Join your hosts Mike and Bobby as they delve into the world of grindhouse and exploitation films from the 1970's, 1980's and beyond. The movies they discuss range from the funny to the downright bizarre but they are always fascinating and often forgotten gems.
…
continue reading
El mejor podcast de videojuegos. Una plática entre amigos sobre la cultura geek, videojuegos animes, peliculas y caricaturas.
…
continue reading
À chaque vendredi de la semaine, Les Exploités regardent un film d'exploitation poche et vous en font la critique pour que vous n'ayez pas besoin de le faire. Au menu: du SEXE, de l'ACTION, du SUSPENCE et du marketing choc un peu trop évident.
…
continue reading
A show about hacking the system, hosted by Patrick Tomasso and Gabi Pirraglia. Patrick is a content creator and Gabi is digital strategist, together they pull apart the internet and social media to reveal the hidden creative formulas for success.
…
continue reading
Join husband and wife team Ring Master Jay and the Dancing Monkey Cee, along with their Bouncing Clown Hosel and his Cabana Boy Dre - as we all deep dive into exploitation cinema, complain about basically everything in life, explore topics related to society and romance, and other titillating topics. This show discusses mature subject matter and is meant for a mature audience.
…
continue reading
Shir Khan is the owner of in-vogue and on-point deep house label at the moment, the leviathan that is Exploited Records. Exploited Rec blazes its way through since 2007 with releases that simply cannot be brushed aside. 2012 has been the breakthrough year for Exploited, bringing them massive celebration and support from artists, the scene and a large audience. Still stated as one of the leading influences in Deep House & Indie Dance, Exploited is not set up to stop releasing tracks that blow ...
…
continue reading
Brandon Friesen brings you (XNOS) Exploiting Nostalgia.. the Saturday morning variety show dedicated to rediscovering all the things we feel sentimental about. Enjoy multiple segments per episode covering childhood memories, classic videogames, music of yesteryear, movies, shows, toys and anything else that comes with that warm familiar feeling. New guests featured every week. Powered by FreezenFactor.
…
continue reading
Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat
…
continue reading
We will investigate America’s identity based off human exploitation for labor.
…
continue reading
Exploit Wars es un podcast de cyberseguridad, pentesting y hacking ético, donde aprenderemos cultura hacker, como realizar hacks y cómo defendernos de ellos, y todo lo que necesitamos para poder disfrutar de una de las profesiones de mayor futuro que existen. Además, cada episodio recomendamos un otro podcast para que sigas aprendiendo. Recomendado tanto si empiezas como si ya eres experto. Este Podcast es la rama auditiva de la academia Rubotic.net
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
Welcome to ”Future of Roblox Exploits,” the podcast where we dive deep into the evolving world of Roblox, exploring the latest trends, hacks, and exploits that shape this dynamic gaming platform. Each episode, we bring you insights from industry experts, developers, and seasoned players to uncover the future of game modifications, security measures, and the ethical implications of exploiting within Roblox. Whether you’re a developer looking to safeguard your creations, a player curious about ...
…
continue reading

1
Exploitation Of Of A MOTHER, VETERAN, SECURITY OFFICER AND PARALEGAL WRONGFULLY CONVICTED &MURDER
Woman veteran*TORTURED SINCE TDCJ* TORTURE TECHNOLOGY IN SAN ANTONIO
Corruption, Lies, Technology, Slander, Exploitation, and ERASED POST ON GOOGLE AND THIS GOVERNMENT FACILITY HAS TRIED TO SET UP THE WRONG VETERAN......WANT TO ASK WHY? This is what is done to take advantage of a wrongfully convicted victim Without an advocate In Texas San Antonio took it upon their self to set up murder with TDCJ of a veteran mother who never got a trial to claim homicide.....per family court attorney A Targeted Individual Since TDCJ My daughter has been exploited
…
continue reading
Ce podcast inédit est une enquête menée dans les Bouches-du-Rhône sur les conditions de vie des travailleurs détachés sous contrat avec des sociétés d'intérim espagnoles. Mauvais traitements, chantage sexuel, menaces, violence: nous découvrons un système rôdé et une omerta qui rend tout témoignage précieux. Ceux qui s’y frottent, les journalistes, les agriculteurs, l'inspection du travail, deviennent eux-mêmes des cibles.
…
continue reading
This podcast brings the voices of labour leaders, activists, organizers, and social movements to a North American audience. We share the perspectives of people on the frontlines of social struggle and change in Latin America and the Caribbean. We are powered by Common Frontiers and allies in the Canadian Labour Movement. Logo by: sagestudio.ca
…
continue reading

