Name pwn.college - Hacking
File Type video
Size 6.73GB
UpdateDate 2024-11-11
hash *****99CCF45F953BD1499FF0769BFF821C06A7
Hot 5
Files Welcome to pwn.college.html | 14.41KB Extra - CSE466/CSE 466 - Computer Systems Security - Connor's Office Hours 9 8 2020.eng.srt | 105.49KB Extra - CSE466/CSE 466 - Computer Systems Security - Connor's Office Hours 9 8 2020.mp4 | 59.60MB Extra - CSE466/CSE 466 - Computer Systems Security - Connor's Office Hours 11 20 2020.eng.srt | 135.10KB Extra - CSE466/CSE 466 - Computer Systems Security - Connor's Office Hours 11 20 2020.mp4 | 106.36MB Extra - CSE466/CSE 466 - Computer Systems Security - Connor's Office Hours 11 27 2020.eng.srt | 157.22KB Extra - CSE466/CSE 466 - Computer Systems Security - Connor's Office Hours 11 27 2020.mp4 | 96.37MB Extra - CSE466/CSE 466 - Computer Systems Security - Connor's Office Hours 12 5 2020.eng.srt | 126.11KB Extra - CSE466/CSE 466 - Computer Systems Security - Connor's Office Hours 12 5 2020.mp4 | 110.59MB Extra - CSE466/CSE 466 - Computer Systems Security - Extended Q&A - 11 18 2020.eng.srt | 187.22KB Extra - CSE466/CSE 466 - Computer Systems Security - Extended Q&A - 11 18 2020.mp4 | 359.07MB Extra - CSE466/CSE 466 - Computer Systems Security - Extended Q&A - 11 25 2020.mp4 | 381.09MB Extra - CSE466/CSE 466 - Computer Systems Security - Extended Q&A - 12 2 2020.eng.srt | 259.59KB Extra - CSE466/CSE 466 - Computer Systems Security - Extended Q&A - 12 2 2020.mp4 | 390.77MB Extra - CSE466/CSE 466 - Computer Systems Security - Extended Q&A 9 2 2020.eng.srt | 214.35KB Extra - CSE466/CSE 466 - Computer Systems Security - Extended Q&A 9 2 2020.mp4 | 375.66MB Extra - CSE466/CSE 466 - Computer Systems Security - Extended Q&A 9 9 2020.eng.srt | 222.60KB Extra - CSE466/CSE 466 - Computer Systems Security - Extended Q&A 9 9 2020.mp4 | 351.21MB Extra - CSE466/CSE 466 - Computer Systems Security - Extended Q&A 10 7 2020.eng.srt | 192.11KB Extra - CSE466/CSE 466 - Computer Systems Security - Extended Q&A 10 7 2020.mp4 | 375.61MB Extra - CSE466/CSE 466 - Computer Systems Security - Extended Q&A 10 14 2020.eng.srt | 221.07KB Extra - CSE466/CSE 466 - Computer Systems Security - Extended Q&A 10 14 2020.mp4 | 374.93MB Extra - CSE466/CSE 466 - Computer Systems Security - Office Hours 9 7 2020.eng.srt | 100.93KB Extra - CSE466/CSE 466 - Computer Systems Security - Office Hours 9 7 2020.mp4 | 173.79MB Extra - CSE466/CSE 466 - Computer Systems Security - Yan's Office Hours 9 14 2020.eng.srt | 76.61KB Extra - CSE466/CSE 466 - Computer Systems Security - Yan's Office Hours 9 14 2020.mp4 | 127.42MB Extra - CSE466/CSE 466 - Computer Systems Security - Yan's Office Hours 11 16 2020.eng.srt | 64.67KB Extra - CSE466/CSE 466 - Computer Systems Security - Yan's Office Hours 11 16 2020.mp4 | 114.95MB Extra - CSE466/CSE 466 - Computer Systems Security - Yan's Office Hours 11 23 2020.eng.srt | 66.00KB Extra - CSE466/CSE 466 - Computer Systems Security - Yan's Office Hours 11 23 2020.mp4 | 145.77MB Extra - CSE466/CSE 466 - Computer Systems Security - Yan's Office Hours 11 30 2020.eng.srt | 67.77KB Extra - CSE466/CSE 466 - Computer Systems Security - Yan's Office Hours 11 30 2020.mp4 | 135.50MB Extra - CSE466/CSE 466 - Computer Systems Security - Yan's Office Hours 12 7 2020.eng.srt | 113.64KB Extra - CSE466/CSE 466 - Computer Systems Security - Yan's Office Hours 12 7 2020.mp4 | 191.91MB Extra - CSE466/CSE 466 - Computer Systems Security Lecture 1 Introduction.eng.srt | 166.73KB Extra - CSE466/CSE 466 - Computer Systems Security Lecture 1 Introduction.mp4 | 186.27MB Extra - CSE466/CSE 466 - Computer Systems Security Office Hours 8 31 2020.eng.srt | 84.29KB Extra - CSE466/CSE 466 - Computer Systems Security Office Hours 8 31 2020.mp4 | 151.61MB Slides/State of the Course.pptx | 100.94MB Slides/00 Fundamentals/Fundamentals_ Assembly.pptx | 1.54MB Slides/00 Fundamentals/Fundamentals_ Binary Files.pptx | 1.73MB Slides/00 Fundamentals/Fundamentals_ Computer Architecture.pptx | 1.85MB Slides/00 Fundamentals/Fundamentals_ Linux Process Loading.pptx | 1.30MB Slides/00 Fundamentals/Fundamentals_ Linux Processes Execution.pptx | 1.48MB Slides/00 Fundamentals/The Secret Life of Hello World.pptx | 2.91MB Slides/00 Introduction/Introduction 1_ Computer Systems and Security (new).pptx | 1.83MB Slides/00 Introduction/Introduction 1_ Computer Systems Security.pptx | 6.59MB Slides/00 Introduction/Introduction 2_ Computer Systems Security (new).pptx | 5.35MB Slides/00 Introduction/Introduction 2_ This Course.pptx | 811.48KB Slides/00 Introduction/Introduction 3_ Cybersecurity Ethics.pptx | 611.18KB Slides/00 Introduction/Introduction 4_ Careers.pptx | 4.05MB Slides/01 Program Misuse/Program Misuse 1_ Introduction.pptx | 1.52MB Slides/01 Program Misuse/Program Misuse 2_ Mitigations (New).pptx | 1.20MB Slides/02 Shellcoding/Shellcoding 1_ Introduction (new).pptx | 6.30MB Slides/02 Shellcoding/Shellcoding 2_ Writing Shellcode (new).pptx | 1.44MB Slides/02 Shellcoding/Shellcoding 3_ Debugging Shellcode (new).pptx | 1.43MB Slides/02 Shellcoding/Shellcoding 4_ Cross-Architecture Shellcode (new).pptx | 1.27MB Slides/02 Shellcoding/Shellcoding 5_ Common Challenges.pptx | 1.61MB Slides/02 Shellcoding/Shellcoding 6_ Data Execution Prevention.pptx | 1.98MB Slides/02 Shellcoding/Shellcoding_ Introduction.pptx | 6.33MB Slides/03 Sandboxing/Sandboxing 1_ Introduction.pptx | 3.00MB Slides/03 Sandboxing/Sandboxing 2_ chroot.pptx | 1.20MB Slides/03 Sandboxing/Sandboxing 3_ seccomp.pptx | 1.19MB Slides/03 Sandboxing/Sandboxing 4_ Escaping seccomp.pptx | 1.21MB Slides/03 Sandboxing/Sandboxing 5_ Modern Jails (cgroups and namespaces).pptx | 1.19MB Slides/04 Reverse Engineering/Reversing 1_ Introduction.pptx | 1.31MB Slides/04 Reverse Engineering/Reversing 2_ Functions and Frames.pptx | 1.62MB Slides/04 Reverse Engineering/Reversing 3_ Understanding Data Access.pptx | 1.53MB Slides/04 Reverse Engineering/Reversing 4_ Static Reversing.pptx | 1.20MB Slides/04 Reverse Engineering/Reversing 5_ Dynamic Reversing.pptx | 1.20MB Slides/04 Reverse Engineering/Reversing 6_ Examples.pptx | 4.60MB Slides/05 Memory Errors/Memory Errors 1_ Introduction.pptx | 7.72MB Slides/05 Memory Errors/Memory Errors 2_ High-level Problems.pptx | 2.82MB Slides/05 Memory Errors/Memory Errors 3_ Smashing the Stack.pptx | 1.54MB Slides/05 Memory Errors/Memory Errors 4_ Causes of Corruption.pptx | 1.36MB Slides/05 Memory Errors/Memory Errors 5_ Stack Canaries.pptx | 1.98MB Slides/05 Memory Errors/Memory Errors 6_ ASLR.pptx | 1.26MB Slides/05 Memory Errors/Memory Errors 7_ Causes of Disclosure.pptx | 1.20MB Slides/06 Exploitation/Exploitation Scenarios_ Achieving Control.pptx | 6.28MB Slides/06 Exploitation/Exploitation Scenarios_ Control Flow Hijack to Shellcode.pptx | 617.63KB Slides/06 Exploitation/Exploitation