YesWeHack Hunter Interviews – #13 leorac: “Bug Bounty is a rollercoaster of emotions”

3:54
YesWeHack Hunter Interviews - #11 Pwnii: “Don't forget that a duplicate bug is a valid bug”

32:09
Limitations Are Just An Illusion: Brumens on Leveraging Advanced SSTI Exploitation to Achieve RCE

5:25
YesWeHack Hunter Interviews – #12 gregxsunday: “I’m paying a lot of attention to SSO or SAML flaws”

10:21
Updated! Best Amps Under $200! One is Going Away Forever

9:43
Talkie Pwnii #3: Python Format String Injection via Insecure Exception Handling

4:57
YesWeHack Hunter Interviews – #9 Nagli: “When you’re a hacker you have some superpowers”

7:16
YesWeHack Customer Story: ATG, Swedish betting and horseracing company

13:10