KacperSzurekEN
NGINX: misconfigurations examples
6:48
KacperSzurekEN
Kallithea - exploit git clone functionality
4:44
KacperSzurekEN
PHP PHAR - file_exists can be dangerous
4:14
KacperSzurekEN
SSH: How to login into multiple servers?
4:08
KacperSzurekEN
Spring Boot Actuator - security point of view
3:36
KacperSzurekEN
How to check account type using Burp Suite?
4:50
KacperSzurekEN
How to handle session expiration in BURP with macros?
2:55
KacperSzurekEN
[BURP] 12 tricks for Burp Repeater
4:16
KacperSzurekEN
XSS Polyglot
6:01
KacperSzurekEN
postMessage: exchange data between different domains
3:45
KacperSzurekEN
Cross-Site Websocket Hijacking
5:48
KacperSzurekEN
Don't use assert in PHP
9:03
KacperSzurekEN
Clickjacking: how to delete someone else's account?
4:42
KacperSzurekEN
Open redirection: can automatic redirection be harmful?
4:12
KacperSzurekEN
RFD: Reflected File Download
3:41
KacperSzurekEN
Excel: CSV Injection
3:00
KacperSzurekEN
Angular: XSS without HTML tags
3:43
KacperSzurekEN
Python: XSS using SVG file
3:42
KacperSzurekEN
PHP: escapeshellcmd vs escapeshellarg
3:16
KacperSzurekEN
Java: Random vs SecureRandom
3:22
KacperSzurekEN
YAML: code execution using !!python/object
2:46
KacperSzurekEN
Python SSTI: Attack Flask framework using Jinja2 template engine
3:20
KacperSzurekEN
PHP: Bypass filters using less-than sign
3:21
KacperSzurekEN
Unzip: how to properly extract files? Symlinks and zip
3:08
KacperSzurekEN
Java XXE: Read secret files when parsing XML files
3:05
KacperSzurekEN
Ruby: execute command using URL in open() function
2:58
KacperSzurekEN
Python 2: Why you shouldn’t use input function
2:41
KacperSzurekEN
Best Black Hat 2018 and DEF CON 26 presentations - summary #2
6:37
KacperSzurekEN
How to create a Metasploit module in example
7:06
KacperSzurekEN
4 common Node.js security issues inside NPM
11:46
KacperSzurekEN
Best Black Hat 2018 and DEF CON 26 presentations - summary
8:20
KacperSzurekEN
Steal messages from Signal using RCE, CVE-2018-10994 explanation
11:28
KacperSzurekEN
Race condition and git hooks vs Gitea server
8:56
KacperSzurekEN
How does Two-Factor Authentication - 2FA work?
14:04