Advertisement
americangods

hackers

Jun 26th, 2019
2,010
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.83 KB | None | 0 0
  1. <canvas>
  2.  
  3. <hacking>
  4.  
  5. <item>
  6. <title>The Complete Ethical Hacking Course</title>
  7. <link>https://www.youtube.com/watch?v=sy_SD0KbNnw</link>
  8. <thumbnail>https://yt3.ggpht.com/a-/AN66SAzU01Rqc3Pps-MgekRO8DX-lCOehCMOwaa4Rw=s288-mo-c-c0xffffffff-rj-k-no</thumbnail>
  9. </item>
  10.  
  11. <plugin>
  12. <title>Beginners Guide To Penetration Testing</title>
  13. <link>plugin://plugin.video.youtube/playlist/PLhjFPlDbRmbvYgGHDven8Gi7ANNX1ZFtP/</link>
  14. <thumbnail>https://yt3.ggpht.com/a-/AN66SAz4aQvA-Ku7OTXrqpxd-N80YTapdH44k58V4A=s288-mo-c-c0xffffffff-rj-k-no</thumbnail>
  15. </plugin>
  16.  
  17. <plugin>
  18. <title>Powershell</title>
  19. <link>plugin://plugin.video.youtube/playlist/PLDEMcGm48klPa23uwbwPupKlndqiXL37D/</link>
  20. <thumbnail>https://yt3.ggpht.com/a-/AN66SAwvtgJCvQ8Ils1ZDygNH_UwvhwSHD_R5T3vIw=s288-mo-c-c0xffffffff-rj-k-no</thumbnail>
  21. </plugin>
  22.  
  23. <plugin>
  24. <title>Null Byte</title>
  25. <link>plugin://plugin.video.youtube/channel/UCgTNupxATBfWmfehv21ym-g/</link>
  26. <thumbnail>https://yt3.ggpht.com/a-/AN66SAwRn66JieYL6dlCNkyUfFqhfYB6l0viTWeLeA=s288-mo-c-c0xffffffff-rj-k-no</thumbnail>
  27. </plugin>
  28.  
  29. <plugin>
  30. <title>Jason Dion</title>
  31. <link>plugin://plugin.video.youtube/playlist/PL1rFvQRVWVVYLeYVfiJJbZ8mTAv8wrYl4/</link>
  32. <thumbnail>https://yt3.ggpht.com/a-/AN66SAyglnqJTGGdWu1RTHd-Z0uKToBmqVDV1LkCHA=s288-mo-c-c0xffffffff-rj-k-no</thumbnail>
  33. </plugin>
  34.  
  35. <plugin>
  36. <title>Geeks Fort</title>
  37. <link>plugin://plugin.video.youtube/channel/UC09NdTL2hkThGLSab8chJMw/</link>
  38. <thumbnail>https://yt3.ggpht.com/a-/AN66SAyYwuiq-Z7-4H_1DPpi43jU5X005FoNOyW89Q=s288-mo-c-c0xffffffff-rj-k-no</thumbnail>
  39. </plugin>
  40.  
  41.  
  42. <plugin>
  43. <title>DemmSec</title>
  44. <link>plugin://plugin.video.youtube/channel/UCJItQmwUrcW4VdUqWaRUNIg/</link>
  45. <thumbnail>https://yt3.ggpht.com/a-/AN66SAwJkgM8dBV3_8UF8LtEPqyGLmunghODfnB7UA=s288-mo-c-c0xffffffff-rj-k-no</thumbnail>
  46. </plugin>
  47.  
  48. <plugin>
  49. <title>HackerSploit</title>
  50. <link>plugin://plugin.video.youtube/channel/UC0ZTPkdxlAKf-V33tqXwi3Q/</link>
  51. <thumbnail>https://yt3.ggpht.com/a-/AN66SAwskK5Ius4i-XtvjpPLiVolW4Xu5OiRwzJXSw=s288-mo-c-c0xffffffff-rj-k-no</thumbnail>
  52. </plugin>
  53.  
