Vulnerability Research Courses
Cyber Mentor via YouTube Contextomy - Let's Debug Together
nullcon via YouTube macOS Security Features Bypasses by Example
nullcon via YouTube Exploiting Android Messengers with WebRTC
nullcon via YouTube XNU Heap Exploitation - From Kernel Bug to Kernel Control
nullcon via YouTube Don't Ruck Us Too Hard - Owning All of Ruckus AP Devices
nullcon via YouTube Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube Emulating Samsung's Baseband for Security Testing
Black Hat via YouTube Finding New Bluetooth Low Energy Exploits via Reverse Engineering Multiple Vendors' Firmwares
Black Hat via YouTube Thinking Outside the JIT Compiler - Understanding and Bypassing StructureID Randomization with Generic and Old-School Methods
Black Hat via YouTube