ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

2,338 results

David Bombal
How to make Millions $$$ hacking zero days?

... courses // SANS Course sans.org. https://www.sans.org/cyber-security-courses/ - Advanced exploit development for penetration ...

1:12:52
How to make Millions $$$ hacking zero days?

169,109 views

3 years ago

Leet Cipher
Malware development 101: Creating your first ever MALWARE

in this video, we go through the process of malware development in real life. we'll talk about various concepts such as shellcode, ...

28:00
Malware development 101: Creating your first ever MALWARE

504,571 views

1 year ago

David Bombal
Reverse Engineering 101 tutorial with the amazing Stephen Sims!

... Exploit development training (beginner and advanced) https://youtu.be/LWmy3t84AIo Buffer Overflow Hacking Tutorial (Bypass ...

1:18:48
Reverse Engineering 101 tutorial with the amazing Stephen Sims!

133,093 views

1 year ago

Cybernews
The Dangerous Evolution of AI Hacking

How does vibe hacking really work? What role does modern AI have in the world of cybersecurity? From the earliest imaginings of ...

27:45
The Dangerous Evolution of AI Hacking

346,069 views

2 weeks ago

Cybernews
The Biggest Hacking Mystery of Our Time: Shadow Brokers

The Shadow Brokers leaks are one of the pivotal moments in history: not only did they create a massive wave of cybercrime and ...

49:42
The Biggest Hacking Mystery of Our Time: Shadow Brokers

1,782,452 views

7 months ago

Cybernews
Where People Go When They Want to Hack You

What do you need to hack any system on the planet? Whatever it is, you can certainly find it on the Zero-day market: a network that ...

34:40
Where People Go When They Want to Hack You

3,935,573 views

1 year ago

DEFCONConference
DEF CON 31 - Retro Exploitation - Vintage Computing as a Vuln Research Playground - Wesley McGrew

It can be very difficult for those new to hacking to learn about vulnerability discovery and exploit development on modern ...

44:15
DEF CON 31 - Retro Exploitation - Vintage Computing as a Vuln Research Playground - Wesley McGrew

670 views

2 years ago

freeCodeCamp.org
Web App Vulnerabilities - DevSecOps Course for Beginners

In this DevSecOps course, you will learn how to take advantage of common web vulnerabilities, how to fix those vulnerabilities, ...

1:28:49
Web App Vulnerabilities - DevSecOps Course for Beginners

209,523 views

4 years ago

NetworkChuck
i created malware with Python (it's SCARY easy!!)

Create your Python Malware lab: https://ntck.co/linode (you get a $100 Credit good for 60 days as a new user!) We are going to ...

25:18
i created malware with Python (it's SCARY easy!!)

2,893,839 views

3 years ago

David Bombal
Buffer Overflow Hacking Tutorial (Bypass Passwords)

He's authored SANS most advanced course, SEC760: Advanced Exploit Development for Penetration Testers, was the 9th person ...

55:39
Buffer Overflow Hacking Tutorial (Bypass Passwords)

90,069 views

2 years ago

LiveOverflow
Finding iOS Kernel Exploit // SockPuppet Jailbreak - CVE-2019-8605

Ned Williamson of Google Project Zero explains how he discovered the Sock Puppet vulnerability affecting the XNU Kernel in iOS ...

23:45
Finding iOS Kernel Exploit // SockPuppet Jailbreak - CVE-2019-8605

167,537 views

6 years ago

Hacker Gallery
I found out what hackers have been up to...

Compilation of 15 original stories detailing ransomware operations, real-world hacks, data breaches, and malware analysis.

2:34:56
I found out what hackers have been up to...

3,804 views

3 months ago

NetworkChuck
the hacker’s roadmap (how to get started in IT in 2025)

Build resume-worthy projects and level up your homelab with the Bambu Labs A1 Combo Printer ➡️ https://ntck.co/bambulaba1 ...

33:50
the hacker’s roadmap (how to get started in IT in 2025)

1,433,564 views

1 year ago

David Bombal
2024 Roadmap to Master Hacker

Get Proton Mail for FREE: https://davidbombal.wiki/protonmail1 Big thanks to Proton for Sponsoring the video! You want to ...

54:38
2024 Roadmap to Master Hacker

250,839 views

2 years ago

DEFCONConference
Dr Bramwell Brizendine - JOP ROCKET A Wicked Tool for JOP Gadget Discovery - DEF CON 27 Conference

Return-oriented Programming (ROP) has been the predominate code-reuse attack for over a decade, but there are other options.

22:22
Dr Bramwell Brizendine - JOP ROCKET A Wicked Tool for JOP Gadget Discovery - DEF CON 27 Conference

1,368 views

6 years ago

RSA Conference
The Five Most Dangerous New Attack Techniques You Need to Know About

Moderator: Ed Skoudis, President, SANS Technology Institute College Panelists: Heather Mahalik Barnhart, DFIR Curriculum ...

47:11
The Five Most Dangerous New Attack Techniques You Need to Know About

3,195 views

1 year ago

Jack Rhysider
Why Governments Love to Buy the Bugs in Your Favorite Apps🎙Darknet Diaries Ep. 98: Zero Day Brokers

If a hacker finds a bug at Microsoft or Google, they could report it to the company, get it patched up, and get a nice reward.

50:14
Why Governments Love to Buy the Bugs in Your Favorite Apps🎙Darknet Diaries Ep. 98: Zero Day Brokers

87,204 views

2 years ago

george hotz archive
George Hotz | Programming | Exploiting fontconfig CVE-2016-5384 with QIRA

Date of stream 21 Mar 2019. Live-stream chat added as Subtitles/CC - English (Twitch Chat). Stream title: Exploiting fontconfig ...

4:07:22
George Hotz | Programming | Exploiting fontconfig CVE-2016-5384 with QIRA

163,895 views

6 years ago

DEFCONConference
DEF CON 23 - Ionut Popescu - NetRipper: Smart Traffic Sniffing for Penetration Testers

He is passionate about ASM, reverse engineering, shellcode and exploit development and he has a MCTS Windows Internals ...

41:56
DEF CON 23 - Ionut Popescu - NetRipper: Smart Traffic Sniffing for Penetration Testers

7,438 views

10 years ago

Yaniv Hoffman
How Hackers Exploit CI/CD Pipelines to Bypass Your Security

Uncover how hackers exploit CI/CD pipelines to bypass security measures and infiltrate systems in this insightful video, "How ...

37:12
How Hackers Exploit CI/CD Pipelines to Bypass Your Security

1,657 views

1 year ago