Exploit Development 5 - DEP Bypass with WriteProcessMemory

Guided Hacking

Exploit Development 5 - DEP Bypass with WriteProcessMemory

2 years ago - 19:40

Binary Exploit Development 4 - DEP Bypass with VirtualAlloc

Guided Hacking

Binary Exploit Development 4 - DEP Bypass with VirtualAlloc

2 years ago - 12:49

Binary exploit development 4 dep bypass with virtualalloc

CodeBeam

Binary exploit development 4 dep bypass with virtualalloc

2 months ago - 18:40

Simple Buffer Overflow and DEP Bypass

Matthew Gaber

Simple Buffer Overflow and DEP Bypass

3 years ago - 8:43

Buffer Overflow Bypass DEP using ROP

Most Wanted Duck

Buffer Overflow Bypass DEP using ROP

3 years ago - 34:50

DEP Bypass using ROP Chains

areyou1or0

DEP Bypass using ROP Chains

3 years ago - 36:25

Microsoft Office DEP bypass

TheTTSecurity

Microsoft Office DEP bypass

13 years ago - 1:30

VUPEN Pwned Google Chrome aka Sandbox ASLR DEP Bypass

Comunidad de Software Libre Hackem [Research Group]

VUPEN Pwned Google Chrome aka Sandbox ASLR DEP Bypass

7 years ago - 1:40

DEP bypass ret2libc

Leigh Trinity

DEP bypass ret2libc

3 weeks ago - 14:07

Exploit Development - Bypass DEP Using VirtualAlloc in a ROP (Return-Oriented Programming) chains

x86byte

Exploit Development - Bypass DEP Using VirtualAlloc in a ROP (Return-Oriented Programming) chains

10 months ago - 4:19

ASX to MP3 Converter-DEP Bypass Exploit

CaesarSecurity

ASX to MP3 Converter-DEP Bypass Exploit

7 years ago - 0:12

How Hackers Bypass File Upload Restrictions

DeadOverflow

How Hackers Bypass File Upload Restrictions

4 hours ago - 6:07

Dep Bypass

AL

Dep Bypass

12 years ago - 22:11

VUPEN Pwned Google Chrome aka Sandbox/ASLR/DEP Bypass

VUPENSecurity

VUPEN Pwned Google Chrome aka Sandbox/ASLR/DEP Bypass

14 years ago - 1:35

Write Once, Pwn Anywhere

Black Hat

Write Once, Pwn Anywhere

10 years ago - 49:46

BOF Dep Bypass Kisayol

THE_123_HACKER

BOF Dep Bypass Kisayol

6 years ago - 44:56

Windows Exploitation (SEH + ROP)

Offensive Cyber-Security

Windows Exploitation (SEH + ROP)

11 years ago - 22:43

Pre-built JOP Chains with the JOP ROCKET: Bypassing DEP without ROP

Black Hat

Pre-built JOP Chains with the JOP ROCKET: Bypassing DEP without ROP

3 years ago - 36:58

Bypass DEP Protection using ROP Chain & Execute Shellcode (with Mona.py)

NobodyAtall

Bypass DEP Protection using ROP Chain & Execute Shellcode (with Mona.py)

