Index of /binaryexploitation/pwn.college - Hacking/Videos/

Index of /binaryexploitation/pwn.college - Hacking/Videos/


../
00 Fundamentals 1 Computer Architecture.mp4        20-Jan-2026 01:54     21M
00 Fundamentals 2 Assembly.mp4                     20-Jan-2026 02:06     76M
00 Fundamentals 3 Binary Files.mp4                 20-Jan-2026 02:08     43M
00 Fundamentals 4 Linux Process Loading.mp4        20-Jan-2026 02:00    111M
00 Fundamentals 5 Linux Process Execution.mp4      20-Jan-2026 02:09     81M
00 Introduction 1 What is Computer Systems Secu..> 20-Jan-2026 02:04     51M
01 Program Misuse 1 Program Misuse.mp4             20-Jan-2026 02:04     65M
02 Shellcoding 1 Introduction.mp4                  20-Jan-2026 02:04     86M
02 Shellcoding 2 Common Challenges.mp4             20-Jan-2026 02:09     35M
02 Shellcoding 3 Data Execution Prevention.mp4     20-Jan-2026 01:53     25M
03 Sandboxing 1 Introduction.mp4                   20-Jan-2026 01:53     21M
03 Sandboxing 2 chroot.mp4                         20-Jan-2026 01:58     41M
03 Sandboxing 3 seccomp.mp4                        20-Jan-2026 02:04     23M
03 Sandboxing 4 Escaping seccomp.mp4               20-Jan-2026 02:04     34M
04 Reverse Engineering 1 Introduction.mp4          20-Jan-2026 01:53     25M
04 Reverse Engineering 2 Data Acces.mp4            20-Jan-2026 02:06     12M
04 Reverse Engineering 3 Functions and Frames.mp4  20-Jan-2026 02:06     34M
04 Reverse Engineering 4 Static Tools.mp4          20-Jan-2026 02:06     30M
04 Reverse Engineering 5 Dynamic Tools.mp4         20-Jan-2026 02:06     40M
04 Reverse Engineering 6 Real-world Application..> 20-Jan-2026 02:01     22M
05 Memory Errors 1 Introduction.mp4                20-Jan-2026 02:05     18M
05 Memory Errors 2 High-level Problems.mp4         20-Jan-2026 02:05     22M
05 Memory Errors 3 Smashing the Stack.mp4          20-Jan-2026 02:05     33M
05 Memory Errors 4 Causes of Corruption, Part 1..> 20-Jan-2026 02:05     25M
05 Memory Errors 5 Causes of Corruption, Part 2..> 20-Jan-2026 02:05     43M
05 Memory Errors 6 Stack Canaries.mp4              20-Jan-2026 02:09     41M
05 Memory Errors 7 Address Space Layout Randomi..> 20-Jan-2026 02:07     40M
05 Memory Errors 8 Causes of Disclosure.mp4        20-Jan-2026 01:50     34M
06 Exploitation 1 Introduction.mp4                 20-Jan-2026 01:46     13M
06 Exploitation 2 Hijacking to Shellcode.mp4       20-Jan-2026 02:03     24M
06 Exploitation 3 Side Effects.mp4                 20-Jan-2026 01:58     15M
06 Exploitation 4 JIT Spray.mp4                    20-Jan-2026 02:02     13M
07 Return Oriented Programming 1 Introduction.mp4  20-Jan-2026 02:07     15M
07 Return Oriented Programming 2 Binary Lego.mp4   20-Jan-2026 02:07     39M
07 Return Oriented Programming 3 Techniques.mp4    20-Jan-2026 02:08     49M
07 Return Oriented Programming 4 Complications.mp4 20-Jan-2026 02:08     36M
08 Kernel 1 Introduction.mp4                       20-Jan-2026 02:07     56M
08 Kernel 2 Environmental Setup.mp4                20-Jan-2026 02:00     57M
08 Kernel 3 Kernel Modules.mp4                     20-Jan-2026 02:06     56M
08 Kernel 4 Privilege Escalation.mp4               20-Jan-2026 02:06     25M
09 Heap 1 What is the Heap.mp4                     20-Jan-2026 02:06     44M
09 Heap 2 Dangers.mp4                              20-Jan-2026 02:01     51M
09 Heap 3 tcache.mp4                               20-Jan-2026 02:05     43M
09 Heap 4 Chunks and Metadata.mp4                  20-Jan-2026 02:07     51M
09 Heap 5 Metadata Corruption.mp4                  20-Jan-2026 02:01     31M
10 Race Conditions 1 Introduction.mp4              20-Jan-2026 01:57     31M
10 Race Conditions 2 Races in the Filesystem.mp4   20-Jan-2026 02:01     48M
10 Race Conditions 3 Processes and Threads.mp4     20-Jan-2026 02:00     34M
10 Race Conditions 4 Races in Memory.mp4           20-Jan-2026 02:05     35M
10 Race Conditions 5 Signals and Reentrancy.mp4    20-Jan-2026 02:06     32M
11 Advanced Exploitation 1 Introduction.mp4        20-Jan-2026 02:05     19M
11 Advanced Exploitation 2 Heap Address Disclos..> 20-Jan-2026 02:05     73M
11 Advanced Exploitation 3 In-Memory Forensics.mp4 20-Jan-2026 01:48     35M
11 Advanced Exploitation 4 Exploit Primitives.mp4  20-Jan-2026 02:07     95M
11 Advanced Exploitation 5 End-to-end Pwnage.mp4   20-Jan-2026 02:06     45M
11 Advanced Exploitation 6 Escaping seccomp (fo..> 20-Jan-2026 01:55     37M
11 Advanced Exploitation 7 Kernel Races.mp4        20-Jan-2026 01:57     24M
12 Automatic Vulnerability Discovery 1 Introduc..> 20-Jan-2026 01:45     22M
12 Automatic Vulnerability Discovery 2 Static A..> 20-Jan-2026 02:07     26M
12 Automatic Vulnerability Discovery 3 Fuzzing.mp4 20-Jan-2026 02:07     41M
12 Automatic Vulnerability Discovery 4 Dynamic ..> 20-Jan-2026 02:07     50M
12 Automatic Vulnerability Discovery 5 The Cybe..> 20-Jan-2026 01:40     26M