Channel Avatar

Source Meets Sink @UCB0KsBKlEcEUaNfd5ylQvCQ@youtube.com

3.3K subscribers - no pronouns :c

More from this channel (soon)


14:35
Ret2plt to bypass NX and ASLR in Linux x64
09:44
Introduction to Procedure Linkage Table (PLT) and Global Offset Table (GOT)
14:25
Blind XXE Part 2 (OOB Data exfiltration)
05:38
Blind XXE Part 1 (SSRF via XXE)
10:37
XML Externel Entity (XXE) Injection
16:26
Return to Libc Part 3
09:20
Return to Libc Part 2
08:10
Return to Libc Part 1
13:12
Setting up a Kubernetes cluster using kind
05:17
Installing Docker in Ubuntu
17:58
Root Detection Bypass using Objection
16:48
Hacking Kubernetes Clusters
03:46:36
x64 Linux Binary Exploitation Training
23:51
Emulating ARM64 Raspberry Pi Image using QEMU
01:27:50
Bypassing ASLR and NX in Linux (x86)
01:37
Setting up Damn Vulnerable Thick Client Application [PART 2] - Configuring the server
18:38
Setting up Damn Vulnerable Thick Client Application [PART 1] - Installing SQL Server and FTP Server
06:23
Hacking and Pentesting Android Apps - Traffic Analysis Revisited
02:47
Hacking and Pentesting Android Apps - Course Introduction
05:43
Bypassing Root Detection in Android Apps using Frida
05:32
Hacking and Pentesting iOS Applications - Introduction to frida trace
03:31
Hacking and Pentesting iOS Applications - Signing and installing third party applications
09:24
Hacking and Pentesting iOS Applications - Traffic Analysis
02:36
Hacking and Pentesting iOS Applications - Course Introduction
04:42
Hacking and Securing JSON Web Tokens(JWT) - None signature attack
07:09
Hacking and Securing JSON Web Tokens(JWT) - Manually creating HS256 signature
02:41
Hacking and Securing JSON Web Tokens(JWT) - Course Introduction
05:48
Exploit Development for Linux (x86) - Understanding NX
10:35
Exploit Development for Linux (x86) - Using third party shellcode
05:05
Exploit Development for Linux (x86) - Course Introduction
01:17
Hacking REST APIs - Course Introduction
11:43
Hacking REST APIs - SQL Injection
04:13
Introduction to Thick Client Applications
01:38
Thick Client Penetration Testing - Course Introduction
06:23
Thick client app pentesting - Echo Mirage
05:07
Write an Android trojan from scratch: Course Introduction
04:35
Write an Android trojan from scratch: Building the UI
02:42
Write an Android trojan from scratch: Bindshell vs ReverseShell
02:34
Hacking and Pentesting Android Apps: Setting up Android Pentesting Labsetup
03:22
Hacking and Pentesting Android Apps: Installing the target app
01:24
Hacking and Pentesting Android Apps: Course Introduction
05:12
Docker bench security for docker security assessments
04:57
Docker --privileged flag
02:37
Hacking Docker Containers - Course Introduction