Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
40 results
Showing off some cross site scripting techniques and looking at the chrome XSS Auditor -=[ Stuff I use ]=- → Microphone:* ...
81,888 views
7 years ago
-=[ Stuff I use ]=- → Microphone:* https://geni.us/ntg3b → Graphics tablet:* https://geni.us/wacom-intuos → Camera#1 for ...
107,032 views
5 years ago
This video is an explanation of bug bounty report submitted to Airbnb program. The vulnerability was XSS that required 4 different ...
27,191 views
3 years ago
We will go over a few puzzle pieces and discuss XSS research... and we find evidence of a XSS conspiracy!!11!!!1! fuzzing: ...
161,453 views
URLs are surprisingly hard to read. Chrome Bug: https://bugs.chromium.org/p/chromium/issues/detail?id=841105 Orange Tsai: ...
346,517 views
We have a look at another interesting XSS vector due to weird Firefox parsing, and then explore how researchers find this stuff.
69,084 views
We learn about simple php web apps and why it's so common that php applications have XSS issues. It's all about shitty tutorials.
137,340 views
An actual XSS on google.com by Masato Kinugawa. It abuses a parsing differential between a JavaScript enabled and disabled ...
690,733 views
How to get good at XSS? There are a lot of charlatans out their overhyping by posting misleading content. It's infuriating because ...
174,689 views
Reading from the famous paper "The Confused Deputy" by Norm Hardy and make a connection to modern web vulnerabilities like ...
40,037 views
In 2017 a cool bug was reported by a researcher, which lead me down a rabbit hole to a 2014 and even 2009 bug. This provides ...
100,472 views
When is a vulnerability actually a vulnerability? I can't answer this question easily, and thus we look at a few examples in this ...
77,880 views
XSS is easily one of the worst vulnerabilities in the Web. It is pretty easy to introduce, and it can have huge impacts. In this video ...
107 views
What is cross site request forgery and what does it have to do wwith the same-origin policy. -=[ Stuff I use ]=- → Microphone:* ...
121,597 views
Let's introduce the concept of a weird machine in order to understand ROP differently. It's maybe a bad tutorial. What Hacker ...
56,223 views
Using ARM SWD with a development board to debug the chip with GDB. research: https://wallet.fail DISCLAIMER: The security ...
134,994 views
totally clickbait. but also not clickbait. I don't know where to start hacking, there is no guide to learn this stuff. But I hope you still ...
3,332,212 views
6 years ago
The start of a new series. We will try to learn some basics about Browser Exploitation. blog: ...
101,451 views
This challenge from the 34C3 CTF implemented a software update in python. In part 1/2 we try to understand the code and think ...
52,005 views
We perform a fault injection on an arduino board to break out of a endless loop. We drop the power for a very short amount of time ...
106,746 views