1
"Should Inuit and the FNMI cooperate with modern industrialized society to exploit the natural resources of their land such as oil and gas".Based on the book "The Right To Be Cold" By: Sheila Watt Cloutier ...
COLIN WILLIAMS
Welcome to the Colin Williams podcast, where amazing things happen. Cover art photo provided by Chris Marquardt on Unsplash: https://unsplash.com/@chrismarquardt
…
continue reading

1
419 - King Kong Escapes (1967) - Summer Sequel Month 2025
2:18:46
2:18:46
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
2:18:46The Kaiju Krew is back to discuss the "sequel" to King Kong about... mining?
…
continue reading
A few microseconds. One silent browser session. That’s all it took for attackers to break into systems without tripping a single alert. In this episode of Hacked & Secured: Pentest Exploits & Mitigations, we explore two subtle but devastating flaws: 🔹 Timing Attacks for Token Leaks – By measuring microsecond delays, attackers were able to recover s…
…
continue reading

1
418 - Deathstalker II (1987) - Summer Sequel Month 2025
2:35:31
2:35:31
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
2:35:31Yobo, Terry, Bobby, and Mike continue Summer Sequel Month 2025 with the winner of the Patreon Poll!
…
continue reading

1
417 - Friday the 13th V: A New Beginning (1985) - Summer Sequel Month 2025
3:50:04
3:50:04
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
3:50:04Summer sequel month 2025 starts with a bang as Chuck, Matt, Bobby, and Mike talk about an infamous entry in the Friday the 13th series.
…
continue reading

1
416 - Beach Party (1963)
3:07:46
3:07:46
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
3:07:46The Beach Party Crew is back for "not yet" Summer Sequel Month where we discuss the origins of the Beach. Will we learn new information that fills in all the mysterious blanks from the sequels? Probably not.
…
continue reading
One flawed password reset. One shared session token. One dangerous object. In Episode 11 of Hacked & Secured: Pentest Exploits & Mitigations, we break down three real-world vulnerabilities where trust between systems and users broke down—with serious consequences. Account Takeover via Forgot Password – A predictable ID and exposed tokens let attack…
…
continue reading

1
415 - The Mafu Cage (1978)
2:37:56
2:37:56
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
2:37:56Chuck, Bobby, and Mike discuss a strange film about two sisters who REALLY love eachother and the animals they decide to keep in a giant cage in their home.
…
continue reading
One cookie set on a subdomain triggered XSS and stole session tokens. One fake image upload gave the attacker a reverse shell. This episode breaks down two powerful exploits—a cookie-based XSS that bypassed frontend protections, and an RCE through Ghostscript triggered by a disguised PostScript file. Learn how subtle misconfigurations turned everyd…
…
continue reading

1
414 - Mistress of the Apes (1979)
2:16:20
2:16:20
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
2:16:20Steve and Izzy (EILFM) join us to talk about a classic ape film about drug deals gone wrong, breast feeding, and ape encounters of the sexual kind.
…
continue reading

1
Exploit Circus - Episode 15 - Week of June 9, 2025 - Parting Gifts - Comedic Puppets, AI Fears, and Twisted Muppets
16:49
Exploit Circus Presents: Comedic Puppets, AI Fears, and Twisted Muppets Join the Exploit Circus for an evening of entertainment meant for a mature audience. The hosts introduce their latest recommendations, including the hilarious Australian puppet comedian Randy Feltface, and explore his creative specials on YouTube. Dive into the bizarre world of…
…
continue reading

