Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
610,050 results
A talk that covers the SLUB allocator internals and explains how common Slab shaping approaches work for exploiting Slab ...
1,398 views
1 year ago
In this video we will walk through reverse engineering the Microsoft Windows exploit mitigation known as "Do not allow child ...
1,522 views
2 years ago
This is the full recording of a workshop I hosted with my friend Tinus Green. The corresponding labs are completely free on Hack ...
335 views
2 days ago
Black Hat - Asia - Singapore - 2018 Hacking conference #hacking, #hackers, #infosec, #opsec, #IT, #security.
86 views
4 years ago
This guy used PUDDING to get free vacations forever... and I've found plenty more legal loopholes just like it! Suggest a topic here ...
4,205,220 views
Exploit: https://github.com/Fire30/CTF-WRITEUPS/blob/master/36c3_ctf/wisdom/README.md CVE: ...
2,590 views
6 years ago
Connor McGarr takes us through the state of exploitation and exploit mitigations on modern Windows systems. Join the Off By One ...
20,554 views
Streamed 3 years ago
There's only a few tickets left for my 9-hour Live Bug Bounty Hunting Workshop designed to teach you everything you need to start ...
10,519 views
3 months ago
PendingIntent, the advanced version of normal Android Intent, provides powerful inter-component communication on Android.
1,259 views
Kamilló Matek - The Key to an "Entire Kingdom" / Pandora FMS - Chained Exploit (CVE-2021-34074) This presentation was held ...
276 views
In this video, we dive deep into exploiting vulnerable plugins & core components of a web application. Learn how hackers find ...
216 views
Watch more AskReddit stories: https://youtube.com/playlist?list=PLAW80l3tA9Nb6eMqT0LrEfFcOZy7wv2TP Subscribe to ...
3,559 views
4 months ago
Welcome to the ultimate Metasploit full course! This 6-hour tutorial covers everything from basic to advanced exploitation ...
42,899 views
11 months ago
Course: https://wargames.ret2.systems/course Modern Binary Exploitation by RPISEC: https://github.com/RPISEC/MBE Pwn ...
4,725 views
10 months ago
This session presents the development and impact of AutoRFKiller, a tool designed to exploit vulnerabilities in cars using learning ...
336 views
Welcome to this comprehensive Windows Penetration Testing Training! In this video, we dive into essential tools, techniques, and ...
434 views
One misconfiguration away from a really bad day. How many breaches have you seen that came down to a forgotten admin ...
628 views
Streamed 2 months ago
https://www.offensivecon.org/speakers/2023/alex-plaskett-and-cedric-halbronn.html.
4,506 views
By: David Aitel.
78 views
12 years ago
Are you Sure your System Applications are Secure? Reduce Exploitation Risk via Application Specific Hardening - Kjell Pirschel, ...
285 views
3 years ago