1 |
 |
Fuzzing/Finding Bugs With Tcpjunk |
12 years, 4 months |
xsploitedsec |
fuzzing, fuzzer, tcpjunk, client, client-side, finding bugs, howto, software, applications, demonstration, buffer, overflow, technique, exploit, xsploitedsec, securitytube |
6869 |
3 |
2 |
 |
Nullcon Goa 2011: Fuzzing With Complexities - By Vishwas Sharma |
12 years, 4 months |
nullcon |
null, nullcon, fuzz. fuzzer, fuzzing, fuzz testing, vulnerability, vulnerability research, vulnerabilities, exploit, security, conference, hacker, hacking, hack, hacker conference, security conference, buffer overflow, overflow |
7750 |
None |
3 |
 |
When Fuzzers Miss: The No Hanging Fruit - Derbycon 2011 |
11 years, 12 months |
Netinfinity |
derbycon 2011, fuzzing, vulnerablity, discovery, memory, security, code fuzzers |
4260 |
None |
4 |
 |
Enumerating Ajax Applications With Act (Ajax Crawling Tool) |
11 years, 11 months |
reliks |
hacking, web applications, xss, sql injection, fuzzing, penetration testing, AJAX, crawer, ACT |
6117 |
None |
5 |
 |
Deepsec 2011: Sms Fuzzing - Sim Toolkit Attack |
11 years, 10 months |
msecnet |
SIM Toolkit, SMS, GSM, mobile, phone, fuzzing, SIM, STK, STA, message |
6461 |
None |
6 |
 |
Usb Attack Toolkit (Uat) [Guadalajaracon 2012] |
11 years, 4 months |
WEBSECmx |
usb, hacking, attack, toolkit, uat, protocolo, teensy, arduino, fuzzing, drivers, clonacion, dispositivos, sniffer, tramas, libusb, android, guadalajara, guadalajaracon, oscar, lopez, guadalajaracon-2012 |
5044 |
None |
7 |
 |
Fuzzing For Fun And Profit |
11 years, 4 months |
Securitytube_Poster |
fuzzer, owasp, fuzzing |
3615 |
1 |
8 |
 |
How To Use Burp Suite For Intruder Sniper To Fuzz Parameters |
11 years, 2 months |
Ronaldo |
burp-suite, hacking, hack, fuzzing |
6565 |
None |
9 |
 |
Basics Of Fuzzing |
11 years, 1 month |
tinitee |
fuzzing, python, basics |
5152 |
None |
10 |
 |
Owasp Zap Proxy Security Testing In Development And Qa |
11 years, 1 month |
HyBrid |
zap, proxy, fuzzing, hacking, hack, owasp |
5774 |
None |
11 |
 |
Pugfuzz Dumb Fuzzer |
11 years, 1 month |
sunirge |
fuzz, fuzzer software, pugfuzz, crash, crashes, access violation, fuzzing, debug, debugger, debugging |
3871 |
None |
12 |
 |
Day 1 Part 1: Exploits 2: Exploits In The Windows Environment |
11 years, 1 month |
OpenSecurityTraining.Info |
OpenSecurityTraining.info, Exploits, Vulnerabilities, software vulnerabilities, buffer overflows, smashing the stack, SEH, structured exception handling, SEHOP, SafeSEH, DEP, Data Execution Prevention, bypassing DEP, ASLR, Address Space Layout Randomization, bypassing ASLR, fuzzing, fuzzer, reverse engineering, Computers, Computer Security, Cyber Security, Technology, Intel, x86, IA32, Training, Education, Multi-day-class, Multi-day-training, Classes |
5126 |
None |
13 |
 |
Day 1 Part 2: Exploits 2: Exploits In The Windows Environment |
11 years, 1 month |
OpenSecurityTraining.Info |
OpenSecurityTraining.info, Exploits, Vulnerabilities, software vulnerabilities, buffer overflows, smashing the stack, SEH, structured exception handling, SEHOP, SafeSEH, DEP, Data Execution Prevention, bypassing DEP, ASLR, Address Space Layout Randomization, bypassing ASLR, fuzzing, fuzzer, reverse engineering, Computers, Computer Security, Cyber Security, Technology, Intel, x86, IA32, Training, Education, Multi-day-class, Multi-day-training, Classes |
4368 |
None |
14 |
 |
Day 1 Part 3: Exploits 2: Exploits In The Windows Environment |
11 years, 1 month |
OpenSecurityTraining.Info |
