Channels lising page
All videos archived of Daniel Boctor
L1LZpWqbJG8 | 29 Jun 2024
Head to https://brilliant.org/DanielBoctor/ to start your free 30-day trial, and get 20% off an annual premium subscription. PART ONE ๐ https://youtu.be/9KfY1hlibZ0 In this video, we take a deep dive into EternalBlue, the infamous exploit behind many of the most impactful cyber-attacks, such as WannaCry, NotPetya, TrickBot, and more. This is the most sophisticated exploit I have covered on this channel, due to the sheer rigor and length of the exploit chain. I wanted to build up to a comprehensive understanding of the exploit, starting with the buffer overflow / out-of-bounds write, as well as the arbitrary memory allocation, before outlining how the attack is executed. Whether you're a pen tester, security researcher, or cyber security expert, I hope you'll find this attack as fascinating as I did. JOIN THE DISCORD! ๐ https://discord.gg/WYqqp7DXbm EternalBlue technical sources: https://research.checkpoint.com/2017/eternalblue-everything-know/ https://www.youtube.com/watch?v=HsievGJQG0w https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-zerosum0x0-Eternal-Exploits.pdf https://www.youtube.com/watch?v=vdYHXJd7Jdo http://www.cs.toronto.edu/~arnold/427/18s/427_18S/indepth/EternalBlue/EternalBlue_report.pdf https://www.virusbulletin.com/uploads/pdf/magazine/2018/201806-EternalBlue.pdf EternalBlue non-technical sources: https://www.foi.se/rest-api/report/FOI%20Memo%207434 https://web.archive.org/web/20190220082742/https://blogs.akamai.com/sitr/2017/05/wannacry-views-from-the-dns-frontline.html https://www.kaspersky.com/about/press-releases/2015_equation-group-the-crown-creator-of-cyber-espionage https://steemit.com/shadowbrokers/@theshadowbrokers/lost-in-translation https://web.archive.org/web/20170516021245/https://intel.malwaretech.com/botnet/wcrypt/?t=24h&bid=all https://www.justice.gov/opa/pr/three-north-korean-military-hackers-indicted-wide-ranging-scheme-commit-cyberattacks-and https://www.fbi.gov/wanted/cyber/gru-hackers-destructive-malware-and-international-cyber-attacks https://www.youtube.com/watch?v=BJzOiai8Dv4 SMB documentation: https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-cifs/4d330f4c-151c-4d79-b207-40bd4f754da9 MUSIC CREDITS: LEMMiNO - Cipher https://www.youtube.com/watch?v=b0q5PR1xpA0 CC BY-SA 4.0 LEMMiNO - Firecracker https://www.youtube.com/watch?v=ulfoU2MziOc CC BY-SA 4.0 LEMMiNO - Nocturnal https://www.youtube.com/watch?v=epmoV2HRs9U CC BY-SA 4.0 LEMMiNO - Siberian https://www.youtube.com/watch?v=5py6E6yo7wk CC BY-SA 4.0 LEMMiNO - Encounters https://www.youtube.com/watch?v=xdwWCl_5x2s CC BY-SA 4.0 #programming #software #softwareengineering #computerscience #code #hacking #hack #cybersecurity #exploit #tracking #softwareengineer #vulnerability #pentesting #privacy #spyware #malware #cyber #cyberattack #zeroday #security #cybersecurity #breaches #databreaches #bug #bugbounty #pentesting #penetrationtesting #backdoor #hacked #CPU #eternalblue #wannacry #notpetya #ransomware #worms #computerworm #NSA #leak #bufferoverflow #memory #exploitchain #zeroclick #microsoftexploit #windowsexploit #cyberattack
9KfY1hlibZ0 | 21 Jun 2024
