Debugging An Undebuggable App

  Рет қаралды 148,198

Bryce Bostwick

Bryce Bostwick

Күн бұрын

Пікірлер: 314
@nodrance
@nodrance 10 күн бұрын
Doing this much to prevent debugging is like hanging up a giant warning sign saying "I AM BEING SUSPICIOUS"
@Toad-k7e
@Toad-k7e 5 күн бұрын
or its anticheat?
@SeprexOG
@SeprexOG 4 күн бұрын
@@Toad-k7eye
@taktuscat4250
@taktuscat4250 3 күн бұрын
@@Toad-k7e its not even a game
@Toad-k7e
@Toad-k7e 2 күн бұрын
@ no one said it was.
@Toad-k7e
@Toad-k7e 2 күн бұрын
@ it could also be DRM to prevent cracking
@wardyorgason
@wardyorgason 11 күн бұрын
now I want to know the conspiracy behind having all of these protections
@misternachname517
@misternachname517 11 күн бұрын
prob just cracking protection
@dahahaka
@dahahaka 11 күн бұрын
​@@misternachname517 either that or they're doing something shady
@Y3ee
@Y3ee 11 күн бұрын
you should check out the app's privacy policy, it's actually so stupid, how much stuff they collect. Them trying to hide from debuggers, jailbroken phones etc. just makes it so much scarier.
@lbgstzockt8493
@lbgstzockt8493 10 күн бұрын
The "conspiracy" is that they spy on you every waking moment and sell the data to anyone who is willing to pay.
@nmslesecnmbese917
@nmslesecnmbese917 10 күн бұрын
The UI looks like a typical chinese app, so what's the expectation?
@henningerhenningstone691
@henningerhenningstone691 7 күн бұрын
"Debugging An Undebuggable App" sounds like my day-job, except I wrote the app 😅
@Joh447
@Joh447 5 күн бұрын
"what sort of lunatic moron coded this piece of sh- oh... That would be me"
@kali_chai
@kali_chai 3 күн бұрын
"I love writing code, I love testing code, and I really love developing code" -No CSC/CPE worker ever
@FancyPotatOS
@FancyPotatOS 7 күн бұрын
The usage of the snapshot call until it crashes is HILARIOUS and feels so ‘junior dev knows a security hack’. Even seeing the ‘while(1)’ is such an indication that something silly is occurring in code
@NSXPCConnection
@NSXPCConnection 12 күн бұрын
10:37 that someone who found the method by the way is Amelia While, really smart person! She found it in iOS ~13 or 15 I don’t remember but it STILL hasn’t been patched
@brycedotco
@brycedotco 12 күн бұрын
Ha!! I looked around a bit but could not find the history here - best I could find (after recording/editing) was that TrollLock-Reborn uses this to back its respring functionality. Can't believe it's been around that long. This is awesome, thanks for sharing!
@ramsey2155
@ramsey2155 11 күн бұрын
At that point its just malicious behaviour. That app should not even be allowed to be deployed
@llsc12dev
@llsc12dev 11 күн бұрын
@@brycedotcounfortunately amy’s method stopped working in the developer betas of ios 18. its funny that it took so long for apple to decide to fix lol
@nono1271
@nono1271 11 күн бұрын
Name looked suspicious, searched it and just found a white male whom people call something he's not and never will be 😑
@NoTraceOfSense
@NoTraceOfSense 10 күн бұрын
omg my oomf in the wild
@encodedlife
@encodedlife 11 күн бұрын
Dude that level of mastery in reverse engineering is impressive!
@ne.uveren
@ne.uveren 7 күн бұрын
This is a good example of the main rule of cyber security: doesn't matter how protected you are, if someone really wants to get in, they will find a way. The only question is, how long can you stall them for
@ДаниилРабинович-б9п
@ДаниилРабинович-б9п 5 күн бұрын
It's sometimes possible to make things that you run impervious to outside connections, but the moment a thing is running on the client side, you might as well assume the client has full control.
