ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

2,918 results

DEFCONConference
DEF CON 32 - The Rise and Fall of Binary Exploitation - Stephen Sims

For the past 20+ years binary exploitation has been seen as the ultimate challenge and prize, when exploiting large applications ...

47:41
DEF CON 32 - The Rise and Fall of Binary Exploitation - Stephen Sims

5,226 views

1 year ago

media.ccc.de
34C3 -  1-day exploit development for Cisco IOS

https://media.ccc.de/v/34c3-8936-1-day_exploit_development_for_cisco_ios Year 2017 was rich in vulnerabilities discovered for ...

45:37
34C3 - 1-day exploit development for Cisco IOS

5,782 views

8 years ago

EuroPython Conference
Pwndbg: Low level debugging and exploit development with Python — disconnect3d

EuroPython 2025 — Terrace 2A on 2025-07-17] *Pwndbg: Low level debugging and exploit development with Python by ...

45:08
Pwndbg: Low level debugging and exploit development with Python — disconnect3d

334 views

3 months ago

media.ccc.de
35C3 -  The Layman's Guide to Zero-Day Engineering

https://media.ccc.de/v/35c3-9979-the_layman_s_guide_to_zero-day_engineering A demystification of the exploit development ...

57:04
35C3 - The Layman's Guide to Zero-Day Engineering

44,645 views

7 years ago

DEFCONConference
Weston Hecker - PENTESTING How to Get into the Field Explained - DEF CON 27 Hack the Sea Village

Presentations from the DEF CON 27 Hack the Sea Village.

24:18
Weston Hecker - PENTESTING How to Get into the Field Explained - DEF CON 27 Hack the Sea Village

1,857 views

6 years ago

Your Investigator
Exploit Development-Everything You Need to Know - Your Investigator

Your Investigator™ (Leading Fraud and Crime Investigation Training Providing Company) offers a wide range of courses and ...

21:27
Exploit Development-Everything You Need to Know - Your Investigator

29 views

4 years ago

DEFCONConference
DEF CON 31 - Retro Exploitation - Vintage Computing as a Vuln Research Playground - Wesley McGrew

It can be very difficult for those new to hacking to learn about vulnerability discovery and exploit development on modern ...

44:15
DEF CON 31 - Retro Exploitation - Vintage Computing as a Vuln Research Playground - Wesley McGrew

665 views

2 years ago

DEFCONConference
Dr Bramwell Brizendine - JOP ROCKET A Wicked Tool for JOP Gadget Discovery - DEF CON 27 Conference

Return-oriented Programming (ROP) has been the predominate code-reuse attack for over a decade, but there are other options.

22:22
Dr Bramwell Brizendine - JOP ROCKET A Wicked Tool for JOP Gadget Discovery - DEF CON 27 Conference

1,365 views

6 years ago

BSidesKC
Exploit Development Is Dead, Long Live Exploit Development!

It is no secret that the days of jmp esp are far gone. In the age of Virtualization-Based Security and Hypervisor Protected Code ...

47:57
Exploit Development Is Dead, Long Live Exploit Development!

9,849 views

4 years ago

DEFCONConference
DEF CON 23 - Ionut Popescu - NetRipper: Smart Traffic Sniffing for Penetration Testers

He is passionate about ASM, reverse engineering, shellcode and exploit development and he has a MCTS Windows Internals ...

41:56
DEF CON 23 - Ionut Popescu - NetRipper: Smart Traffic Sniffing for Penetration Testers

7,436 views

10 years ago

media.ccc.de
Pegasus internals (33c3)

https://media.ccc.de/v/33c3-7901-pegasus_internals Technical Teardown of the Pegasus malware and Trident exploit chain This ...

29:39
Pegasus internals (33c3)

28,333 views

9 years ago

Exploit Development and Penetration Testing
win32 Exploit Development

I created this video to assist with anyone learning how to create shellcode that accesses the x86 win API, or simply trying to learn ...

2:30:58
win32 Exploit Development

2,170 views

10 years ago

DEFCONConference
DEF CON 25 - Artem Kondratenko - Cisco Catalyst Exploitation

This presentation is a detailed write-up of the exploit development process for the vulnerability in Cisco Cluster Management ...

40:32
DEF CON 25 - Artem Kondratenko - Cisco Catalyst Exploitation

3,840 views

8 years ago

pwn.college
pwn.college - Advanced Exploitation - Exploit Primitives

Let's learn about exploitation primitives! Module details at https://pwn.college/modules/exploitation2.

45:58
pwn.college - Advanced Exploitation - Exploit Primitives

3,407 views

5 years ago

The Linux Foundation
SLUB Internals for Exploit Developers - Andrey Konovalov, xairy.io

SLUB Internals for Exploit Developers - Andrey Konovalov, xairy.io Every Linux kernel exploit that targets a slab memory ...

1:30:49
SLUB Internals for Exploit Developers - Andrey Konovalov, xairy.io

1,847 views

1 year ago

0xdade
Skill Building By Revisiting Past CVEs - Sandra Escandor-O’Keefe

Revisiting past CVEs can be a useful tool for finding patterns, to increase our critical thinking, gain knowledge in techniques that ...

20:47
Skill Building By Revisiting Past CVEs - Sandra Escandor-O’Keefe

387 views

7 years ago

OpenSecurityTraining2
Day 1 Part 1: Exploits1: Introduction to Software Exploits

The class materials are available at http://www.OpenSecurityTraining.info/Exploits1.html Follow us on Twitter for class news ...

58:59
Day 1 Part 1: Exploits1: Introduction to Software Exploits

38,904 views

13 years ago

DEFCONConference
DEF CON 25 - Min Zheng, Xiangyu Liu - macOS:iOS Kernel Debugging and Heap Feng Shui

Kernel bug is always very difficult to reproduce and may lead to the entire system panic and restart. In practice, kernel debugging ...

26:03
DEF CON 25 - Min Zheng, Xiangyu Liu - macOS:iOS Kernel Debugging and Heap Feng Shui

3,175 views

8 years ago

DEFCONConference
DEF CON 21 - Fatih Ozavci - VoIP Wars Return of the SIP

... also well versed at network penetration testing, web application testing, reverse engineering, fuzzing and exploit development.

47:11
DEF CON 21 - Fatih Ozavci - VoIP Wars Return of the SIP

4,281 views

12 years ago

DEFCONConference
DEF CON 21 - Soen - Evolving Exploits Through Genetic Algorithms

Evolving Exploits Through Genetic Algorithms SOEN HACKER FOR TEAM VANNED This talk will discuss the next logical step ...

23:35
DEF CON 21 - Soen - Evolving Exploits Through Genetic Algorithms

4,454 views

12 years ago