Head to https://brilliant.org/DanielBoctor/ to start your free 30-day trial, and get 20% off an annual premium subscription. In this video, we take a deep dive into EternalBlue, the infamous exploit behind many of the most impactful cyber-attacks, such as WannaCry, NotPetya, TrickBot, and more. This is the most sophisticated exploit I have covered on this channel, due to the sheer rigor and length of the exploit chain. I wanted to build up to a comprehensive understanding of the exploit, starting with the buffer overflow / out-of-bounds write, as well as the arbitrary memory allocation, before outlining how the attack is executed. Whether you're a pen tester, security researcher, or cyber security expert, I hope you'll find this attack as fascinating as I did. JOIN THE DISCORD! ๐ https://discord.gg/WYqqp7DXbm EternalBlue technical sources: https://research.checkpoint.com/2017/eternalblue-everything-know/ https://www.youtube.com/watch?v=HsievGJQG0w https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-zerosum0x0-Eternal-Exploits.pdf https://www.youtube.com/watch?v=vdYHXJd7Jdo http://www.cs.toronto.edu/~arnold/427/18s/427_18S/indepth/EternalBlue/EternalBlue_report.pdf https://www.virusbulletin.com/uploads/pdf/magazine/2018/201806-EternalBlue.pdf EternalBlue non-technical sources: https://www.foi.se/rest-api/report/FOI%20Memo%207434 https://web.archive.org/web/20190220082742/https://blogs.akamai.com/sitr/2017/05/wannacry-views-from-the-dns-frontline.html https://www.kaspersky.com/about/press-releases/2015_equation-group-the-crown-creator-of-cyber-espionage https://steemit.com/shadowbrokers/@theshadowbrokers/lost-in-translation https://web.archive.org/web/20170516021245/https://intel.malwaretech.com/botnet/wcrypt/?t=24h&bid=all https://www.justice.gov/opa/pr/three-north-korean-military-hackers-indicted-wide-ranging-scheme-commit-cyberattacks-and https://www.fbi.gov/wanted/cyber/gru-hackers-destructive-malware-and-international-cyber-attacks https://www.youtube.com/watch?v=BJzOiai8Dv4 SMB documentation: https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-cifs/4d330f4c-151c-4d79-b207-40bd4f754da9 MUSIC CREDITS: LEMMiNO - Cipher https://www.youtube.com/watch?v=b0q5PR1xpA0 CC BY-SA 4.0 LEMMiNO - Firecracker https://www.youtube.com/watch?v=ulfoU2MziOc CC BY-SA 4.0 LEMMiNO - Nocturnal https://www.youtube.com/watch?v=epmoV2HRs9U CC BY-SA 4.0 LEMMiNO - Siberian https://www.youtube.com/watch?v=5py6E6yo7wk CC BY-SA 4.0 LEMMiNO - Encounters https://www.youtube.com/watch?v=xdwWCl_5x2s CC BY-SA 4.0 #programming #software #softwareengineering #computerscience #code #hacking #hack #cybersecurity #exploit #tracking #softwareengineer #vulnerability #pentesting #privacy #spyware #malware #cyber #cyberattack #zeroday #security #cybersecurity #breaches #databreaches #bug #bugbounty #pentesting #penetrationtesting #backdoor #hacked #CPU #eternalblue #wannacry #notpetya #ransomware #worms #computerworm #NSA #leak #bufferoverflow #memory #exploitchain #zeroclick #microsoftexploit #windowsexploit #cyberattack
YRohz9VO1YY | 23 Mar 2024
