Day[0]
Podcast autorstwa dayzerosec
Kategorie:
259 Odcinki
-
Rust in the Web? A Special Guest and some Bad Crypto [Bounty Hunting]
Opublikowany: 16.11.2021 -
A too trusty TrustZone and a few Linux Kernel bugs [Binary Exploitation]
Opublikowany: 11.11.2021 -
A MacOS SIP Bypass & an XSS Fiesta [Bounty Hunting]
Opublikowany: 9.11.2021 -
Type Confusion in Android NFC, PHP-FPM Local Privilege Escalation, and CallbackHell [Binary Exploitation]
Opublikowany: 4.11.2021 -
Discourse SNS RCE, a Stored XSS in GitLab, and a Reddit Race Condition [Bug Hunting]
Opublikowany: 2.11.2021 -
A Kernel Race, SuDump, and a Chrome Garbage Collector Bug [Exploit Dev/VR]
Opublikowany: 28.10.2021 -
A Slack Attack and a MySQL Scientific Notation Bug [Bug Hunting]
Opublikowany: 26.10.2021 -
WebKit Bugs, a Windows Race, and House of IO Improved [Exploit Dev/VR]
Opublikowany: 21.10.2021 -
WebSocket Hijacking, GitHub review bypass and SQLi to RCE [Bug Hunting]
Opublikowany: 19.10.2021 -
HyperKit Bugs & an Open5GS Stack Overflow [Binary Exploitation]
Opublikowany: 14.10.2021 -
SharePoint RCE & an Apache Path Traversal [Bug Hunting]
Opublikowany: 12.10.2021 -
Chrome Exploits and a Firefox Update Bug [Binary Exploitation]
Opublikowany: 7.10.2021 -
Gatekeeper Bypass, Opera RCE, and Prototype Pollution [Bounty Hunting]
Opublikowany: 5.10.2021 -
Kernel UAFs and a Parallels VM Escape [Binary Exploitation]
Opublikowany: 30.09.2021 -
iOS 0days, Apache Dubbo RCEs, and NPM bugs [Bounty Hunting]
Opublikowany: 29.09.2021 -
A Curl UAF, iPhone FORCEDENTRY, and a Crazy HP OMEN Driver [Binary Exploitation]
Opublikowany: 23.09.2021 -
A Flickr CSRF, GitLab, & OMIGOD, Azure again? [Bounty Hunting]
Opublikowany: 21.09.2021 -
NETGEAR smart switches, SpookJS, & Parallels Desktop [Binary Exploitation]
Opublikowany: 16.09.2021 -
Reused VMWare exploits & Escaping Azure Container Instances [Bounty Hunting]
Opublikowany: 14.09.2021 -
Escaping the Bhyve, WhatsApp, & BrakTooth [Binary Exploitation]
Opublikowany: 9.09.2021
A weekly podcast for bounty hunters, exploit developers or anyone interesting in the details of the latest disclosed vulnerabilities and exploits.