Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
3,364 results
For the past 20+ years binary exploitation has been seen as the ultimate challenge and prize, when exploiting large applications ...
5,714 views
1 year ago
https://media.ccc.de/v/34c3-8936-1-day_exploit_development_for_cisco_ios Year 2017 was rich in vulnerabilities discovered for ...
5,794 views
8 years ago
EuroPython 2025 — Terrace 2A on 2025-07-17] *Pwndbg: Low level debugging and exploit development with Python by ...
492 views
4 months ago
https://media.ccc.de/v/35c3-9979-the_layman_s_guide_to_zero-day_engineering A demystification of the exploit development ...
45,072 views
7 years ago
You've probably heard about the likes of XSS, CSRF, SQL Injection, RCE, Man-in-the-middle attack, and LFI. Very few of the ...
6,821 views
6 years ago
It is no secret that the days of jmp esp are far gone. In the age of Virtualization-Based Security and Hypervisor Protected Code ...
9,965 views
4 years ago
In this stream we figure out why our exploit was historically unreliable, and rewrite it! Good stream to watch if you want to get up to ...
2,453 views
5 years ago
... Malvica is a senior content developer and security researcher at OffSec focusing on vulnerability research, exploit development, ...
64 views
2 weeks ago
This lecture covers an overview of fuzzing, and the basics of exploit development and writing shellcode. This course is geared for ...
10,320 views
12 years ago
I created this video to assist with anyone learning how to create shellcode that accesses the x86 win API, or simply trying to learn ...
2,175 views
10 years ago
Exploit generation Many people are familiar with scripts which can help during an exploit development. But what if we automate ...
1,227 views
9 years ago
This lecture covers exploit development and writing shellcode. This course is geared for pen-testers and incident responders, and ...
7,112 views
https://media.ccc.de/v/33c3-7901-pegasus_internals Technical Teardown of the Pegasus malware and Trident exploit chain This ...
28,381 views
Jeremy enjoys vulnerability research and analysis, exploit development, programming, fuzzing, and reverse engineering. Twitter: ...
716 views
Let's set up an environment for kernel experimentation! Module details at https://pwn.college/modules/kernel.
7,313 views
The class materials are available at http://www.OpenSecurityTraining.info/Exploits1.html Follow us on Twitter for class news ...
38,956 views
13 years ago
Vinícius Vieira (aka. v1n1v131r4) is a Cyber Security Researcher and Pentester with over 16 years of experience. He is Professor ...
829 views
Streamed 5 years ago
Let's learn about exploitation primitives! Module details at https://pwn.college/modules/exploitation2.
3,484 views
6,734 views
This is the 15th video recorded course lecture for CIS5930/CIS4930 "Offensive Security" from Spring 2013 at the Florida State ...
4,306 views