Try CodeCrafters today with 40% off! ๐ https://app.codecrafters.io/join?via=daniel-boctor In this video, we take a deep dive into Spectre and Meltdown, two of the most dangerous and widespread transient execution CPU vulnerabilities, discovered by researchers at Google Project Zero. These vulnerabilities allow a rogue process to read from unauthorized memory on nearly every device in the world. What makes these bugs particularly dangerous is that they don't behave like any software bug we've seen before, as they don't rely on exploiting any fundamental weakness or flaws in any code. These vulnerabilities are baked into the very essence of modern CPU technology, attacking underlying CPU micro-architectures. JOIN THE DISCORD! ๐ https://discord.gg/WYqqp7DXbm 0:00 โ Pizza Index 1:15 - Side Channels 2:05 โ Spectre Overview 7:04 โ Speculative Execution 10:50 - Exploit Official Source: https://meltdownattack.com/ Official CERT report: https://web.archive.org/web/20180104032628/http://www.kb.cert.org/vuls/id/584653 Pizza meter: https://en.wikipedia.org/wiki/The_Pizza_Meter Google Project Zero blog post: https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html A few additional videos that helped me: https://www.youtube.com/watch?v=mgAN4w7LH2o (special thanks to Ymir Vigfusson's awesome video! This video was an inspiration to me, and one of the best spectre explanations on YouTube) https://www.youtube.com/watch?v=I5mRwzVvFGE https://www.youtube.com/watch?v=Njgoed0lv0A https://www.youtube.com/watch?v=ekBV2AdUc5g https://www.youtube.com/watch?v=IPhvL3A-e6E MUSIC CREDITS: LEMMiNO - Cipher https://www.youtube.com/watch?v=b0q5PR1xpA0 CC BY-SA 4.0 LEMMiNO - Firecracker https://www.youtube.com/watch?v=ulfoU2MziOc CC BY-SA 4.0 LEMMiNO - Nocturnal https://www.youtube.com/watch?v=epmoV2HRs9U CC BY-SA 4.0 LEMMiNO - Siberian https://www.youtube.com/watch?v=5py6E6yo7wk CC BY-SA 4.0 LEMMiNO - Encounters https://www.youtube.com/watch?v=xdwWCl_5x2s CC BY-SA 4.0 #programming #software #softwareengineering #computerscience #code #programminglanguage #softwaredevelopment #hacking #hack #cybersecurity #exploit #tracking #softwareengineer #vulnerability #pentesting #privacy #spyware #malware #cyber #cyberattack #ethicalhacking #encoding #lowlevelsecurity #zeroday #security #cybersecurity #breaches #databreaches #bug #bugbounty #pentesting #penetrationtesting #backdoor #javascript #hacked #spectre #CPU #intel #AMD #meltdown #assembly #ARM #semiconductor #computerengineering#cybersecurity programming #software #softwareengineering #computerscience #code #programminglanguage #softwaredevelopment #hacking #hack #cybersecurity #exploit #tracking #softwareengineer #vulnerability #pentesting #privacy #spyware #malware #cyber #cyberattack #ethicalhacking #encoding #lowlevelsecurity #zeroday #security #cybersecurity #breaches #databreaches #bug #bugbounty #pentesting #penetrationtesting #backdoor #javascript #hacked #spectre #CPU #intel #AMD #meltdown #assembly #ARM #semiconductor #computerengineering
K5WOkLaGS-E | 17 Feb 2024
Try SquareX for free today! ๐ https://sqrx.io/dbv2_yt In this video, we take a deep dive into the Microsoft Teams RCE (remote code execution) exploit chain, discovered by bug hunter Masato Kinugawa. This exploit chain consists of cross-site scripting (XSS), prototype pollution, and a sandbox escape within the desktop application framework Electron. Whether you're a pen tester, security researcher, or cyber security expert, having a solid foundation in web and desktop technologies, as well as JavaScript, prototypes, and APIs are crucial. JOIN THE DISCORD! ๐ https://discord.gg/WYqqp7DXbm 0:00 - Overview 0:46 - Electron 2:30 - Entry Point + Chain Architecture 3:25 - Cross-site Scripting (XSS) 6:53 - Prototype Pollution 11:10 - Sandbox Escape 13:26 - SquareX Masato Kinugawa's report: