All creators
zSecurity

zSecurity

Ethical hacking, OSINT, and AI security tools with a focus on practical exploits and terminal-based tutorials.

Rating
7.1
ReReview score
Award
Worth a Watch
Chart
#80
AI & Software Tools
Subscribers
599K
YouTube
Age
14y 5m
Channel age

Nutrition Label

zSecurity delivers highly authentic, hands-on hacking tutorials that prioritize "show, don't tell" demonstrations using real terminal commands and live environments. While the technical walkthroughs are reliable and sponsorship disclosures are excellent, the video titles frequently exaggerate the scope or severity of the exploits shown, often framing standard OSINT techniques as direct application breaches.

Strengths

  • +Live technical demonstrations
  • +Clear sponsorship disclosures
  • +Practical execution steps

Notes

  • !Titles often claim direct hacks on secure apps, while content usually demonstrates social engineering or public data scraping.
  • !Sponsorships and affiliate tools are transparently integrated into the tutorials, often as required steps for the workflow.

Why this rating

Evidence receipts showing why each dimension is rated the way it is.

Experience Authenticity9/10
I'm going to run a command that will download a docker image... it basically contains a browser that can be accessed through the web.
[08:15]

Demonstrates the exact terminal commands and configuration steps in real-time, showing the actual workflow rather than just slides.

Transparency9/10
Special thanks to: Pliny the Liberator... For publishing all their amazing work and contributing to the community
[Description]

Exceptionally transparent by explicitly crediting the external researcher (Pliny) who discovered the jailbreak prompts, rather than claiming credit for the discovery.

Rigor & Evidence8/10
As you can see, the target has logged in... and if I go back to my hacker machine... I have full access to the emails.
[23:45]

Provides a complete proof-of-concept by successfully bypassing 2FA on a real Gmail account during the demonstration.

Title-Content Alignment3/10
Ezequiel Pereira... discovered a bug in the Google internal network... Google paid him $36,000.
[00:25]

The title claims 'Google Paid $150K', but the specific case study cited in the video explicitly mentions a $36,000 payout, creating a significant clickbait discrepancy.

Original Analysis4/10
The Zero Trust Solution
[6:21]

The solution presented (Allowlisting/Zero Trust) is a standard industry sales pitch for the sponsored tool, rather than a novel or independent security insight.

Categories
Automation & AgentsCoding ToolsDeveloper PlatformsResearch ToolsSecurity & Privacy
Formats
TutorialsExplainers