@ggsap
@ggsap 5 күн бұрын
this only applies for client side
@Architector_4
@Architector_4 3 күн бұрын
@@ggsap I mean, theoretically of course, but a determined enough adversary could physically break into your server room and make your server software clientside to them too lol
@tbuk8350
@tbuk8350 2 күн бұрын
This. The most important thing when developing an app (that you want to keep secure), is that you can NEVER trust the client. No amount of signing, checksums, obfuscation, etc. can protect a client-side program from someone who is determined enough. All you can do is slow them down. The only thing you as a developer can ever trust is your own hardware, which is usually the server. Write your networked programs so that the server validates EVERY action, and denies any request from the client that is out of its bounds. Then you leave blindly attacking the server and trying to find vulnerabilities in private code as the only option for the attacker, which is 1000x more difficult than hacking client-side code, which can be debugged, reverse-engineered, etc.
@tarosykes
@tarosykes 2 күн бұрын
@@Architector_4oh hey architector :)
@williamkaiser6075
@williamkaiser6075 11 күн бұрын
The streisand effect, but for protecting your app binaries
@slime_stick
@slime_stick 6 күн бұрын
Just learned a new word 😮
@noewaeda
@noewaeda 18 сағат бұрын
"protecting" your app binaries is already a bad idea to begin with
@john.dough.
@john.dough. 10 күн бұрын
woah! as someone used to Linux reverse engineering with Ghidra, it's wild how many things are so similar yet so different! thanks for sharing :0
@tijtij
@tijtij 11 күн бұрын
Got this video suggested by the algorithm and I am happy I clicked on it. The concepts are explained very clearly. I know very little about assembly but had no trouble following along. Instant subscribe.
@VerifyBot
@VerifyBot 11 күн бұрын
This was such a joy to watch! The way you explain everything calmly and enthusiastically is genuinly so charming Keep up with this!
@tdrg_
@tdrg_ 11 күн бұрын
It’s incredible how I can understand 10% of what you’re doing and still enjoy it so much Thanks for the video!
@pantherosgaming1995
@pantherosgaming1995 7 күн бұрын
That method of torpedo-ing the phone memory can actually be considered malicious.
@SeizureSalad
@SeizureSalad 5 күн бұрын
i've never seen reverse engineering explained in such an easy to understand and digest way. I've been trying to teach myself intel x86 assembly and IDA for some time now but still haven't gotten the hang of it and don't know where to start but this was really interesting to watch
@brycedotco
@brycedotco 5 күн бұрын
It takes awhile - I'm definitely still learning too. Keep at it!
@flameddogo
@flameddogo 11 күн бұрын
"Feed two birds with one scone" is hilarious
@jackedakk
@jackedakk 11 күн бұрын
the efficient pacifist
@lbgstzockt8493
@lbgstzockt8493 10 күн бұрын
PETA approved
@vertexstuff
@vertexstuff 10 күн бұрын
I was not ready for that lolll
@NithinJune
@NithinJune 9 күн бұрын
i’m pretty sure PETA came up with this 😭
@nuvotion-live
@nuvotion-live 5 күн бұрын
Much nicer :)
@ResizePixel
@ResizePixel 11 күн бұрын
This is so fun to watch as a much higher level programming language developer. I love seeing these concepts and watching you step through assembly. It makes me want to challenge myself to learn more!
@lampree
@lampree 9 күн бұрын
I think the most impressive part of your videos isn’t even your reverse engineering skills (which are great) but your ability to explain a complex subject and keep anyone interested. That is talent!
@nagyszabolcs9451
@nagyszabolcs9451 11 күн бұрын
I don't really have experience with ios specifically, but your explanations make this so watchable, can't wait for part 2!
