Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
538 results
Return-oriented Programming (ROP) has been the predominate code-reuse attack for over a decade, but there are other options.
1,365 views
6 years ago
It can be very difficult for those new to hacking to learn about vulnerability discovery and exploit development on modern ...
665 views
2 years ago
He is passionate about ASM, reverse engineering, shellcode and exploit development and he has a MCTS Windows Internals ...
7,436 views
10 years ago
... also well versed at network penetration testing, web application testing, reverse engineering, fuzzing and exploit development.
4,281 views
12 years ago
0 views
Evolving Exploits Through Genetic Algorithms SOEN HACKER FOR TEAM VANNED This talk will discuss the next logical step ...
4,454 views
The rapid advancement of cyber defense products has led to an increase in sophisticated memory evasion techniques employed ...
1,515 views
Memory corruption vulnerabilities have plagued computer systems since we started programming software. Techniques for ...
3,845 views
His focus includes performing root-cause analysis, fuzzing and exploit development. Prior to joining HP, Hariri worked as an ...
3,090 views
... systems program, Mark's work has focused primarily on vulnerability discovery and exploit development for embedded systems.
7,434 views
Friday, July 12, 2024: 11:00 am (Little Theatre): In this revealing presentation, an ethical hacker with 25 years of experience ...
69 views
1 year ago
View the full free MOOC at https://ost2.fyi/Exp4011. This is it! This is the class that *actually* teaches you how to exploit a race ...
148 views
To ensure Google Pixel devices are always at their most secure, the Android Red Team continuously attacks the riskiest areas of ...
1,811 views
For decades, software vulnerabilities have remained an unsolvable security problem regardless of years of investment in various ...
5,575 views
3 years ago
... reverse engineering, exploit development and the defensive side as a chief security officer for software companies running wide ...
1,433 views
9 years ago
Ever wonder why there isn't a metasploit-style framework for Android apps? We did! Whether you're a developer trying to protect ...
6,174 views
Java Every-Days: Exploiting Software Running on 3 Billion Devices BRIAN GORENC ZERO DAY INITIATIVE, HP SECURITY ...
1,731 views
In this exploit development focused talk, we will first introduce eBPF and discuss several nefarious techniques enabled by the ...
4,898 views
View the full free MOOC at https://ost2.fyi/Vulns1001. This class is for C/C++ developers learning secure development, and ...
1,342 views
... in the UK, where he performs vulnerability discovery, exploit development, bespoke protocol analysis and reverse engineering.
3,052 views
Hello, my name is BWL-X8620, and I'm a SOHO router. For many years my fellow SOHO routers and I were victims of endless ...
39,585 views
How to Disclose or Sell an Exploit Without Getting in Trouble JAMES DENARO PARTNER, CIPHERLAW You have identified a ...
1,474 views
Managed Code Rootlets (MCRs) are terrifying post-exploitation attacks that open the doors for cementing and expanding a ...
1,830 views
View the full free MOOC at https://ost2.fyi/Vulns1002. This class is for C/C++ developers learning secure development, and ...
380 views
If you're interested in vulnerability research for fun or profit, or if you're a beginner and you're not sure how to progress, it can be ...
10,646 views