ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

3,303 results

DEFCONConference
DEF CON 32 - The Rise and Fall of Binary Exploitation - Stephen Sims

For the past 20+ years binary exploitation has been seen as the ultimate challenge and prize, when exploiting large applications ...

47:41
DEF CON 32 - The Rise and Fall of Binary Exploitation - Stephen Sims

5,226 views

1 year ago

media.ccc.de
34C3 -  1-day exploit development for Cisco IOS

https://media.ccc.de/v/34c3-8936-1-day_exploit_development_for_cisco_ios Year 2017 was rich in vulnerabilities discovered for ...

45:37
34C3 - 1-day exploit development for Cisco IOS

5,782 views

8 years ago

media.ccc.de
35C3 -  The Layman's Guide to Zero-Day Engineering

https://media.ccc.de/v/35c3-9979-the_layman_s_guide_to_zero-day_engineering A demystification of the exploit development ...

57:04
35C3 - The Layman's Guide to Zero-Day Engineering

44,643 views

7 years ago

EuroPython Conference
Pwndbg: Low level debugging and exploit development with Python — disconnect3d

EuroPython 2025 — Terrace 2A on 2025-07-17] *Pwndbg: Low level debugging and exploit development with Python by ...

45:08
Pwndbg: Low level debugging and exploit development with Python — disconnect3d

334 views

3 months ago

BSidesKC
Exploit Development Is Dead, Long Live Exploit Development!

It is no secret that the days of jmp esp are far gone. In the age of Virtualization-Based Security and Hypervisor Protected Code ...

47:57
Exploit Development Is Dead, Long Live Exploit Development!

9,849 views

4 years ago

Your Investigator
Exploit Development-Everything You Need to Know - Your Investigator

Your Investigator™ (Leading Fraud and Crime Investigation Training Providing Company) offers a wide range of courses and ...

21:27
Exploit Development-Everything You Need to Know - Your Investigator

29 views

4 years ago

DEFCONConference
DEF CON 23 - Ionut Popescu - NetRipper: Smart Traffic Sniffing for Penetration Testers

He is passionate about ASM, reverse engineering, shellcode and exploit development and he has a MCTS Windows Internals ...

41:56
DEF CON 23 - Ionut Popescu - NetRipper: Smart Traffic Sniffing for Penetration Testers

7,436 views

10 years ago

pwn.college
pwn.college - Advanced Exploitation - Exploit Primitives

Let's learn about exploitation primitives! Module details at https://pwn.college/modules/exploitation2.

45:58
pwn.college - Advanced Exploitation - Exploit Primitives

3,407 views

5 years ago

OpenSecurityTraining2
Day 1 Part 1: Exploits1: Introduction to Software Exploits

The class materials are available at http://www.OpenSecurityTraining.info/Exploits1.html Follow us on Twitter for class news ...

58:59
Day 1 Part 1: Exploits1: Introduction to Software Exploits

38,904 views

13 years ago

media.ccc.de
Pegasus internals (33c3)

https://media.ccc.de/v/33c3-7901-pegasus_internals Technical Teardown of the Pegasus malware and Trident exploit chain This ...

29:39
Pegasus internals (33c3)

28,331 views

9 years ago

DEFCONConference
DEF CON 31 - Retro Exploitation - Vintage Computing as a Vuln Research Playground - Wesley McGrew

It can be very difficult for those new to hacking to learn about vulnerability discovery and exploit development on modern ...

44:15
DEF CON 31 - Retro Exploitation - Vintage Computing as a Vuln Research Playground - Wesley McGrew

665 views

2 years ago

The Linux Foundation
SLUB Internals for Exploit Developers - Andrey Konovalov, xairy.io

SLUB Internals for Exploit Developers - Andrey Konovalov, xairy.io Every Linux kernel exploit that targets a slab memory ...

1:30:49
SLUB Internals for Exploit Developers - Andrey Konovalov, xairy.io

1,847 views

1 year ago

DEFCONConference
Weston Hecker - PENTESTING How to Get into the Field Explained - DEF CON 27 Hack the Sea Village

Presentations from the DEF CON 27 Hack the Sea Village.

