Talkie Pwnii #1: Exploiting SQL LIKE Operator & Command Injection Regex Bypass
![](https://i.ytimg.com/vi/S8qrBTJjH7k/mqdefault.jpg)
7:49
Talkie Pwnii #2: Exploiting second order SQL injection to extract data
![](https://i.ytimg.com/vi/i5L9xEk_adw/mqdefault.jpg)
12:50
i dove down the 7z rabbit hole (it goes deep)
![](https://i.ytimg.com/vi/zgdq6ErscqY/mqdefault.jpg)
6:10
Albanian Hacking Tool (ALHacking Tool)!
![](https://i.ytimg.com/vi/cYHqLMgdzAk/mqdefault.jpg)
3:54
YesWeHack Hunter Interviews - #11 Pwnii: “Don't forget that a duplicate bug is a valid bug”
![](https://i.ytimg.com/vi/FVm6wYc1S6A/mqdefault.jpg)
32:09
Limitations Are Just An Illusion: Brumens on Leveraging Advanced SSTI Exploitation to Achieve RCE
![](https://i.ytimg.com/vi/YVxWJaxlJRI/mqdefault.jpg)
11:45
How to be invisible online in 6 minutes (Whonix - Superior Internet Privacy)
![](https://i.ytimg.com/vi/1MNaDP2s9CY/mqdefault.jpg)
9:43
Talkie Pwnii #3: Python Format String Injection via Insecure Exception Handling
![](https://i.ytimg.com/vi/FBwRTWEzGN0/mqdefault.jpg)
16:16