1
Exploit Circus - Episode 14 - Week of June 9, 2025 - Main Attraction - Black Emanuelle (1975) - Part Two
1:17:49
1:17:49
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
1:17:49Exploring Unequal Attractions: Analyzing Emmanuelle in Africa In this episode, the hosts review the 1976 film 'Emmanuelle in Africa,' diving deep into its plot and themes. The film, featuring Laura Gemser as Emmanuelle, is a mix of soft-core eroticism and complex interactions between characters, set against the backdrop of Kenya. The hosts discuss …
…
continue reading

1
Exploit Circus - Episode 13 - Week of June 9, 2025 - Main Attraction - Black Emanuelle (1975) - Part One
1:19:06
1:19:06
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
1:19:06Exploit Circus: Analyzing 'Emmanuel in Africa' This episode of Exploit Circus takes listeners on a deep dive into the erotic film 'Emmanuel in Africa.' The hosts navigate through the movie's intricate details, discussing the storyline, characters, and notable scenes, including the provocative performances and unique settings. The conversation provi…
…
continue reading

1
413 - Karate Raider (1995)
3:27:15
3:27:15
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
3:27:15Matt, Wick, Bobby, and Mike discuss a movie Matt Anderson has tried to get on the bin for over a year... was it worth the wait? Featuring Joe Estevez, Ron Marchini (Death Machines), and Burt Ward!
…
continue reading
Exploit Circus: Diving into the World of Black Emmanuel In this episode of the Exploit Circus podcast, the hosts introduce their show with a theatrical and humorous flair, discussing the 1970s film 'Black Emmanuel.' The team—which includes Cabana Boy,Hosel the Clown, Ringmaster Jay, and the Dancing Monkey Cee—talks about the theme, plot, and produc…
…
continue reading

1
Exploit Circus - Episode 11 - Week of June 4, 2025 - Main Attraction - Troll 2 (1990)
1:54:22
1:54:22
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
1:54:22The Hilariously Infamous Troll 2 Review In this episode, the hosts dive into the hilariously infamous cult classic 'Troll 2,' a 1990 movie notorious for its bizarre plot, poor acting, and incoherent storylines. The conversation covers the wacky narrative of a family swapping homes with another in a town called Nilbog, only to discover the residents…
…
continue reading

1
Exploit Circus - Episode 10 - Week of June 4, 2025 - Cee's Corner - Navigating the Health System
21:54
The Exploit Circus: Navigating the Health System In this episode of The Exploit Circus, the hosts dive into the intricacies and frustrations of dealing with the health system. They share personal anecdotes about their struggles with doctors who dismiss patient concerns and the importance of patient-doctor communication. The discussion highlights is…
…
continue reading

1
Exploit Circus - Episode 9 - Week of June 4, 2025 - B*tch of the Week - Society's Warning Labels
37:10
The Exploit Circus: Navigating the Health System In this episode of The Exploit Circus, the hosts dive into the intricacies and frustrations of dealing with the health system. They share personal anecdotes about their struggles with doctors who dismiss patient concerns and the importance of patient-doctor communication. The discussion highlights is…
…
continue reading
Exploring the Best Worst Movie: A Trailer for the upcoming review of 'Troll 2' In this episode, we preview the upcoming episode where and embark on a humorous and critical journey through the cult classic 'Troll 2'. The script opens with a whimsical and cautionary introduction, setting the tone for an adult-themed analysis. The hosts delve into the…
…
continue reading
The Exploit Circus Podcast: Wild Nights and Unexpected Tales In this episode of The Exploit Circus Podcast, the hosts Ring Master Jay and the Dancing Monkey Cee, along with their Bouncy Clown Hosel delve into an adult-themed discussion filled with humor and unexpected stories. They introduce a new co-host Cabana Boy Dre and share personal anecdotes…
…
continue reading

