[ Videos ]
Video hub — watch → notes → code

SentinelEdge: Advanced eBPF Kernel Security & Systems Architecture
Project overview of SentinelEdge — a professional-grade eBPF kernel security framework showcasing modern Linux kernel programming, deep system tracing, and production-style observability.
Watch Video
Cache Miss, TLB Miss & False Sharing — The Performance Killers in 3 Minutes
Three invisible bottlenecks that silently destroy program performance — cache miss, TLB miss, false sharing — demonstrated with real C code and CPU counter data.
Watch Video
Store→Load Reordering: x86 vs ARM64 Real-World Test
What really happens when CPUs reorder your instructions. Side-by-side experiment putting store→load reordering to the test on x86-64 and ARM64.
Watch Video
Debugging Real-Mode Bootloader in GDB (CS Changed, Symbols Broken)
How to debug a hand-written x86 assembly bootloader with GDB symbols — even across far jumps and segment changes. The trick most tutorials skip.
Watch Video
Debugging Ubuntu 6.8 x86_64 Kernel with GDB & QEMU — Disable KASLR Without Rebuild
Build and debug the Ubuntu 6.8 x86_64 kernel from source with debug symbols, then attach GDB via QEMU. Includes the trick for disabling KASLR without rebuilding.
Watch Video
How x86 Jumps REALLY Work: EFLAGS Truth with GDB + pwndbg
All x86 conditional jumps (ja, jb, je, etc.) are triggered by EFLAGS — not by syntax or code order. Hands-on with GDB and pwndbg to see exactly which flag fires each branch.
Watch Video
How to Build a Bootloader from Scratch — Just Assembly, No OS
Hand-written Stage-1 bootloader in raw x86 assembly. No GRUB, no operating system, no standard library. Boots directly from BIOS.
Watch Video
HarrisonSec Lab Tour | A Journey Through Computing Evolution
Join me on a tour of my security lab, where I explore the evolution of operating systems from FreeDOS to modern AI-driven security research.
Watch Video
Complete Secure Company Network Design
A comprehensive 3-hour demonstration of how to design and implement a secure enterprise network with multiple security zones, VLANs, and proper firewall configuration
Watch Video
Buffer Overflow Attack Explained
This is one of the clearest demonstrations of a buffer overflow attack I've seen, where Dr. Mike Pound not only explains the theory but shows the complete attack process, invaluable for security learners
Watch Video