81
81
Feb 21, 2014
02/14
by
Jonathan Afek
movies
eye 81
favorite 0
comment 0
When writing an application, developers typically include pointers to a variety of data objects. In some scenarios, the developer may accidentally use a pointer to an invalid or deallocated object, causing the application to enter an unintended execution flow. This usually causes the application to crash, but can result in far more dangerous behavior. This class of bug is referred to as the Dangling Pointer, and unfortunately it is a common programming malpractice.
Topics: pointer, exploit, memory allocation
Topics: youtube, bleach, exploit, gaming, 2007
123
123
software
eye 123
favorite 0
comment 0
This leak comes from any sources forums. You can still use it for VPS of Computer Monitor without having shut down. v2 is coming soon!
Topics: remote, administration, tool, rat, exploit
Zero-day vulnerabilities are those that have not previously been identified and thus are in their zeroth day of existence. These vulnerabilities are the most potentially damaging from a cyber defense perspective because the defender is unaware of their existence and a malicious attacker can exploit them to take control of a system without the owner's consent or knowledge. Zero-day vulnerabilities are also highly valuable to offensive cyber operations as they may be exploited before defenders...
Topics: cyber, security, cybersecurity, exploit, zero-day vulnerability, zero-day exploit, offensive...
21
21
Jan 1, 2022
01/22
by
Marionumber1, NWPlayer123, etc.
software
eye 21
favorite 0
comment 0
Originally leaked browser exploit for Wii U Firmware 5.5.0 and 5.5.1. Install Java 8 Exract the files to "C:\kexploit" Open a terminal (CMD) in the same folder and run the HaxServer with "java -jar HaxServer.jar" Open the Wii U browser at the IP of your PC where the HaxServer is running
Topics: browser, exploit, wii u, homebrew
279
279
Nov 7, 2004
11/04
by
http://www.exploit.net/wizard/
software
eye 279
favorite 0
comment 0
This program will submit your site to 1,200 search engines including AOL, Yahoo!, Google, Hotbot, AltaVista, Looksmart, Excite, Lycos and Goto. It uses 20 sockets to post your Web site information. Note: This product is registered by purchasing between one and 12 month keys. Keys range from $79.00 to $249.00. Once the key is used up, you will need to purchase another to use the product.
Topics: Exploit Submission Wizard, Internet, Web building tools, Web site promotion, exploit, submission,...
36
36
Jul 9, 2019
07/19
by
Hak5
movies
eye 36
favorite 0
comment 0
This week Darren is joined by Rob Ruller. Source: https://www.youtube.com/watch?v=NtcKH9yRyJM Uploader: Hak5
Topics: Youtube, video, Entertainment, virtual box, virtualbox, virtualization, vpn, linux, backtrack,...
12
12
Feb 7, 2016
02/16
by
Kenneth Udut
movies
eye 12
favorite 0
comment 0
#Getting up. The oh gah part is I REALLY didnt wanna get up!-MvE5H1ExwW6.mp4 Getting up The oh gah part is I REALLY didnt wanna get up MvE5H1ExwW6 mp4 Getting
Topics: feat, exploit, effort, Getting, Vine, KennethUdut
Perf has been added into Linux kernel since 2.6.3x to provide a framework for all things performance analysis. It covers hardware level (CPU/PMU, Performance Monitoring Unit) features and software features (software counters, trace points) as well. Among the supported perf measurable event list, there is a small set of common hardware events monikers which get mapped onto an actual events provided by the CPU, if they exists, otherwise the event cannot be used. So there is no surprise CPU...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, hitb2016ams, perf,...
18
18
Jan 16, 2020
01/20
by
SalC1
movies
eye 18
favorite 0
comment 0
Link to YouTube version: https://www.youtube.com/watch?v=SAj6DiZKwyM Video created by SalC1 . Rights to the gameplay footage belongs to Mojang. Today, lets dive into the history of a lesser-known exploit with books. Sources: - Aidan's Testing with older versions of Minecraft. - fr1kin Interview: https://youtu.be/0SxXS2S8mwM?t=1270 - History of Jacktherippa: https://youtu.be/iM9VZfGlkgY?t=673 - Reddit Post: https://www.reddit.com/r/admincraft/c... - Client used to make these books:...
