Exploit عمومی
[search 0]
بیشتر
برنامه را دانلود کنید!
show episodes
 
Artwork

1
Les Exploités

Les Exploités

icon
Unsubscribe
icon
icon
Unsubscribe
icon
ماهیانه
 
À chaque vendredi de la semaine, Les Exploités regardent un film d'exploitation poche et vous en font la critique pour que vous n'ayez pas besoin de le faire. Au menu: du SEXE, de l'ACTION, du SUSPENCE et du marketing choc un peu trop évident.
  continue reading
 
Artwork

1
Exploit

Exploit Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
روزانه+
 
A show about hacking the system, hosted by Patrick Tomasso and Gabi Pirraglia. Patrick is a content creator and Gabi is digital strategist, together they pull apart the internet and social media to reveal the hidden creative formulas for success.
  continue reading
 
Artwork

1
Exploit Circus

Exploit Circus

icon
Unsubscribe
icon
icon
Unsubscribe
icon
هفتگی+
 
Join husband and wife team Ring Master Jay and the Dancing Monkey Cee, along with their Bouncing Clown Hosel and his Cabana Boy Dre - as we all deep dive into exploitation cinema, complain about basically everything in life, explore topics related to society and romance, and other titillating topics. This show discusses mature subject matter and is meant for a mature audience.
  continue reading
 
Artwork

1
Exploited Podcast

Exploited

icon
Unsubscribe
icon
icon
Unsubscribe
icon
ماهیانه
 
Shir Khan is the owner of in-vogue and on-point deep house label at the moment, the leviathan that is Exploited Records. Exploited Rec blazes its way through since 2007 with releases that simply cannot be brushed aside. 2012 has been the breakthrough year for Exploited, bringing them massive celebration and support from artists, the scene and a large audience. Still stated as one of the leading influences in Deep House & Indie Dance, Exploited is not set up to stop releasing tracks that blow ...
  continue reading
 
Artwork

1
Exploiting Nostalgia

FreezenFactor

icon
Unsubscribe
icon
icon
Unsubscribe
icon
ماهیانه
 
Brandon Friesen brings you (XNOS) Exploiting Nostalgia.. the Saturday morning variety show dedicated to rediscovering all the things we feel sentimental about. Enjoy multiple segments per episode covering childhood memories, classic videogames, music of yesteryear, movies, shows, toys and anything else that comes with that warm familiar feeling. New guests featured every week. Powered by FreezenFactor.
  continue reading
 
Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat
  continue reading
 
Artwork

1
Exploit Wars

Rubotic

icon
Unsubscribe
icon
icon
Unsubscribe
icon
ماهیانه
 
Exploit Wars es un podcast de cyberseguridad, pentesting y hacking ético, donde aprenderemos cultura hacker, como realizar hacks y cómo defendernos de ellos, y todo lo que necesitamos para poder disfrutar de una de las profesiones de mayor futuro que existen. Además, cada episodio recomendamos un otro podcast para que sigas aprendiendo. Recomendado tanto si empiezas como si ya eres experto. Este Podcast es la rama auditiva de la academia Rubotic.net
  continue reading
 
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
  continue reading
 
Artwork

1
Future of Roblox Exploits

Redzem Technologies

icon
Unsubscribe
icon
icon
Unsubscribe
icon
روزانه+
 
Welcome to ”Future of Roblox Exploits,” the podcast where we dive deep into the evolving world of Roblox, exploring the latest trends, hacks, and exploits that shape this dynamic gaming platform. Each episode, we bring you insights from industry experts, developers, and seasoned players to uncover the future of game modifications, security measures, and the ethical implications of exploiting within Roblox. Whether you’re a developer looking to safeguard your creations, a player curious about ...
  continue reading
 
Artwork

1
Exploitation Of Of A MOTHER, VETERAN, SECURITY OFFICER AND PARALEGAL WRONGFULLY CONVICTED &MURDER

Woman veteran*TORTURED SINCE TDCJ* TORTURE TECHNOLOGY IN SAN ANTONIO

icon
Unsubscribe
icon
icon
Unsubscribe
icon
ماهیانه
 
Corruption, Lies, Technology, Slander, Exploitation, and ERASED POST ON GOOGLE AND THIS GOVERNMENT FACILITY HAS TRIED TO SET UP THE WRONG VETERAN......WANT TO ASK WHY? This is what is done to take advantage of a wrongfully convicted victim Without an advocate In Texas San Antonio took it upon their self to set up murder with TDCJ of a veteran mother who never got a trial to claim homicide.....per family court attorney A Targeted Individual Since TDCJ My daughter has been exploited
  continue reading
 