Scenarios_ JIT Spraying!.pptx | 614.51KB Slides/06 Exploitation/Exploitation Scenarios_ Vulnerability Side-Effects.pptx | 610.91KB Slides/07 Return Oriented Programming/ROP 1_ Introduction.pptx | 1.94MB Slides/07 Return Oriented Programming/ROP 2_ Binary Lego.pptx | 6.84MB Slides/07 Return Oriented Programming/ROP 3_ Techniques.pptx | 1.29MB Slides/07 Return Oriented Programming/ROP 4_ Complications.pptx | 1.34MB Slides/08 Dynamic Allocator Misuse/Heap 1_ Introduction.pptx | 3.39MB Slides/08 Dynamic Allocator Misuse/Heap 2_ Dangers.pptx | 1.54MB Slides/08 Dynamic Allocator Misuse/Heap 3_ tcache.pptx | 1.27MB Slides/08 Dynamic Allocator Misuse/Heap 4_ Metadata and Chunks.pptx | 1.38MB Slides/08 Dynamic Allocator Misuse/Heap 5_ Metadata Corruption.pptx | 1.30MB Slides/09 Race Conditions/Race Conditions 1_ Introduction.pptx | 1.39MB Slides/09 Race Conditions/Race Conditions 2_ Races in the Filesystem.pptx | 662.17KB Slides/09 Race Conditions/Race Conditions 3_ Process and Threads.pptx | 622.30KB Slides/09 Race Conditions/Race Conditions 4_ Races in Memory.pptx | 622.25KB Slides/09 Race Conditions/Race Conditions 5_ Signals and Reentrancy.pptx | 872.86KB Slides/10 Kernel Exploitation/Kernel 1_ Introduction.pptx | 2.95MB Slides/10 Kernel Exploitation/Kernel 2_ Environment Setup.pptx | 1.20MB Slides/10 Kernel Exploitation/Kernel 3_ Kernel Modules.pptx | 1.22MB Slides/10 Kernel Exploitation/Kernel 4_ Privilege Escalation.pptx | 1.37MB Slides/11 Advanced Exploitation/Advanced Exploitation 1_ Introduction.pptx | 1006.56KB Slides/11 Advanced Exploitation/Advanced Exploitation 2_ Heap Address Disclosure via Race Condition.pptx | 659.77KB Slides/11 Advanced Exploitation/Advanced Exploitation 3_ Memory Forensics.pptx | 612.05KB Slides/11 Advanced Exploitation/Advanced Exploitation 4_ Exploit Primitives.pptx | 675.08KB Slides/11 Advanced Exploitation/Advanced Exploitation 5_ End-to-End.pptx | 616.08KB Slides/11 Advanced Exploitation/Advanced Exploitation 6_ Kernel Allocators.pptx | 602.76KB Slides/11 Advanced Exploitation/Advanced Exploitation 7_ Kernel Races.pptx | 615.11KB Slides/11 Advanced Exploitation/Advanced Exploitation 8_ Escaping Seccomp (for real!).pptx | 1.27MB Slides/11 Advanced Exploitation/Advanced Exploitation 9_ Kernel Mitigations.pptx | 599.71KB Slides/12 Automatic Vulnerability Discovery/Automated Vulnerability Discovery 1_ Introduction.pptx | 1.55MB Slides/12 Automatic Vulnerability Discovery/Automated Vulnerability Discovery 2_ Static Analysis.pptx | 665.94KB Slides/12 Automatic Vulnerability Discovery/Automated Vulnerability Discovery 3_ Fuzzing.pptx | 821.66KB Slides/12 Automatic Vulnerability Discovery/Automated Vulnerability Discovery 4_ Dynamic Symbolic Execution.pptx | 7.33MB Slides/12 Automatic Vulnerability Discovery/Automated Vulnerability Discovery 5_ The Cyber Grand Challenge.pptx | 11.06MB Slides/X Format String Vulnerabilities/Format Strings_ Reading Memory.pptx | 1.28MB Slides/X Format String Vulnerabilities/Format Strings_ Writing Memory.pptx | 1.63MB Videos/00 Fundamentals 1 Computer Architecture.mp4 | 20.85MB Videos/00 Fundamentals 2 Assembly.mp4 | 75.71MB Videos/00 Fundamentals 3 Binary Files.mp4 | 43.49MB Videos/00 Fundamentals 4 Linux Process Loading.mp4 | 110.63MB Videos/00 Fundamentals 5 Linux Process Execution.mp4 | 80.89MB Videos/00 Introduction 1 What is Computer Systems Security.mp4 | 50.69MB Videos/01 Program Misuse 