Clip 3/3 Speaker: Dan Bergh Johnsson, Omegapoint SQL Injection and Cross-Site Scripting have been topping the OWASP...
Month: August 2010

Want to see what the 300 million dollar, 390 foot Philippe Starck designed mega yacht that belongs...

music by All-City Arson http://panicinpodsix.com source

Botnet Resistant Coding: Protecting Your Users from Script Kiddies [email protected] [email protected] Zeus botnets are trojans accountable for...
The “new” Insecure Library Loading vulnerability (2269637) in action… The Metasploit team has added a exploit module...

This is a short video demo of the Microsoft DLL Hijacking Exploit on Windows 7 and office...

This video is the work sample for Amazingland the Magical (working title) created and performed by Trey...

This is a video of me performing the MS10-046 exploit in the Metasploit framework, then using ettercap...

Apple has shipped QuickTime 7.6.7 to fix a critical vulnerability that exposes Windows users to malicious hacker...

We took the colors from 100,000 profiles designed with Themeleon and geolocated them in the world where...
Credits go out to iExploitTube, check out the channel: http://bit.ly/9J5pSN This video will show you how to...

Teensy device programmed to download and execute MSF payload. 1. I am running two Virtual machines. The...
From the DEFCON 18 Badge Hacking Contest. Dancing Badge w/ Ninja Party Badge Bruteforcer by Team Bashfork...

trailer for an actual pilot for a hypothetical web series “There’s something dark in Shady Texas …”...

A tutorial on the MODx Revolution security system. Covers User Groups, Roles, Authority, ACLs, Context Access, Resource...

‘Adaptive Bloom’ by Justin Goodyer of the Bartlett School of Architecture is a reactive facade driven by...