https://speakerdeck.com/masatokinugawa/how-i-hacked-microsoft-teams-and-got-150000-dollars-in-pwn2own AngularJS RegEx: https://github.com/angular/angular.js/blob/47bf11ee94664367a26ed8c91b9b586d3dd420f5/src/ng/compile.js#L1384 SquareX socials: Twitter: https://twitter.com/getsquarex LinkedIn: https://www.linkedin.com/company/getsquarex/ Instagram: https://www.instagram.com/getsquarex/ Facebook: https://www.facebook.com/getsquarex Blog: https://labs.sqrx.com/ MUSIC CREDITS: LEMMiNO - Cipher https://www.youtube.com/watch?v=b0q5PR1xpA0 CC BY-SA 4.0 LEMMiNO - Firecracker https://www.youtube.com/watch?v=ulfoU2MziOc CC BY-SA 4.0 LEMMiNO - Nocturnal https://www.youtube.com/watch?v=epmoV2HRs9U CC BY-SA 4.0 LEMMiNO - Siberian https://www.youtube.com/watch?v=5py6E6yo7wk CC BY-SA 4.0 LEMMiNO - Encounters https://www.youtube.com/watch?v=xdwWCl_5x2s CC BY-SA 4.0 #programming #software #softwareengineering #computerscience #code #programminglanguage #softwaredevelopment #hacking #hack #cybersecurity #exploit #tracking #softwareengineer #vulnerability #pentesting #privacy #spyware #malware #cyber #cyberattack #bugbounties #ethicalhacking #encoding #lowlevelsecurity #zeroday #zero-day #bugbounty #security #cybersecurity #breaches #databreaches #bug #bugbounty #pentesting #penetrationtesting #backdoor #javascript #XSS #crosssitescripting #web #webdev #electron #HTML #hacked #BeFearlessOnline #SquareX #Befearless&SecureOnline #Cybersecurity #Privacy #Security #Cybersec
PZ-H099IaWo | 19 Jan 2024
Try SquareX for free today! ๐ https://sqrx.io/db_yt In this video, we take a deep dive into the GitLab / ExifTool metadata parsing vulnerability, which enables attackers to gain access to GitLab servers via an RCE (remote code execution). Whether you're a pen tester, security researcher, or cyber security expert, having a solid foundation in escape sequences, code evaluation, and character parsing is critical. JOIN THE DISCORD! ๐ https://discord.gg/WYqqp7DXbm 0:00 - Overview 0:26- Metadata 1:59 - DjVu 2:34 - C Escape Sequences 4:18 - Structure 11:14 - Exploit 13:45 - SquareX Hackerone report https://hackerone.com/reports/1154542 William Bowlingโs report https://devcraft.io/2021/05/04/exiftool-arbitrary-code-execution-cve-2021-22204.html Vulnerable code https://github.com/exiftool/exiftool/blob/11.70/lib/Image/ExifTool/DjVu.pm Patch https://github.com/exiftool/exiftool/commit/cf0f4e7dcd024ca99615bfd1102a841a25dde031 SquareX socials: Twitter: https://twitter.com/getsquarex LinkedIn: https://www.linkedin.com/company/getsquarex/ Instagram: https://www.instagram.com/getsquarex/ Facebook: https://www.facebook.com/getsquarex Blog: https://labs.sqrx.com/ MUSIC CREDITS: LEMMiNO - Cipher https://www.youtube.com/watch?v=b0q5PR1xpA0 CC BY-SA 4.0 LEMMiNO - Firecracker https://www.youtube.com/watch?v=ulfoU2MziOc CC BY-SA 4.0 LEMMiNO - Nocturnal https://www.youtube.com/watch?v=epmoV2HRs9U CC BY-SA 4.0 LEMMiNO - Siberian https://www.youtube.com/watch?v=5py6E6yo7wk CC BY-SA 4.0 LEMMiNO - Encounters https://www.youtube.com/watch?v=xdwWCl_5x2s CC BY-SA 4.0 #programming #software #softwareengineering #computerscience #code #programminglanguage #softwaredevelopment #hacking #hack #cybersecurity #exploit #tracking #softwareengineer #vulnerability #pentesting #privacy #spyware #malware #cyber #cyberattack #bugbounties #ethicalhacking #JPEG #encoding #lowlevelsecurity #zeroday #zero-day #cybersecurityexplained #bugbounty #memorymanagement #gitlab #security #cybersecurity #github #git #versioncontrol #breaches #databreaches #bug #bugbounty #pentesting #penetrationtesting #BeFearlessOnline #SquareX #Befearless&SecureOnline #Cybersecurity #Privacy #Security #Cybersec
