Wookash Podcast cover image

How Fil-C Works

Wookash Podcast

00:00

Memory safety examples and historical exploits

Filip recounts classic exploitation techniques like stack shellcode and demonstrates why full memory control is dangerous.

Play episode from 04:25
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app