Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
790 results
A concept is a brick. It can be used to build a courthouse of reason. Or it can be thrown through the window.” ― Gilles Deleuze ...
4,930 views
4 years ago
Printer Spooler service, one of the important services in Microsoft Windows, has existed for more than 25 years. It runs at highest ...
6,621 views
3 years ago
View the full free MOOC at https://ost2.fyi/Exp4011. This is it! This is the class that *actually* teaches you how to exploit a race ...
131 views
6 days ago
130 views
172 views
5 days ago
... Chuanda Ding, Evil Printer: How to Hack Windows Machines with Printing Protocol - https://media.defcon.org/DEF CON 28/DEF ...
6,031 views
2 years ago
Windows syscalls, while increasingly trendy in red team efforts, have only been very rarely used as pure shellcode, outside of ...
2,667 views
1 year ago
In 2020, security researchers reported a record number of Windows vulnerabilities. We were curious what superpowers will we ...
9,035 views
Due current global issues of 2020, organizations have been forced to make changes in how their business model operates and as ...
1,770 views
This presentation will cover a complete exploit chain in Azure B2C, starting with a discovery of cryptographic misuse and leading ...
2,001 views
9 months ago
In 2021 the FORCEDENTRY sandbox escape introduced the usage of NSPredicate in an iOS exploit. This new technique allowed ...
5,615 views
Privilege escalation is a common attack vector in the Windows OS. Today, there are multiple offensive tools in the wild that can ...
2,619 views
Windows 11 ships with a nifty feature called Power Automate, which lets users automate mundane processes. In a nutshell, Users ...
5,380 views
Virtualization and containers are the foundations of cloud services. Containers should be isolated from the real host's settings to ...
838 views
For software to communicate with hardware, it needs to talk to a kernel-mode driver that serves as a middle-man between the two, ...
5,275 views
This presentation will show a new method of dumping LSASS that bypasses current EDR defenses without using a vulnerability ...
1,849 views
PowerPwning: Post-Exploiting By Overpowering PowerShell JOE BIALEK SECURITY ENGINEER, MICROSOFT PowerShell is a ...
3,156 views
10 years ago
With a recent market cap of over $100 billion and the genericization of its name, the popularity of Zoom is undeniable. But what ...
1,592 views
Active Directory has always been a popular target for attackers, with a constant rise in attack tools attempting to compromise and ...
2,011 views