ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

3,306 results

DEFCONConference
DEF CON 32 - The Rise and Fall of Binary Exploitation - Stephen Sims

For the past 20+ years binary exploitation has been seen as the ultimate challenge and prize, when exploiting large applications ...

47:41
DEF CON 32 - The Rise and Fall of Binary Exploitation - Stephen Sims

5,221 views

1 year ago

media.ccc.de
34C3 -  1-day exploit development for Cisco IOS

https://media.ccc.de/v/34c3-8936-1-day_exploit_development_for_cisco_ios Year 2017 was rich in vulnerabilities discovered for ...

45:37
34C3 - 1-day exploit development for Cisco IOS

5,781 views

8 years ago

EuroPython Conference
Pwndbg: Low level debugging and exploit development with Python — disconnect3d

EuroPython 2025 — Terrace 2A on 2025-07-17] *Pwndbg: Low level debugging and exploit development with Python by ...

45:08
Pwndbg: Low level debugging and exploit development with Python — disconnect3d

332 views

3 months ago

Your Investigator
Exploit Development-Everything You Need to Know - Your Investigator

Your Investigator™ (Leading Fraud and Crime Investigation Training Providing Company) offers a wide range of courses and ...

21:27
Exploit Development-Everything You Need to Know - Your Investigator

29 views

4 years ago

media.ccc.de
35C3 -  The Layman's Guide to Zero-Day Engineering

https://media.ccc.de/v/35c3-9979-the_layman_s_guide_to_zero-day_engineering A demystification of the exploit development ...

57:04
35C3 - The Layman's Guide to Zero-Day Engineering

44,633 views

7 years ago

DEFCONConference
DEF CON 23 - Ionut Popescu - NetRipper: Smart Traffic Sniffing for Penetration Testers

He is passionate about ASM, reverse engineering, shellcode and exploit development and he has a MCTS Windows Internals ...

41:56
DEF CON 23 - Ionut Popescu - NetRipper: Smart Traffic Sniffing for Penetration Testers

7,436 views

10 years ago

DEFCONConference
DEF CON 31 - Retro Exploitation - Vintage Computing as a Vuln Research Playground - Wesley McGrew

It can be very difficult for those new to hacking to learn about vulnerability discovery and exploit development on modern ...

44:15
DEF CON 31 - Retro Exploitation - Vintage Computing as a Vuln Research Playground - Wesley McGrew

665 views

2 years ago

DEFCONConference
Weston Hecker - PENTESTING How to Get into the Field Explained - DEF CON 27 Hack the Sea Village

Presentations from the DEF CON 27 Hack the Sea Village.

24:18
Weston Hecker - PENTESTING How to Get into the Field Explained - DEF CON 27 Hack the Sea Village

1,857 views

6 years ago

BSidesKC
Exploit Development Is Dead, Long Live Exploit Development!

It is no secret that the days of jmp esp are far gone. In the age of Virtualization-Based Security and Hypervisor Protected Code ...

47:57
Exploit Development Is Dead, Long Live Exploit Development!

9,845 views

4 years ago

Exploit Development and Penetration Testing
win32 Exploit Development

I created this video to assist with anyone learning how to create shellcode that accesses the x86 win API, or simply trying to learn ...

2:30:58
win32 Exploit Development

2,170 views

10 years ago

0xdade
Skill Building By Revisiting Past CVEs - Sandra Escandor-O’Keefe

Revisiting past CVEs can be a useful tool for finding patterns, to increase our critical thinking, gain knowledge in techniques that ...

20:47
Skill Building By Revisiting Past CVEs - Sandra Escandor-O’Keefe

387 views

7 years ago

DEFCONConference
DEF CON 25 - Artem Kondratenko - Cisco Catalyst Exploitation

This presentation is a detailed write-up of the exploit development process for the vulnerability in Cisco Cluster Management ...

40:32
DEF CON 25 - Artem Kondratenko - Cisco Catalyst Exploitation

3,839 views

8 years ago

SecurityHackingVideo
DEFCON 19  Metasploit vSploit Modules

Check out the following: http://solidshellsecurity.com/ (quality dedicated/vps servers and IT services) ...

42:40
DEFCON 19 Metasploit vSploit Modules

7 views

12 years ago

pwn.college
pwn.college - Advanced Exploitation - Exploit Primitives

Let's learn about exploitation primitives! Module details at https://pwn.college/modules/exploitation2.

45:58
pwn.college - Advanced Exploitation - Exploit Primitives

3,406 views

5 years ago

NorthSec
NorthSec 2015 - Guillaume Ross - CTF or WTF?

This talk compares and contrasts CTF challenges, including previous NorthSec challenges, with outcomes from real-life ...

27:02
NorthSec 2015 - Guillaume Ross - CTF or WTF?

348 views

10 years ago

The Hacktivists
Dissecting EggHunter on Exploit Development - Vinícius Vieira (aka. v1n1v131r4)

Vinícius Vieira (aka. v1n1v131r4) is a Cyber Security Researcher and Pentester with over 16 years of experience. He is Professor ...

24:35
Dissecting EggHunter on Exploit Development - Vinícius Vieira (aka. v1n1v131r4)

827 views

Streamed 5 years ago

OpenSecurityTraining2
Day 1 Part 1: Exploits1: Introduction to Software Exploits

The class materials are available at http://www.OpenSecurityTraining.info/Exploits1.html Follow us on Twitter for class news ...

58:59
Day 1 Part 1: Exploits1: Introduction to Software Exploits

38,903 views

13 years ago

DEFCONConference
DEF CON 12 - spoonm and HD Moore, Bubonic Buffer Overflow

spoonm and HD Moore, Bubonic Buffer Overflow The Metasploit Framework has progressed from a simple network game to a ...

1:06:41
DEF CON 12 - spoonm and HD Moore, Bubonic Buffer Overflow

1,324 views

11 years ago

DEFCONConference
DEF CON 21 - Fatih Ozavci - VoIP Wars Return of the SIP

... also well versed at network penetration testing, web application testing, reverse engineering, fuzzing and exploit development.

47:11
DEF CON 21 - Fatih Ozavci - VoIP Wars Return of the SIP

4,281 views

12 years ago

SecurityHackingVideo
Peter Van Eeckhoutte & Elliot Cutright     Win32 Exploit Development With Mona and Metasploit

Check out the following: http://solidshellsecurity.com/ (quality dedicated/vps servers and IT services) ...

58:06
Peter Van Eeckhoutte & Elliot Cutright Win32 Exploit Development With Mona and Metasploit

78 views

12 years ago