Jason Turley
Welcome to my educational YouTube channel, where we delve into the fascinating world of programming, cybersecurity and hacking!
Обзор PicoCTF 2025 Hash Only 2
PicoCTF 2025 Hash Only 1 запись
Утечка адресов с помощью строк форматирования | PicoCTF 2025 «Время пирогов 2»
Позиционно-независимый исполняемый обход | PicoCTF 2025 «Время пирога»
Ethernaut Foundry — монета Naught
Ethernaut Foundry — Повторный вход
Why You’ll Never Get Hired in Cybersecurity (Unless You Do This)
printf() memory leak and other buffer shenanigans
What is the volatile keyword in C?
Reverse Engineering a Linux Kernel Module Crackme Challenge
Microcorruption Embedded Security CTF - #4 Cusco
Microcorruption Embedded Security CTF - #3 Hanoi
Microcorruption Embedded Security CTF - #2 Sydney
Microcorruption Embedded Security CTF - #1 New Orleans
Ethernaut Foundry - Denial
Exploit writing in Python w/Pwntools | "i love birds" TJCTF 2025
Hidden data in Excel | "Guess Again" TJCTF 2025
Bypassing a web blacklist | "Loopy" TJCTF 2025
Trying to automate a CTF challenge | "Guess the Number" TJCTF 2025
Extracting Data from Various Files | "Deep Layers" TJCTF 2025
Ethernaut Foundry - King
How to QUICKLY format JSON in Vim!
Ethernaut Foundry - Vault
Ethernaut Foundry - Force
Ethernaut Foundry - Telephone
Ethernaut Foundry - Fallout
Ethernaut Foundry - Fallback
The BEST exploit development course I've ever taken
This Bug Stumps 90% of C Programmers
Beginner Buffer Overflow - Exploiting Dup Scout Enterprise 10.0.18