Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
32 results
If the contents are helpful consider subscribing to my channel!! Thank you.
10 views
10 months ago
If you want to learn a lot more, watch the Linux Basics for Hackers video series with OTW. First video: ...
688,344 views
2 years ago
In Python, strings are used to represent text and 'bytes' are used to represent binary data. If you end up with bytes that ...
602 views
Byte ordering, or boiled egg orientation, endianness is important! Dr Steve Bagley on the computer science topic named after ...
149,774 views
7 years ago
Bruteforcing stack canary, stack guard, stack cookie with a C program. brute_cookie.c: ...
29,982 views
8 years ago
Solving Eat Sleep Pwn Repeat (ESPR - 150 pwn) challenge from the 33c3ctf. Dumping the binary through a format string ...
48,022 views
Part 1 is about understanding the algorithm with binary.ninja and gdb. Zwiebel is a reversing CTF challenge with encrypted ...
42,327 views
9 years ago
Code on vid4 folder at https://gitlab.com/0x4ndr3/format-strings-series-utube/ Environment: Ubuntu 16.04 x86 gcc flags for RELRO ...
713 views
5 years ago
This video provides you with an #OSINT challenge to solve. See if you can geolocate where I snapped this photo. *Instructions:* ...
17,104 views
Let's introduce the concept of a weird machine in order to understand ROP differently. It's maybe a bad tutorial. What Hacker ...
59,851 views
6 years ago
What is inside the Windows Executable or the executables for other operating systems? I take a look at the past from the days of ...
476,010 views
MIT 6.004 Computation Structures, Spring 2017 Instructor: Chris Terman View the complete course: https://ocw.mit.edu/6-004S17 ...
2,658 views
TIÊU ĐỀ: CÙNG MÌNH CHƠI THỬ CTF VỚI PICOCTF 2024 (Blame Game ,Collaborative Development, binhexa và Binary ...
223 views
1 year ago
This challenge from the 34C3 CTF implemented a software update in python. In part 1/2 we try to understand the code and think ...
52,553 views
Last video from the BRUCON CTF 2016. Covering "Breaking the crypto", "Log Analysis BSQLi" and "Crypto". Topics covered: hash ...
29,758 views
33 views
4 years ago
Commented walkthrough of the security CTF Internetwache 2016. Crypto challenges. -=[ Stuff I use ]=- → Microphone:* ...
20,799 views
Failed challenge that exposed real security issues with an anonymous mail service, and solving "Lockpicking" and "Restricted ...
13,734 views
In this guest video 13cubed shows us some forensics work combining data from fls and volatility and then exploring the data with ...
41,018 views
Max Willsey (UC Berkeley) https://simons.berkeley.edu/talks/max-willsey-uc-berkeley-2023-11-15 Logic and Algebra for Query ...
665 views
Streamed 2 years ago