Introduction to PwnTools. In this video, we’re diving into one of the most powerful tools for exploitation and reverse engineering—PwnTools. We’ll go over everything you need to know to get started—from basic syntax and commands to creating your first exploit. …
Buffer Overflows: Rewriting EIP. In this video, we will discuss the next topic in our Buffer Overflows episode. The next topic is rewriting your Extended Instruction Pointer (EIP) to control execution. 🎬 Thank you for watching this video! 🙏https://s4thv1k.com/posts/binary-expl… https://github.com/saisathvik1/binary… …
In this video, we will be covering Binary Exploitation: Stack Overflows. The goal here in the Stack Overflow is to demonstrate my code—this is a sample code that I wrote, and I’ll upload this code to my GitHub and point …
In this video we will discuss Game Hacking because I recently participated in Cyberspace CTF 2024 and I came across this challenge which involves Game Hacking using “Snake” on Linux.
Introduction to Volatility Framework. In this video we will explore how to use Volatility to analyze your computer’s memory snapshot and uncover hidden clues about what’s been happening on it.
VHOST Enumeration with Gobuster and FFUF. In this video I’ll showcase the methods to effectively enumerate virtual hosts using two powerful tools: Gobuster and FFUF. This guide is going to help you to enhance your skill in identifying and enumerating …