ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

1,888 results

DEFCONConference
DEF CON 26  - Alexei Bulazel - Reverse Engineering Windows Defenders Emulator

Windows Defender Antivirus's mpengine.dll implements the core of Defender's functionality in an enormous ~11 MB, 30000+ ...

46:46
DEF CON 26 - Alexei Bulazel - Reverse Engineering Windows Defenders Emulator

45,998 views

7 years ago

DEFCONConference
DEF CON 26 - zerosum0x0 - Demystifying MS17 010 Reverse Engineering the ETERNAL Exploits

MS17-010 is the most important patch in the history of operating systems, fixing remote code execution vulnerabilities in the world ...

48:14
DEF CON 26 - zerosum0x0 - Demystifying MS17 010 Reverse Engineering the ETERNAL Exploits

17,700 views

7 years ago

Velimir Radlovački
Demystifying MS17-010: Reverse Engineering the ETERNAL Exploits

PLEASE SUBSCRIBE, LIKE AND COMMENT TO KEEP THIS CHANNEL ALIVE! Tip Jar: https://paypal.me/radlovacki MS17-010 is ...

48:14
Demystifying MS17-010: Reverse Engineering the ETERNAL Exploits

82 views

7 years ago

Velimir Radlovački
Reverse Engineering Windows Defenders Emulator

PLEASE SUBSCRIBE TO KEEP THIS CHANNEL ALIVE! Tip Jar: https://paypal.me/radlovacki Windows Defender Antivirus's ...

46:46
Reverse Engineering Windows Defenders Emulator

550 views

7 years ago

John Hammond
Google CTF - BEGINNER Reverse Engineering w/ ANGR

Hang with our community on Discord! https://johnhammond.org/discord If you would like to support me, please like, comment ...

39:47
Google CTF - BEGINNER Reverse Engineering w/ ANGR

304,062 views

5 years ago

LinuxConfAu 2018 - Sydney, Australia
Tap On to Reverse Engineering

Michael Farrell http://lca2018.linux.org.au/schedule/presentation/78/ Since 2015, I've been working on reverse engineering ...

40:48
Tap On to Reverse Engineering

2,405 views

8 years ago

MAXOENGINEERING
DEF CON 26    Alexei Bulazel   Reverse Engineering Windows Defenders Emulator

ndustrial engineering is an inter-disciplinary profession that is concerned with the optimization of complex processes, systems, ...

46:46
DEF CON 26 Alexei Bulazel Reverse Engineering Windows Defenders Emulator

16 views

7 years ago

BSides SATX
Christopher Doege - Intro to Reverse Engineering with Ghidra Taming The Dragon

Title: Intro to Reverse Engineering with Ghidra Taming The Dragon Presenter: Christopher Doege - @Chris_Doege Track: In The ...

54:32
Christopher Doege - Intro to Reverse Engineering with Ghidra Taming The Dragon

382 views

6 years ago

DEFCONConference
DEF CON 31 - Game Changing Advances in Windows Shellcode Analysis - Brizendine,  Kersten, Hince

Shellcode is omnipresent, seen or unseen. Yet tooling to analyze shellcode is lacking. We present the cutting-edge SHAREM ...

43:28
DEF CON 31 - Game Changing Advances in Windows Shellcode Analysis - Brizendine, Kersten, Hince

1,623 views

2 years ago

OpenNSM
OpenNSM (Reverse Engineering Cryptolocker - Brandon Tansey)

Brandon discusses the basics of reverse engineering malware by investigating Cryptolocker. Detailed meeting notes: ...

1:18:01
OpenNSM (Reverse Engineering Cryptolocker - Brandon Tansey)

2,940 views

11 years ago

media.ccc.de
Jethro Beekman: Reversing UEFI by execution

This talk will be an overview of how to reverse-engineer Unified Extensible Firmware Interface (UEFI) firmware, the replacement ...

24:53
Jethro Beekman: Reversing UEFI by execution

1,559 views

10 years ago

HITCON
What the hell is Windows's CLIP Service - Reversing and exploiting the obfuscated code at its core.

With a focus on Reverse Engineering and Vulnerability Research, Philippe uses his background in Embedded Security and ...

40:18
What the hell is Windows's CLIP Service - Reversing and exploiting the obfuscated code at its core.

133 views

7 months ago

DEFCONConference
DEF CON 31 - #NoFilter  Abusing Windows Filtering Platform for privilege escalation - Ron Ben Yizhak

Privilege escalation is a common attack vector in the Windows OS. Today, there are multiple offensive tools in the wild that can ...

35:41
DEF CON 31 - #NoFilter Abusing Windows Filtering Platform for privilege escalation - Ron Ben Yizhak

3,706 views

2 years ago

DEFCONConference
DEF CON 23 - Chris Domas - Repsych: Psychological Warfare in Reverse Engineering

Your precious 0-day? That meticulously crafted exploit? The perfect foothold? At some point, they'll be captured, dissected, and ...

38:49
DEF CON 23 - Chris Domas - Repsych: Psychological Warfare in Reverse Engineering

168,036 views

10 years ago

Recon Conference
Recon 2023 - Erik Egsgard - The Hunt for Red October - One Ping Too Many

The windows networking stack has been the source of various vulnerabilities over the years, a few of which could lead to remote ...

48:40
Recon 2023 - Erik Egsgard - The Hunt for Red October - One Ping Too Many

735 views

2 years ago

OpenSecurityTraining2
Day 1 Part 1: Intro to Software RE (Reverse Engineering)

Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us ...

57:36
Day 1 Part 1: Intro to Software RE (Reverse Engineering)

49,707 views

13 years ago

DEFCONConference
DEF CON 30 Blue Team Village - Connor Morley - Malicious memory techniques on Windows & how to spot

... which can make reverse engineering uh quite painful but we're going to be focusing on the preventing of monitoring by security ...

59:34
DEF CON 30 Blue Team Village - Connor Morley - Malicious memory techniques on Windows & how to spot

1,136 views

3 years ago

media.ccc.de
36C3 -  Reflections on the New Reverse Engineering Law

https://media.ccc.de/v/36c3-11089-reflections_on_the_new_reverse_engineering_law Individuals conducting reverse ...

40:43
36C3 - Reflections on the New Reverse Engineering Law

1,297 views

6 years ago

DEFCONConference
DEF CON 25 - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level

I will show how a generic de-randomization of the Page Table entries can be performed through dynamic reverse engineering.

31:04
DEF CON 25 - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level

7,011 views

8 years ago

潜龙勿用
Lab12 Malware Reverse Engineering

1. Extract strings from malwares with strings.exe from command line 2. Decomplie .Net executables with ILSpy 3. Exploit ...

1:04:35
Lab12 Malware Reverse Engineering

265 views

4 years ago