OK.
9:16
This Sneaky Malware was Spying on Universities and Government Systems
PwnFunction
Shared 4 days ago
63K views
8:31
2 Bytes Was Enough To Breach The US Treasury
Shared 1 month ago
424K views
13:54
How To Predict Random Numbers Generated By Computers
Shared 2 years ago
600K views
18:00
Dangerous Code Hidden in Plain Sight for 12 years!
Shared 3 years ago
1.7M views
19:27
How One NPM Package Silently Owns Your Entire Codebase
188K views
14:02
Don't make random HTTP requests.
414K views
10:08
This Website has No Code, or Does it?
1.1M views
8:11
Why you should Close Your Files | bin 0x02
359K views
15:20
How some functions can be Dangerous | bin 0x01
Shared 4 years ago
145K views
8:35
What are Executables? | bin 0x00
193K views
8:52
Insecure Deserialization Attack Explained
116K views
9:54
Server-Side Template Injections Explained
95K views
11:27
Cross-Site Scripting (XSS) Explained
Shared 5 years ago
488K views
26:26
Solving a Hard Google CTF challenge - "Paste-tastic!"
94K views
10:07
XXE Challenge - Google CTF
42K views
14:11
Cross-Site Request Forgery (CSRF) Explained
Shared 6 years ago
494K views
20:11
XML External Entities (XXE) Explained
165K views
8:14
Insecure Direct Object Reference (IDOR) Explained
110K views
11:43
Hacking Electron Applications
97K views
11:08
HTTP Parameter Pollution Explained
269K views
8:34
Open Redirect Vulnerability Explained
178K views