4 years ago - 26:21

ASLR and DEP Exploit Development Demo for UNSW ZEIT8042

Fatih Ozavci

ASLR and DEP Exploit Development Demo for UNSW ZEIT8042

3 years ago - 26:01

#0x41414141​ الحلقة السادسةNX/DEP bypass in 64-bit systems

lMinzarl

#0x41414141​ الحلقة السادسةNX/DEP bypass in 64-bit systems

4 years ago - 1:00:42

metacom lab

metacom lab

Exploit development, Buffer Overflow, Seh Overflow, Dep Bypass,

@metacom_lab subscribers

OSED Week 9 | ASLR bypass | My schedule first look

misguidedghost

OSED Week 9 | ASLR bypass | My schedule first look

2 years ago - 11:18

PATCH NOW: Cisco ISE RCE is being exploited

David Bombal

PATCH NOW: Cisco ISE RCE is being exploited

2 days ago - 2:26

Teaching Old Shellcode New Tricks

Velimir Radlovački

Teaching Old Shellcode New Tricks

6 years ago - 32:09

#0x41414141 الحلقة الخامسة NX/DEP bypass in 32-bit systems

lMinzarl

#0x41414141 الحلقة الخامسة NX/DEP bypass in 32-bit systems

4 years ago - 51:51

Understanding ASLR and Its Bypass ||  Binary Exploitation - 0xb

The Cyber Expert

Understanding ASLR and Its Bypass || Binary Exploitation - 0xb

2 years ago - 11:58

Bypass DEP com ROP Chains com WinDbg (CloudMe Sync 1.11.2)

Most Wanted Duck

Bypass DEP com ROP Chains com WinDbg (CloudMe Sync 1.11.2)

3 years ago - 50:18

Windows 10 buffer overflow. Bypassing DEP with custom ROP chain

Shelldon

Windows 10 buffer overflow. Bypassing DEP with custom ROP chain

2 years ago - 1:19

VUPENSecurity

VUPENSecurity

@VUPENSecurity subscribers

How to MDM Bypass on iPhone, iPad, iPod and MAC for Free on any iOS

iGuidesBlog

How to MDM Bypass on iPhone, iPad, iPod and MAC for Free on any iOS

7 years ago - 2:08

DEF CON 26 - zerosum0x0 - Demystifying MS17 010 Reverse Engineering the ETERNAL Exploits

DEFCONConference

DEF CON 26 - zerosum0x0 - Demystifying MS17 010 Reverse Engineering the ETERNAL Exploits

6 years ago - 48:14

recon 2017 Brussels - Teaching Old Shellcode New Tricks

Recon Conference

recon 2017 Brussels - Teaching Old Shellcode New Tricks

2 years ago - 35:02

Defeating ASLR: A ZDI Demonstration

HP Security Research

Defeating ASLR: A ZDI Demonstration

10 years ago - 0:29

Advanced Exploit Development: Master Fuzzing & Create Exploits Like a Pro! 💻🔥

AllGoodTutorials

Advanced Exploit Development: Master Fuzzing & Create Exploits Like a Pro! 💻🔥

4 months ago - 8:35:24

areyou1or0

areyou1or0

@areyou1or0 subscribers

DevOps Full Course 2025 | DevOps Tutorial For Beginners | Intellipaat

Intellipaat

DevOps Full Course 2025 | DevOps Tutorial For Beginners | Intellipaat

-

Leigh Trinity

Leigh Trinity

@LeighTrinity subscribers

TheTTSecurity

TheTTSecurity

@TheTTSecurity subscribers

CVE-2012-1876 - IE6/7/8/9 col span heap buffer overflow exploit

Steven Seeley

CVE-2012-1876 - IE6/7/8/9 col span heap buffer overflow exploit

13 years ago - 0:21

RTSP NAT Slipstream on Google Chrome [89.0.4389.72 (Official Build) (64-bit)] CVE-2021–21210

Daniel Berredo

RTSP NAT Slipstream on Google Chrome [89.0.4389.72 (Official Build) (64-bit)] CVE-2021–21210

4 years ago - 0:53

George Nosenko - How to cook Cisco: Exploit Development for Cisco IOS - Ekoparty 2017

Ekoparty Security Conference

George Nosenko - How to cook Cisco: Exploit Development for Cisco IOS - Ekoparty 2017

7 years ago - 44:56

OSED Week 7 | Still at DEP

misguidedghost

OSED Week 7 | Still at DEP

2 years ago - 6:06

Turn off Protected view Office 2010.avi

purpletriangle1

Turn off Protected view Office 2010.avi

13 years ago - 0:27

Configuring Microsoft Windows Data Execution Prevention (DEP)

Secure Your Digital Life

Configuring Microsoft Windows Data Execution Prevention (DEP)

5 years ago - 3:23

Windows 7 buffer overflow. Bypassing DEP

Shelldon

Windows 7 buffer overflow. Bypassing DEP

2 years ago - 0:19

Black Hat USA 2014 - Exploit: Abusing Performance Optimization Weaknesses to Bypass ASLR

