switch to basic browser
📂
📝
📟

🌲 / learning Testing - security The Complete Cybersecurity Bootcamp, 2nd Edition Lesson 25 Buffer Overflows

c File Name Size files dur q vq aq Vc Ac Fmt Res fps T Date
-001. Learning objectives en.srt732srtsrt2023-08-23 17:39:50
-001. Learning objectives.mp4381822638.916644784652125h264aacmov1280x72030mp42023-08-23 15:58:47
-002. 25.1 Understanding Buffer Overflows en.srt14485srtsrt2023-08-23 17:39:51
-002. 25.1 Understanding Buffer Overflows.mp423161627500.784762370236125h264aacmov1280x72030mp42023-08-23 15:58:50
-003. 25.2 Exploiting Buffer Overflows en.srt11704srtsrt2023-08-23 17:39:52
-003. 25.2 Exploiting Buffer Overflows.mp419121854391.000816391257125h264aacmov1280x72030mp42023-08-23 15:58:52
-004. 25.3 Overcoming Defenses for Buffer Overflow Vulnerabilities en.srt4831srtsrt2023-08-23 17:39:53
-004. 25.3 Overcoming Defenses for Buffer Overflow Vulnerabilities.mp45723525161.935986282149125h264aacmov1280x72030mp42023-08-23 15:58:52
-005. 25.4 Understanding Fuzzing en.srt6106srtsrt2023-08-23 17:39:54
-005. 25.4 Understanding Fuzzing.mp48072793205.798458313180125h264aacmov1280x72030mp42023-08-23 15:58:53
-006. 25.5 Creating a Fuzzing Strategy en.srt15864srtsrt2023-08-23 17:39:55
-006. 25.5 Creating a Fuzzing Strategy.mp420964861466.837188359225125h264aacmov1280x72030mp42023-08-23 15:58:55
-007. 25.6 Exploring Mutation-based, Generation-based, and Evolutionary Fuzzers en.srt10416srtsrt2023-08-23 17:39:55
-007. 25.6 Exploring Mutation-based, Generation-based, and Evolutionary Fuzzers.mp413545106320.597914337204125h264aacmov1280x72030mp42023-08-23 15:58:57
-008. 25.7 Surveying Tools to Find and Exploit Buffer Overflows en.srt16917srtsrt2023-08-23 17:39:56
-008. 25.7 Surveying Tools to Find and Exploit Buffer Overflows.mp425366987567.727891357224125h264aacmov1280x72030mp42023-08-23 15:58:59

control-panel

π
f69dc311a936 // 3.77 TiB free of 3.98 TiB