Channel Avatar

Velimir Radlovački @UCbcTNshxjNe4w6nSyUWkQhQ@youtube.com

1.6K subscribers - no pronouns :c

Education, Computer Science, Information Technology, Securit


48:51
Harnessing Weapons of Mac Destruction
42:13
Are Your Child's Records at Risk? The Current State of School Infosec
00:41
Have You Tried Turning It Off And On Again
00:38
Sinclair ZX Spectrum 48K Commercial
00:32
Amiga 500 (1987)
03:15
Učenička kompanija Eko Flame, Vršac
47:42
The Ether Wars: Exploits, counter-exploits and honeypots on Ethereum
00:31
Commodore 64 Family Pack (1983)
01:14
Cisco Networking Academy Digital Badges
28:37
Owning The Cloud Through Server-Side Request Forgery
28:40
Don't Red-Team AI Like a Chump
44:18
Want Strong Isolation? Just Reset Your Processor
22:08
Unpacking Pkgs: A Look Inside macOS Installer Packages And Common Security Flaws
26:01
Velimir Radlovački's Personal Room 2020 03 23 08 04 32
08:30
Izrada grafikona
48:42
Are Quantum Computers Really A Threat To Cryptography?
37:29
SSO Wars: The Token Menace
02:24
Orion Exploration Mission-1
00:31
Earth Night Rotate
17:35
Please Inject Me, a x64 Code Injection
52:34
Weaponizing Hypervisors to Fight and Beat Car and Medical Device
48:09
.NET Malware Threats: Internals And Reversing
48:34
Malware Command and Control Channels: A journey into darkness
44:13
Machine Duping 101: Pwning Deep Learning Systems
43:19
I Fight For The Users, Episode I - Attacks Against Top Consumer Products
39:22
Help, I've got ANTs!!!
44:20
Hacking Hotel Keys and Point of Sale systems
30:06
Hacking Next-Gen ATM's From Capture to Cashout
45:21
How to get good seats in the security theater? Hacking boarding passes for fun & profit.
43:46
Exploiting and attacking seismological networks.. remotely
18:49
Esoteric Exfiltration Video and Slides
45:39
Drones Hijacking - multi-dimensional attack vectors & countermeasures
18:18
DIY Nukeproofing: a new dig at "data-mining"
43:19
Direct Memory Attack the Kernel
42:56
Developing Managed Code Rootkits for the Java Runtime Environment
50:56
Cyber Grand Shellphish
21:23
Cheap Tools for Hacking Heavy Trucks
45:02
VLAN hopping, ARP poisoning & MITM Attacks in Virtualized Environments
41:29
Maelstrom - Are You Playing with a Full Deck?...
32:40
An introduction to Pinworm: man in the middle for your metadata
45:22
Abusing Bleeding Edge Web Standards for AppSec Glory
03:15
eFront
42:10
Weaponize Your Feature Codes
44:57
Bypassing Captive Portals and Limited Networks
48:25
The Remote Metamorphic Engine: Detecting, Evading, Attacking the AI and Reverse Engineering
40:46
Stumping the Mobile Chipset
44:21
Hacker-Machine Interface - State of the Union for SCADA HMI Vulnerabilities
19:57
Stargate: Pivoting Through VNC To Own Internal Networks
41:59
So you think you want to be a penetration tester
35:43
How to do it Wrong: Smartphone Antivirus and Security Applications Under Fire
51:37
Sk3wlDbg: Emulating all (well many) of the things with Ida
44:36
Six Degrees of Domain Admin ...
41:00
SITCH - Inexpensive, Coordinated GSM Anomaly Detection
44:17
Sentient Storage - Do SSDs Have a Mind of Their Own?
38:33
Secure Penetration Testing Operations: Demonstrated Weaknesses in Learning Material and Tools
41:57
Robot Hacks Video Games: How TASBot Exploits Consoles with Custom Controllers
34:09
A Monitor Darkly: Reversing and Exploiting Ubiquitous...
43:46
Research on the Machines: Help the FTC Protect Privacy & Security
31:22
Realtime bluetooth device detection with Blue Hydra
15:01
pin2pwn: How to Root an Embedded Linux Box with a Sewing Needle