1
412 - Lovely But Deadly (1981)
3:32:19
3:32:19
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
3:32:19Fern, Yobo, Bobby, and Mike discuss a real enigma of a movie. When a chealeader goes undercover to find the drug dealer's who sold the drugs that led to her brother's overdose, she uncovers a mysterious criminal organization that runs deeper than she imaged. Featuring karate, fencing, Carl Reiner pool parties, rich kids who can't get their music ca…
…
continue reading

1
Exploit Circus - Episode 6 - A Deep Dive into Howard Stern’s Private Parts - Private Parts (1997)
4:14:48
4:14:48
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
4:14:48In this episode of The Exploit Circus podcast, hosts Jay, C, and Hosel deliver an in-depth review of the 1997 autobiographical film 'Private Parts,' based on the life of shock jock Howard Stern. The discussion begins with a whimsical circus-themed introduction and transitions into a breakdown of Stern's career, controversial persona, and the film's…
…
continue reading
One markdown link copied server files. One poisoned log triggered remote code execution. One LFI crashed the entire server. In this episode, we unpack three real-world exploits—directory traversal and local file inclusion flaws that went far beyond file reads. From silent data leaks to full server compromise, these attacks all started with a single…
…
continue reading

1
411 - Grand Theft Auto (1977)
2:55:08
2:55:08
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
2:55:08Matt Anderson, that guy Greg, Bobby, and Mike discuss the Ron Howard directorial debut for Roger Corman, 1977's Grand Theft Auto! When a wealthy girl decides to steal her car and elope with Opie in Las Vegas, her jealous ex, with the help of a local radio station DJ (The Real Don Steele), offer a cash reward to see who can catch them. Featuring lot…
…
continue reading

1
Exploit Circus - Episode 5 - Cosmic Circus of Exploitation - Nightmare Sisters (1987)
3:18:02
3:18:02
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
3:18:02Cosmic Circus of Exploitation: A Journey Through 'Nightmare Sisters' and 80s Horror Nostalgia In this episode of the Exploit Circus podcast, Ring Master Jay and Dancing Monkey Cee, along with their special guest Hosel the Clown, dive into the 1987 cult classic 'Nightmare Sisters.' The hosts provide a detailed analysis of the film, discussing its un…
…
continue reading

1
410 - The Solider (1982)
2:27:01
2:27:01
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
2:27:01The Glickencrew (Wick, Chef Robby, Bobby, and Mike) return to discuss another James Glickenhaus flick. Grindbin all star for: Shakedown, McBain, The Exterminator, the expectations are sky high for this Ken Wahl classic. Featuring one of the longest Grindbin rants in history.
…
continue reading

1
Exploit Circus - Episode 4 - Yokai Conundrum and Human Connection - Recently, My Sister Is Unusual (2014)
3:35:04
3:35:04
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
3:35:04Exploit Circus: Yokai Conundrum and Human Connection In this week's episode of the Exploit Circus, hosts Jay and Cee dive into a detailed review of the Japanese film 'My Sister is Unusual.' They discuss the movie's complex plot about a girl, Mitsuki, possessed by a spirit named Hiyori who needs to have sex with Mitsuki's brother to ascend to heaven…
…
continue reading

1
MINI BIN: Human Fly Part 2
1:04:46
1:04:46
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
1:04:46The bin will return next week with a brand new episode. In the meantime, check out the second part of the Human Fly saga from the Patreon mini bin
…
continue reading

1
Exploit Circus - Episode 3 - The Innocence of Exploitation - Picture of Beauty (2017) - Part 2
1:35:05
1:35:05
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
1:35:05The Innocence of Exploitation: A Review of 'Picture of Beauty (2017)' In this episode, hosts Jay and Cee dissect the movie 'Picture of Beauty (2017),' a seemingly innocent exploitation film filled with nudity and sexual content. They discuss the peculiar mix of drama, comedy, and straightforward storytelling that makes the film seem almost kind in …
…
continue reading

