1. Hacks, Leaks & Big Tech Control: Is Your Data Under Siege by Shadow Powers?

    Hacks, Leaks & Big Tech Control: Is Your Data Under Siege by Shadow Powers?

    65
    6
    91K
    40
  2. LIVE! CryptoCrow and Richard Heart on Bitcoin, Ethereum, HEX, security, scams, etc.

    LIVE! CryptoCrow and Richard Heart on Bitcoin, Ethereum, HEX, security, scams, etc.

    12
    1
    24
  3. Doublespeak: Jailbreaking ChatGPT-style Sandboxes using Linguistic Hacks

    Doublespeak: Jailbreaking ChatGPT-style Sandboxes using Linguistic Hacks

    286
    2
  4. Leaking Secret Data with a Heap Overflow - "Leek" Pwn Challenge [Angstrom CTF 2023]

    Leaking Secret Data with a Heap Overflow - "Leek" Pwn Challenge [Angstrom CTF 2023]

    44
  5. Linked List Exploit Continued - GOT Overwrite - "Links 2+3" Pwn Challenge [ImaginaryCTF]

    Linked List Exploit Continued - GOT Overwrite - "Links 2+3" Pwn Challenge [ImaginaryCTF]

    190
  6. Tier 1: Funnel - HackTheBox Starting Point - Full Walkthrough

    Tier 1: Funnel - HackTheBox Starting Point - Full Walkthrough

    140
    2
  7. HackTheBox Certified Penetration Testing Specialist (CPTS) - Review + Tips

    HackTheBox Certified Penetration Testing Specialist (CPTS) - Review + Tips

    5
    0
    298
  8. HackTheBox Battlegrounds - Server Siege (Practice Mode)

    HackTheBox Battlegrounds - Server Siege (Practice Mode)

    50
  9. Tier 2: Base - HackTheBox Starting Point - Full Walkthrough

    Tier 2: Base - HackTheBox Starting Point - Full Walkthrough

    52
  10. Binary Exploitation (Pwn) Challenge Walkthroughs - PicoCTF 2022 (BEGINNER-FRIENDLY Capture The Flag)

    Binary Exploitation (Pwn) Challenge Walkthroughs - PicoCTF 2022 (BEGINNER-FRIENDLY Capture The Flag)

    6
    0
    54
  11. Angstrom CTF 2022 - Challenge Walkthroughs

    Angstrom CTF 2022 - Challenge Walkthroughs

    83
  12. Web Challenges [Space Heroes CTF 2023]

    Web Challenges [Space Heroes CTF 2023]

    53
  13. Exploiting a Vulnerable Linked List Implementation - "Links 1" Pwn Challenge [ImaginaryCTF]

    Exploiting a Vulnerable Linked List Implementation - "Links 1" Pwn Challenge [ImaginaryCTF]

    27
  14. SEETF [Social Engineering Experts] 2022 - Challenge Walkthroughs

    SEETF [Social Engineering Experts] 2022 - Challenge Walkthroughs

    3
    0
    36
  15. Reverse Engineering (RE) Challenge Walkthroughs - PicoCTF 2022 (BEGINNER-FRIENDLY Capture The Flag)

    Reverse Engineering (RE) Challenge Walkthroughs - PicoCTF 2022 (BEGINNER-FRIENDLY Capture The Flag)

    4
    1
    47
  16. Intergalactic Recovery [easy]: HackTheBox Forensics Challenge (RAID 5 Disk Recovery)

    Intergalactic Recovery [easy]: HackTheBox Forensics Challenge (RAID 5 Disk Recovery)

    59
  17. NahamConCTF 2022: Web Challenge Walkthroughs

    NahamConCTF 2022: Web Challenge Walkthroughs

    8
    1
    25
  18. Web Challenge Walkthroughs - PicoCTF 2022 (BEGINNER-FRIENDLY Capture The Flag)

    Web Challenge Walkthroughs - PicoCTF 2022 (BEGINNER-FRIENDLY Capture The Flag)

    34
  19. 9: Overwriting Global Offset Table (GOT) Entries with printf() - Intro to Binary Exploitation (Pwn)

    9: Overwriting Global Offset Table (GOT) Entries with printf() - Intro to Binary Exploitation (Pwn)

    39
  20. The Final Opportunity: BTC's Last Call to Wealth For Middle Class

    The Final Opportunity: BTC's Last Call to Wealth For Middle Class

    98