@Mabeloid
@Mabeloid 11 күн бұрын
i know nothing about this debugging area of programming and i have to let you know how clear and good all your explanations are that nothing went over my head
@voilin
@voilin 10 күн бұрын
I'm not an apple dev, but your presentation was so good I decided to stay anyway, that was masterful!
@TheOliveOli38
@TheOliveOli38 6 күн бұрын
Ngl blocking debuggers and having jailbreak protection is something I'd expect from stuff like Mario Kart Tour (which does have those protection measures because of anti-cheat, which is also the same reason why it's online-only) but a widget app? Are the devs really that greedy for ad revenue? (Which I'm guessing is the main reason why they did all of that; they don't want people bypassing ads or cracking IAPs)
@codewithkanishk7500
@codewithkanishk7500 6 күн бұрын
Perfectly explained, Person like me who had never written Objective C or never done any IOS development can easily understand how things are working, Thanks man your teaching skills are absolutely phenomenal.
@_opa334
@_opa334 11 күн бұрын
But I thought the App Store was secure and Apple manually verifies all submissions to not be malicious??? Was my life a lie??? 😢😢😢 /s
@qwfp
@qwfp 11 күн бұрын
There is no malicious apps in the App Store. 😃
@brycedotco
@brycedotco 11 күн бұрын
this is totally the only one, probably, i swear
@user-lj4lo7cx7m
@user-lj4lo7cx7m 10 күн бұрын
As a developer in a big company here at US: No. They don't verify deeply our app, and it usually takes a few hours to get approved
@sorae42
@sorae42 10 күн бұрын
Most of the software storefronts only do deep analysis on the softwares first submission. Later updates are usually quickly skimmed thru so they can get the new version up and running asap.
@thewhitefalcon8539
@thewhitefalcon8539 10 күн бұрын
They are verifying their financial security, not your computer security.
@DarrenJohn10X
@DarrenJohn10X 6 күн бұрын
I don't ever code in assembly, and I don't have or use any Apple products. But I watched this entire video. You are excellent at explaining every step. 👏
@TechX1320
@TechX1320 2 күн бұрын
I cannot stand Root detection/Jailbreak detection. It all started with people thinking "Oh, cheaters root/jailbreak" when you don't even need to. You can mod the app and sideload. On iOS, yes, this is far more difficult than android, but still possible.
@gnorts_mr_alien
@gnorts_mr_alien 9 сағат бұрын
you are an amazing communicator. think your channel will go very far.
@yassine-sa
@yassine-sa 8 күн бұрын
18:12 God, he's literally about to collapse and start crying 😂😂😂
@oskarristolang
@oskarristolang 10 күн бұрын
absolutely love your videos, they're so complex but yet so simple
@Flor-ian
@Flor-ian 11 күн бұрын
The dedication to recording the video twice is insane. Love the content and happy to see a new upload!
@rosawatson6813
@rosawatson6813 10 күн бұрын
Amazing production quality! Absolutely love it. My experience goes as far as "doing random stuff with frida". Learned quite a bit from this.
@DaxSudo
@DaxSudo 10 күн бұрын
This is the most underrated channel I have ever seen and I love it. Everything you’re doing I’m on the exact opposite side of that react native, native development, web development API’s, edge services. Full stack and u hack it I love it so much.
@abdallaaltaay4487
@abdallaaltaay4487 12 күн бұрын
Is there a similar channel that does the same thing but android
@brycedotco
@brycedotco 11 күн бұрын
(watching this thread so that if anybody has any recommendations, I can learn too, ty)
@bity-bite
@bity-bite 11 күн бұрын
Closest I can think of is LauireWired
@asdhuman
@asdhuman 11 күн бұрын
also you can apply a lot of this knowledge to android too
@FaizanAli-visiontech
@FaizanAli-visiontech 11 күн бұрын
​@@brycedotcoMe too
@reabstraction
@reabstraction 11 күн бұрын
​@@brycedotco There is something called ReVanced if you want to patch apps yourself Its a plugin patcher for Android Most known for patching KZbin It can patch any app Unless it uses Play Integrity API In which case that will need to be patched out using microG as a replacement As Play Integrity API requires code signing
@alvinjoycharles6914
@alvinjoycharles6914 11 күн бұрын
My absolute favourite channel on yt. Please keep making this kind of content!!
