Also other interesting videos would be developing malwares such as worms, rootkits, RATs to demonstrate how they work. It is really interesting for me how malicious actors program them
Thank you for sharing and I like the ideas of using timestamps and playlists to compile the relevant information together. Pointers are interesting and I don't know much about them but this video gave me a good idea on what they could be used for.
Another great video. I would like to see more videos where exploits in developed in C instead of python. I would really appreciate it. Good job. Keep it up
Hey bro, you can try these: starters: www.vulnhub.com/entry/stack-overflows-for-beginners-101,290/ www.vulnhub.com/entry/exploit-exercises-protostar-v2,32/ securitylab.disi.unitn.it/lib/exe/fetch.php?media=teaching:netsec:2016:bufferoverflowlabg10.pdf
Hey mate. There will be other long videos soon don’t worry. I have a post about this. ua-cam.com/users/postUgkxFhcOX1O8UnRX8S8vf-V7roZgYtb2ZYdv?si=ojzyS6792U8KMJ16 Thanks for your support!
Also other interesting videos would be developing malwares such as worms, rootkits, RATs to demonstrate how they work. It is really interesting for me how malicious actors program them
As a CS major interested in cyber, I've learned so much from your channel brother. Thanks for starting to do more bite-sized videos like this.
Anytime bro
Thank you for sharing and I like the ideas of using timestamps and playlists to compile the relevant information together. Pointers are interesting and I don't know much about them but this video gave me a good idea on what they could be used for.
@@J_G_Network welcome bro! Yeah learning pointers are essential in exploit dev/ethical hacking.
One of the best channels I've found so far... glad the algorithm recommended you
Thanks bro! More videos to come
You're the only creator I have notifications enabled for. Godspeed 🙌
Wow I appreciate that. Thanks a lot!
Thanks mate, really appreciate your effort. Your contents are a blast.
@@pa-vl1kg anytime! Thanks as well
nice one man, keep this coming ! 💪🔥
Thanks 🔥
Just want to put it out there that I like your long format videos :)
@@chul0delcibao thanks bro! There will be more of that this year! Exploit dev, reverse engineering and AI
Another great video. I would like to see more videos where exploits in developed in C instead of python. I would really appreciate it. Good job. Keep it up
@@ChingizPanahli Yes that will be good to do in kernel exploits. I’ll read more about that topic so I can share to all
WOW! *VERY* well done video.
Interesting! Great video
Appreciate that.
Great!👍
🔥 🔥 video
hi your channel is amazing
@@tarunmunjal thank you!!!
❤
Im here.
Could you make videos on android application pentesting?
@@SankalpaBaral1337 hi, I don’t have experience with mobile but I’ll read up something and add this on my todo list.
can you suggest some resources to learn binary exploitation?
Hey bro, you can try these:
starters:
www.vulnhub.com/entry/stack-overflows-for-beginners-101,290/
www.vulnhub.com/entry/exploit-exercises-protostar-v2,32/
securitylab.disi.unitn.it/lib/exe/fetch.php?media=teaching:netsec:2016:bufferoverflowlabg10.pdf
I dont know any of this but you explained it in a very interesting way just made me listen to the end and i think i actually learned Something
@@x9rtu3os1t8 thank you! Appreciate that
@@hacktheclown thank you so much
Some day we will do exp 401 offsec
why this video this short 🥲 love your videos
Hey mate. There will be other long videos soon don’t worry. I have a post about this.
ua-cam.com/users/postUgkxFhcOX1O8UnRX8S8vf-V7roZgYtb2ZYdv?si=ojzyS6792U8KMJ16
Thanks for your support!