Topics: Minecraft, 2b2t, Book Exploit, Gaming, YouTube
In the era of cyberwarfare, it becomes a norm to see cyber criminals use multi-level attacks to penetrate a multi-layered protected network infrastructure. We often see APT attackers manipulate 0-day or N-day Windows kernel vulnerabilities in order to guarantee a successful full system compromise. It would be a surprise if we do not see Windows kernel exploit involved in such targeted attacks. It is also worth noting that beside APT attackers, the botnet operators also seize the opportunity to...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, hitb2016ams, exploit,...
32
32
Jan 16, 2020
01/20
by
SalC1
movies
eye 32
favorite 0
comment 0
Link to YouTube version: https://www.youtube.com/watch?v=-xDODejcM6c Video created by SalC1 . Rights to the gameplay footage belongs to Mojang. These exploits seem to never stop coming! Let's take a look at what the one is all about. Book Banning Video: https://youtu.be/_7f6DojmoWE SalC1 Channel Discord: https://discordapp.com/invite/Qe76wvR Like my videos? Consider subscribing to my channel.
Topics: Minecraft, 2b2t, The Sign Exploit, Gaming, YouTube
114
114
Apr 20, 2020
04/20
by
King Kable
movies
eye 114
favorite 0
comment 0
Link to YouTube version: https://www.youtube.com/watch?v=CiaZqkRv0UE Video created by King Kable . Rights to the gameplay footage belongs to Clapfoot. for collie eyes only
Topics: Foxhole, Gameplay, Refinery, Glitch, Exploit, Gaming, YouTube
Showing off a new DSiWare exploit, which involves Sudoku, by EA. Video recorded by yellows8. This video was uploaded on January 10th as unlisted since we were considering releasing this video only before the exploit release. We decided to wait for exploit release since the exploit release would've been soon after a video release. Source: https://www.youtube.com/watch?v=S2W8RNvamhI Uploader: caitsith2 Upload date: 2011-01-10
Topics: Youtube, video, Gaming, dsi, homebrew, dsiware, exploit
Topics: warcarchives, exploitdb, exploit, 895, CVE, 2004-1235, tibet
31
31
Jan 14, 2020
01/20
by
FitMC
movies
eye 31
favorite 0
comment 0
Link to YouTube version: https://www.youtube.com/watch?v=xKJKK-7MN5Y Video created by FitMC . Rights to the gameplay footage belongs to Mojang. A brand new coordinate exploit has been discovered involving the queue server on 2b2t, and one group has taken major advantage of it. My Twitter: https://twitter.com/FitMC My Instagram: https://www.instagram.com/fitmcsippycup/ YT Streams: https://www.youtube.com/c/FitMC/live Catch up on streams here: https://www.youtube.com/playlist?list......
Topics: Minecraft, 2b2t, Leaking Bases, Queue Exploit, Gaming, YouTube
3,374
3.4K
Jan 30, 2019
01/19
by
Dave J Murphy
software
eye 3,374
favorite 7
comment 0
This is a really cool method of softmodding your dsi console. It works through the Flipnote Studio app. This is one of the first exploits in years that does'int use one of those dsiware games that are now gone forever after the dsi Shop Channel closed down. The original can be found here: https://davejmurphy.com/%CD%A1-%CD%9C%CA%96-%CD%A1/ with a tutorial here: https://dsi.cfw.guide/
Topics: softmod, exploit, Nintendo, Lennyface, Flipnote, Ds, DS, DSi
Original URL: http://www.mediafire.com/file/euyu4faj8hm6sfm/%255B1.7.10%255DNameSpoofV2.jar/file Corresponding video: https://www.youtube.com/watch?v=2q-VnSDPvj8
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
Topics: minecraft, cheat, mod, name, exploit, jar, hack, 1.7.10
Venez nous rejoindre mercredi soir à 19h pour Mars Première : https://www.twitch.tv/hugolisoir Commandez notre livre sur Amazon : https://amzn.to/2K1womp Ou avec la FNAC : https://tidd.ly/37JegpJ Soutenez-nous avec Tipeee: https://www.tipeee.com/hugo-lisoir Soutenez-nous avec uTip : https://utip.io/feed/hugolisoir Contact pro: contact.hugolisoir@gmail.com Dernières nouvelles des étoiles (DNDE) est un format hebdomadaire qui fait le tour de l'actualité spatiale. SpaceX, Blue Origin,...
