Vulnerability Analysis Courses
secwestnet via YouTube Exploit Hall of Fame - Techniques and Innovations
secwestnet via YouTube SUDO Security Policy Bypass Vulnerability - CVE-2019-14287
HackerSploit via YouTube AFL-Unicorn - Fuzzing the 'Unfuzzable'
0xdade via YouTube Cats vs. Spectre - An Axiomatic Approach to Modeling Speculative Execution Attacks
IEEE via YouTube Augury - Using Data Memory-Dependent Prefetchers to Leak Data at Rest
IEEE via YouTube Understanding the Prevailing Security Vulnerabilities in TrustZone-Assisted TEE Systems
IEEE via YouTube Your Exploit is Mine - Automatic Shellcode Transplant for Remote Exploits
IEEE via YouTube Are Smart Contracts Haunted? - Security Vulnerabilities in Blockchain
NahamSec via YouTube Analyzing a Smart Contract Vulnerability Worth $600,000+ - Smart Contract Series Episode 4
NahamSec via YouTube