6:08 How to use Frida to overload android application methods and steal juicy data buztheflash 1.1K views - 6 years ago
3:57 How to use Drozer to exfiltrate juicy data by exploiting a vulnerability in an application buztheflash 169 views - 6 years ago
4:56 How to use java debugger to steal juicy data in an android application buztheflash 83 views - 6 years ago
2:32 How to intercept and change on the fly the data sent to an android application? buztheflash 20 views - 6 years ago
11:59 Blind SQL Injection with Damn Vulnerable Web App (medium security level) buztheflash 5.5K views - 13 years ago
4:48 Metasploit with Microsoft SQL Server and SMB exploits (Part 2/2) buztheflash 3.7K views - 13 years ago
6:24 Use Backtrack 5 on Live CD (or USB key) to gain access to Windows 7 with admin rights buztheflash 40.1K views - 14 years ago
4:53 Social Engineering Toolkit and John The Ripper working hand in hand in Backtrack 5 buztheflash 8.6K views - 14 years ago
3:24 Social Engineering Toolkit and Ettercap in Backtrack 5 (by http://prox-ia.blogspot.com) buztheflash 7.8K views - 14 years ago
4:54 Save you USB data with Gemalto YuuWaa by http://prox-ia.blogspot.com buztheflash 345 views - 16 years ago
8:42 Solution to MITM attacks from Microsoft (by http://prox-ia.blogspot.com) buztheflash 237 views - 16 years ago