1 Program Misuse.mp4 | 64.71MB Videos/02 Shellcoding 1 Introduction.mp4 | 85.56MB Videos/02 Shellcoding 2 Common Challenges.mp4 | 35.32MB Videos/02 Shellcoding 3 Data Execution Prevention.mp4 | 25.02MB Videos/03 Sandboxing 1 Introduction.mp4 | 20.69MB Videos/03 Sandboxing 2 chroot.mp4 | 41.05MB Videos/03 Sandboxing 3 seccomp.mp4 | 22.78MB Videos/03 Sandboxing 4 Escaping seccomp.mp4 | 33.69MB Videos/04 Reverse Engineering 1 Introduction.mp4 | 24.83MB Videos/04 Reverse Engineering 2 Data Acces.mp4 | 12.21MB Videos/04 Reverse Engineering 3 Functions and Frames.mp4 | 33.99MB Videos/04 Reverse Engineering 4 Static Tools.mp4 | 29.65MB Videos/04 Reverse Engineering 5 Dynamic Tools.mp4 | 39.55MB Videos/04 Reverse Engineering 6 Real-world Applications.mp4 | 21.62MB Videos/05 Memory Errors 1 Introduction.mp4 | 18.44MB Videos/05 Memory Errors 2 High-level Problems.mp4 | 21.85MB Videos/05 Memory Errors 3 Smashing the Stack.mp4 | 33.29MB Videos/05 Memory Errors 4 Causes of Corruption, Part 1.mp4 | 25.03MB Videos/05 Memory Errors 5 Causes of Corruption, Part 2.mp4 | 42.92MB Videos/05 Memory Errors 6 Stack Canaries.mp4 | 41.40MB Videos/05 Memory Errors 7 Address Space Layout Randomization.mp4 | 40.49MB Videos/05 Memory Errors 8 Causes of Disclosure.mp4 | 33.78MB Videos/06 Exploitation 1 Introduction.mp4 | 12.52MB Videos/06 Exploitation 2 Hijacking to Shellcode.mp4 | 24.45MB Videos/06 Exploitation 3 Side Effects.mp4 | 15.29MB Videos/06 Exploitation 4 JIT Spray.mp4 | 13.22MB Videos/07 Return Oriented Programming 1 Introduction.mp4 | 15.03MB Videos/07 Return Oriented Programming 2 Binary Lego.mp4 | 38.88MB Videos/07 Return Oriented Programming 3 Techniques.mp4 | 48.68MB Videos/07 Return Oriented Programming 4 Complications.mp4 | 35.61MB Videos/08 Kernel 1 Introduction.mp4 | 55.63MB Videos/08 Kernel 2 Environmental Setup.mp4 | 56.78MB Videos/08 Kernel 3 Kernel Modules.mp4 | 56.06MB Videos/08 Kernel 4 Privilege Escalation.mp4 | 24.69MB Videos/09 Heap 1 What is the Heap.mp4 | 43.88MB Videos/09 Heap 2 Dangers.mp4 | 51.36MB Videos/09 Heap 3 tcache.mp4 | 43.32MB Videos/09 Heap 4 Chunks and Metadata.mp4 | 50.80MB Videos/09 Heap 5 Metadata Corruption.mp4 | 31.27MB Videos/10 Race Conditions 1 Introduction.mp4 | 30.97MB Videos/10 Race Conditions 2 Races in the Filesystem.mp4 | 48.38MB Videos/10 Race Conditions 3 Processes and Threads.mp4 | 34.34MB Videos/10 Race Conditions 4 Races in Memory.mp4 | 34.73MB Videos/10 Race Conditions 5 Signals and Reentrancy.mp4 | 31.81MB Videos/11 Advanced Exploitation 1 Introduction.mp4 | 18.82MB Videos/11 Advanced Exploitation 2 Heap Address Disclosure via Race.mp4 | 72.95MB Videos/11 Advanced Exploitation 3 In-Memory Forensics.mp4 | 34.57MB Videos/11 Advanced Exploitation 4 Exploit Primitives.mp4 | 94.57MB Videos/11 Advanced Exploitation 5 End-to-end Pwnage.mp4 | 45.10MB Videos/11 Advanced Exploitation 6 Escaping seccomp (for real).mp4 | 37.45MB Videos/11 Advanced Exploitation 7 Kernel Races.mp4 | 23.70MB Videos/12 Automatic Vulnerability Discovery 1 Introduction.mp4 | 22.10MB Videos/12 Automatic Vulnerability Discovery 2 Static Analysis.mp4 | 26.50MB Videos/12 Automatic Vulnerability Discovery 3 Fuzzing.mp4 | 40.96MB Videos/12 Automatic Vulnerability Discovery 4 Dynamic Symbolic Execution.mp4 | 49.61MB Videos/12 Automatic Vulnerability Discovery 5 The Cyber Grand Challenge.mp4 | 25.52MB Welcome to pwn.college_files/style.css | 4.27KB