@Daniel15au
@Daniel15au 10 күн бұрын
I don't own any Apple devices (neither does anyone in my family) and have never written code for iOS, but I still enjoyed this video. Nice work!
@gFamWeb
@gFamWeb 11 күн бұрын
As a security researcher, this video is so incredibly fascinating and also extremely helpful for whenever I need to use `lldb`.
@Observer552
@Observer552 5 күн бұрын
Is every app open-source for you? Great video, and I was feeling sad for recording the video twice
@yassine-sa
@yassine-sa 8 күн бұрын
Bro I can't imagine how hard learning all of this must have been, this is so frkn awesomme
@kwiky5643
@kwiky5643 7 күн бұрын
not really given how interesting it is. It's not "basic knowledge", but it's not like it's obscure stuff either if you're an iOS dev
@yassine-sa
@yassine-sa 7 күн бұрын
@kwiky5643 yes I agree, I'm not an IOS dev( I'm not in the apple ecosystem) and i can see what you mean, but still what he did is so cool I wanna try ios dev as soon as i get an apple computer and i have time
@yandevelop
@yandevelop 11 күн бұрын
Really great video! I'm glad that I found your channel. I'm a tweak developer for jailbreaks myself so this is very interesting to see! Good job :)
@appelveg
@appelveg 12 күн бұрын
Very in depth! Love your explanations, you were literally explaining as I was figuring out! And the app is SOOOO sketchy :)
@rugmj
@rugmj 11 күн бұрын
Really enjoy seeing your videos, I learn something which helps me write tweaks every time :)
@bocchertherock
@bocchertherock 6 күн бұрын
The single apostrophe after the app name label is just enough to classify this app as suspicious. General rule of thumb: If a program/app name uses non-alphanumeric characters in weird places, that's one red flag.
@eastarctica513
@eastarctica513 11 күн бұрын
This video is actually amazing! It goes over tons of the things I’ve had trouble with when dabbling in iOS reversing. I’ll have to look into those group identifiers a bit more though to learn how they actually work
@developertpl
@developertpl 7 күн бұрын
I really enjoy your content and the way you explain complex iOS features. It would be really nice to be able to watch you building an application, either as a series or a live coding session.
@brycedotco
@brycedotco 6 күн бұрын
I appreciate that! I've never been sure if building a normal thing would be super interesting to people - this gives me some motivation. Thanks!
@jirehla-ab1671
@jirehla-ab1671 6 күн бұрын
​How abt disassembly (viewing assembly code) instead of debugging, would the steps be different? @@brycedotco Same platform IOS
@ggsap
@ggsap 5 күн бұрын
@@brycedotco It probably won't but this reverse engineering format is quite intresting!
@ahmetdenizsezgin
@ahmetdenizsezgin 9 күн бұрын
3:03 No you’re not best sentence i have ever heard this year about coding
@SimSel02
@SimSel02 8 күн бұрын
I love your videos and you have very impressive skills (I really enjoy how you explain)! Keep it up! I’d also like to see videos published more often
@nobodyknows-vk3iv
@nobodyknows-vk3iv 19 сағат бұрын
it's a crime for this video not go viral
@mikaay4269
@mikaay4269 9 күн бұрын
I've never had any apple device and probably never will, but this content is still really interesting. Keep it up!