Topics: Youtube, video, Science & Technology, Chine, Mars, Zhurong, Exploit, Tianwenn-1, sonde, hugo...
31
31
Jan 24, 2020
01/20
by
FitMC
movies
eye 31
favorite 0
comment 0
Link to YouTube version: https://www.youtube.com/watch?v=EgyjJ0EGVZ8 Video created by FitMC . Rights to the gameplay footage belongs to Mojang. I discuss what has been happening on 2b2t in the past few weeks as well as what I have been up to on the server. My Twitter: https://twitter.com/SonOfShoop My Instagram: https://www.instagram.com/fitmcsippycup/
Topics: Minecraft, 2b2t, Coordinate Exploit, Fitlantis Found, Gaming, YouTube
Data is more defenseless than any time in recent memory and each mechanical development raises new security danger that requires new security arrangements. web kill tool is directed to assess the security of an IT framework by securely uncovering its weaknesses. The performance of an application is measured based on the number of false negatives and false positives. Testing technique that is highly automated, which covers several boundary cases by means of invalid data as the application input...
Topics: Information Gathering, Exploit Vulnerabilities, analysis victim sip address
16
16
Feb 7, 2016
02/16
by
Kenneth Udut
movies
eye 16
favorite 0
comment 0
#Getting #dressed with the #Boop hand.-MvEnw9xKmY2.mp4 Getting dressed with the Boop hand MvEnw9xKmY2 mp4 Getting dressed Boop
Topics: feat, exploit, effort, Getting, dressed, Boop, Vine, KennethUdut
28
28
Aug 8, 2019
08/19
by
FitMC
movies
eye 28
favorite 0
comment 0
Link to YouTube version: https://www.youtube.com/watch?v=768muOIoytQ Video created by FitMC. R ights to the gameplay footage belongs to Mojang . Trying out an exploit on SMP Live with some hilarious results. My Twitter: https://twitter.com/SonOfShoop My Instagram: https://www.instagram.com/fitmcsippycup/ Twitch: https://www.twitch.tv/realfitmc
Topics: Minecraft, 2b2t, Minecart Flying, Exploit, Minecart Glitch, Gaming, YouTube
35
35
Jan 15, 2020
01/20
by
FitMC
movies
eye 35
favorite 0
comment 0
Link to YouTube version: https://www.youtube.com/watch?v=T2H527m60bQ Video created by FitMC . Rights to the gameplay footage belongs to Mojang. We take a look at the chaotic history of both thunder and lightning on the oldest anarchy server in Minecraft. My Twitter: https://twitter.com/SonOfShoop My Instagram: https://www.instagram.com/fitmcsippycup/ YT Streams: https://www.youtube.com/c/FitMC/live Catch up on streams here: https://www.youtube.com/playlist?list... Additional Footage: xcc2...
