Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
233 results
Hi there! This video introduces the core ideas behind format string vulnerabilities. We quickly review what is a format string, what ...
1,563 views
8 months ago
In this video we talk about the history of format string bugs and how they can still be useful today for exploitation. We look at an ...
1,957 views
10 months ago
We will see how to find the internal vfprintf buffer and how to overwrite it in order to modify printf's arguments on the fly, allowing us ...
2,146 views
Broadcasted live on Twitch -- Watch live at https://www.twitch.tv/pwncollege.
974 views
11 months ago
Merch: https://shop.jasonturley.xyz/ ==== Social Media ==== Discord: https://discord.gg/v2BVAUyj3P Blog: ...
115 views
3 months ago
This Book excerpt on writing security exploits and tools. It covers various software vulnerabilities, such as buffer overflows (stack ...
38 views
9 months ago
... where overwrite the caler okay so the goal here is use the format string to figure out what the CER is then write the exploit in this ...
190 views
Sharing is caring! If you enjoyed this video, help more learners by sharing it. If you find our content valuable, you can also support ...
67 views
Fully weaponizing a write-what-where primitive abusing a vulnerable printf function (Format String) in order to bend the program ...
1,384 views
PicoCTF format-string-3 PWN Challenge https://play.picoctf.org Github : https://github.com/dannytzoc.
239 views
7 months ago
The HTB Content team made me a goodbye CTF consisting of four challenges. In this video, I'll solve Farewell, a format string pwn ...
4,321 views
Ready to level up your CTF skills? In this video, we tackle Level 7 of the Narnia wargame on OverTheWire, where we exploit a ...
187 views
Title From Buffer Overflows to Breaking AI: Two Decades of ZDI Vulnerability Research Speaker Brian Gorenc Trend Micro's ...
621 views
1 month ago
Download 1M+ code from https://codegive.com/d5ff54f long live exploit development: a comprehensive tutorial exploit ...
12 views
The provided Book is an excerpt from "The Shellcoder's Handbook," a book detailing the exploitation of software security ...
62 views
35 views
5 months ago
This meeting covers SSRF, SSTI, and other server-based web application vulnerabilities. Recorded on 2025-01-30. This meeting ...
53 views
Regarding the vulnerabilities, CVE-2024-23113 is a format string vulnerability found in the fgfmd component. We will give a brief ...
258 views
6 months ago
Download 1M+ code from https://codegive.com/8759615 binary aberration derelict: a deep dive into exploiting memory corruption ...
0 views
A talk by Caleb Gross at inaugural Offensive AI Con in October 2025 (offensiveaicon.com) O(N) The Money: Scaling LLM-Based ...
813 views
2 months ago