XSS like you've never seen.
PwnFunction
XSS like you've never seen.
13:28
Innocent Looking Backdoor Found in Universities and Government Systems
PwnFunction
Innocent Looking Backdoor Found in Universities and Government Systems
9:16
2 Bytes Was Enough To Breach The US Treasury
PwnFunction
2 Bytes Was Enough To Breach The US Treasury
8:31
How To Predict Random Numbers Generated By Computers
PwnFunction
How To Predict Random Numbers Generated By Computers
13:54
Dangerous Code Hidden in Plain Sight for 12 years!
PwnFunction
Dangerous Code Hidden in Plain Sight for 12 years!
18:00
How One NPM Package Silently Owns Your Entire Codebase
PwnFunction
How One NPM Package Silently Owns Your Entire Codebase
19:27
Don't make random HTTP requests.
PwnFunction
Don't make random HTTP requests.
14:02
This Website has No Code, or Does it?
PwnFunction
This Website has No Code, or Does it?
10:08
Why you should Close Your Files | bin 0x02
PwnFunction
Why you should Close Your Files | bin 0x02
8:11
How some functions can be Dangerous | bin 0x01
PwnFunction
How some functions can be Dangerous | bin 0x01
15:20
What are Executables? | bin 0x00
PwnFunction
What are Executables? | bin 0x00
8:35
Insecure Deserialization Attack Explained
PwnFunction
Insecure Deserialization Attack Explained
8:52
PwnFunction Live Stream
PwnFunction
PwnFunction Live Stream
Server-Side Template Injections Explained
PwnFunction
Server-Side Template Injections Explained
9:54
Cross-Site Scripting (XSS) Explained
PwnFunction
Cross-Site Scripting (XSS) Explained
11:27
Solving a Hard Google CTF challenge - "Paste-tastic!"
PwnFunction
Solving a Hard Google CTF challenge - "Paste-tastic!"
26:26
XXE Challenge - Google CTF
PwnFunction
XXE Challenge - Google CTF
10:07
Cross-Site Request Forgery (CSRF) Explained
PwnFunction
Cross-Site Request Forgery (CSRF) Explained
14:11
XML External Entities (XXE) Explained
PwnFunction
XML External Entities (XXE) Explained
20:11
Insecure Direct Object Reference (IDOR) Explained
PwnFunction
Insecure Direct Object Reference (IDOR) Explained
8:14
Hacking Electron Applications
PwnFunction
Hacking Electron Applications
11:43
HTTP Parameter Pollution Explained
PwnFunction
HTTP Parameter Pollution Explained
11:08
Open Redirect Vulnerability Explained
PwnFunction
Open Redirect Vulnerability Explained
8:34