Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
63 results
Showing off some cross site scripting techniques and looking at the chrome XSS Auditor -=[ Stuff I use ]=- → Microphone:* ...
81,885 views
7 years ago
-=[ Stuff I use ]=- → Microphone:* https://geni.us/ntg3b → Graphics tablet:* https://geni.us/wacom-intuos → Camera#1 for ...
107,030 views
5 years ago
This video is an explanation of bug bounty report submitted to Airbnb program. The vulnerability was XSS that required 4 different ...
27,189 views
3 years ago
We will go over a few puzzle pieces and discuss XSS research... and we find evidence of a XSS conspiracy!!11!!!1! fuzzing: ...
161,451 views
URLs are surprisingly hard to read. Chrome Bug: https://bugs.chromium.org/p/chromium/issues/detail?id=841105 Orange Tsai: ...
346,510 views
We have a look at another interesting XSS vector due to weird Firefox parsing, and then explore how researchers find this stuff.
69,084 views
An actual XSS on google.com by Masato Kinugawa. It abuses a parsing differential between a JavaScript enabled and disabled ...
690,724 views
... absuing Chrome's XSS auditor and how the same-origin applies to iframes. Twitch: https://twitch.tv/liveoverflow LiveOverflow2: ...
48,809 views
4 years ago
We learn about simple php web apps and why it's so common that php applications have XSS issues. It's all about shitty tutorials.
137,334 views
How to get good at XSS? There are a lot of charlatans out their overhyping by posting misleading content. It's infuriating because ...
174,686 views
Injections, including Cross-Site Scripting (XSS), are among the most prevalent security vulnerabilities according to the OWASP ...
910 views
2 years ago
Reading from the famous paper "The Confused Deputy" by Norm Hardy and make a connection to modern web vulnerabilities like ...
40,035 views
In 2017 a cool bug was reported by a researcher, which lead me down a rabbit hole to a 2014 and even 2009 bug. This provides ...
100,470 views
When is a vulnerability actually a vulnerability? I can't answer this question easily, and thus we look at a few examples in this ...
77,880 views
Date of stream 2 Dec 2019. Live-stream chat added as Subtitles/CC - English (Twitch Chat). Stream title: - heard good things ...
547,046 views
XSS is easily one of the worst vulnerabilities in the Web. It is pretty easy to introduce, and it can have huge impacts. In this video ...
107 views
This challenge from the 34C3 CTF implemented a software update in python. In part 1/2 we try to understand the code and think ...
52,003 views
6 years ago
What is cross site request forgery and what does it have to do wwith the same-origin policy. -=[ Stuff I use ]=- → Microphone:* ...
121,586 views
totally clickbait. but also not clickbait. I don't know where to start hacking, there is no guide to learn this stuff. But I hope you still ...
3,332,138 views
Let's introduce the concept of a weird machine in order to understand ROP differently. It's maybe a bad tutorial. What Hacker ...
56,219 views