Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
239 results
Hi there! This video introduces the core ideas behind format string vulnerabilities. We quickly review what is a format string, what ...
1,668 views
10 months ago
In this video, we solve picoCTF's PIE TIME 2 challenge, a binary exploitation challenge where we combine a format string ...
7,125 views
1 month ago
We will see how to find the internal vfprintf buffer and how to overwrite it in order to modify printf's arguments on the fly, allowing us ...
2,229 views
Merch: https://shop.jasonturley.xyz/ ==== Social Media ==== Discord: https://discord.gg/v2BVAUyj3P Blog: ...
165 views
5 months ago
Fully weaponizing a write-what-where primitive abusing a vulnerable printf function (Format String) in order to bend the program ...
1,434 views
BSides Canberra 2025.
1,383 views
3 months ago
The HTB Content team made me a goodbye CTF consisting of four challenges. In this video, I'll solve Farewell, a format string pwn ...
4,395 views
A talk by Caleb Gross at inaugural Offensive AI Con in October 2025 (offensiveaicon.com) O(N) The Money: Scaling LLM-Based ...
964 views
4 months ago
Sharing is caring! If you enjoyed this video, help more learners by sharing it. If you find our content valuable, you can also support ...
78 views
11 months ago
Hahna Kane Latonick joins the live stream to talk about machine learning, reverse engineering, program analysis and more!
429 views
Streamed 4 months ago
The provided Book is an excerpt from "The Shellcoder's Handbook," a book detailing the exploitation of software security ...
76 views
Course: https://wargames.ret2.systems/course Modern Binary Exploitation by RPISEC: https://github.com/RPISEC/MBE Pwn ...
4,846 views
TryHackMe room: https://tryhackme.com/room/pwn101 Merch: https://shop.jasonturley.xyz/ ==== Social Media ==== Discord: ...
108 views
2 weeks ago
PicoCTF format-string-3 PWN Challenge https://play.picoctf.org Github : https://github.com/dannytzoc.
343 views
9 months ago
Title From Buffer Overflows to Breaking AI: Two Decades of ZDI Vulnerability Research Speaker Brian Gorenc Trend Micro's ...
691 views
This Book excerpt on writing security exploits and tools. It covers various software vulnerabilities, such as buffer overflows (stack ...
39 views
Download 1M+ code from https://codegive.com/d5ff54f long live exploit development: a comprehensive tutorial exploit ...
12 views
1 year ago
This Book is a beginner's guide to exploiting vulnerabilities on ARM systems, which are commonly used in mobile devices.
75 views
Regarding the vulnerabilities, CVE-2024-23113 is a format string vulnerability found in the fgfmd component. We will give a brief ...
267 views
8 months ago
This is a general meeting covers format string vulnerabilities related to printf and more binary exploitation! Recorded on ...
22 views