Topics: Minecraft, 2b2t, History of Lightning, Lightning Exploit, Gaming, YouTube
27
27
Jan 23, 2020
01/20
by
FitMC
movies
eye 27
favorite 0
comment 0
Link to YouTube version: https://www.youtube.com/watch?v=M6LDrYnntA8 Video created by FitMC . Rights to the gameplay footage belongs to Mojang. My Twitter: https://twitter.com/SonOfShoop My Instagram: https://www.instagram.com/fitmcsippycup/ My Snapchat: fitmcsippycup
Topics: Minecraft, 2b2t, Anti Hack Arrows, Arrow Exploit, Gaming, YouTube
19
19
Jan 26, 2020
01/20
by
FitMC
movies
eye 19
favorite 0
comment 0
Link to YouTube version: https://www.youtube.com/watch?v=YIlsR2Dv0Uw Video created by FitMC . Rights to the gameplay footage belongs to Mojang. Here's the latest on what has been happening on 2b2t over the past few weeks. My Twitter: https://twitter.com/SonOfShoop My Instagram: https://www.instagram.com/fitmcsippycup/ My Merch: https://www.redbubble.com/people/fitm... Thumbnail Render: LukasAnimations
Topics: Minecraft, 2b2t Update, Kickbow Exploit, French Incursion, Gaming, YouTube
38
38
Jul 9, 2019
07/19
by
Hak5
movies
eye 38
favorite 0
comment 0
Segment from Hak5 1x05 - Exploiting Windows Vulnerabilities with Metasploit -~-~~-~~~-~~-~- Please watch: "Bash Bunny Primer - Hak5 2225" https://www.youtube.com/watch?v=8j6hrjSrJaM -~-~~-~~~-~~-~- Source: https://www.youtube.com/watch?v=74ON7Z23fZA Uploader: Hak5
Topics: Youtube, video, Howto & Style, exploit, hak5, metasploit, security, vulnerability, windows
Academic literature put out between 1990-2016 covering both offensive and defensive techniques of application security. Many have a focus on Android or iOS mobile operating systems. This does not nearly comprise all existing literature, but accounts for the most significant (as of November 29, 2016)
Topics: Hacking, Offensive, Exploit, ROP, JOP, COP, Memory Error, Application Security
19
19
Jun 20, 2020
06/20
by
TheLovelyKazooie
movies
eye 19
favorite 0
comment 0
Link to YouTube version: https://www.youtube.com/watch?v=UXu0vxMRwy8 Video created by TheLovelyKazooie . Rights to the gameplay footage belongs to Mojang. Found by Leduck. Our current understanding is that this can only be done the *very first* time you ever enchant armor with Food Reserves on it. From that point on if you restart your PC/Console it will no longer work. This needs to be explored further but it seems like you can ignore collision in almost any direction by using your potion...
Topics: Minecraft Dungeons, FOod Reserves Glitch, Map Glitch, Exploit, Gaming, YouTube
578
578
movies
eye 578
favorite 0
comment 0
Keynote Speaker 1 Theo de Raadt Exploit Mitigation Techniques (presentation material in zip)
Topics: hack, security, unix, linux, open bsd, exploit, vulnerabilities, security professional
3
3.0
May 1, 2021
05/21
by
Benjamin Yunker (benjipenguin)
data
eye 3
favorite 0
comment 0
Really had too much fun with the sweeping text customizer, and came up with this beauty!
Topics: stl, Decor, office, developer, Bash_Guard, uniX, linux, forkbomb, exploit, thingiverse
7
7.0
Apr 22, 2020
04/20
by
Center for Accessible Technology in Sign
movies
eye 7
favorite 0
comment 0
ASL vocabulary
Topic: abuse,exploit,play on,play upon,trade on,trade upon,take advantage
RocketLauncher was first developed to use flashcarts to start the payload. But I found away around that and add support for using a game like Mario 64 to trigger the exploit! Source: https://www.youtube.com/watch?v=mLC1shKv95o Uploader: ApacheThunder Upload date: 2017-07-14
Topics: Youtube, video, Gaming, RocketLauncher, DSi, Nintendo, Feature, Mario 64 DS, Exploit, Homebrew
61
61
movies
eye 61
favorite 0
comment 0
Video toont een untethered jailbreak, gebaseerd op een Safari-exploit.
Topics: tweakers, 1095, Video toont een untethered jailbreak, gebaseerd op een Safari-exploit.