@cihadturhan
@cihadturhan 9 күн бұрын
Great job man! I love your videos. It's full of information and I still understand it even if I have very limited ios dev experience. Now, when I think about how I can protect my app from hackers, there is literally no way I can think of
@boomanten1020
@boomanten1020 11 күн бұрын
I havent done any iOS reversing, but you have such a good way of explaining things that help me outside of the Apple environment. Also like how iOS manual pages mention the BSD System Call
@seekyboi23
@seekyboi23 6 күн бұрын
Because macOS and iOS are forks of FreeBSD
@dahahaka
@dahahaka 11 күн бұрын
The snapshot loop is kinda hilarious
@jondycz
@jondycz 7 күн бұрын
Now try McDonald's app
@iskamag
@iskamag 10 күн бұрын
Jailbreak "protection" is so annoying. It often triggers when jailbreak's inactive too. Just let me use my phone how I want damnit!
@arjundureja
@arjundureja 11 күн бұрын
Can't wait for the next video. Need to know why this app has so many protections
@tokero5199
@tokero5199 12 күн бұрын
Great video! I was sure you were going to to patch the bin with a noop or something but setting a break on the mem address was clever.
@NithinJune
@NithinJune 9 күн бұрын
13:05 oh god if you weren’t sure that you don’t want this app anywhere near your phone, that temu app layout seals the deal
@TheOnlyASDK
@TheOnlyASDK 9 күн бұрын
it reminds me of the OPPO Theme Store, the UI design is very similar
@NithinJune
@NithinJune 8 күн бұрын
@ i think it’s a chinese design language. if you look at chinese websites and apps, we would probably consider them cluttered and trashy
@TheOnlyASDK
@TheOnlyASDK 4 күн бұрын
@@NithinJune True, they have very information dense design principles
@VanillaSpooks
@VanillaSpooks 6 күн бұрын
Feed two birds with one scone??? The birds will now battle over the scone
@dewantawsif
@dewantawsif 10 күн бұрын
So I had seen your very first video and after a year KZbin recommends this one. Subscribed so I can get more on my feed.
@etino
@etino 11 күн бұрын
Your channel is golden. Respect man! Keep it up :)
@MrRonanX
@MrRonanX 11 күн бұрын
This channel is a hidden gem of the iOS Engineering!
@seansingh4421
@seansingh4421 9 күн бұрын
Check for canaries as well. A lot of softwares have reverse engineering/debugging canaries that only activate when you analyze them
@camillelouedoc3799
@camillelouedoc3799 4 күн бұрын
I finally found the perfect KZbin channel for my lunch break 🍻
@moohric
@moohric 9 күн бұрын
Man, this is entertaining to watch during lunch :D
@thundertastic896
@thundertastic896 11 күн бұрын
Dude, you're doing stuff with the debugger that I thought were not possible, would you be down to make a video about common and not so common tricks to debug applications? In this age of printf debugging nobody really praises the abilities of the debugger.
@Kaleb_Weise
@Kaleb_Weise 9 күн бұрын
Thanks for taking us through the journey! 🥂
@henriquematias1986
@henriquematias1986 10 күн бұрын
Super cool video dude! What else did you find inside that was suspicious 😂
@elmigranto
@elmigranto 10 күн бұрын
Extremely well-done and explained. I am beyond impressed! 💯
@0xbitbybit
@0xbitbybit 3 күн бұрын
You know someone knows what they're talking about when they can afford/use IDA Pro 😂Awesome video and I haven't even done anything to do with iOS!
@ItsD3vil
@ItsD3vil 10 күн бұрын
You are a gem man love your content so much keep it up!
@pilothyper
@pilothyper 3 күн бұрын
I barely even know how to style text in CSS, so this stuff is a whole new realm for me dang xD
@joshynoshy
@joshynoshy 11 күн бұрын
I NEED to know why. WHYYYY? Why did they make the app so scared of debugger?
@TheOisannNetwork
@TheOisannNetwork 11 күн бұрын
In general: It's about regulation, fraud prevention, anti-cheating and IP protection. I'm sure there are other reasons too, but those are for sure the main ones.