263CooDJZCY | 08 Dec 2023
In this video, we take a deep dive into the disaster that occurred at Knight Capital Group, an American global financial services firm engaging in market making, electronic execution, and institutional sales and trading, on August 1st 2012. Weather you're a pen tester, security researcher, software engineer, or cyber security expert, having a solid foundation of test automation, DevOps, and automated deployment practices are critical. 0:00 - Prologue 1:06 - Overview 2:42 - Dark Pools 4:28 - RLP 5:14 - SEC Approval 5:43 - SMARS WE HAVE A DISCORD NOW! https://discord.gg/WYqqp7DXbm Doug Seven's report: https://dougseven.com/2014/04/17/knightmare-a-devops-cautionary-tale/ SEC filing: https://www.sec.gov/files/litigation/admin/2013/34-70694.pdf Henrico Dolfing's report: https://www.henricodolfing.com/2019/06/project-failure-case-study-knight-capital.html MUSIC CREDITS: LEMMiNO - Cipher https://youtu.be/b0q5PR1xpA0?si=pUNJUB-ra1ulTJtI CC BY-SA 4.0 LEMMiNO - Firecracker https://youtu.be/epmoV2HRs9U?si=Rljr2wC0SKYFEruJ CC BY-SA 4.0 LEMMiNO - Nocturnal https://youtu.be/epmoV2HRs9U?si=Rljr2wC0SKYFEruJ CC BY-SA 4.0 LEMMiNO - Siberian https://youtu.be/epmoV2HRs9U?si=Rljr2wC0SKYFEruJ CC BY-SA 4.0 #programming #software #softwareengineering #computerscience #code #programminglanguage #softwaredevelopment #hacking #hack #cybersecurity #exploit #tracking #softwareengineer #vulnerability #pentesting #privacy #spyware #malware #cyber #cyberattack #bugbounties #ethicalhacking #lowlevelsecurity #zeroday #zeroday #cybersecurityexplained #bugbounty #injection #breach #Zoom #knightcapital #marketmaking #devops #deployment #databreach #testautomation #QA #disasterrecovery
mj-FObYH7fQ | 24 Nov 2023
In this video, we take a deep dive into a high severity Zoom SQL injection vulnerability, which allowed attackers to enable a victims webcam and microphone without their permission. This vulnerability was exploited by taking advantage of dependencies between back-end systems and the SQLite database engine. Weather you're a pen tester, security researcher, or cyber security expert, having a solid foundation in character encoding schemes, especially when it comes to SQL, is critical. 0:00 - Overview 1:06- Reverse Engineering 4:40- SQLite 5:32 - Attack Vector 8:27 - Encoding (ASCII, Unicode, UTF-8) 11:45 - Exploit WE HAVE A DISCORD NOW! https://discord.gg/WYqqp7DXbm Original report by Keegan Ryan https://medium.com/@keegan.ryan/patched-zoom-exploit-altering-camera-settings-via-remote-sql-injection-4fdf3de8a0d MUSIC CREDITS: LEMMiNO - Cipher https://youtu.be/b0q5PR1xpA0?si=pUNJUB-ra1ulTJtI CC BY-SA 4.0 LEMMiNO - Firecracker https://youtu.be/epmoV2HRs9U?si=Rljr2wC0SKYFEruJ CC BY-SA 4.0 LEMMiNO - Nocturnal https://youtu.be/epmoV2HRs9U?si=Rljr2wC0SKYFEruJ CC BY-SA 4.0 LEMMiNO - Siberian https://youtu.be/epmoV2HRs9U?si=Rljr2wC0SKYFEruJ CC BY-SA 4.0 #programming #software #softwareengineering #computerscience #code #programminglanguage #softwaredevelopment #hacking #hack #cybersecurity #exploit #tracking #softwareengineer #vulnerability #pentesting #privacy #spyware #malware #cyber #cyberattack #bugbounties #ethicalhacking #lowlevelsecurity #zeroday #zeroday #cybersecurityexplained #bugbounty #SQL #injection #SQLinjection #unicode #ASCII #UTF8 #encoding #breach #SQLbreach #SQLite #databaseinjection #Zoom #Linux #localSQL