27
27
Jul 9, 2019
07/19
by
Hak5
movies
eye 27
favorite 0
comment 0
In this HakTip from DEFCON 19 Darren is joined by Georgia Weidman of GRMn00bs to talk all things Android Botnets. Source: https://www.youtube.com/watch?v=t8Aw8H6Oqq4 Uploader: Hak5
Topics: Youtube, video, Entertainment, defcon, georgia weidman, android, botnet, rootkit, baseband, ios,...
38
38
Jan 22, 2020
01/20
by
FitMC
movies
eye 38
favorite 0
comment 0
Link to YouTube version: https://www.youtube.com/watch?v=1yig3MFAAOk Video created by FitMC . Rights to the gameplay footage belongs to Mojang. A detailed history of the decade long journey of the Dragon Egg on the oldest anarchy server in Minecraft, 2b2t. My Twitter: https://twitter.com/SonOfShoop My Instagram: https://www.instagram.com/fitmcsippycup/ YT Streams: https://www.youtube.com/c/FitMC/live Catch up on streams here: https://www.youtube.com/playlist?list... Renders: ThebesAndSound,...
Topics: Minecraft, 2b2t, Dragon Egg Exploit, History of the Dragon Egg, Gaming, YouTube
Exploit kits are one of the threats that is ever present on the Internet. Indiscriminately compromising users that are simply surfing websites. As ransomware has exploded so has the proliferation of these exploit kits. This combination of ransomware, tor, and bitcoin has created a financially lucrative monster. One of the challenges with investigating exploit kits is how quickly they move and pivot to other systems. For the last year Talos has been systematically diving into each exploit kit...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, cisco, talos,...
68
68
movies
eye 68
favorite 0
comment 0
Tiger Cubs To Go... Help us stop the abuse of big cat cubs! PLEASE SHARE THIS VIDEO & TAKE ACTION BY CLICKING ON THE LINK BELOW! - THANK YOU :) The Big Cats and Public Safety Protection Act has been reintroduced as HR 1998. Please ask your member of Congress to sign on as a Co Sponsor so that this bill can be passed this year! TAKE ACTION HERE: https://www.votervoice.net/BCR/Campaigns/30111/Respond Learn the truth about tiger cub petting displays:...
Topics: tigers, cubs, cute, cutest, help, exploit, abused, petting, swimming, big cats, babies, breeding
http://smealum.net/ninjhax/ http://twitter.com/smealum This video showcases ninjhax, a brand new exploit just released to the public that lets any owner of the (surprisingly popular) game Cubic Ninja run unsigned code on their 3DS (new or old, XL or no, 2DS included) without the need for any extra hardware of any kind. This launcher does not let users run pirated 3DS software. Please visit the official webpage for more information on the launcher and how to install it yourself :...
Topics: Youtube, video, Gaming, Nintendo DS Homebrew, Nintendo 3DS (Video Game Platform), Firmware...
6
6.0
Apr 7, 2021
04/21
by
Sean Hodgins (hodginsa)
data
eye 6
favorite 0
comment 0
Forgot to upload this last night! #PrintADay Everyone's favourite internet exploit has a logo, and its eerily cute. Now you can have it as a keychain to continue to remind you of how serious of an event this was; also use it to inform the less tech savvy in what they should do now that it has happened. Measures about 30mm wide, 2.5mm thick as usual(my standard). Some small braces for the long heart drips. Enjoy!
Topics: Keychains, simple, keychain, heart, heartbleed, logo, stl, dangerous, bleed, thingiverse, cute,...
28
28
Oct 16, 2017
10/17
by
HackersSecurity
movies
eye 28
favorite 0
comment 0
Invest in IT Startups with as little as 10$ (or bitcoin) and watch your money grow every second! Withdraw instantly every $1 or 0.01BTC! http://bit.ly/1bQdMOQ Source: https://www.youtube.com/watch?v=ogv4JXnUkjw Uploader: HackersSecurity
Topics: Youtube, video, Science & Technology, blackhat usa, blackhat 2012, blackhat hacking, blackhat,...