1
Exploit Circus - Episode 2 - Exploring the Absurdity of 'Dick Shark' and Sexual Enhancements - Dick Shark (2016)
1:41:37
1:41:37
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
1:41:37Exploring the Absurdity of 'Dick Shark' and Sexual Enhancements This was originally episode 1 but due to technical issues was thought to be lost and we were able to recover it. Enjoy! In this episode, titled 'Exploring the Absurdity of 'Dick Shark' and Sexual Enhancements,' hosts Jay and Cee welcome listeners to the 'Exploit Circus' podcast, where …
…
continue reading

1
Exploit Circus - Episode 1 - The Innocence of Exploitation - Picture of Beauty (2017) - Part 1
1:22:35
1:22:35
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
1:22:35Exploit Circus Podcast: Introduction & Horror Movies In this introductory episode of the Exploit Circus Podcast, hosts Jay (Ringmaster Jay) and Cee (Dancing Monkey Cee) welcome listeners to their show, where they will discuss and review highly provocative and violent horror movies each week. Jay shares his early experiences with exploitation cinema…
…
continue reading
A broken logout flow let attackers hijack accounts using just a user ID. A self-XSS and an IDOR exposed stored data. And a forgotten internal tool—running outdated software—ended in full Remote Code Execution. This episode is all about how small bugs, missed checks, and overlooked services can lead to serious consequences. Chapters: 00:00 - INTRO 0…
…
continue reading

1
409 - Sting of Death (1966)
1:46:06
1:46:06
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
1:46:06The Grindbin finally returns as Bobby, Tim, Fern, and Mike discuss a horror movie about... jellyfish?
…
continue reading
A predictable ID exposed private documents. A crafted name leaked backend files. In this episode, we break down two high-impact flaws—an IDOR that let attackers clone confidential attachments, and an SSTI hidden in an email template that revealed server-side files. Simple inputs, big consequences. Learn how they worked, why they were missed, and ho…
…
continue reading
# Title * HN59 - Microsoft AI Discovers 20 Zero-Day Vulnerabilities in Bootloaders! ## Description 🔍 Microsoft’s AI Uncovers 20 Zero-Day Threats | CoffeeLoader Malware Gets Smarter In this episode of Exploit Brokers, Cipherceval dives into how Microsoft Security Copilot, powered by AI, discovered over 20 previously unknown vulnerabilities in popula…
…
continue reading

1
408 - They Call Me Macho Woman! (1989)
3:25:17
3:25:17
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
3:25:17Matt, Julie, Bobby, and Mike discuss the hidden gem, They Call Me Macho Woman! Don't let the Troma title screen scare you away, Macho Woman is everything you hope for in a bin movie.
…
continue reading
A single uppercase letter unlocked an admin panel. One malformed request hijacked user sessions. In this episode, we break down two real-world exploits—a 403 bypass and a request smuggling attack—that turned small oversights into full system compromise. Learn how they worked, why they were missed, and what should have been done differently. Chapter…
…
continue reading

1
407 - The Warriors (1979)
3:26:13
3:26:13
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
3:26:13Vaughn, Yobo, Bobby, and Mike close the month (quarter) of Yobo with the legendary Walter Hill film, The Warriors. If you listen to this show, you know the movie, there's nothing much I can add here.
…
continue reading
A simple filename triggered stored XSS, hijacking accounts and stealing API keys. A SQL injection bypassed a web firewall, dumping an entire database in one request. Both attacks exploited basic security flaws—flaws that should have been caught. Learn how these exploits worked, why they were missed, and what should have been done differently. Chapt…
…
continue reading
Welcome to Exploit Brokers with your host Cipherceval! In this deep dive, we uncover a sophisticated cyber assault where hackers exploited Microsoft SharePoint to launch the Havoc C2 via a stealthy click fix attack. Learn how a single click can trigger malicious PowerShell commands, turning everyday corporate tools into gateways for cybercrime. In …
…
continue reading

1
406 - Mardi Gras Massacre (1978)
3:02:11
3:02:11
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
3:02:11Yobo, Chris in Miami, Bobby, and Mike discuss a movie that covers the ONLY ritual murder ever committed in New Orleans since the 1800s. With restaurants that serve breakfast, lunch, or dinner for the same meal, cops who go deep under the covers, and theatrical musical murder productions; this movie has it all!…
…
continue reading

