YoVDO

Reverse Engineering Courses

Practical Exploitation of Registry Vulnerabilities in the Windows Kernel
OffensiveCon via YouTube
Inside Apple's Lightning: JTAGging the iPhone for Fuzzing and Profit
OffensiveCon via YouTube
MacDirtyCow: Auditing and Exploiting XNU Virtual Memory
OffensiveCon via YouTube
CustomProcessingUnit: Reverse Engineering and Customization of Intel Microcode
OffensiveCon via YouTube
New Phones, Software and Chips - New Bugs?
OffensiveCon via YouTube
How to Hack Shannon Baseband from a Phone
OffensiveCon via YouTube
ASN.1 and Done: A Journey of Exploiting ASN.1 Parsers in the Baseband
OffensiveCon via YouTube
The Joy and Excitement of Forbidden Computing - Closing Keynote
Confreaks via YouTube
Option Hack That 30 Year Old Oscilloscope - Unlocking Hidden Features
Confreaks via YouTube
Changing a Single Byte Saves Me Seconds Every Day - Hacking Tetris for Game Boy
Confreaks via YouTube
< Prev Page 76 Next >