24:18
Weston Hecker - PENTESTING How to Get into the Field Explained - DEF CON 27 Hack the Sea Village

1,857 views

6 years ago

0xdade
Skill Building By Revisiting Past CVEs - Sandra Escandor-O’Keefe

Revisiting past CVEs can be a useful tool for finding patterns, to increase our critical thinking, gain knowledge in techniques that ...

20:47
Skill Building By Revisiting Past CVEs - Sandra Escandor-O’Keefe

387 views

7 years ago

DEFCONConference
DEF CON 25 - Artem Kondratenko - Cisco Catalyst Exploitation

This presentation is a detailed write-up of the exploit development process for the vulnerability in Cisco Cluster Management ...

40:32
DEF CON 25 - Artem Kondratenko - Cisco Catalyst Exploitation

3,840 views

8 years ago

DEFCONConference
DEF CON 25 - Min Zheng, Xiangyu Liu - macOS:iOS Kernel Debugging and Heap Feng Shui

Kernel bug is always very difficult to reproduce and may lead to the entire system panic and restart. In practice, kernel debugging ...

26:03
DEF CON 25 - Min Zheng, Xiangyu Liu - macOS:iOS Kernel Debugging and Heap Feng Shui

3,175 views

8 years ago

DEFCONConference
DEF CON 21 - Fatih Ozavci - VoIP Wars Return of the SIP

... also well versed at network penetration testing, web application testing, reverse engineering, fuzzing and exploit development.

47:11
DEF CON 21 - Fatih Ozavci - VoIP Wars Return of the SIP

4,281 views

12 years ago

Exploit Development and Penetration Testing
win32 Exploit Development

I created this video to assist with anyone learning how to create shellcode that accesses the x86 win API, or simply trying to learn ...

2:30:58
win32 Exploit Development

2,170 views

10 years ago

DEFCONConference
DEF CON 32 - Anyone can hack IoT- Beginner’s Guide to Hacking Your First IoT Device - Andrew Bellini

Yes, anyone can hack IoT devices and I'll show you how! It doesn't matter if you're an experienced pen tester in other fields, ...

54:12
DEF CON 32 - Anyone can hack IoT- Beginner’s Guide to Hacking Your First IoT Device - Andrew Bellini

282,450 views

1 year ago

OWASP Foundation
Use After Free Exploitation - OWASP AppSecUSA 2014

Stephen currently works out of San Francisco as a consultant performing reverse engineering, exploit development, threat ...

47:13
Use After Free Exploitation - OWASP AppSecUSA 2014

7,406 views

11 years ago

DEFCONConference
DEF CON 21 - Soen - Evolving Exploits Through Genetic Algorithms

Evolving Exploits Through Genetic Algorithms SOEN HACKER FOR TEAM VANNED This talk will discuss the next logical step ...

23:35
DEF CON 21 - Soen - Evolving Exploits Through Genetic Algorithms

4,454 views

12 years ago

DEFCONConference
DEF CON 12 - spoonm and HD Moore, Bubonic Buffer Overflow

spoonm and HD Moore, Bubonic Buffer Overflow The Metasploit Framework has progressed from a simple network game to a ...

1:06:41
DEF CON 12 - spoonm and HD Moore, Bubonic Buffer Overflow

1,324 views

11 years ago

DEFCONConference
DEF CON 15 - Damian Gomez - Intelligent Debugging

Damian Gomez: Intelligent debugging for vuln-dev Damian Gomez is a Security Researcher at Immunity, which he joined in ...

29:12
DEF CON 15 - Damian Gomez - Intelligent Debugging

224 views

11 years ago

DEFCONConference
DEF CON 15 - Moore and Valsmith - Tactical Exploitation

... the leading open-source exploit development platform. In his spare time, HD searches for new vulnerabilities, develops security ...

46:47
DEF CON 15 - Moore and Valsmith - Tactical Exploitation

727 views

11 years ago

DEFCONConference
DEF CON 23 - Panel - Abusing Adobe Readers JavaScript APIs

His focus includes performing root-cause analysis, fuzzing and exploit development. Prior to joining HP, Hariri worked as an ...

36:58
DEF CON 23 - Panel - Abusing Adobe Readers JavaScript APIs

3,090 views

10 years ago