Ce podcast inédit est une enquête menée dans les Bouches-du-Rhône sur les conditions de vie des travailleurs détachés sous contrat avec des sociétés d'intérim espagnoles. Mauvais traitements, chantage sexuel, menaces, violence: nous découvrons un système rôdé et une omerta qui rend tout témoignage précieux. Ceux qui s’y frottent, les journalistes, les agriculteurs, l'inspection du travail, deviennent eux-mêmes des cibles.
  continue reading
 
Artwork

1
Super-Exploitation and Resistance

José Luis Granados Ceja

icon
Unsubscribe
icon
icon
Unsubscribe
icon
ماهیانه
 
This podcast brings the voices of labour leaders, activists, organizers, and social movements to a North American audience. We share the perspectives of people on the frontlines of social struggle and change in Latin America and the Caribbean. We are powered by Common Frontiers and allies in the Canadian Labour Movement. Logo by: sagestudio.ca
  continue reading
 
Loading …
show series
 
A few microseconds. One silent browser session. That’s all it took for attackers to break into systems without tripping a single alert. In this episode of Hacked & Secured: Pentest Exploits & Mitigations, we explore two subtle but devastating flaws: 🔹 Timing Attacks for Token Leaks – By measuring microsecond delays, attackers were able to recover s…
  continue reading
 
One flawed password reset. One shared session token. One dangerous object. In Episode 11 of Hacked & Secured: Pentest Exploits & Mitigations, we break down three real-world vulnerabilities where trust between systems and users broke down—with serious consequences. Account Takeover via Forgot Password – A predictable ID and exposed tokens let attack…
  continue reading
 
One cookie set on a subdomain triggered XSS and stole session tokens. One fake image upload gave the attacker a reverse shell. This episode breaks down two powerful exploits—a cookie-based XSS that bypassed frontend protections, and an RCE through Ghostscript triggered by a disguised PostScript file. Learn how subtle misconfigurations turned everyd…
  continue reading
 
Exploit Circus Presents: Comedic Puppets, AI Fears, and Twisted Muppets Join the Exploit Circus for an evening of entertainment meant for a mature audience. The hosts introduce their latest recommendations, including the hilarious Australian puppet comedian Randy Feltface, and explore his creative specials on YouTube. Dive into the bizarre world of…
  continue reading
 
Exploring Unequal Attractions: Analyzing Emmanuelle in Africa In this episode, the hosts review the 1976 film 'Emmanuelle in Africa,' diving deep into its plot and themes. The film, featuring Laura Gemser as Emmanuelle, is a mix of soft-core eroticism and complex interactions between characters, set against the backdrop of Kenya. The hosts discuss …
  continue reading
 
Exploit Circus: Analyzing 'Emmanuel in Africa' This episode of Exploit Circus takes listeners on a deep dive into the erotic film 'Emmanuel in Africa.' The hosts navigate through the movie's intricate details, discussing the storyline, characters, and notable scenes, including the provocative performances and unique settings. The conversation provi…
  continue reading
 
Exploit Circus: Diving into the World of Black Emmanuel In this episode of the Exploit Circus podcast, the hosts introduce their show with a theatrical and humorous flair, discussing the 1970s film 'Black Emmanuel.' The team—which includes Cabana Boy,Hosel the Clown, Ringmaster Jay, and the Dancing Monkey Cee—talks about the theme, plot, and produc…
  continue reading
 
The Hilariously Infamous Troll 2 Review In this episode, the hosts dive into the hilariously infamous cult classic 'Troll 2,' a 1990 movie notorious for its bizarre plot, poor acting, and incoherent storylines. The conversation covers the wacky narrative of a family swapping homes with another in a town called Nilbog, only to discover the residents…
  continue reading
 
The Exploit Circus: Navigating the Health System In this episode of The Exploit Circus, the hosts dive into the intricacies and frustrations of dealing with the health system. They share personal anecdotes about their struggles with doctors who dismiss patient concerns and the importance of patient-doctor communication. The discussion highlights is…
  continue reading
 
The Exploit Circus: Navigating the Health System In this episode of The Exploit Circus, the hosts dive into the intricacies and frustrations of dealing with the health system. They share personal anecdotes about their struggles with doctors who dismiss patient concerns and the importance of patient-doctor communication. The discussion highlights is…
  continue reading
 
Exploring the Best Worst Movie: A Trailer for the upcoming review of 'Troll 2' In this episode, we preview the upcoming episode where and embark on a humorous and critical journey through the cult classic 'Troll 2'. The script opens with a whimsical and cautionary introduction, setting the tone for an adult-themed analysis. The hosts delve into the…
  continue reading
 
