YoVDO

Use-After-Free Vulnerability Courses

The Art of Exploiting UAF by Ret2bpf in Android Kernel
Black Hat via YouTube
Attacking iPhone XS Max
Black Hat via YouTube
Use-After-Use-After-Free - Exploit UAF by Generating Your Own
Black Hat via YouTube
Ret2page - The Art of Exploiting Use-After-Free Vulnerabilities in the Dedicated Cache
Black Hat via YouTube
Breaking Android Kernel Isolation and Rooting with ARM MMU Features
Black Hat via YouTube
Exploiting a Limited UAF on Ubuntu 22.04 to Achieve LPE
Hack In The Box Security Conference via YouTube
Exploiting UAF by Ret2bpf in Android Kernel
Hack In The Box Security Conference via YouTube
Abusing Silent Mitigations - Understanding Weaknesses Within Internet Explorer
Black Hat via YouTube
The Power of Pair - One Template that Reveals 100+ UAF IE Vulnerabilities
Black Hat via YouTube
Mitigating Use-after-frees in the Linux Kernel
Linux Foundation via YouTube
Page 1 Next >