skip to Main Content
This website use cookies which are necessary to its functioning and required to achieve the purposes illustrated in the privacy policy. To learn more or withdraw consent please click on Learn More. By continued use of this website you are consenting to our use of cookies.

LevelUp Library

LevelUp is a free series of online security conferences with content for the hacker and security researcher community.

Why I <3 Offensive Work and Why I </3 Offensive Work

Watch the Webinar

Business Tradecraft for Hackers in the Corporate Industrial Complex

Watch the Webinar

Sticking With It : How To Choose a Target & Stay Motivated

Watch the Webinar

Hackers Don’t Wear Black Hoodies, They Wear Capes

Watch the Webinar

Recognition Primed Bug Bounty Hunting

Watch the Webinar

Hacking Your Resume

Watch the Webinar

Code That Gets You PWN(S|’D)

Watch the Webinar

Hardware Hacking for the Masses (and you!)

Watch the Webinar

Overview of common Android app vulnerabilities

Watch the Webinar

GSuite Security: Everyone wants it but not everyone gets it

Watch the Webinar

REST in Peace: Abusing GraphQL to Attack Underlying Infrastructure

Watch the Webinar

Car Hacking: A College Student’s Perspective

Watch the Webinar

Forget ME, Remember WE. How to hack better with a group

Watch the Webinar

So You Want to Be a Pentester?

Watch the Webinar

Fun with Frida on Mobile

Watch the Webinar

1 Hacker is Good, 2 Hackers are Better – Bug Hunting as a Team

Watch the Webinar

How to Use Zap + using Zap HUD in your browser

Watch the Webinar

Group Hacking a Mini Live Hacking Event

Watch the Webinar

The Diary of an (Inexperienced) Bug Hunter

Watch the Webinar

OWASP Amass – Discovering Internet Exposure

Watch the Webinar
Resource Tile - How does unicode affect our security

How Does Unicode Affect Our Security

Watch the Webinar
Resource Tile - How i Hacked Every Major IDE in 2 weeks

How I Hacked Every Major IDE in 2 Weeks

Watch the Webinar
Resource Tile - Browser Exploitation for Fun and Profit

Browser Exploitation for Fun and Profit

Watch the Webinar
Resource Tile - Targeting for Bug Bounty Research

Targeting for Bug Bounty Research

Watch the Webinar
Resource Tile - Hidden in Plain Site Disclosing Information via Your API

Hidden in Plain Site: Disclosing Information via Your APIs

Watch the Webinar
Resource Tile - Do You Like Fuzzing

Do You Like Fuzzing?

Watch the Webinar
Resource Tile - Identifying & Avoiding Android App Problems

Identifying & Avoiding Android App Protections

Watch the Webinar
Resource Tile - Advanced Android Bug Bounty Skills

Advanced Android Bug Bounty Skills

Watch the Webinar
Resource Tile - Reverse Engineering iOS Mobile Apps

Reverse Engineering iOS Mobile Apps

Watch the Webinar
Resource Tile - Doing Recon Like a Boss

Doing Recon Like A Boss

Watch the Webinar
Resource Tile - Giving Back to the Bug Bounty Community

Giving Back to the Bug Bounty Community

Watch the Webinar
Resource Tile - Breaking Mobile App Protection Mechanisms

Breaking Mobile App Protection Mechanisms

Watch the Webinar
Resource Tile - Esoteric Sub-Domain Enumeration Techniques

Esoteric Sub-Domain Enumeration Techniques

Watch the Webinar
Resource Tile - Car Hacking 101

Car Hacking 101

Watch the Webinar
Resource Tile - Hacking Internet of Things for Bug Bounties

Hacking Internet of Things for Bug Bounties

Watch the Webinar
Resource Tile - Finding Hidden Gems in Old Bug Bounty Programs

Finding Hidden Gems in Old Bug Bounty Programs

Watch the Webinar
Resource Tile - How to Fail at Bug Bounty Hunting

How to Fail at Bug Bounty Hunting

Watch the Webinar
Resource Tile - Bug Boutny Hunting Methodology

Bug Bounty Hunting Methodology v2

Watch the Webinar
Resource Tile - Small Files and Big Bounties, Exploiting Sensitive Files

Small Files and Big Bounties, Exploiting Sensitive Files

Watch the Webinar
Resource Tile - Trickle Down PwnOnomics

Trickle Down PwnOnomics

Watch the Webinar
Resource Tile - Bug Bounty Hunter Methodology v3

Bug Bounty Hunter Methodology v3

Watch the Webinar
Resource Tile - Hacking oAuth 2.0 for Fun and Profit

Hacking oAuth2.0 For Fun and Profit

Watch the Webinar
Resource Tile - Hardware Hacking101

Hardware Hacking 101

Watch the Webinar
Resource Tile - Back to Basics Appsec Practices in Smart Contract Auditing

Back to Basics: Application Security Practices in Smart Contract Auditing

Watch the Webinar
Resource Tile - Meet a Bugcrowd Admin, Twitch

Meet a Bugcrowd Program Admin, Twitch

Watch the Webinar
Resource Tile - Practical Recon Techniques for Bug Hunters& Pen Testers

Practical Recon Techniques for Bug Hunters & Pen Testers

Watch the Webinar
Resource Tile - Why Humans Suck at Calculating Risk and How it Affects Security

How and Why Humans Suck at Calculating Risks

Watch the Webinar
Resource Tile - Serverless Top 10 Vulns

Serverless Top 10 Vulnerabilities

Watch the Webinar
Resource Tile - Profiling the attacker using offender profiling in soc environment

Profiling the Attacker – Using Offender Profiling In SOC Environments

Watch the Webinar
Resource Tile - Behind the curtain safe harbor and the dod

Behind the Curtain: Safe Harbor and Department of Defense

Watch the Webinar
Resource Tile - What you reap is what you sow

A Hackers Contemplation – Where Do We Go From Here?

Watch the Webinar
Resource Tile - AEM hacker approaching adobe experience manager webapps in bug bounty programs

AEM hacker – Approaching Adobe Experience Manager Web Apps

Watch the Webinar
Resource Tile - FInding bugs with binary ninja

Reverse Engineering with Binary Ninja

Watch the Webinar
Resource Tile - From an IVI in a box to a car in a box

From an IVI in a box to a CAR in a box

Watch the Webinar
Resource Tile - IoT Attacker point of view

IoT – Attacker Point of View

Watch the Webinar
Resource Tile - Social Engineering 101

Social Engineering 101

Watch the Webinar
Resource Tile - API Security 101

API Security Testing For Hackers

Watch the Webinar
Resource Tile - Turbo Intruder Abusing HTTP Misfeatures to Accelerate Attacks

Turbo Intruder: Abusing HTTP Misfeatures to Accelerate Attacks by James Kettle

Watch the Webinar
Resource Tile - Bad API, hAPI Hackers

Bad API, hAPI Hackers!

Watch the Webinar
Resource Tile - iPhone Baseband Researcher and Reversing

iPhone Baseband Research + Reversing

Watch the Webinar

What’s in My Hacking Tool Box?

Watch the Webinar
Resource Tile - From CTF to CVE

From Ctf to Cve: How Application of Concepts and Persistence Led to a Vulnerability Disclosure

Watch the Webinar
Resource Tile - The Law and You Reducing the COst of Free Speech

The Law and You: Reducing the Cost of Free Speech

Watch the Webinar

MachO and the AppStore

Watch the Webinar
Back To Top