The Exploit Circus Podcast: Wild Nights and Unexpected Tales In this episode of The Exploit Circus Podcast, the hosts Ring Master Jay and the Dancing Monkey Cee, along with their Bouncy Clown Hosel delve into an adult-themed discussion filled with humor and unexpected stories. They introduce a new co-host Cabana Boy Dre and share personal anecdotes…
  continue reading
 
Fern, Yobo, Bobby, and Mike discuss a real enigma of a movie. When a chealeader goes undercover to find the drug dealer's who sold the drugs that led to her brother's overdose, she uncovers a mysterious criminal organization that runs deeper than she imaged. Featuring karate, fencing, Carl Reiner pool parties, rich kids who can't get their music ca…
  continue reading
 
In this episode of The Exploit Circus podcast, hosts Jay, C, and Hosel deliver an in-depth review of the 1997 autobiographical film 'Private Parts,' based on the life of shock jock Howard Stern. The discussion begins with a whimsical circus-themed introduction and transitions into a breakdown of Stern's career, controversial persona, and the film's…
  continue reading
 
One markdown link copied server files. One poisoned log triggered remote code execution. One LFI crashed the entire server. In this episode, we unpack three real-world exploits—directory traversal and local file inclusion flaws that went far beyond file reads. From silent data leaks to full server compromise, these attacks all started with a single…
  continue reading
 
Matt Anderson, that guy Greg, Bobby, and Mike discuss the Ron Howard directorial debut for Roger Corman, 1977's Grand Theft Auto! When a wealthy girl decides to steal her car and elope with Opie in Las Vegas, her jealous ex, with the help of a local radio station DJ (The Real Don Steele), offer a cash reward to see who can catch them. Featuring lot…
  continue reading
 
Cosmic Circus of Exploitation: A Journey Through 'Nightmare Sisters' and 80s Horror Nostalgia In this episode of the Exploit Circus podcast, Ring Master Jay and Dancing Monkey Cee, along with their special guest Hosel the Clown, dive into the 1987 cult classic 'Nightmare Sisters.' The hosts provide a detailed analysis of the film, discussing its un…
  continue reading
 
The Glickencrew (Wick, Chef Robby, Bobby, and Mike) return to discuss another James Glickenhaus flick. Grindbin all star for: Shakedown, McBain, The Exterminator, the expectations are sky high for this Ken Wahl classic. Featuring one of the longest Grindbin rants in history.
  continue reading
 
Exploit Circus: Yokai Conundrum and Human Connection In this week's episode of the Exploit Circus, hosts Jay and Cee dive into a detailed review of the Japanese film 'My Sister is Unusual.' They discuss the movie's complex plot about a girl, Mitsuki, possessed by a spirit named Hiyori who needs to have sex with Mitsuki's brother to ascend to heaven…
  continue reading
 
The Innocence of Exploitation: A Review of 'Picture of Beauty (2017)' In this episode, hosts Jay and Cee dissect the movie 'Picture of Beauty (2017),' a seemingly innocent exploitation film filled with nudity and sexual content. They discuss the peculiar mix of drama, comedy, and straightforward storytelling that makes the film seem almost kind in …
  continue reading
 
Exploring the Absurdity of 'Dick Shark' and Sexual Enhancements This was originally episode 1 but due to technical issues was thought to be lost and we were able to recover it. Enjoy! In this episode, titled 'Exploring the Absurdity of 'Dick Shark' and Sexual Enhancements,' hosts Jay and Cee welcome listeners to the 'Exploit Circus' podcast, where …
  continue reading
 
Exploit Circus Podcast: Introduction & Horror Movies In this introductory episode of the Exploit Circus Podcast, hosts Jay (Ringmaster Jay) and Cee (Dancing Monkey Cee) welcome listeners to their show, where they will discuss and review highly provocative and violent horror movies each week. Jay shares his early experiences with exploitation cinema…
  continue reading
 
A broken logout flow let attackers hijack accounts using just a user ID. A self-XSS and an IDOR exposed stored data. And a forgotten internal tool—running outdated software—ended in full Remote Code Execution. This episode is all about how small bugs, missed checks, and overlooked services can lead to serious consequences. Chapters: 00:00 - INTRO 0…
  continue reading
 
A predictable ID exposed private documents. A crafted name leaked backend files. In this episode, we break down two high-impact flaws—an IDOR that let attackers clone confidential attachments, and an SSTI hidden in an email template that revealed server-side files. Simple inputs, big consequences. Learn how they worked, why they were missed, and ho…
  continue reading
 
