ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

3,364 results

DEFCONConference
DEF CON 32 - The Rise and Fall of Binary Exploitation - Stephen Sims

For the past 20+ years binary exploitation has been seen as the ultimate challenge and prize, when exploiting large applications ...

47:41
DEF CON 32 - The Rise and Fall of Binary Exploitation - Stephen Sims

5,714 views

1 year ago

media.ccc.de
34C3 -  1-day exploit development for Cisco IOS

https://media.ccc.de/v/34c3-8936-1-day_exploit_development_for_cisco_ios Year 2017 was rich in vulnerabilities discovered for ...

45:37
34C3 - 1-day exploit development for Cisco IOS

5,794 views

8 years ago

EuroPython Conference
Pwndbg: Low level debugging and exploit development with Python — disconnect3d

EuroPython 2025 — Terrace 2A on 2025-07-17] *Pwndbg: Low level debugging and exploit development with Python by ...

45:08
Pwndbg: Low level debugging and exploit development with Python — disconnect3d

492 views

4 months ago

media.ccc.de
35C3 -  The Layman's Guide to Zero-Day Engineering

https://media.ccc.de/v/35c3-9979-the_layman_s_guide_to_zero-day_engineering A demystification of the exploit development ...

57:04
35C3 - The Layman's Guide to Zero-Day Engineering

45,072 views

7 years ago

Conferia
Antti Rössi: How your PHP application can get hacked and how to prevent that from happening? @PHPCon

You've probably heard about the likes of XSS, CSRF, SQL Injection, RCE, Man-in-the-middle attack, and LFI. Very few of the ...

50:39
Antti Rössi: How your PHP application can get hacked and how to prevent that from happening? @PHPCon

6,821 views

6 years ago

BSidesKC
Exploit Development Is Dead, Long Live Exploit Development!

It is no secret that the days of jmp esp are far gone. In the age of Virtualization-Based Security and Hypervisor Protected Code ...

47:57
Exploit Development Is Dead, Long Live Exploit Development!

9,965 views

4 years ago

gamozolabs
Rewriting our Android exploit to be more reliable

In this stream we figure out why our exploit was historically unreliable, and rewrite it! Good stream to watch if you want to get up to ...

10:42:44
Rewriting our Android exploit to be more reliable

2,453 views

5 years ago

BSides Oslo
Chrome Browser Exploitation: from zero to heap sandbox escape - Matteo Malvica

... Malvica is a senior content developer and security researcher at OffSec focusing on vulnerability research, exploit development, ...

42:18
Chrome Browser Exploitation: from zero to heap sandbox escape - Matteo Malvica

64 views

2 weeks ago

Nobody
Offensive Security 2013 - FSU - Lecture7: Fuzzing / Exploit Dev 101

This lecture covers an overview of fuzzing, and the basics of exploit development and writing shellcode. This course is geared for ...

1:11:04
Offensive Security 2013 - FSU - Lecture7: Fuzzing / Exploit Dev 101

10,320 views

12 years ago

Exploit Development and Penetration Testing
win32 Exploit Development

I created this video to assist with anyone learning how to create shellcode that accesses the x86 win API, or simply trying to learn ...

2:30:58
win32 Exploit Development

2,175 views

10 years ago

Cooper
Hack.lu 2016 Exploit generation and JavaScript analysis automation with WinDBG

Exploit generation Many people are familiar with scripts which can help during an exploit development. But what if we automate ...

31:47
Hack.lu 2016 Exploit generation and JavaScript analysis automation with WinDBG

1,227 views

9 years ago

Nobody
Offensive Security 2013 - FSU - Lecture8: Exploit Dev 102

This lecture covers exploit development and writing shellcode. This course is geared for pen-testers and incident responders, and ...

1:14:24
Offensive Security 2013 - FSU - Lecture8: Exploit Dev 102

7,112 views

12 years ago

media.ccc.de
Pegasus internals (33c3)

https://media.ccc.de/v/33c3-7901-pegasus_internals Technical Teardown of the Pegasus malware and Trident exploit chain This ...

29:39
Pegasus internals (33c3)

28,381 views

9 years ago

DEFCONConference
DEF CON 18 - Jeremy Brown - Exploiting SCADA Systems

Jeremy enjoys vulnerability research and analysis, exploit development, programming, fuzzing, and reverse engineering. Twitter: ...

27:36
DEF CON 18 - Jeremy Brown - Exploiting SCADA Systems

716 views

12 years ago

pwn.college
pwn.college - Kernel Security - Environment Setup

Let's set up an environment for kernel experimentation! Module details at https://pwn.college/modules/kernel.

28:31
pwn.college - Kernel Security - Environment Setup

7,313 views

5 years ago

OpenSecurityTraining2
Day 1 Part 1: Exploits1: Introduction to Software Exploits

The class materials are available at http://www.OpenSecurityTraining.info/Exploits1.html Follow us on Twitter for class news ...

58:59
Day 1 Part 1: Exploits1: Introduction to Software Exploits

38,956 views

13 years ago

The Hacktivists
Dissecting EggHunter on Exploit Development - Vinícius Vieira (aka. v1n1v131r4)

Vinícius Vieira (aka. v1n1v131r4) is a Cyber Security Researcher and Pentester with over 16 years of experience. He is Professor ...

24:35
Dissecting EggHunter on Exploit Development - Vinícius Vieira (aka. v1n1v131r4)

829 views

Streamed 5 years ago

pwn.college
pwn.college - Advanced Exploitation - Exploit Primitives

Let's learn about exploitation primitives! Module details at https://pwn.college/modules/exploitation2.

45:58
pwn.college - Advanced Exploitation - Exploit Primitives

3,484 views

5 years ago

OpenSecurityTraining2
Day 1 Part 3: Exploits1: Introduction to Software Exploits

The class materials are available at http://www.OpenSecurityTraining.info/Exploits1.html Follow us on Twitter for class news ...

59:07
Day 1 Part 3: Exploits1: Introduction to Software Exploits

6,734 views

13 years ago

Nobody
Offensive Security 2013 - FSU - Lecture15: Web Application Hacking 104 & Exploit Development 104

This is the 15th video recorded course lecture for CIS5930/CIS4930 "Offensive Security" from Spring 2013 at the Florida State ...

1:20:48
Offensive Security 2013 - FSU - Lecture15: Web Application Hacking 104 & Exploit Development 104

4,306 views

12 years ago