Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
1,147 results
It can be very difficult for those new to hacking to learn about vulnerability discovery and exploit development on modern ...
668 views
2 years ago
Memory corruption vulnerabilities have plagued computer systems since we started programming software. Techniques for ...
3,850 views
10 years ago
How to Disclose or Sell an Exploit Without Getting in Trouble JAMES DENARO PARTNER, CIPHERLAW You have identified a ...
1,475 views
12 years ago
A new wave of attacks has targeted CentreStack and Triofox servers using an unpatched Local File Inclusion vulnerability ...
64 views
3 months ago
In this talk I will show how to reverse engineer a proprietary HTTP Server in order to leverage memory corruption vulnerabilities ...
1,799 views
3 years ago
DARPA's Grand Cyber Challenge foretold an ominous future stricken with machines exploiting our code and automatically ...
1,898 views
6 years ago
View the full free MOOC at https://ost2.fyi/Exp4011. This is it! This is the class that *actually* teaches you how to exploit a race ...
150 views
1 year ago
In this talk, we will present novel vulnerabilities and exploitation techniques that reliably bypass Linux syscall tracing. A user mode ...
1,303 views
Phantom attack is a collection of attacks that evade Linux system call monitoring. A user mode program does not need any special ...
3,060 views
4 years ago
Privilege escalation is a common attack vector in the Windows OS. Today, there are multiple offensive tools in the wild that can ...
3,636 views
Like most modern devices, building controllers have increasingly become network connected, exposing them to a wider range of ...
7,439 views
Imagine being able to get together with a few of your co-workers, look at your office keys and derive a building master key. Or you ...
6,562 views
5 years ago
What can you do, as an attacker, when you find yourself as a low privileged Windows user with no path to SYSTEM? Install a ...
6,236 views
Cisco ASA and ASA-X are widely deployed firewalls that are relied upon to protect internal networks from the dangers of the ...
1,739 views
A debugger is always a valuable tool when searching for vulnerabilities, particularly in embedded systems where multiple ...
252 views
5 days ago
Cisco has issued an urgent warning regarding a critical vulnerability, CVE-2024-20353, in its Identity Services Engine (ISE).
35 views
1 month ago
VoIP Wars: Return of the SIP FATIH OZAVCI INFORMATION SECURITY RESEARCHER AND CONSULTANT, VIPROY ...
4,284 views
A concept is a brick. It can be used to build a courthouse of reason. Or it can be thrown through the window.” ― Gilles Deleuze ...
5,273 views
Ever wonder why there isn't a metasploit-style framework for Android apps? We did! Whether you're a developer trying to protect ...
6,175 views
A Password is Not Enough: Why disk encryption is broken and how we might fix it DANIEL SELIFONOV Since the publication of ...
1,921 views