OpenSecurityTraining.info, Exploits, Vulnerabilities, software vulnerabilities, buffer overflows, smashing the stack, SEH, structured exception handling, SEHOP, SafeSEH, DEP, Data Execution Prevention, bypassing DEP, ASLR, Address Space Layout Randomization, bypassing ASLR, fuzzing, fuzzer, reverse engineering, Computers, Computer Security, Cyber Security, Technology, Intel, x86, IA32, Training, Education, Multi-day-class, Multi-day-training, Classes |
4319 |
None |
15 |
 |
Day 1 Part 4: Exploits 2: Exploits In The Windows Environment |
11 years, 1 month |
OpenSecurityTraining.Info |
OpenSecurityTraining.info, Exploits, Vulnerabilities, software vulnerabilities, buffer overflows, smashing the stack, SEH, structured exception handling, SEHOP, SafeSEH, DEP, Data Execution Prevention, bypassing DEP, ASLR, Address Space Layout Randomization, bypassing ASLR, fuzzing, fuzzer, reverse engineering, Computers, Computer Security, Cyber Security, Technology, Intel, x86, IA32, Training, Education, Multi-day-class, Multi-day-training, Classes |
4136 |
None |
16 |
 |
Day 1 Part 5: Exploits 2: Exploits In The Windows Environment |
11 years, 1 month |
OpenSecurityTraining.Info |
OpenSecurityTraining.info, Exploits, Vulnerabilities, software vulnerabilities, buffer overflows, smashing the stack, SEH, structured exception handling, SEHOP, SafeSEH, DEP, Data Execution Prevention, bypassing DEP, ASLR, Address Space Layout Randomization, bypassing ASLR, fuzzing, fuzzer, reverse engineering, Computers, Computer Security, Cyber Security, Technology, Intel, x86, IA32, Training, Education, Multi-day-class, Multi-day-training, Classes |
4611 |
None |
17 |
 |
Day 2 Part 1: Exploits 2: Exploits In The Windows Environment |
11 years |
OpenSecurityTraining.Info |
OpenSecurityTraining.info, Exploits, Vulnerabilities, software vulnerabilities, buffer overflows, smashing the stack, SEH, structured exception handling, SEHOP, SafeSEH, DEP, Data Execution Prevention, bypassing DEP, ASLR, Address Space Layout Randomization, bypassing ASLR, fuzzing, fuzzer, reverse engineering, Computers, Computer Security, Cyber Security, Technology, Intel, x86, IA32, Training, Education, Multi-day-class, Multi-day-training, Classes |
4101 |
None |
18 |
 |
Day 2 Part 2: Exploits 2: Exploits In The Windows Environment |
11 years |
OpenSecurityTraining.Info |
OpenSecurityTraining.info, Exploits, Vulnerabilities, software vulnerabilities, buffer overflows, smashing the stack, SEH, structured exception handling, SEHOP, SafeSEH, DEP, Data Execution Prevention, bypassing DEP, ASLR, Address Space Layout Randomization, bypassing ASLR, fuzzing, fuzzer, reverse engineering, Computers, Computer Security, Cyber Security, Technology, Intel, x86, IA32, Training, Education, Multi-day-class, Multi-day-training, Classes |
3830 |
None |
19 |
 |
Day 2 Part 3: Exploits 2: Exploits In The Windows Environment |
11 years |
OpenSecurityTraining.Info |
OpenSecurityTraining.info, Exploits, Vulnerabilities, software vulnerabilities, buffer overflows, smashing the stack, SEH, structured exception handling, SEHOP, SafeSEH, DEP, Data Execution Prevention, bypassing DEP, ASLR, Address Space Layout Randomization, bypassing ASLR, fuzzing, fuzzer, reverse engineering, Computers, Computer Security, Cyber Security, Technology, Intel, x86, IA32, Training, Education, Multi-day-class, Multi-day-training, Classes |
4210 |
None |
20 |
 |
Day 2 Part 4: Exploits 2: Exploits In The Windows Environment |
11 years |
OpenSecurityTraining.Info |
