Exploit

Security

MAJOR EXPLOIT: This GIF can Backdoor ANY Android Phone [Zero-Day]

In this video, Daniel Boctor takes a deep dive into the inner mechanics of a double free vulnerability within Android OS, allowing attackers to gain complete access to any Android mobile phone with an RCE (remote code execution). This vulnerability was exploited by creating a custom GIF file and sending it to a user in […]

Read More
Security

We Finally Know How Hackers Exploited Gmail

This video is from ThioJoe.

Read More
Security

DNS Remote Code Execution: Finding the Vulnerability 👾 (Part 1)

In this video, Flashback Team will tell you the story of how we found CVE-2020-10881 in the Pwn2Own Tokyo 2019 hacking competition and present our Game Plan for exploiting it.

Read More
AI Ethics

ChatGPT Exploits

Fireship explores a new ChatGPT exploit. A recent ChatGPT exploit known as DAN allowed users to get the AI to violate the ethics and guidelines set by OpenAI. The results are both hilarious and terrifying.

Read More
Privacy Windows

Does Windows have Back Doors?

Retired Microsoft engineer Davepl discusses “back doors” in Windows, the implications, and how the software developer protects against such attacks from rogues, hackers, and nation-states. Understand how back doors are like the Follina zero-day exploit in Office, giving complete control of the system to the attacker.

Read More
Java Security

Log4J & JNDI Exploit: Why So Bad? – Computerphile

By now, you have certainly heard of the Log4J exploit and that it’s been called the “most critical vulnerability of the last decade.” Dr Bagley and Dr Pound explain why it’s so pervasive.

Read More