1
1.0
Nov 8, 2021
11/21
by
Chris Kellahan (UltraSalem)
data
eye 1
favorite 0
comment 0
Played all of one game of the cyberpunk miniatures game Exploit Zero https://stalker7.com/hardwired/ . Loved it. But all my movement gauges were 3" and 6" based, so needed something new to handle the 4" movement base of E0. STL file uploaded (I print in multi-layers with prusaslicer to get coloured text and markings). Widget is double sided and has markings on the underside as well.
Topics: stl, movement, Cyberpunk, widget, exploit_zero, wargaming, thingiverse, Toy & Game Accessories,...
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2012kul/materials/ PRESENTATION ABSTRACT: Behind every successful exploit is a good delivery mechanism. This talk combines my research in exploit writing, browser and PDF exploitation, web hacking and old school data representation techniques, bringing you a slew of creative and innovative tricks and techniques to send exploits successfully to the victim's doorstep. Never before has the fine art of packaging been more important when...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, exploit, exploit...
21
21
Feb 11, 2016
02/16
by
Kenneth Udut
movies
eye 21
favorite 0
comment 0
Getting the #creeps. Sometimes it's your #nerve #endings firing for no real reason. Sometimes something really IS #touching you -ezrpzhBvuwY
Topics: poise, fright, fearfulness, fear, exploit, effort, contact, brace, brace, creeps, Vine,...
A sermon on James 6:1-6. God has a heart for the poor and oppressed and warns against those who selfishly pursue and hoard wealth and condemns those who use abuse, mistreatment and exploitation of their workers to get rich and live in luxury. 1 Timothy 6:3-10 Matthew 6:19-24
Topics: Warnings to All Who Exploit Others in Order to Get Rich, Jeff Evans, CCBC Sermons
In this video I will reveal a new exploit for the Nintendo DSi! This exploit happens during early boot with a flashcart with a rom modified and set to autoboot. (this provides a stable environment for our exploit code). With this we can gain full control over the console for the first time! Source: https://www.youtube.com/watch?v=jRG6FwpHR6I Uploader: ApacheThunder Upload date: 2017-07-02
Topics: Youtube, video, Gaming, Nintendo DSi, RocketLauncher, Haxx, Exploit, Portable Console, Gaming,...
HITBSecConf2005 Malaysia _ The Grugq.mp4 Source: https://www.youtube.com/watch?v=avQRqip_MBY Uploader: killab66661
Topics: Youtube, video, Education, hacking, hacker, learn, teach, insight, help, educational, educate,...
Thanks to shutterbug2000 we found a quick way to make the full RocketLauncher payload boot using just the exploited DS Cart White list and a standard retail cart. I found the specific math required to set the offset in the white list to make the needed code land in the arm7 irq handler address. So it is likely we will have a tool that will automatically search a rom dump of a cart you have for a usable offset and setup the white list for you! This means that most NTR games will be supported. As...
Topics: Youtube, video, Gaming, Nintendo, DSi, Portable, Console, Homebrew, Hax, RocketLauncher, exploit,...
12
12
Jul 9, 2019
07/19
by
Hak5
movies
eye 12
favorite 0
comment 0
We head out to DC for Shmoocon, our favorite hacker conference on the east coast, to talk to some of the brightest minds in security. We talk to Tom Eston about social media security, TheX1le about his new tool airdrop-ng, Jason Scott about preserving our digital heritage, Chris Paget about man-in-the-middle attacks against GSM networks, and much more. Source: https://www.youtube.com/watch?v=7BUz3vYXac0 Uploader: Hak5
Topics: Youtube, video, Entertainment, jasager, hack, exploit, crack, metasploit, 802, 11, wireless, wifi,...
35
35
Jul 9, 2019
07/19
by
Hak5
movies
eye 35
favorite 0
comment 0
After much request we've dedicated an episode to Metasploit. Room362.com's very own Rob Fuller, aka Mubix, joins us in studio to show us the basics of exploiting and the power of auxiliary modules. Source: https://www.youtube.com/watch?v=RxyD0F38WYg Uploader: Hak5
Topics: Youtube, video, Entertainment, hack, windows, hacking, offensive, security, backtrack, hacker,...