4SN1YckY-BA | 10 Nov 2023
In this video, we take a deep dive into the inner mechanics of a double free vulnerability within Android OS, allowing attackers to gain complete access to any Android mobile phone with an RCE (remote code execution). This vulnerability was exploited by creating a custom GIF file and sending it to a user in WhatsApp. Weather you're a pen tester, security researcher, or cyber security expert, having a solid foundation in low level languages, especially C, is critical. 0:00 - Overview 0:35 - GIFs 1:02- GIFs within Android 2:10- Memory / Pointers 3:35 - Double Free 6:02 - WhatsApp Payload 8:24 - RCE WE HAVE A DISCORD NOW! https://discord.gg/WYqqp7DXbm Original report by security researcher Awakened https://awakened1712.github.io/hacking/hacking-whatsapp-gif-rce/ Double free within android-gif-drawable https://github.com/koral--/android-gif-drawable/pull/673 MUSIC CREDITS: LEMMiNO - Cipher https://youtu.be/b0q5PR1xpA0?si=pUNJUB-ra1ulTJtI CC BY-SA 4.0 LEMMiNO - Nocturnal https://youtu.be/epmoV2HRs9U?si=Rljr2wC0SKYFEruJ CC BY-SA 4.0 #programming #software #softwareengineering #computerscience #code #programminglanguage #softwaredevelopment #hacking #hack #cybersecurity #exploit #tracking #softwareengineer #vulnerability #pentesting #privacy #spyware #malware #cyber #cyberattack #bugbounties #ethicalhacking #mobile #android #doublefree #malloc #realloc #GIF #mobilesecurity #lowlevelsecurity #zeroday #zero-day #cybersecurityexplained #bugbounty #compiler #memorymanagement #kernel #operatingsystems #OS
TvOvOOZJlcw | 20 Oct 2023
In this video, we take a deep dive into the inner mechanics of Cross Site Request Forgery (CSRF), CSRF Tokens, and how Surgey Bobrov was able to bypass them with a joint Google Analytics & Django web framework exploit / vulnerability. CSRF is the lesser known of the big three web attacks, consisting of SQL injection, and cross site scripting (XSS). 0:00 - Overview 0:48 - Cookies 3:17- Cross Site Request Forgery (CSRF) 4:29- CSRF Tokens 6:42- Exploit / Vulnerability WE HAVE A DISCORD NOW! https://discord.gg/WYqqp7DXbm Django patch - https://www.djangoproject.com/weblog/2016/sep/26/security-releases/ Original report - https://hackerone.com/reports/26647 Surgey Bobrov - https://hackerone.com/bobrov?type=user Double Submit Cookie - https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html#double-submit-cookie MUSIC CREDITS: LEMMiNO - Cipher https://youtu.be/b0q5PR1xpA0?si=pUNJUB-ra1ulTJtI CC BY-SA 4.0 LEMMiNO - Nocturnal https://youtu.be/epmoV2HRs9U?si=Rljr2wC0SKYFEruJ CC BY-SA 4.0 #Python #Coding #Programming #Software #SoftwareEngineering #ComputerScience #Code #ProgrammingLanguage #SoftwareDevelopment #Development #Developers #Hacking #Hack #CyberSecurity #Exploit #Tracking #Web #WebDev #SoftwareEngineer #Django #WebFramework #Vulnerability #PenTesting #Privacy #Spyware #Malware #CSRF #CrossSiteRequestForgery #SQLInjection #CrossSiteScripting #XSS #WebVulnerabilities #Cyber #CyberAttack #BugBounties #GoogleExploit #GoogleAnalytics #EthicalHacking
