Channel Avatar

stacksmashing @UC3S8vxwRfqLBdIhgRlDRVzw@youtube.com

217K subscribers - no pronouns :c

Hi, I'm a security researcher who creates videos on reverse-


09:11
Breaking Bitlocker - Bypassing the Windows Disk Encryption
09:10
Getting JTAG on the iPhone 15
09:45
The secrets of Apple Lightning - Part 1
20:13
The Hitchhackerโ€™s Guide to iPhone Lightning and JTAG Hacking (DEF CON 30 Presentation)
08:11
Can an AI drive Mario Kart 64?
04:41
Hacking the Game Boy with a Silver Play Button
08:38
How the Apple AirTags were hacked
08:12
Online Multiplayer on the Game Boy
08:35
Mining Bitcoin on the Game Boy
17:19
In-depth: Raspberry Pi Pico's PIO - programmable I/O!
06:26
Why 111-1111111 is a valid Windows 95 key
02:08
Hacking the โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆยฎ โ–ˆโ–ˆโ–ˆโ–ˆ & โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ„ข
34:41
rC3 Talk: Hacking the Game & Watch
08:06
Game & Watch: How we dumped the firmware & community-updates
06:13
Bringing homebrew to the Game & Watch
06:00
DOOM on the Game and Watch
09:57
Hacking the Nintendo Game and Watch
19:02
In-depth: ELF - The Extensible & Linkable Format
10:31
Exploring the Mew Glitch
12:35
How to reverse engineer & patch a Game Boy ROM
14:11
Reversing WannaCry Part 3 - The encryption component
10:01
Hacking the Game Boy cartridge protection
14:40
Bare-metal ARM firmware reverse engineering with Ghidra and SVD-Loader
15:48
Reversing WannaCry Part 2 - Diving into the malware with #Ghidra
10:01
CVE-2020-0601 aka Curveball: A technical look inside the critical Microsoft CryptoAPI vulnerability
13:08
IoT Security: Backdooring a smart camera by creating a malicious firmware upgrade
22:31
Reversing WannaCry Part 1 - Finding the killswitch and unpacking the malware in #Ghidra
13:29
Reverse engineering with #Ghidra: Breaking an embedded firmware encryption scheme
11:30
Ghidra quickstart & tutorial: Solving a simple crackme