# Title * HN59 - Microsoft AI Discovers 20 Zero-Day Vulnerabilities in Bootloaders! ## Description 🔍 Microsoft’s AI Uncovers 20 Zero-Day Threats | CoffeeLoader Malware Gets Smarter In this episode of Exploit Brokers, Cipherceval dives into how Microsoft Security Copilot, powered by AI, discovered over 20 previously unknown vulnerabilities in popula…
  continue reading
 
A single uppercase letter unlocked an admin panel. One malformed request hijacked user sessions. In this episode, we break down two real-world exploits—a 403 bypass and a request smuggling attack—that turned small oversights into full system compromise. Learn how they worked, why they were missed, and what should have been done differently. Chapter…
  continue reading
 
A simple filename triggered stored XSS, hijacking accounts and stealing API keys. A SQL injection bypassed a web firewall, dumping an entire database in one request. Both attacks exploited basic security flaws—flaws that should have been caught. Learn how these exploits worked, why they were missed, and what should have been done differently. Chapt…
  continue reading
 
Welcome to Exploit Brokers with your host Cipherceval! In this deep dive, we uncover a sophisticated cyber assault where hackers exploited Microsoft SharePoint to launch the Havoc C2 via a stealthy click fix attack. Learn how a single click can trigger malicious PowerShell commands, turning everyday corporate tools into gateways for cybercrime. In …
  continue reading
 
Yobo, Chris in Miami, Bobby, and Mike discuss a movie that covers the ONLY ritual murder ever committed in New Orleans since the 1800s. With restaurants that serve breakfast, lunch, or dinner for the same meal, cops who go deep under the covers, and theatrical musical murder productions; this movie has it all!…
  continue reading
 
Exposed secrets, overlooked permissions, and credentials hiding in plain sight—each one leading to a critical breach. In this episode, we break down three real-world pentest findings where a forgotten file, a misconfigured setting, and a leaked credential gave attackers full control. How did they happen? How can you find similar issues? And what ca…
  continue reading
 
In this episode of Exploit Brokers, we dive into the dark world of cybercrime, exploring two alarming topics: a malicious Android loan app masquerading as a financial tool and Xerox printer vulnerabilities that could be leaking your credentials. Learn how loan sharks have moved from traditional methods to sophisticated digital predation, exploiting…
  continue reading
 
Yobo, other Tim and Brady join Bobby and Mike as the month of Yobo continues with the 1980's TV movie "classic" about a young Scott Baio with a drinking problem and his friend who wets the bed but might make it to the Olympics one day. Or is this the movie about Scott Baio getting drunk and hitting his brother off a row boat with an oar? Either way…
  continue reading
 
How can attackers take over accounts, networks, and devices—without credentials? In this episode, we break down three real-world security flaws that prove authentication alone isn’t enough: Account Takeover – A single request bypassed email verification, locking out store owners. Internal Network Compromise – A hidden admin URL and hardcoded access…
  continue reading
 
In today’s episode of Exploit Brokers, we dive deep into two major security threats making waves across the digital world. A critical Remote Code Execution (RCE) vulnerability in Microsoft Outlook is putting millions of users at risk, with hackers exploiting it through spear phishing emails and malicious links. Not only that, but we’re also uncover…
  continue reading
 
Welcome back to Exploit Brokers! In today’s video, we dive deep into a critical 7‑Zip vulnerability that’s being exploited by Russian cybercriminals to bypass Windows’ security protections. If you’ve used 7‑Zip at all, you need to know how this flaw can let hackers sneak past the Mark-of-the-Web (MOTW) and deploy dangerous malware like Smoke Loader…
  continue reading
 
What if you could take over an account—not by cracking a password, but by chaining two overlooked vulnerabilities? What if a single CSRF exploit let attackers reset security questions and hijack accounts? And what if manipulating an authorization token could escalate privileges? In this episode of Hacked & Secured: Pentest Exploits & Mitigations, w…
  continue reading
 
What if your OTP security wasn’t secure at all? What if a static domain—something most people ignore—could lead to full account takeover? And what if flawed role management allowed admins to escalate privileges? In this episode of Hacked & Secured: Pentest Exploits & Mitigations, we break down three real-world security failures that turned minor ov…
  continue reading
 
Lazarus Group’s Secret Admin Layer EXPOSED – Major Cybersecurity Discovery! 🔥💻 Security researchers have uncovered a hidden admin layer used by North Korea’s Lazarus Group to manage their Command and Control (C2) servers. This sophisticated network of VPNs and proxies allows them to execute cyberattacks worldwide—mainly targeting cryptocurrency dev…
  continue reading
 
Loading …

راهنمای مرجع سریع

در حین کاوش به این نمایش گوش دهید
پخش