9AC2heqy_eE | 13 Oct 2023
In this video, we take a deep dive into the inner mechanics of Python's Global Interpreter Lock (GIL), which is a must for all threading and multiprocessing devs, and expose a subtle nonce / hidden vulnerability, which could potentially make your code unsafe. Join us as we explore the impact of GIL on threading and multiprocessing, and discover how it affects the performance and scalability of your Python programs. By the end of this video, you'll gain valuable insights and learn proper threading practices that can help you avoid potential pitfalls. 0:00 - Overview 1:15 - Python threading example 3:50 - Threading 5:46 - GIL (Global Interpreter Lock) 6:24 - CPU bound vs IO bound 7:40 - Purpose of GIL 8:21 - Multiprocessing 9:25 - GILs downfall Source code - https://github.com/daniel-boctor/Daniel-Boctor-Youtube/tree/main/GIL WE HAVE A DISCORD NOW! https://discord.gg/WYqqp7DXbm MUSIC CREDITS: LEMMiNO - Cipher https://youtu.be/b0q5PR1xpA0?si=pUNJUB-ra1ulTJtI CC BY-SA 4.0 LEMMiNO - Nocturnal https://youtu.be/epmoV2HRs9U?si=Rljr2wC0SKYFEruJ CC BY-SA 4.0
1VAuOvtfhAM | 06 Oct 2023
In this video, we explore a HUGE gamechanger for Python speed and optimization - Just In Time compilation (JIT) with Numba. WE HAVE A DISCORD NOW! https://discord.gg/WYqqp7DXbm Source code - https://github.com/daniel-boctor/Daniel-Boctor-Youtube/blob/main/Numba/numba.ipynb 0:00 - Intro 0:52 - Compilation vs interpretation 2:05 - Numba (JIT) 2:36 - Decarators 3:58 - NumPy
ysDJMF4ToWI | 29 Sep 2023
In this video I try my very best to complete my C programming homework without committing several catastrophes, however this C code may be haunted. WE HAVE A DISCORD NOW! https://discord.gg/WYqqp7DXbm Source code - https://github.com/daniel-boctor/Daniel-Boctor-Youtube/blob/main/PSETS/PSET1.c 0:00 - God tier coding 0:45 - Haunted code
zsoCSFaTo0o | 22 Sep 2023
In this video, I showcase a revolutionary feat of engineering: the first untraceable tracking pixel. With some understand of HTTP, software engineering, and computer networking, we can apply the mechanics of traditional tracking pixels to legitimate email resources, to become fully undetectable to those who ghost us. Whether you're a beginner or a seasoned programmer, you can harness this ability yourself, as well as bettering your digital hygiene, online privacy, and resistance to hackers, spyware, and other trackers. WE HAVE A DISCORD NOW! https://discord.gg/WYqqp7DXbm #python #coding #programming #software #softwareengineering #computerscience #softwaredevelopment #email #hacking #cybersecurity #exploit #trackingpixel #tracking #web #fullstack #softwareengineer #django #webframework #informationtechnology #computernetworking #OSI #networkengineering #vulnerability #IP #TCP #pentesting #privacy #spyware #malware
25B66fOb0GA | 15 Sep 2023
In this video, we delve into the Python Deque, a versatile data structure that combines the features of both stacks, queues, and lists. Learn how to efficiently manipulate and access elements using deque operations. This tutorial is perfect for beginners and experienced programmers, as we explore its implementation, advantages, and practical use cases. Source code - https://github.com/daniel-boctor/Daniel-Boctor-Youtube/blob/main/Deques/deques.ipynb 0:00 - Introduction 0:16 - Deques 0:41 - Appending to the right 1:10 - Popping from the right 1:39 - Appending to the left 2:18 - Popping from the left 2:44 - Insertion / deletion into middle 3:29 - Outro
