång av Burp Suite
29:52
Genomgång av Burp Suite
  • Show more

© Copyright 2025 Vidoe. All Rights Reserved.

To claim DCMA copyright, please email to [email protected].
ViDoe Login
Upload videos, create your own free channel with ViDoe.Top after login

Login with Google Login with Discord