Index of /binaryexploitation/pwn.college - Hacking/Videos/
Index of /binaryexploitation/pwn.college - Hacking/Videos/
../
00 Fundamentals 1 Computer Architecture.mp4 20-Jan-2026 01:54 21M
00 Fundamentals 2 Assembly.mp4 20-Jan-2026 02:06 76M
00 Fundamentals 3 Binary Files.mp4 20-Jan-2026 02:08 43M
00 Fundamentals 4 Linux Process Loading.mp4 20-Jan-2026 02:00 111M
00 Fundamentals 5 Linux Process Execution.mp4 20-Jan-2026 02:09 81M
00 Introduction 1 What is Computer Systems Secu..> 20-Jan-2026 02:04 51M
01 Program Misuse 1 Program Misuse.mp4 20-Jan-2026 02:04 65M
02 Shellcoding 1 Introduction.mp4 20-Jan-2026 02:04 86M
02 Shellcoding 2 Common Challenges.mp4 20-Jan-2026 02:09 35M
02 Shellcoding 3 Data Execution Prevention.mp4 20-Jan-2026 01:53 25M
03 Sandboxing 1 Introduction.mp4 20-Jan-2026 01:53 21M
03 Sandboxing 2 chroot.mp4 20-Jan-2026 01:58 41M
03 Sandboxing 3 seccomp.mp4 20-Jan-2026 02:04 23M
03 Sandboxing 4 Escaping seccomp.mp4 20-Jan-2026 02:04 34M
04 Reverse Engineering 1 Introduction.mp4 20-Jan-2026 01:53 25M
04 Reverse Engineering 2 Data Acces.mp4 20-Jan-2026 02:06 12M
04 Reverse Engineering 3 Functions and Frames.mp4 20-Jan-2026 02:06 34M
04 Reverse Engineering 4 Static Tools.mp4 20-Jan-2026 02:06 30M
04 Reverse Engineering 5 Dynamic Tools.mp4 20-Jan-2026 02:06 40M
04 Reverse Engineering 6 Real-world Application..> 20-Jan-2026 02:01 22M
05 Memory Errors 1 Introduction.mp4 20-Jan-2026 02:05 18M
05 Memory Errors 2 High-level Problems.mp4 20-Jan-2026 02:05 22M
05 Memory Errors 3 Smashing the Stack.mp4 20-Jan-2026 02:05 33M
05 Memory Errors 4 Causes of Corruption, Part 1..> 20-Jan-2026 02:05 25M
05 Memory Errors 5 Causes of Corruption, Part 2..> 20-Jan-2026 02:05 43M
05 Memory Errors 6 Stack Canaries.mp4 20-Jan-2026 02:09 41M
05 Memory Errors 7 Address Space Layout Randomi..> 20-Jan-2026 02:07 40M
05 Memory Errors 8 Causes of Disclosure.mp4 20-Jan-2026 01:50 34M
06 Exploitation 1 Introduction.mp4 20-Jan-2026 01:46 13M
06 Exploitation 2 Hijacking to Shellcode.mp4 20-Jan-2026 02:03 24M
06 Exploitation 3 Side Effects.mp4 20-Jan-2026 01:58 15M
06 Exploitation 4 JIT Spray.mp4 20-Jan-2026 02:02 13M
07 Return Oriented Programming 1 Introduction.mp4 20-Jan-2026 02:07 15M
07 Return Oriented Programming 2 Binary Lego.mp4 20-Jan-2026 02:07 39M
07 Return Oriented Programming 3 Techniques.mp4 20-Jan-2026 02:08 49M
07 Return Oriented Programming 4 Complications.mp4 20-Jan-2026 02:08 36M
08 Kernel 1 Introduction.mp4 20-Jan-2026 02:07 56M
08 Kernel 2 Environmental Setup.mp4 20-Jan-2026 02:00 57M
08 Kernel 3 Kernel Modules.mp4 20-Jan-2026 02:06 56M
08 Kernel 4 Privilege Escalation.mp4 20-Jan-2026 02:06 25M
09 Heap 1 What is the Heap.mp4 20-Jan-2026 02:06 44M
09 Heap 2 Dangers.mp4 20-Jan-2026 02:01 51M
09 Heap 3 tcache.mp4 20-Jan-2026 02:05 43M
09 Heap 4 Chunks and Metadata.mp4 20-Jan-2026 02:07 51M
09 Heap 5 Metadata Corruption.mp4 20-Jan-2026 02:01 31M
10 Race Conditions 1 Introduction.mp4 20-Jan-2026 01:57 31M
10 Race Conditions 2 Races in the Filesystem.mp4 20-Jan-2026 02:01 48M
10 Race Conditions 3 Processes and Threads.mp4 20-Jan-2026 02:00 34M
10 Race Conditions 4 Races in Memory.mp4 20-Jan-2026 02:05 35M
10 Race Conditions 5 Signals and Reentrancy.mp4 20-Jan-2026 02:06 32M
11 Advanced Exploitation 1 Introduction.mp4 20-Jan-2026 02:05 19M
11 Advanced Exploitation 2 Heap Address Disclos..> 20-Jan-2026 02:05 73M
11 Advanced Exploitation 3 In-Memory Forensics.mp4 20-Jan-2026 01:48 35M
11 Advanced Exploitation 4 Exploit Primitives.mp4 20-Jan-2026 02:07 95M
11 Advanced Exploitation 5 End-to-end Pwnage.mp4 20-Jan-2026 02:06 45M
11 Advanced Exploitation 6 Escaping seccomp (fo..> 20-Jan-2026 01:55 37M
11 Advanced Exploitation 7 Kernel Races.mp4 20-Jan-2026 01:57 24M
12 Automatic Vulnerability Discovery 1 Introduc..> 20-Jan-2026 01:45 22M
12 Automatic Vulnerability Discovery 2 Static A..> 20-Jan-2026 02:07 26M
12 Automatic Vulnerability Discovery 3 Fuzzing.mp4 20-Jan-2026 02:07 41M
12 Automatic Vulnerability Discovery 4 Dynamic ..> 20-Jan-2026 02:07 50M
12 Automatic Vulnerability Discovery 5 The Cybe..> 20-Jan-2026 01:40 26M