Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Shellcode
YouTube
education
Showing:
18
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
HackerSploit
ChatGPT for Cybersecurity
5
rewiews
Explore ChatGPT's applications in cybersecurity, from pentesting and shell generation to blue team strategies. Learn to leverage AI for enhanced security practices and automation.
Add to list
12
Lesons
40 minutes
On-Demand
Free-Video
White Hat Cal Poly
Browser Exploitation - Max Zinkus
0
rewiews
Explore JavaScript-based browser exploitation techniques, including XSS, JIT compilation vulnerabilities, and shellcode execution. Learn about browser security measures and how to find and chain exploits.
Add to list
15
Lesons
45 minutes
On-Demand
Free-Video
Secret Pentesting Techniques - 10 Advanced Methods
0
rewiews
Discover advanced pentesting techniques, from binary droppers to egress busting, with insights on encryption, shellcode injection, and firewall bypassing for enhanced security assessments.
Add to list
24
Lesons
41 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Fuzzing - Finding Your Own Bugs and 0days
0
rewiews
Aprende técnicas de fuzzing para descubrir vulnerabilidades y exploits de día cero. Incluye demostraciones prácticas de Buffer Overflow y creación de shellcode para pruebas de penetración.
Add to list
1
Lesons
39 minutes
On-Demand
Free-Video
nullcon
A New Secret Stash For Fileless Malware
0
rewiews
Explores advanced fileless malware techniques using Windows event logs for code hiding and infection. Reveals new methods to conceal shellcode and manipulate logging functions.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
44CON Information Security Conference
ARM Assembly and Shellcode Basics - Workshop
0
rewiews
Comprehensive workshop on ARM assembly and shellcode creation, covering basics, execve() shell, and reverse shell. Includes hands-on practice with QEMU emulator and Raspberry Pi hardware.
Add to list
20
Lesons
2 hours 16 minutes
On-Demand
Free-Video
Black Hat
Alarm.DISARM - Remotely Exploiting & Disarming Popular Physical Security System from Public Internet
0
rewiews
Explore remote code execution vulnerabilities in physical security systems, learning to exploit and disarm alarms through reverse engineering and network protocol analysis.
Add to list
11
Lesons
36 minutes
On-Demand
Free-Video
Black Hat
Universal Android Rooting Is Back
0
rewiews
Explore universal Android rooting through kernel exploitation, focusing on a Use-After-Free bug affecting all Linux versions. Learn about innovative techniques for 64-bit devices and bypassing modern kernel mitigations.
Add to list
23
Lesons
42 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
Syscalls in Shellcode - Techniques for Malicious Functionality
0
rewiews
Explore advanced techniques for using Windows syscalls in shellcode, overcoming portability issues, and enhancing malicious functionality. Learn about ShellWasp tool and novel WoW64 syscall invocation methods for stealthy code execution.
Add to list
1
Lesons
1 hour 2 minutes
On-Demand
Free-Video
Security BSides London
Easy Ways to Bypass Anti Virus Systems
0
rewiews
Discover simple techniques to evade antivirus systems, including signature detection, emulation, sandboxing, and firewalls. Learn how attackers can bypass popular security measures with minimal effort and resources.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
Black Hat
State of Web Exploit Toolkits
0
rewiews
Deep dive into popular web exploit toolkits, analyzing construction, shellcodes, obfuscations, and exploits. Explore trends, data harvesting methods, and emerging players in cybercriminal landscape.
Add to list
28
Lesons
42 minutes
On-Demand
Free-Video
Black Hat
PDF Attack - A Journey From the Exploit Kit to the Shellcode Part 1
0
rewiews
Explore the intricacies of PDF-based attacks, from exploit kits to shellcode execution, in this comprehensive cybersecurity analysis by Jose Miguel Esparza.
Add to list
1
Lesons
53 minutes
On-Demand
Free-Video
Black Hat
PDF Attack - A Journey From the Exploit Kit to the Shellcode Part 2
0
rewiews
Explore advanced PDF exploitation techniques, from exploit kits to shellcode execution, with expert insights on vulnerabilities and attack vectors.
Add to list
1
Lesons
1 hour 4 minutes
On-Demand
Free-Video
Secrets of DNS
0
rewiews
Explore DNS vulnerabilities, including cross-site scripting, SQL injection, and DNS rebinding. Learn about traffic forwarding, shellcode, and detection techniques in this security-focused talk.
Add to list
14
Lesons
48 minutes
On-Demand
Free-Video
Shellcode Time - Come on Grab Your Friends - Wartortell
0
rewiews
Explore shellcode creation techniques, from assembly basics to advanced concepts like modular payloads and JSON objects, enhancing your understanding of low-level programming and security.
Add to list
36
Lesons
44 minutes
On-Demand
Free-Video
Metasploit Fuzzing and Exploit Development
0
rewiews
Learn advanced Metasploit techniques for fuzzing and exploit development, covering overflows, stack manipulation, and shellcode creation. Gain practical skills inspired by Derbycon's founding.
Add to list
11
Lesons
57 minutes
On-Demand
Free-Video
Waiter, There's a Compiler in My Shellcode
0
rewiews
Learn advanced techniques for creating and optimizing shellcode, including using compilers and assembly language to craft efficient and stealthy payloads for security research and penetration testing.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
ACCU Conference
The Anatomy of an Exploit
0
rewiews
Explore exploit development through C and x86_64 assembly, gaining insights into security vulnerabilities and the attacker's perspective for more secure coding practices.
Add to list
39
Lesons
51 minutes
On-Demand
Free-Video
load more...