OpenSecurityTraining.info, Exploits, Vulnerabilities, software vulnerabilities, buffer overflows, smashing the stack, SEH, structured exception handling, SEHOP, SafeSEH, DEP, Data Execution Prevention, bypassing DEP, ASLR, Address Space Layout Randomization, bypassing ASLR, fuzzing, fuzzer, reverse engineering, Computers, Computer Security, Cyber Security, Technology, Intel, x86, IA32, Training, Education, Multi-day-class, Multi-day-training, Classes |
4191 |
None |
21 |
 |
Day 3 Part 1: Exploits 2: Exploits In The Windows Environment |
10 years, 10 months |
OpenSecurityTraining.Info |
OpenSecurityTraining.info, Exploits, Vulnerabilities, software vulnerabilities, buffer overflows, smashing the stack, SEH, structured exception handling, SEHOP, SafeSEH, DEP, Data Execution Prevention, bypassing DEP, ASLR, Address Space Layout Randomization, bypassing ASLR, fuzzing, fuzzer, reverse engineering, Computers, Computer Security, Cyber Security, Technology, Intel, x86, IA32, Training, Education, Multi-day-class, Multi-day-training, Classes |
4118 |
None |
22 |
 |
Day 3 Part 2: Exploits 2: Exploits In The Windows Environment |
10 years, 10 months |
OpenSecurityTraining.Info |
OpenSecurityTraining.info, Exploits, Vulnerabilities, software vulnerabilities, buffer overflows, smashing the stack, SEH, structured exception handling, SEHOP, SafeSEH, DEP, Data Execution Prevention, bypassing DEP, ASLR, Address Space Layout Randomization, bypassing ASLR, fuzzing, fuzzer, reverse engineering, Computers, Computer Security, Cyber Security, Technology, Intel, x86, IA32, Training, Education, Multi-day-class, Multi-day-training, Classes |
3404 |
None |
23 |
 |
Day 3 Part 3: Exploits 2: Exploits In The Windows Environment |
10 years, 10 months |
OpenSecurityTraining.Info |
OpenSecurityTraining.info, Exploits, Vulnerabilities, software vulnerabilities, buffer overflows, smashing the stack, SEH, structured exception handling, SEHOP, SafeSEH, DEP, Data Execution Prevention, bypassing DEP, ASLR, Address Space Layout Randomization, bypassing ASLR, fuzzing, fuzzer, reverse engineering, Computers, Computer Security, Cyber Security, Technology, Intel, x86, IA32, Training, Education, Multi-day-class, Multi-day-training, Classes |
3418 |
None |
24 |
 |
Day 3 Part 4: Exploits 2: Exploits In The Windows Environment |
10 years, 10 months |
OpenSecurityTraining.Info |
OpenSecurityTraining.info, Exploits, Vulnerabilities, software vulnerabilities, buffer overflows, smashing the stack, SEH, structured exception handling, SEHOP, SafeSEH, DEP, Data Execution Prevention, bypassing DEP, ASLR, Address Space Layout Randomization, bypassing ASLR, fuzzing, fuzzer, reverse engineering, Computers, Computer Security, Cyber Security, Technology, Intel, x86, IA32, Training, Education, Multi-day-class, Multi-day-training, Classes |
3486 |
None |
25 |
 |
Wireless Beacon Fuzzing Using Metasploit |
10 years, 8 months |
L33T |
metasploit, hacking, hack, fuzzing, beacon |
4659 |
None |
26 |
 |
Hwk Wireless Exploitation Tool |
10 years, 8 months |
L33T |
hwk, wireless, exploitation, fuzzing |
4828 |
1 |
27 |
 |
Mutillidae: Introduction To Installing, Configuring, And Using Burp-Suite Proxy |
10 years, 7 months |
tinitee |
hacking, exploitation, web-application, fuzzing, proxy. |
4584 |
None |
28 |
 |
Buffer Overflow (Seh Overwrite) Audio Coder 0.8.18.5353 With Immunity Debugger And Mona.Py |
10 years, 4 months |
xboz |
seh, structured exception handler, buffer overflow tutorial, exploit development, exploit research, fuzzing, seh buffer overflow tutorial, ajin abraham, xenotix, kerala cyber force |
4567 |
None |
29 |
 |
Offensive Security 2013 - Fuzzing - Exploit Dev 101 |
10 years, 3 months |
Alone |
hacking, hack, exploit, fuzzing |
3798 |
None |