HackersOnBoard

Black Hat USA 2014 - Exploit: Abusing Performance Optimization Weaknesses to Bypass ASLR

9 years ago - 45:06

Matthew Gaber

Matthew Gaber

@matthewgaber7004 subscribers

Matthew Gaber

Matthew Gaber

@matthewgaber7004 subscribers

Ground Truth: [...] and a flaw in the Linux/MIPS stack - Parker Thompson, Mudge, & Tim Carstens

0xdade

Ground Truth: [...] and a flaw in the Linux/MIPS stack - Parker Thompson, Mudge, & Tim Carstens

6 years ago - 52:37

HP Pwn2Own Mozilla Firefox exploit

Trend Micro Zero Day Initiative

HP Pwn2Own Mozilla Firefox exploit

11 years ago - 1:21

Adobe urges users to upgrade

BCS, The Chartered Institute for IT

Adobe urges users to upgrade

15 years ago - 0:48

How to Find System Information on Windows 10

iActivate

How to Find System Information on Windows 10

7 years ago - 0:17

184 - KASAN comes to Windows and Shuffling ROP Gadgets [Binary Exploitation Podcast]

DAY[0]

184 - KASAN comes to Windows and Shuffling ROP Gadgets [Binary Exploitation Podcast]

2 years ago - 41:18

Advanced: Introduction to ROP Chains for Binary Exploitation

CYBERSEC - UCalgary

Advanced: Introduction to ROP Chains for Binary Exploitation

Buffer Overflow Review Recall a basic buffer overflow where we jump into a different function ...

4 years ago - 1:59:55

Windows Exploitation (Heap Spray/ASLR Bypass)

Offensive Cyber-Security

Windows Exploitation (Heap Spray/ASLR Bypass)

11 years ago - 10:59

#HITB2012AMS D2T1 - A. Bazhanyuk and N. Tarakanov - Automatically Searching for Vulnerabilities

Hack In The Box Security Conference

#HITB2012AMS D2T1 - A. Bazhanyuk and N. Tarakanov - Automatically Searching for Vulnerabilities

13 years ago - 1:07:36

PoC of Remote Heap Corruption on Google Chrome v80.0.3987

cemonatk

PoC of Remote Heap Corruption on Google Chrome v80.0.3987

5 years ago - 0:24

#HITB2021AMS D1T1 - Bypassing DEP With Jump-Oriented Programming - B. Brizendine and A. Babcock

Hack In The Box Security Conference

#HITB2021AMS D1T1 - Bypassing DEP With Jump-Oriented Programming - B. Brizendine and A. Babcock

4 years ago - 57:11

Defeating DEP Using ROP Chains Part 1

Alex Akinbi

Defeating DEP Using ROP Chains Part 1

7 years ago - 13:34

Rope: Bypassing Behavioral Detection of Malware with Distributed ROP-Driven Execution

Black Hat

Rope: Bypassing Behavioral Detection of Malware with Distributed ROP-Driven Execution

3 years ago - 35:28

Day 3 Part 3: Exploits 2: Exploits in the Windows Environment

OpenSecurityTraining2

Day 3 Part 3: Exploits 2: Exploits in the Windows Environment

12 years ago - 32:06

ARM Exploitation  (ASLR BYPASS)

Offensive Cyber-Security

ARM Exploitation (ASLR BYPASS)

11 years ago - 11:37

Winamp 5.12 DEP/ASLR Bypass Win10

Charles Truscott

Winamp 5.12 DEP/ASLR Bypass Win10

7 years ago - 1:16

How To BYPASS The New Roblox Anti Cheat / BYFRON (2023!)

xCAVERAx

How To BYPASS The New Roblox Anti Cheat / BYFRON (2023!)

2 years ago - 3:12

Google Pays Prizes to Hackers it Dared To Find Chrome Weakness

Slate

Google Pays Prizes to Hackers it Dared To Find Chrome Weakness

13 years ago - 0:53