Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
56 results
Mitigating (Some) Use-after-frees in the Linux Kernel - Jann Horn, Google.
1,070 views
5 years ago
To help support me, check out Kite! Kite is a coding assistant that helps you faster, on any IDE offer smart completions and ...
202,092 views
About Sreenu Technologies: Sreenu Technologies has established in 2013 May. We are experts on Java Realtime Project ...
45,365 views
3 years ago
https://media.ccc.de/v/35c3-9657-from_zero_to_zero_day In this talk I will share my story of how in a little over a year, a high ...
31,883 views
7 years ago
Mainframes run the world, literally. Have you ever paid for something, a mainframe was involved, flown? Used a bank? Gone to ...
1,653 views
This is the 4th video recorded course lecture for CIS5930/CIS4930 "Offensive Security" from Spring 2013 at the Florida State ...
7,407 views
12 years ago
A demonstration of my Emacs demonstration tool, demo-it, given at the PDX Emacs Hacker night. Sorry that the recording just cuts ...
4,098 views
9 years ago
Popular Approaches to Preventing Code Injection Attacks are Dangerously Wrong According to the 2016 Verizon Data Breach ...
1,240 views
8 years ago
This is the 7th video recorded course lecture for CIS5930/CIS4930 "Offensive Security" from Spring 2013 at the Florida State ...
10,317 views
This is the 15th video recorded course lecture for CIS5930/CIS4930 "Offensive Security" from Spring 2013 at the Florida State ...
4,299 views
For more content, subscribe on Twitch! https://twitch.tv/johnhammond010 If you would like to support me, please like, comment ...
106,077 views
4 years ago
Authors: Jun Xu (Pennsylvania State University), Dongliang Mu (Nanjing University) Ping Chen, Xinyu Xing and Peng Liu ...
387 views
Where is my Code Vulnerable: Matching CVEs and Source Code - David A. Barrett & Peter Shin, Canvass Labs Surprisingly, often ...
460 views
6 years ago
This is the 16th video recorded course lecture for CIS5930/CIS4930 "Offensive Security" from Spring 2013 at the Florida State ...
2,093 views
If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer ...
502,937 views
When Molehill Vulnerabilities Become Mountainous Exploits Here's a story: you have built the ultimate AppSec program for your ...
170 views
Hi Friends, #GainJavaKnowledge Welcome to this channel Gain Java Knowledge. In this video we will discuss what is ...
24,134 views
15,215 views
Bypassing Many Kernel Protections Using Elastic Objects - Yueqi Chen & Zhepeng Lin, Ph.D. Students.
481 views
From AppSecEU 2016 in Rome https://2016.appsec.eu/ - Managed by the official OWASP Media Project ...
449 views
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us ...
1,945 views
The Rapid7 Metasploit development team discusses (and demonstrates!) ongoing Metasploit work and features during their ...
1,099 views
SouJava next event will be online at 07:00 AM with Ivar Grimstad Brazil hour: 07:00 AM Microservice Patterns - Implemented by ...
534 views
Streamed 5 years ago
our second zoom experiment in lecturing/attending from home - filmed March 2020 in the time of COVID.
2,202 views
9,767 views