  54. <plugin>
  55. <title>The Shadow Brokers</title>
  56. <link>plugin://plugin.video.youtube/channel/UCkpwPf2B4FphjqVcozDym0A/</link>
  57. <thumbnail>https://yt3.ggpht.com/a-/AN66SAyGThdk_vN5TEwl4rGkmq9xVZTwTM7S_7mmhA=s288-mo-c-c0xffffffff-rj-k-no</thumbnail>
  58. </plugin>
  59.  
  60. <plugin>
  61. <title>Mighty Ghost Hack</title>
  62. <link>plugin://plugin.video.youtube/channel/UCeVmancWx92vTZ9IPYOKnKg/</link>
  63. <thumbnail>https://yt3.ggpht.com/a-/AN66SAxIKDh1TEYTzB44N244m-dpXl43hN5uJm00Lg=s288-mo-c-c0xffffffff-rj-k-no</thumbnail>
  64. </plugin>
  65.  
  66. <plugin>
  67. <title>Penetration Testing</title>
  68. <link>plugin://plugin.video.youtube/channel/UCEIOXb213JZK61VNZnJ_RyA/</link>
  69. <thumbnail>https://yt3.ggpht.com/a-/AN66SAyJrEdOuTGY276nWO7sZrN8ZB8ZTcml7A66-g=s288-mo-c-c0xffffffff-rj-k-no</thumbnail>
  70. </plugin>
  71.  
  72.  
  73. <plugin>
  74. <title>Codeinstein</title>
  75. <link>plugin://plugin.video.youtube/channel/UCO51Z4c1R8EPHZioGwgBmDw/</link>
  76. <thumbnail>https://yt3.ggpht.com/a-/AN66SAzvASAFHGPicvI5cOBaQO4e7t4jRMIHQK4ATg=s288-mo-c-c0xffffffff-rj-k-no</thumbnail>
  77. </plugin>
  78.  
  79. <plugin>
  80. <title>Crazy Danish Hacker</title>
  81. <link>plugin://plugin.video.youtube/channel/UClg0eyJTbAZaYuz3mhwfBBQ/</link>
  82. <thumbnail>https://yt3.ggpht.com/a-/AN66SAxmFVxnQ0TAlE91XNnjv682DF7KJ6TbmzPzdg=s288-mo-c-c0xffffffff-rj-k-no</thumbnail>
  83. </plugin>
  84.  
  85. <plugin>
  86. <title>DedSec</title>
  87. <link>plugin://plugin.video.youtube/channel/UCx34ZZW2KgezfUPPeL6m8Dw/</link>
  88. <thumbnail>https://yt3.ggpht.com/a-/AN66SAxN7YBaSXXvEIsKMja1OzffgOHOI9EkHSIxew=s288-mo-c-c0xffffffff-rj-k-no</thumbnail>
  89. </plugin>
  90.  
  91. <plugin>
  92. <title>Black Hat Hacking Tutorials</title>
  93. <link>plugin://plugin.video.youtube/channel/UCewoqENUmfwLqlh2MQ8nFBQ/</link>
  94. <thumbnail>https://yt3.ggpht.com/a-/AN66SAxU4FpEJasWJ0ajLmLIY_pInUPdiASwJL0_rQ=s288-mo-c-c0xffffffff-rj-k-no</thumbnail>
  95. </plugin>
  96.  
  97. <plugin>
  98. <title>Hak5</title>
  99. <link>plugin://plugin.video.youtube/channel/UC3s0BtrBJpwNDaflRSoiieQ/</link>
  100. <thumbnail>https://yt3.ggpht.com/a-/AN66SAz1PCMvBTxaJBzV04G5X9vuXYXzg4UYP-4xgQ=s288-mo-c-c0xffffffff-rj-k-no</thumbnail>
  101. </plugin>
  102.  
  103.  
  104.  
  105. </hacking>
  106. </canvas>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement