Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
224 results
Return-oriented Programming (ROP) has been the predominate code-reuse attack for over a decade, but there are other options.
1,365 views
6 years ago
It can be very difficult for those new to hacking to learn about vulnerability discovery and exploit development on modern ...
665 views
2 years ago
He is passionate about ASM, reverse engineering, shellcode and exploit development and he has a MCTS Windows Internals ...
7,436 views
10 years ago
Evolving Exploits Through Genetic Algorithms SOEN HACKER FOR TEAM VANNED This talk will discuss the next logical step ...
4,454 views
12 years ago
... also well versed at network penetration testing, web application testing, reverse engineering, fuzzing and exploit development.
4,282 views
The rapid advancement of cyber defense products has led to an increase in sophisticated memory evasion techniques employed ...
1,517 views
... systems program, Mark's work has focused primarily on vulnerability discovery and exploit development for embedded systems.
7,435 views
Memory corruption vulnerabilities have plagued computer systems since we started programming software. Techniques for ...
3,847 views
His focus includes performing root-cause analysis, fuzzing and exploit development. Prior to joining HP, Hariri worked as an ...
3,090 views
Security has gone from a curiosity to a phenomenon in the last decade. Fortunately for us, despite the rise of memory-safe, ...
13,365 views
To ensure Google Pixel devices are always at their most secure, the Android Red Team continuously attacks the riskiest areas of ...
1,811 views
For decades, software vulnerabilities have remained an unsolvable security problem regardless of years of investment in various ...
5,577 views
3 years ago
His primary areas of expertise include reverse engineering embedded firmware and exploit development. He has also presented ...
5,586 views
Friday, July 12, 2024: 11:00 am (Little Theatre): In this revealing presentation, an ethical hacker with 25 years of experience ...
69 views
1 year ago
... reverse engineering, exploit development and the defensive side as a chief security officer for software companies running wide ...
1,433 views
9 years ago
In this exploit development focused talk, we will first introduce eBPF and discuss several nefarious techniques enabled by the ...
4,904 views
Java Every-Days: Exploiting Software Running on 3 Billion Devices BRIAN GORENC ZERO DAY INITIATIVE, HP SECURITY ...
1,731 views
How Debian handles security vulnerabilities (CVEs) for its packages. Learn how security vulnerabilities are tracked and fixed, ...
625 views
2 months ago
View the full free MOOC at https://ost2.fyi/Vulns1001. This class is for C/C++ developers learning secure development, and ...
1,349 views
Ever wonder why there isn't a metasploit-style framework for Android apps? We did! Whether you're a developer trying to protect ...
6,174 views