zlmzrD8zq0o | 31 Aug 2023
In this video, we settle the long-standing debate among Python programmers: list comprehensions vs for loops. Discover why Python list and dictionary comprehensions are faster than regular for loops, and how they can improve your code efficiency. Whether you're a beginner or an experienced Python programmer, this video will help you become an all around stronger and more knowledgeable programmer. Ready to level up your Python skills? Subscribe now to stay tuned for more insightful software content. Source code - https://github.com/daniel-boctor/Daniel-Boctor-Youtube/blob/main/Comprehensions/comprehensions.ipynb 0:00 - Introduction 0:18 - Performance Improvement 0:57 - Call Stack 1:44 - Bytecodes 2:40 - Map 3:35 - Outro
b9RgHa1CnH4 | 17 Aug 2023
The first video in a Python, NumPy, Pandas, and Matplotlib based based computational / quant finance series, spanning from stochastic modelling and portfolio insurance, to asset pricing , factor regressions, data visualization, and everything in-between. Source code - https://github.com/daniel-boctor/Daniel-Boctor-Youtube/blob/main/Finance101/finance.ipynb 0:00 - Intro 0:17 - Data Source 1:00 - Information Preparation 2:09 - Returns 4:18 - DataFrame 5:03 - Measures of Risk 5:18 - Annualization 6:31 - Raw Sharpe Ratio 6:52 - Wealth Index 7:37 - Drawdowns 8:45 - Outro
-WanByjXSXU | 04 Aug 2023
A Day in the Life of a Software Engineer Intern @ Cisco Meraki in San Francisco - working on Cyber Security Systems Integration Testing within the MX QA team Still learning how to edit :p 0:00 Intro 0:12 Wake up 0:24 Commute to the office 0:35 Arrive at the office 1:00 Breakfast 1:29 Juice & Bagel 1:43 Morning grind 2:13 Lunch 3:06 Games room 3:37 Afternoon grind 4:03 Maximo 4:16 Snacks 4:30 Intern events 4:37 Gym 4:59 Office parties 5:16 Evenings 6:11 Commute home 6:43 Nights 7:00 Maximo's greatest weakness
qz4JZ7OfPNU | 21 Jul 2023
How using Python generators (aka the yield statement) can be advantageous to program design and memory efficiency and management. Source code - https://github.com/daniel-boctor/Daniel-Boctor-Youtube/blob/main/Generators/generators.ipynb 0:00 - Introduction 0:25 - Lists 2:51 - Generators 5:47 - Rolling Returns 8:00 - Outro
tDrwHeBwWGE | 08 Jul 2023
How execution speed and computer architecture are just as important as time complexity. Featuring NumPy, Pandas, SIMD, vectors, registers, and more! Source code - https://github.com/daniel-boctor/Daniel-Boctor-Youtube/blob/main/Vectorization/vectors.ipynb 0:00 - Introduction 0:30 - Performance Improvement 4:10 - Design Advantage 5:54 - SIMD (Single Instruction, Multiple Data) 7:42 - Outro
9Wd2a_69QIw | 24 Jun 2023
Source code - https://github.com/daniel-boctor/Daniel-Boctor-Youtube/blob/main/Namecheap%20DDNS%20Script/DDNS.sh API spec - https://www.namecheap.com/support/knowledgebase/article.aspx/29/11/how-to-dynamically-update-the-hosts-ip-with-an-http-request/ 0:00 - Intro 0:40 - API Setup 2:12 - DDNS Script 16:41 - Demo & Validation 18:42 - Automation 20:13 - Complete
qENPLhAB8-I | 18 Jun 2023
Source Code - https://github.com/daniel-boctor/Daniel-Boctor-Youtube/blob/main/DollarDisplayWidget/widgets.py 0:00 - Intro 0:53 - Background 2:25 - Setup 6:20 - Widget 17:45 - Complete