Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
41 results
Showing off some cross site scripting techniques and looking at the chrome XSS Auditor -=[ Stuff I use ]=- → Microphone:* ...
81,885 views
7 years ago
-=[ Stuff I use ]=- → Microphone:* https://geni.us/ntg3b → Graphics tablet:* https://geni.us/wacom-intuos → Camera#1 for ...
107,030 views
5 years ago
This video is an explanation of bug bounty report submitted to Airbnb program. The vulnerability was XSS that required 4 different ...
27,189 views
3 years ago
We will go over a few puzzle pieces and discuss XSS research... and we find evidence of a XSS conspiracy!!11!!!1! fuzzing: ...
161,451 views
URLs are surprisingly hard to read. Chrome Bug: https://bugs.chromium.org/p/chromium/issues/detail?id=841105 Orange Tsai: ...
346,510 views
We have a look at another interesting XSS vector due to weird Firefox parsing, and then explore how researchers find this stuff.
69,084 views
An actual XSS on google.com by Masato Kinugawa. It abuses a parsing differential between a JavaScript enabled and disabled ...
690,724 views
We learn about simple php web apps and why it's so common that php applications have XSS issues. It's all about shitty tutorials.
137,334 views
How to get good at XSS? There are a lot of charlatans out their overhyping by posting misleading content. It's infuriating because ...
174,686 views
Reading from the famous paper "The Confused Deputy" by Norm Hardy and make a connection to modern web vulnerabilities like ...
40,035 views
In 2017 a cool bug was reported by a researcher, which lead me down a rabbit hole to a 2014 and even 2009 bug. This provides ...
100,470 views
When is a vulnerability actually a vulnerability? I can't answer this question easily, and thus we look at a few examples in this ...
77,880 views
XSS is easily one of the worst vulnerabilities in the Web. It is pretty easy to introduce, and it can have huge impacts. In this video ...
107 views
What is cross site request forgery and what does it have to do wwith the same-origin policy. -=[ Stuff I use ]=- → Microphone:* ...
121,587 views
totally clickbait. but also not clickbait. I don't know where to start hacking, there is no guide to learn this stuff. But I hope you still ...
3,332,155 views
6 years ago
Let's introduce the concept of a weird machine in order to understand ROP differently. It's maybe a bad tutorial. What Hacker ...
56,219 views
The start of a new series. We will try to learn some basics about Browser Exploitation. blog: ...
101,449 views
Using ARM SWD with a development board to debug the chip with GDB. research: https://wallet.fail DISCLAIMER: The security ...
134,967 views
This challenge from the 34C3 CTF implemented a software update in python. In part 1/2 we try to understand the code and think ...
52,003 views
In this guest video 13cubed shows us some forensics work combining data from fls and volatility and then exploring the data with ...
39,232 views