Jasmine Rice
Jasmine Rice
  • Видео 47
  • Просмотров 77 938
Code Auditing Discussion
Code Auditing Discussion
Просмотров: 497

Видео

Windows Internals
Просмотров 74 тыс.7 лет назад
Windows Internals
The Future of Intelligence: Changing Threats, Evolving Methods
Просмотров 527 лет назад
The Future of Intelligence: Changing Threats, Evolving Methods
Intro to ROP (part 4)
Просмотров 1177 лет назад
Intro to ROP (part 4)
Intro to ROP (part 5)
Просмотров 567 лет назад
Intro to ROP (part 5)
Intro to ROP (part 6)
Просмотров 467 лет назад
Intro to ROP (part 6)
Intro to Rop (part 3)
Просмотров 577 лет назад
Intro to Rop (part 3)
Intro to ROP (part 2)
Просмотров 1357 лет назад
Part 2 of a training I took.
Intro to ROP (part 1)
Просмотров 5157 лет назад
Part 1. This is from a training I took. The vulnerability is an arbitrary write by a format string.
recon2015 21 j00ru One font vulnerability to rule them all
Просмотров 247 лет назад
recon2015 21 j00ru One font vulnerability to rule them all
recon2015 20 steven vittitoe Reverse Engineering Windows AFD sys
Просмотров 897 лет назад
recon2015 20 steven vittitoe Reverse Engineering Windows AFD sys
recon2015 19 mike ryan john mcmaster marshallh Reversing the Nintendo 64 CIC
Просмотров 1427 лет назад
recon2015 19 mike ryan john mcmaster marshallh Reversing the Nintendo 64 CIC
recon2015 18 andrew zonenberg From Silicon to Compiler
Просмотров 237 лет назад
recon2015 18 andrew zonenberg From Silicon to Compiler
recon2015 17 nitay artenstein shift reduce Pandora s Cash Box The Ghost Under Your POS
Просмотров 227 лет назад
recon2015 17 nitay artenstein shift reduce Pandora s Cash Box The Ghost Under Your POS
recon2015 16 yong chuan koh Understaning the Microsoft Office Protected View Sandbox
Просмотров 607 лет назад
recon2015 16 yong chuan koh Understaning the Microsoft Office Protected View Sandbox
recon2015 12 alex ionescu Hooking Nirvana
Просмотров 367 лет назад
recon2015 12 alex ionescu Hooking Nirvana
recon2015 14 christopher domas The movfuscator
Просмотров 2197 лет назад
recon2015 14 christopher domas The movfuscator
recon2015 10 yaniv balmas 0x3E9 Ways to DIE
Просмотров 137 лет назад
recon2015 10 yaniv balmas 0x3E9 Ways to DIE
recon2015 09 yuriy bulygin oleksandr bazhaniuk Attacking and Defending BIOS in 2015
Просмотров 337 лет назад
recon2015 09 yuriy bulygin oleksandr bazhaniuk Attacking and Defending BIOS in 2015
recon2015 13 colin o flynn Glitching and Side Channel Analysis for All
Просмотров 387 лет назад
recon2015 13 colin o flynn Glitching and Side Channel Analysis for All
recon2015 05 peter hlavaty jihui lu This Time Font hunt you down in 4 bytes
Просмотров 147 лет назад
recon2015 05 peter hlavaty jihui lu This Time Font hunt you down in 4 bytes
recon2015 07 travis goodspeed sergey bratus Polyglots and Chimeras in Digital Radio Modes
Просмотров 257 лет назад
recon2015 07 travis goodspeed sergey bratus Polyglots and Chimeras in Digital Radio Modes
recon2015 06 sophia d antoine Exploiting Out of Order Execution
Просмотров 707 лет назад
recon2015 06 sophia d antoine Exploiting Out of Order Execution
recon2015 04 jeffrey crowell julien voisin Radare2 building a new IDA
Просмотров 347 лет назад
recon2015 04 jeffrey crowell julien voisin Radare2 building a new IDA
recon2015 02 brian gorenc simon zuckerbraun abdul aziz hariri Abusing Silent Mitigations
Просмотров 147 лет назад
recon2015 02 brian gorenc simon zuckerbraun abdul aziz hariri Abusing Silent Mitigations
recon2015 03 exide Finish Him
Просмотров 197 лет назад
recon2015 03 exide Finish Him
recon2015 01 joan calvet marion marschalek paul rascagneres Totally Spies
Просмотров 547 лет назад
recon2015 01 joan calvet marion marschalek paul rascagneres Totally Spies
recon2016 21 richard johnson Go Speed Tracer
Просмотров 167 лет назад
recon2016 21 richard johnson Go Speed Tracer
recon2016 20 julian kirsch clemens jonischkeit Movfuscator Be Gone
Просмотров 297 лет назад
recon2016 20 julian kirsch clemens jonischkeit Movfuscator Be Gone
recon2016 19 alex ionescu Abusing the NT Kernel Shim Engine
Просмотров 537 лет назад
recon2016 19 alex ionescu Abusing the NT Kernel Shim Engine