33:00Recon for Hackers with Maltego External Network Infrastructure Penetration Testing ReconNeXuS InfoSec112 views·2 years ago
41:42Server-Side Template Injection Vulnerability Detailed Analysis SSTI SSTI Springboot ThymeleafNeXuS InfoSec422 views·3 years ago
57:16Reverse Engineering .NET C# Binaries using DNSpy DNSpy BasicsNeXuS InfoSec2.7K views·3 years ago
1:28:43Exploiting Machine in Unreachable network 3 Hops away - using Reverse Pivot Technique (NO SSH)NeXuS InfoSec51 views·5 years ago