Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
7,511 results
It can be very difficult for those new to hacking to learn about vulnerability discovery and exploit development on modern ...
668 views
2 years ago
The Exploit Prediction Scoring System (EPSS) provides efficient, data-driven vulnerability management data that uses current ...
1,589 views
1 year ago
It is no secret that the days of jmp esp are far gone. In the age of Virtualization-Based Security and Hypervisor Protected Code ...
9,873 views
4 years ago
Yes, anyone can hack IoT devices and I'll show you how! It doesn't matter if you're an experienced pen tester in other fields, ...
288,100 views
https://media.ccc.de/v/34c3-8936-1-day_exploit_development_for_cisco_ios Year 2017 was rich in vulnerabilities discovered for ...
5,788 views
8 years ago
https://media.ccc.de/v/why2025-99-from-wan-to-nas-a-pwn2own-journey-through-the-soho-attack-surface The SOHO Smashup is ...
480 views
6 months ago
MS17-010 is the most important patch in the history of operating systems, fixing remote code execution vulnerabilities in the world ...
17,491 views
7 years ago
Continuous Integration (CI) systems and similar architecture has taken new direction, especially in the last few years. Automating ...
4,890 views
For the past 20+ years binary exploitation has been seen as the ultimate challenge and prize, when exploiting large applications ...
5,318 views
A debugger is always a valuable tool when searching for vulnerabilities, particularly in embedded systems where multiple ...
251 views
5 days ago
Memory corruption vulnerabilities have plagued computer systems since we started programming software. Techniques for ...
3,850 views
10 years ago
Speaker(s): Suyash Nalawade In this talk, we'll explore in detail about Remote Code Execution (RCE) and Arbitrary Command ...
101 views
4 months ago
PLEASE SUBSCRIBE, LIKE AND COMMENT TO KEEP THIS CHANNEL ALIVE! Tip Jar: https://paypal.me/radlovacki MS17-010 is ...
81 views
This talk explores the hidden risks in apps leveraging modern AI systems—especially those using large language models (LLMs) ...
142,661 views
SLUB Internals for Exploit Developers - Andrey Konovalov, xairy.io Every Linux kernel exploit that targets a slab memory ...
1,867 views
In this presentation, we will unveil a new attack surface: Device Virtualization in VMKernel. This isan unknown territory that has not ...
588 views
Are you Sure your System Applications are Secure? Reduce Exploitation Risk via Application Specific Hardening - Kjell Pirschel, ...
285 views
3 years ago
Don't miss out! Join us at our next Flagship Conference: KubeCon + CloudNativeCon Europe in Paris from March 19-22, 2024.
118 views
How we built an automatic exploitation system and qualified for the DARPA Cyber Grand Challenge. Antonio Bianchi, Jacopo ...
1,483 views
How to Disclose or Sell an Exploit Without Getting in Trouble JAMES DENARO PARTNER, CIPHERLAW You have identified a ...
1,475 views
12 years ago
(Transcription coming soon, sorry for the delay ) EDS: Exploitation Detection System AMR THABET MALWARE RESEARCHER, ...
2,695 views
Talk from the Circle of HOPE (2018) hacker conference: ...
61,065 views
Don't miss out! Join us at our next Flagship Conference: KubeCon + CloudNativeCon North America in Salt Lake City from ...
166 views
Please watch: "ChatGPT's SECRET Mini Games for Kids! | Super Fun, Super Easy!
28 views
10 months ago
Over the past decade, infotainment systems experienced a growth in functionality, broader adoption and central incorporation into ...
879 views