Channel Avatar

Vince Panda19 @UCK1ISapqE2JpoKsVyA1T0MQ@youtube.com

None subscribers - no pronouns set

Vince Panda19 is the Official YouTube Handle of Athis SN, th


02:14
FindWindowA Shellcode Injection POC | Malware Development
06:44
Double-Free Exploitation (Tcache)
04:32
LLMNR Poisoning via Responder using SMB
17:36
Smashing TRUN Command with Vanilla Stack Exploitation | VULNSERVER | Windows EXP-DEV 0x1
04:30
ASREP Roasting Attack via Rubeus/GetNPUsers | AD Exploitation | Red Teaming
04:05
Exploitation with Sigreturn Oriented Programming (SROP)
03:45
Bypassing No-Execute (NX) via Orthodox Ret2Libc Technique
05:36
Ret2Syscalls | Exploitation via syscalls | Buffer Overflows | Binary Exploitation
09:33
Stack Canary Bypass via Format String & BOF Vulnerabilities with a classical Ret2Win Style!
10:51
Position Independent Executable (PIE) Bypass
00:42
RGui 3.4.4 POC | Vanilla Structured Exception Handling Overflows | Exploit Development
01:28
Goldwave 5.70 POC/Exploit Script | Unicode Overflows | Venetian Shellcode | Custom Stack Alignment
00:41
Sync Breeze 10.0.28 Proof of Concept | Vanilla Stack Buffer Overflow | Exploit Development
00:33
R-3.5.0 POC | Athis Offsec |
00:46
FTP Commander 8.03 | POC | Athis Offsec
00:22
Backdooring 101 | TFTPD Server v3.27 | POC | Athis Offsec
00:26
Backdooring 101 | Putty | POC | Athis Offsec
03:28
Ret2Win Attack | Return Oriented Programming | Exploit Development | Athis Offsec
02:33
Reversing An ELF Binary And Changing The Flow Of Execution | Reverse Engineering | Dynamic Analysis
01:43
Exploiting Latest Ubuntu OS for gaining Root Shell | CVE-2021-3493 | Exploitation | Ubuntu
01:38
HACKING EXPECTATIONS VS REALITY !!!