Channel Avatar

alchemy @[email protected]

150 subscribers - no pronouns :c

Real, Concrete and Verifiable information in the field of cy


15:29
Malware Testing: Breaking Kali Linux’s Default Security with Ransomware
34:04
Ethical Hacking Operation: From Login Crack to Buffer Overflow Exploit
21:35
Binary Exploitation: exploit ret2win with params
13:44
Binary Exploitation: Ret2Win (CTF Walkthrough)
06:39
Bug Bounty: SQL Injection against a login page
07:41
Tutorial: How to install correctly Immunity Debugger with Mona (for Win 7 and Win 11)
10:53
PoC: Proof-of-Concept of DoS exploit for SmallFTP 1.0.3
34:02
Exploit Development: Crafting a Buffer Overflow Exploit for VulnServer
24:24
Exploit Development: Writing a Remote Buffer Overflow Exploit for Windows 11 RCE
15:39
Exploit Development: Crafting Remote Code Execution Exploit
16:38
Exploit Development: The Art of Crafting DoS Exploits!
19:08
Exploiting Chatify: Uncovering DoS and RCE Vulnerabilities!
13:39
UFW Firewall Configuration: Bulleftproof SSH on Kali Linux (Linux)
06:48
how to create a discord app for malware
13:31
Malware Testing: FUD PrismShellv2 | Windows Backdoor
11:57
Bug Bounty: Exploiting Stored XSS to Gain Full Control Using BeEF
07:23
Bug Bounty: Exploiting CSRF Vulnerability to Hijack User Actions
04:30
Bug Bounty: IDOR Login Bypass | Access Accounts Without Passwords
02:42
Bug Bounty: Mastering SQL Injection Attacks on a Test Site
07:39
Bug Bounty: Exploiting FTP Misconfigurations for Deface Attacks
06:04
Bank Phishing Simulation: How I Stole My Own Login Credentials!
11:44
Bug Bounty: Bank Hacking (MITM, Cracking MD5, Bypass Admin Login, Session Hijacking & Money Theft)
09:15
Exploit Development: Buffer Overflow - Overwriting RIP
09:12
From Exploit to Defense: Mastering Local File Inclusion (LFI) Attacks
17:17
Cookie Session Hijacking: How Hackers Steal Your Sessions!
13:22
Exploit Development: Buffer Overflow - Arbitrary Code Execution | Kali Linux 2024
09:46
Malware Testing: FUD WinSpyV2 | Discord RAT