@LetrixAR
@LetrixAR 10 күн бұрын
The app has in-app purchases
@IrtyGo560
@IrtyGo560 5 күн бұрын
1) this app is chinese 2) money can change hands in this app
@lekeshala3735
@lekeshala3735 9 күн бұрын
I really enjoyed this video, showed me how much I didn't know about reverse engineering, good job.
@LeonOF-i3f
@LeonOF-i3f 11 күн бұрын
bro is the goat we all needed
@TimTheBeastNL
@TimTheBeastNL 6 күн бұрын
love the vids, would love to see a more detailed video or blog about FLEX. Would be cool to fully understand how to install and use it.
@NerdOfComputers
@NerdOfComputers 5 күн бұрын
this mustve take long to edit but worth it!
@snowyy304
@snowyy304 9 күн бұрын
You're a legend, my dude! Your reverse engineering is impressive as hell 🔥🔥🔥
@asandax6
@asandax6 8 күн бұрын
It seems if you make an app harder to crack Hackers just get motivated to crack it even more.
@lukasjetu9776
@lukasjetu9776 5 күн бұрын
I like how the word 'ptrace' in the captions is more and more b`ro`ke`n
@lukasjetu9776
@lukasjetu9776 5 күн бұрын
nevermind, ignore this
@jannikheidemann3805
@jannikheidemann3805 2 күн бұрын
Peat race
@danmorgan712
@danmorgan712 9 күн бұрын
As someone that loathes Apple and avoids their products like the plague, I still found this to just be an interesting video and found myself watching the entire thing and wanting more. Nice presentation.
@worldgeektube
@worldgeektube 10 күн бұрын
First class. Great analysis. No fluff.
@RobertNMusic
@RobertNMusic 7 күн бұрын
Love the video and great explanation! Would like to have more horizontal space on your windows though 😬 Could have XCode or disassembler top of screen and terminal bottom so that both get more width
@Visitor______________________v
@Visitor______________________v 5 күн бұрын
So much skill here, very interesting
@APerson-14
@APerson-14 Күн бұрын
gotta love apple allowing malaware yet can't allow 3rd party app stores
@nirusplex
@nirusplex 9 күн бұрын
Its a piece of art. Loved it.
@distortions
@distortions 10 күн бұрын
This is a cool series.
@Alcaline-hu2vu
@Alcaline-hu2vu 7 күн бұрын
They say everything is open source if you know assembly
@JZL003
@JZL003 10 күн бұрын
I just enjoy watching this, but there's so many helpful tips! I know it's maybe between 'purely educational' and 'live coding' but I think collating some of your tips into the description could be a nice summary for people who were actually learning and going to use
@MarioMakesSftwr
@MarioMakesSftwr 11 күн бұрын
amazing content as always!
@BitZorg
@BitZorg 10 күн бұрын
I haven't tried this, but I'm pretty sure ghidra can connect to a LLDB server and you can debug it that way. Might be nice for ant longer debugging sessions.
@RandomGeometryDashStuff
@RandomGeometryDashStuff 11 күн бұрын
04:36 do ios syscall numbers not change with kernel versions like linux?
@bm1259
@bm1259 10 күн бұрын
thats probably normal behaviour for operating systems but ofc windows just has to be different
@Dorumin
@Dorumin 10 күн бұрын
@@bm1259 You'd think it's more of a problem than it really is. If Linux syscalls were so simple, there would be more Golangs that use it directly instead of libcs and musls :)
@jeffsmithdawg
@jeffsmithdawg 12 күн бұрын
Dude you’re like god level at reverse engineering. Did you ever create a jailbreak?
@tomtravis858
@tomtravis858 11 күн бұрын
I wouldn't imagine so, it's a very different field of reverse engineering.
