Talkie Pwnii #1: Exploiting SQL LIKE Operator & Command Injection Regex Bypass
7:49
Talkie Pwnii #2: Exploiting second order SQL injection to extract data
3:54
YesWeHack Hunter Interviews - #11 Pwnii: “Don't forget that a duplicate bug is a valid bug”
9:58
what happens when your CPU has a bug? (GhostWrite)
1:02:17
OAuth 2.0 and OpenID Connect (in plain English)
24:50
Hacking Discord for $5000 Bounty
17:35
I’ve Switched to UV for Python, and So Should You
27:31
Cybersecurity Architecture: Networks
18:27