Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
63 results
Showing off some cross site scripting techniques and looking at the chrome XSS Auditor -=[ Stuff I use ]=- → Microphone:* ...
81,856 views
7 years ago
-=[ Stuff I use ]=- → Microphone:* https://geni.us/ntg3b → Graphics tablet:* https://geni.us/wacom-intuos → Camera#1 for ...
107,021 views
5 years ago
This video is an explanation of bug bounty report submitted to Airbnb program. The vulnerability was XSS that required 4 different ...
27,137 views
3 years ago
We will go over a few puzzle pieces and discuss XSS research... and we find evidence of a XSS conspiracy!!11!!!1! fuzzing: ...
161,419 views
URLs are surprisingly hard to read. Chrome Bug: https://bugs.chromium.org/p/chromium/issues/detail?id=841105 Orange Tsai: ...
346,451 views
We have a look at another interesting XSS vector due to weird Firefox parsing, and then explore how researchers find this stuff.
69,059 views
An actual XSS on google.com by Masato Kinugawa. It abuses a parsing differential between a JavaScript enabled and disabled ...
690,627 views
... absuing Chrome's XSS auditor and how the same-origin applies to iframes. Twitch: https://twitch.tv/liveoverflow LiveOverflow2: ...
48,809 views
4 years ago
We learn about simple php web apps and why it's so common that php applications have XSS issues. It's all about shitty tutorials.
137,298 views
How to get good at XSS? There are a lot of charlatans out their overhyping by posting misleading content. It's infuriating because ...
174,663 views
Reading from the famous paper "The Confused Deputy" by Norm Hardy and make a connection to modern web vulnerabilities like ...
40,017 views
Injections, including Cross-Site Scripting (XSS), are among the most prevalent security vulnerabilities according to the OWASP ...
899 views
2 years ago
In 2017 a cool bug was reported by a researcher, which lead me down a rabbit hole to a 2014 and even 2009 bug. This provides ...
100,447 views
Date of stream 2 Dec 2019. Live-stream chat added as Subtitles/CC - English (Twitch Chat). Stream title: - heard good things ...
546,692 views
When is a vulnerability actually a vulnerability? I can't answer this question easily, and thus we look at a few examples in this ...
77,868 views
XSS is easily one of the worst vulnerabilities in the Web. It is pretty easy to introduce, and it can have huge impacts. In this video ...
107 views
What is cross site request forgery and what does it have to do wwith the same-origin policy. -=[ Stuff I use ]=- → Microphone:* ...
121,524 views
In this guest video 13cubed shows us some forensics work combining data from fls and volatility and then exploring the data with ...
39,215 views
Let's introduce the concept of a weird machine in order to understand ROP differently. It's maybe a bad tutorial. What Hacker ...
56,202 views
Using ARM SWD with a development board to debug the chip with GDB. research: https://wallet.fail DISCLAIMER: The security ...
134,786 views