1
Ep. 4 – Exposed Secrets & Silent Takeovers: How Misconfigurations Open the Door to Attackers
21:15
Exposed secrets, overlooked permissions, and credentials hiding in plain sight—each one leading to a critical breach. In this episode, we break down three real-world pentest findings where a forgotten file, a misconfigured setting, and a leaked credential gave attackers full control. How did they happen? How can you find similar issues? And what ca…
…
continue reading
In this episode of Exploit Brokers, we dive into the dark world of cybercrime, exploring two alarming topics: a malicious Android loan app masquerading as a financial tool and Xerox printer vulnerabilities that could be leaking your credentials. Learn how loan sharks have moved from traditional methods to sophisticated digital predation, exploiting…
…
continue reading

1
405 - The Boy Who Drank Too Much (1980)
3:08:22
3:08:22
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
3:08:22Yobo, other Tim and Brady join Bobby and Mike as the month of Yobo continues with the 1980's TV movie "classic" about a young Scott Baio with a drinking problem and his friend who wets the bed but might make it to the Olympics one day. Or is this the movie about Scott Baio getting drunk and hitting his brother off a row boat with an oar? Either way…
…
continue reading

1
Ep. 3 – One Request, One URL, One Bluetooth Hack: Three Takeovers That Shouldn’t Have Happened
21:30
How can attackers take over accounts, networks, and devices—without credentials? In this episode, we break down three real-world security flaws that prove authentication alone isn’t enough: Account Takeover – A single request bypassed email verification, locking out store owners. Internal Network Compromise – A hidden admin URL and hardcoded access…
…
continue reading
In today’s episode of Exploit Brokers, we dive deep into two major security threats making waves across the digital world. A critical Remote Code Execution (RCE) vulnerability in Microsoft Outlook is putting millions of users at risk, with hackers exploiting it through spear phishing emails and malicious links. Not only that, but we’re also uncover…
…
continue reading
Welcome back to Exploit Brokers! In today’s video, we dive deep into a critical 7‑Zip vulnerability that’s being exploited by Russian cybercriminals to bypass Windows’ security protections. If you’ve used 7‑Zip at all, you need to know how this flaw can let hackers sneak past the Mark-of-the-Web (MOTW) and deploy dangerous malware like Smoke Loader…
…
continue reading

1
404 - Seven (1979)
3:31:28
3:31:28
در پخش در آینده
در پخش در آینده
لیست ها
پسندیدن
دوست داشته شد
3:31:28Yobouary starts strong with the classic Andy Sidaris film, Seven! Starring Grindbin All Star William Smith, this is Sidaris at his best. This movie has literally everything you could want... and, unfortunately, offensive comedy routines...
…
continue reading

1
Ep. 2 – Chaining IDORs, CSRF Account Takeovers & Token Manipulation for Privilege Escalation
19:16
What if you could take over an account—not by cracking a password, but by chaining two overlooked vulnerabilities? What if a single CSRF exploit let attackers reset security questions and hijack accounts? And what if manipulating an authorization token could escalate privileges? In this episode of Hacked & Secured: Pentest Exploits & Mitigations, w…
…
continue reading

1
Ep. 1 – Breaking OTP Security, Exploiting Static Domains & Privilege Escalation via Role Misconfigurations
19:12
What if your OTP security wasn’t secure at all? What if a static domain—something most people ignore—could lead to full account takeover? And what if flawed role management allowed admins to escalate privileges? In this episode of Hacked & Secured: Pentest Exploits & Mitigations, we break down three real-world security failures that turned minor ov…
…
continue reading
Lazarus Group’s Secret Admin Layer EXPOSED – Major Cybersecurity Discovery! 🔥💻 Security researchers have uncovered a hidden admin layer used by North Korea’s Lazarus Group to manage their Command and Control (C2) servers. This sophisticated network of VPNs and proxies allows them to execute cyberattacks worldwide—mainly targeting cryptocurrency dev…
…
continue reading