Exploit Development Courses
Black Hat via YouTube A Brief History of Mitigation - The Path to EL1 in iOS 11
Black Hat via YouTube Exploiting a Single SQLite Vulnerability Across Multiple Software
Black Hat via YouTube Cross the Wall - Bypass All Modern Mitigations of Microsoft Edge
Black Hat via YouTube BlueBorne - A New Class of Airborne Attacks that can Remotely Compromise Any Linux - IoT Device
Black Hat via YouTube Zero Days, Thousands of Nights - The Life & Times of Zero-Day Vulnerabilities and Their Exploits
Black Hat via YouTube Cracking the Lens - Targeting HTTP's Hidden Attack-Surface
Black Hat via YouTube Analysis of the Attack Surface of Windows 10 Virtualization-Based Security
Black Hat via YouTube Over the Edge - Silently Owning Windows 10's Secure Browser
Black Hat via YouTube Resurrecting the Read Logs Permission on Samsung Devices
Black Hat via YouTube