Vulnerability Research Courses
Black Hat via YouTube Searching for RPC Functions to Coerce Authentications in Microsoft Protocols
Black Hat via YouTube Unwinding the Stack for Fun and Profit
Black Hat via YouTube A Dirty Little History - Bypassing Spectre Hardware Defenses to Leak Kernel Data
Black Hat via YouTube Devils Are in the File Descriptors - It Is Time To Catch Them All
Black Hat via YouTube USMA - Share Kernel Code With Me
Black Hat via YouTube Like Lightning From the Cloud - Finding RCEs in an Embedded TLS Library
Black Hat via YouTube From Coordinated Disclosure to Cooperative Vulnerability Research When Dealing with Critical Software Stacks
Black Hat via YouTube Automated Discovery of Deserialization Gadget Chains
Black Hat via YouTube iOS Jailbreak Internals - Userland Read-Only Memory Can Be Dangerous
Black Hat via YouTube