ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

95,986 results

DEFCONConference
DEF CON 32 - The Rise and Fall of Binary Exploitation - Stephen Sims

For the past 20+ years binary exploitation has been seen as the ultimate challenge and prize, when exploiting large applications ...

47:41
DEF CON 32 - The Rise and Fall of Binary Exploitation - Stephen Sims

5,212 views

1 year ago

media.ccc.de
Exploiting PHP7 unserialize (33c3)

https://media.ccc.de/v/33c3-7858-exploiting_php7_unserialize teaching a new dog old tricks PHP-7 is a new version of the most ...

44:02
Exploiting PHP7 unserialize (33c3)

6,602 views

9 years ago

DEFCONConference
DEF CON 26 - zerosum0x0 - Demystifying MS17 010 Reverse Engineering the ETERNAL Exploits

MS17-010 is the most important patch in the history of operating systems, fixing remote code execution vulnerabilities in the world ...

48:14
DEF CON 26 - zerosum0x0 - Demystifying MS17 010 Reverse Engineering the ETERNAL Exploits

17,442 views

7 years ago

The Linux Foundation
SLUB Internals for Exploit Developers - Andrey Konovalov, xairy.io

SLUB Internals for Exploit Developers - Andrey Konovalov, xairy.io Every Linux kernel exploit that targets a slab memory ...

1:30:49
SLUB Internals for Exploit Developers - Andrey Konovalov, xairy.io

1,848 views

1 year ago

EuroPython Conference
Pwndbg: Low level debugging and exploit development with Python — disconnect3d

EuroPython 2025 — Terrace 2A on 2025-07-17] *Pwndbg: Low level debugging and exploit development with Python by ...

45:08
Pwndbg: Low level debugging and exploit development with Python — disconnect3d

330 views

3 months ago

DEFCONConference
DEF CON 32 - Anyone can hack IoT- Beginner’s Guide to Hacking Your First IoT Device - Andrew Bellini

Yes, anyone can hack IoT devices and I'll show you how! It doesn't matter if you're an experienced pen tester in other fields, ...

54:12
DEF CON 32 - Anyone can hack IoT- Beginner’s Guide to Hacking Your First IoT Device - Andrew Bellini

281,595 views

1 year ago

media.ccc.de
34C3 -  1-day exploit development for Cisco IOS

https://media.ccc.de/v/34c3-8936-1-day_exploit_development_for_cisco_ios Year 2017 was rich in vulnerabilities discovered for ...

45:37
34C3 - 1-day exploit development for Cisco IOS

5,781 views

8 years ago

OpenSecurityTraining2
Day 1 Part 1: Exploits1: Introduction to Software Exploits

The class materials are available at http://www.OpenSecurityTraining.info/Exploits1.html Follow us on Twitter for class news ...

58:59
Day 1 Part 1: Exploits1: Introduction to Software Exploits

38,903 views

13 years ago

pwn.college
pwn.college - Advanced Exploitation - Exploit Primitives

Let's learn about exploitation primitives! Module details at https://pwn.college/modules/exploitation2.

45:58
pwn.college - Advanced Exploitation - Exploit Primitives

3,406 views

5 years ago

John Hammond
TryHackMe! SweetRice Exploit & Stabilizing Shells

If you would like to support me, please like, comment & subscribe, and check me out on Patreon: ...

20:25
TryHackMe! SweetRice Exploit & Stabilizing Shells

57,763 views

5 years ago

media.ccc.de
35C3 -  The Layman's Guide to Zero-Day Engineering

https://media.ccc.de/v/35c3-9979-the_layman_s_guide_to_zero-day_engineering A demystification of the exploit development ...

57:04
35C3 - The Layman's Guide to Zero-Day Engineering

44,627 views

7 years ago

OpenSecurityTraining2
Vulns1001 03 Heap Buffer Overflow 🥷CVE-2020-0917🦾 03 Exploit

View the full free MOOC at https://ost2.fyi/Vulns1001. This class is for C/C++ developers learning secure development, and ...

25:12
Vulns1001 03 Heap Buffer Overflow 🥷CVE-2020-0917🦾 03 Exploit

1,342 views

2 years ago

OpenSecurityTraining2
Day 1 Part 1: Exploits 2: Exploits in the Windows Environment

The class materials are available at http://www.OpenSecurityTraining.info/Exploits2.html Follow us on Twitter for class news ...

1:17:34
Day 1 Part 1: Exploits 2: Exploits in the Windows Environment

13,620 views

13 years ago

DEFCONConference
DEF CON Safe Mode IoT Village - t1v0  - In Search of the Perfect UPnP Tool

While researching UPnP vulnerabilities I became frustrated with the currently available UPnP tools. Some devices that I knew had ...

29:10
DEF CON Safe Mode IoT Village - t1v0 - In Search of the Perfect UPnP Tool

903 views

5 years ago

pwn.college
pwn.college Module 12 - Automated Vulnerability Discovery - Fuzzing

Let's learn about fuzzing! Module details at https://pwn.college.

22:46
pwn.college Module 12 - Automated Vulnerability Discovery - Fuzzing

2,198 views

5 years ago

CNCF [Cloud Native Computing Foundation]
Detecting Five Famous Exploits With Falco

... to understand when you might be undergoing an attack or an exploit so we're going to do that in the context of 5 famous exploits ...

32:00
Detecting Five Famous Exploits With Falco

3,986 views

2 years ago

BSidesSLC
BSidesSLC 2025 | Start - Recon - Exploit: A Framework for Desktop App Pentesting

Think desktop apps are old news? Think again—many still harbor critical vulnerabilities waiting to be exploited. In this BSidesSLC ...

24:39
BSidesSLC 2025 | Start - Recon - Exploit: A Framework for Desktop App Pentesting

150 views

7 months ago

DEFCONConference
Christopher Roberts - Firmware Slap Automating Discovery  Exploitable Vulns - DEF CON 27 Conference

DARPA's Grand Cyber Challenge foretold an ominous future stricken with machines exploiting our code and automatically ...

32:48
Christopher Roberts - Firmware Slap Automating Discovery Exploitable Vulns - DEF CON 27 Conference

1,897 views

6 years ago

DEFCONConference
DEF CON 21 - James Denaro - How to Disclose or Sell an Exploit

How to Disclose or Sell an Exploit Without Getting in Trouble JAMES DENARO PARTNER, CIPHERLAW You have identified a ...

36:58
DEF CON 21 - James Denaro - How to Disclose or Sell an Exploit

1,474 views

12 years ago

DEFCONConference
DEF CON 31 - Azure B2C 0Day - An Exploit Chain from Public Keys to Microsoft Bug Bounty - John Novak

This presentation will cover a complete exploit chain in Azure B2C, starting with a discovery of cryptographic misuse and leading ...

40:14
DEF CON 31 - Azure B2C 0Day - An Exploit Chain from Public Keys to Microsoft Bug Bounty - John Novak

2,562 views

2 years ago