0:57
Windows Internals What is the CONTEXT structure
1K views • 2 months ago
16:34
Creating FLIRT Signatures in IDA Pro for CTF's, Malware, etc...
1.2K views • 3 months ago
17:13
Recreating Undocumented Structures Using Local Types in IDA Pro
889 views • 3 months ago
1:44:37
Return Oriented Shellcode (ROP Shellcode)
1.1K views • 9 months ago
55:20
Introduction to Linux Heap Exploitation
1.8K views • 9 months ago
2:34:38
A Look at Modern Windows Kernel Exploitation
2.7K views • 9 months ago
1:03:27
Modern Windows Binary Patch Diffing!
1K views • 9 months ago
1:19:00
Reverse Engineering Windows Exploit Mitigations - Do Not Allow Child Proc
936 views • 9 months ago
50:36
Hacking Google Cloud Platform (GCP)
1K views • 9 months ago
1:25:23
Browser Exploitation Introduction: Part 2 - UAF Against IE11 Bypassing MemGC
856 views • 9 months ago
46:35
Return Oriented Shellcode
2K views • 1 year ago
51:56
Hacker Techniques Introduction to Buffer Overflows
9.7K views • 1 year ago
1:38
What is the Off by One Security Stream
2.6K views • 1 year ago
End of Videos