TOTALLY AWESOME. can’t wait for literally most of your Future Topics.🔥💯
@sike59438 ай бұрын
yayy from writeups to lectures, so cool man, much appreciated.
@goonman12558 ай бұрын
great video, looking forward to the rest of the topics
@Starckoo8 ай бұрын
Great video! Looking forward to the next one :)
@markuche13378 ай бұрын
Wow can't wait for the next series 😄
@tlocto8 ай бұрын
very cool, looking forward to more.
@plasma288 ай бұрын
Nicely explained! Upcoming topics look really cool. Much appreciated
@awwliveyet8 ай бұрын
bro bro bro bro ❤🔥🔥, this will surely enhance my reversing skills
@SloppyJoePirates8 ай бұрын
A fellow pirate! Haha thanks, glad you like it
@abhinavbansal93968 ай бұрын
Waiting for more videos 🔥🔥
@TalsonHacks8 ай бұрын
You make topics easier to wrap your head around. So excited to see your Browser Exploitation one in the future.
@SloppyJoePirates8 ай бұрын
Is there's a browser exploitation one you're particularly interested in? CSP WebRTC bypass comes out monday. Or more of the binary exploitation of browsers?
@TalsonHacks8 ай бұрын
@@SloppyJoePirates Binary Exploitation for the browsers would be good!
@madhav6ram8 ай бұрын
this is very cool!
@danielfoudeh59158 ай бұрын
Looking forward to the upcoming ones!!!
@SloppyJoePirates8 ай бұрын
It turns out there was a SECCOMP flag checker challenge! From one of my favorite CTFs too! IrisCTF 2023 rev/securecomputing by Seraphin github.com/IrisSec/IrisCTF-2024-Challenges/tree/main/securecomputing-rev Seraphin also wrote an amazing article on the subject: seraphin.xyz/articles/seccomp.html