ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

2,917 results

media.ccc.de
34C3 -  1-day exploit development for Cisco IOS

https://media.ccc.de/v/34c3-8936-1-day_exploit_development_for_cisco_ios Year 2017 was rich in vulnerabilities discovered for ...

45:37
34C3 - 1-day exploit development for Cisco IOS

5,781 views

8 years ago

DEFCONConference
DEF CON 32 - The Rise and Fall of Binary Exploitation - Stephen Sims

For the past 20+ years binary exploitation has been seen as the ultimate challenge and prize, when exploiting large applications ...

47:41
DEF CON 32 - The Rise and Fall of Binary Exploitation - Stephen Sims

5,219 views

1 year ago

EuroPython Conference
Pwndbg: Low level debugging and exploit development with Python — disconnect3d

EuroPython 2025 — Terrace 2A on 2025-07-17] *Pwndbg: Low level debugging and exploit development with Python by ...

45:08
Pwndbg: Low level debugging and exploit development with Python — disconnect3d

332 views

3 months ago

media.ccc.de
35C3 -  The Layman's Guide to Zero-Day Engineering

https://media.ccc.de/v/35c3-9979-the_layman_s_guide_to_zero-day_engineering A demystification of the exploit development ...

57:04
35C3 - The Layman's Guide to Zero-Day Engineering

44,633 views

7 years ago

Your Investigator
Exploit Development-Everything You Need to Know - Your Investigator

Your Investigator™ (Leading Fraud and Crime Investigation Training Providing Company) offers a wide range of courses and ...

21:27
Exploit Development-Everything You Need to Know - Your Investigator

29 views

4 years ago

Exploit Development and Penetration Testing
win32 Exploit Development

I created this video to assist with anyone learning how to create shellcode that accesses the x86 win API, or simply trying to learn ...

2:30:58
win32 Exploit Development

2,170 views

10 years ago

DEFCONConference
DEF CON 31 - Retro Exploitation - Vintage Computing as a Vuln Research Playground - Wesley McGrew

It can be very difficult for those new to hacking to learn about vulnerability discovery and exploit development on modern ...

44:15
DEF CON 31 - Retro Exploitation - Vintage Computing as a Vuln Research Playground - Wesley McGrew

665 views

2 years ago

DEFCONConference
Weston Hecker - PENTESTING How to Get into the Field Explained - DEF CON 27 Hack the Sea Village

Presentations from the DEF CON 27 Hack the Sea Village.

24:18
Weston Hecker - PENTESTING How to Get into the Field Explained - DEF CON 27 Hack the Sea Village

1,857 views

6 years ago

DEFCONConference
DEF CON 23 - Ionut Popescu - NetRipper: Smart Traffic Sniffing for Penetration Testers

He is passionate about ASM, reverse engineering, shellcode and exploit development and he has a MCTS Windows Internals ...

41:56
DEF CON 23 - Ionut Popescu - NetRipper: Smart Traffic Sniffing for Penetration Testers

7,436 views

10 years ago

BSidesKC
Exploit Development Is Dead, Long Live Exploit Development!

It is no secret that the days of jmp esp are far gone. In the age of Virtualization-Based Security and Hypervisor Protected Code ...

47:57
Exploit Development Is Dead, Long Live Exploit Development!

9,847 views

4 years ago

pwn.college
pwn.college - Advanced Exploitation - Exploit Primitives

Let's learn about exploitation primitives! Module details at https://pwn.college/modules/exploitation2.

45:58
pwn.college - Advanced Exploitation - Exploit Primitives

3,406 views

5 years ago

OpenSecurityTraining2
Day 1 Part 1: Exploits1: Introduction to Software Exploits

The class materials are available at http://www.OpenSecurityTraining.info/Exploits1.html Follow us on Twitter for class news ...

58:59
Day 1 Part 1: Exploits1: Introduction to Software Exploits

38,903 views

13 years ago

media.ccc.de
Pegasus internals (33c3)

https://media.ccc.de/v/33c3-7901-pegasus_internals Technical Teardown of the Pegasus malware and Trident exploit chain This ...

29:39
Pegasus internals (33c3)

28,330 views

9 years ago

DEFCONConference
DEF CON 25 - Artem Kondratenko - Cisco Catalyst Exploitation

This presentation is a detailed write-up of the exploit development process for the vulnerability in Cisco Cluster Management ...

40:32
DEF CON 25 - Artem Kondratenko - Cisco Catalyst Exploitation

3,839 views

8 years ago

0xdade
Skill Building By Revisiting Past CVEs - Sandra Escandor-O’Keefe

Revisiting past CVEs can be a useful tool for finding patterns, to increase our critical thinking, gain knowledge in techniques that ...

20:47
Skill Building By Revisiting Past CVEs - Sandra Escandor-O’Keefe

387 views

7 years ago

DEFCONConference
DEF CON 21 - Fatih Ozavci - VoIP Wars Return of the SIP

... also well versed at network penetration testing, web application testing, reverse engineering, fuzzing and exploit development.

47:11
DEF CON 21 - Fatih Ozavci - VoIP Wars Return of the SIP

4,281 views

12 years ago

DEFCONConference
DEF CON 25 - Min Zheng, Xiangyu Liu - macOS:iOS Kernel Debugging and Heap Feng Shui

Kernel bug is always very difficult to reproduce and may lead to the entire system panic and restart. In practice, kernel debugging ...

26:03
DEF CON 25 - Min Zheng, Xiangyu Liu - macOS:iOS Kernel Debugging and Heap Feng Shui

3,175 views

8 years ago

NorthSec
NorthSec 2015 - Guillaume Ross - CTF or WTF?

This talk compares and contrasts CTF challenges, including previous NorthSec challenges, with outcomes from real-life ...

27:02
NorthSec 2015 - Guillaume Ross - CTF or WTF?

348 views

10 years ago

The Hacktivists
Dissecting EggHunter on Exploit Development - Vinícius Vieira (aka. v1n1v131r4)

Vinícius Vieira (aka. v1n1v131r4) is a Cyber Security Researcher and Pentester with over 16 years of experience. He is Professor ...

24:35
Dissecting EggHunter on Exploit Development - Vinícius Vieira (aka. v1n1v131r4)

827 views

Streamed 5 years ago

OpenSecurityTraining2
Day 1 Part 3: Exploits1: Introduction to Software Exploits

The class materials are available at http://www.OpenSecurityTraining.info/Exploits1.html Follow us on Twitter for class news ...

59:07
Day 1 Part 3: Exploits1: Introduction to Software Exploits

6,730 views

13 years ago