282 Avsnitt

  1. Exploiting VS Code with Control Characters

    Publicerades: 2025-05-12
  2. Mitigating Browser Hacking - Interview with John Carse (SquareX Field CISO)

    Publicerades: 2025-04-22
  3. Pulling Gemini Secrets and Windows HVPT

    Publicerades: 2025-04-16
  4. Session-ception and User Namespaces Strike Again

    Publicerades: 2025-04-01
  5. Extracting YouTube Creator Emails and Spilling Azure Secrets

    Publicerades: 2025-03-24
  6. ESP32 Backdoor Drama and SAML Auth Bypasses

    Publicerades: 2025-03-17
  7. Exploiting Xbox 360 Hypervisor and Microcode Hacking

    Publicerades: 2025-03-12
  8. Path Confusion and Mixing Public/Private Keys

    Publicerades: 2025-03-03
  9. ZDI's Triaging Troubles and LibreOffice Exploits

    Publicerades: 2025-02-25
  10. Recycling Exploits in MacOS and Pirating Audiobooks

    Publicerades: 2025-02-18
  11. Top 10 Web Hacking Techniques and Windows Shadow Stacks

    Publicerades: 2025-02-12
  12. Unicode Troubles, Bypassing CFG, and Racey Pointer Updates

    Publicerades: 2025-02-04
  13. Deanonymization with CloudFlare and Subaru's Security Woes

    Publicerades: 2025-01-27
  14. Excavating Exploits and PHP Footguns

    Publicerades: 2025-01-20
  15. WhatsApp vs. NSO and CCC Talks

    Publicerades: 2025-01-14
  16. Buggy Operating Systems Are Coming to Town

    Publicerades: 2024-12-16
  17. Machine Learning Attacks and Tricky Null Bytes

    Publicerades: 2024-12-09
  18. A Windows Keyhole and Buggy OAuth

    Publicerades: 2024-12-02
  19. Linux Is Still a Mess and Vaultwarden Auth Issues

    Publicerades: 2024-11-26
  20. FortiJump Higher, Pishi, and Breaking Control Flow Flattening

    Publicerades: 2024-11-18

1 / 15

A weekly podcast for bounty hunters, exploit developers or anyone interesting in the details of the latest disclosed vulnerabilities and exploits.

Visit the podcast's native language site