Memory Corruption Courses
Linux Foundation via YouTube Securing C Code That Seems to Work Fine
OWASP Foundation via YouTube Bypassing Control Flow Guard in Windows 10
YouTube New Shiny in the Metasploit Framework
YouTube Format String Vulnerabilities 101 - Lecture 4
YouTube Unexpected Intrusion Testing Results in SAP Systems - Critical Vulnerabilities and Exploits
Hack In The Box Security Conference via YouTube Introduction to Code Sanitizers
code::dive conference via YouTube Fuzzing at Mach Speed: Uncovering IPC Vulnerabilities on MacOS
nullcon via YouTube Specialized Exploits: Stack Overflows and Bypasses
Pluralsight CIAPO - Code Injection via Arbitrary Pointer Overwrite
DefCamp via YouTube