@brycedotco
@brycedotco 11 күн бұрын
Yea, I wish! I'm an app dev who dabbles in reverse engineering, not a reverse engineer who dabbles in app dev, unfortunately 😅
@jeffsmithdawg
@jeffsmithdawg 11 күн бұрын
@ you definitely have what it takes
@super_loaf2
@super_loaf2 4 күн бұрын
my cat is currently watching this video with me
@doshantgiradkar5307
@doshantgiradkar5307 12 күн бұрын
Loved your videos ❤️❤️, can you make them more frequently, like once a month if not week. And can you please also expand a little bit over to android side of things?
@brycedotco
@brycedotco 11 күн бұрын
Thank you!! I'm trying to make more of them this year! I have about zero expertise on the android side though - I want to learn, but we're probably a ways away from anything fun there!
@neutrino2211_
@neutrino2211_ 11 күн бұрын
Your channel really needs to get in the eyes of more researchers, the RE content is always top notch
@LiveLM
@LiveLM 9 күн бұрын
At first I thought it was just cracking protection, but purposely exhausting the phone's memory is too far. Sketchy ass app, people should really quit using crap like this
@sirflimflam
@sirflimflam 11 күн бұрын
This is very interesting. Could finding something like this result in getting the app taken off the app store? Seems a little crazy to force the entire phone to crap itself as a matter of design, regardless of the likelihood of activating. I don't think Apple would appreciate the implied instability of the phone. Granted you wouldn't theoretically run into this problem unless you were trying to debug the app, but the fact they have kill code like that at all would raise some eyebrows for me if I was determining the suitability for the app to be on the storefront.
@aaronmaynard42
@aaronmaynard42 8 күн бұрын
I like your funny words magic man.
@TheHackysack
@TheHackysack 11 күн бұрын
Sublime Text mentioned! Let's go!
@AlekEagle
@AlekEagle 10 күн бұрын
16:53 would it be possible to compute what the shared folder would be and return that so resigned code would still work? Or does the iOS system prevent resigned packages from accessing shared folders from different signatures
@shavranotheferanox7809
@shavranotheferanox7809 4 күн бұрын
saw this in reccomended, got curious cause it looked interesting, understood absolutely 0 things, sended it to my gf who likes to "poke around" in apps and things as well
@darrenjones5688
@darrenjones5688 11 күн бұрын
What’s the recommended device/version for jailbreak now? I’ve got an iOS 12 device but most apps won’t even install on it now.
Hacking This Terrible DRM
15:20
Nathan Baggs
Рет қаралды 119 М.
This Rare Futuristic eBike is a Total Nightmare
18:24
Berm Peak
Рет қаралды 6 МЛН
Мен атып көрмегенмін ! | Qalam | 5 серия
25:41
Enceinte et en Bazard: Les Chroniques du Nettoyage ! 🚽✨
00:21
Two More French
Рет қаралды 42 МЛН
I Tried Putting my Fluid Simulation on a Planet
27:23
Sebastian Lague
Рет қаралды 394 М.
Modding TikTok to only show Cat Videos
29:12
Bryce Bostwick
Рет қаралды 108 М.
The Lever Paradox
24:43
Steve Mould
Рет қаралды 894 М.
I built an Omni-Directional Ball-Wheeled Bike
27:55
James Bruton
Рет қаралды 4,7 МЛН
Attempting to Make the World's Smallest* Electric Motor
16:27
Chronova Engineering
Рет қаралды 898 М.
AI Is Making You An Illiterate Programmer
27:22
ThePrimeTime
Рет қаралды 222 М.
some of the worst API security i've EVER seen
27:53
Low Level
Рет қаралды 379 М.
After 44 Years, Someone Beat the Donkey Kong Kill Screen
29:09
the ONLY way to run Deepseek...
11:59
NetworkChuck
Рет қаралды 328 М.
i dove down the 7z rabbit hole (it goes deep)
12:50
Low Level
Рет қаралды 645 М.
Мен атып көрмегенмін ! | Qalam | 5 серия
25:41