Use-After-Free Vulnerability Courses
Black Hat via YouTube Attacking iPhone XS Max
Black Hat via YouTube Use-After-Use-After-Free - Exploit UAF by Generating Your Own
Black Hat via YouTube Ret2page - The Art of Exploiting Use-After-Free Vulnerabilities in the Dedicated Cache
Black Hat via YouTube Breaking Android Kernel Isolation and Rooting with ARM MMU Features
Black Hat via YouTube Exploiting a Limited UAF on Ubuntu 22.04 to Achieve LPE
Hack In The Box Security Conference via YouTube Exploiting UAF by Ret2bpf in Android Kernel
Hack In The Box Security Conference via YouTube Abusing Silent Mitigations - Understanding Weaknesses Within Internet Explorer
Black Hat via YouTube The Power of Pair - One Template that Reveals 100+ UAF IE Vulnerabilities
Black Hat via YouTube Mitigating Use-after-frees in the Linux Kernel
Linux Foundation via YouTube