ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

113,977 results

The Linux Foundation
SLUB Internals for Exploit Developers - Andrey Konovalov, xairy.io

SLUB Internals for Exploit Developers - Andrey Konovalov, xairy.io Every Linux kernel exploit that targets a slab memory ...

1:30:49
SLUB Internals for Exploit Developers - Andrey Konovalov, xairy.io

1,980 views

1 year ago

media.ccc.de
34C3 -  1-day exploit development for Cisco IOS

https://media.ccc.de/v/34c3-8936-1-day_exploit_development_for_cisco_ios Year 2017 was rich in vulnerabilities discovered for ...

45:37
34C3 - 1-day exploit development for Cisco IOS

5,794 views

8 years ago

DEFCONConference
DEF CON 32 - The Rise and Fall of Binary Exploitation - Stephen Sims

For the past 20+ years binary exploitation has been seen as the ultimate challenge and prize, when exploiting large applications ...

47:41
DEF CON 32 - The Rise and Fall of Binary Exploitation - Stephen Sims

5,715 views

1 year ago

DEFCONConference
DEF CON 33 - Exploiting Shadow Data from AI Models and Embeddings - Patrick Walsh

This talk explores the hidden risks in apps leveraging modern AI systems—especially those using large language models (LLMs) ...

48:23
DEF CON 33 - Exploiting Shadow Data from AI Models and Embeddings - Patrick Walsh

170,333 views

5 months ago

NetSecNow
How-to Penetration Testing and Exploiting with Metasploit + Armitage + msfconsole

http://www.PentesterUniversity.org In this Video we show you how to exploit machines with Metasploit, Armitage, and msfconsole.

1:14:08
How-to Penetration Testing and Exploiting with Metasploit + Armitage + msfconsole

662,026 views

12 years ago

pwn.college
pwn.college - Advanced Exploitation - Exploit Primitives

Let's learn about exploitation primitives! Module details at https://pwn.college/modules/exploitation2.

45:58
pwn.college - Advanced Exploitation - Exploit Primitives

3,484 views

5 years ago

BSidesKC
Exploit Development Is Dead, Long Live Exploit Development!

It is no secret that the days of jmp esp are far gone. In the age of Virtualization-Based Security and Hypervisor Protected Code ...

47:57
Exploit Development Is Dead, Long Live Exploit Development!

9,965 views

4 years ago

John Hammond
Exploiting Unauthenticated Redis - TryHackMe!

To help support me, check out Kite! Kite is a coding assistant that helps you faster, on any IDE offer smart completions and ...

35:08
Exploiting Unauthenticated Redis - TryHackMe!

34,321 views

5 years ago

DEFCONConference
DEF CON 26 - zerosum0x0 - Demystifying MS17 010 Reverse Engineering the ETERNAL Exploits

MS17-010 is the most important patch in the history of operating systems, fixing remote code execution vulnerabilities in the world ...

48:14
DEF CON 26 - zerosum0x0 - Demystifying MS17 010 Reverse Engineering the ETERNAL Exploits

17,657 views

7 years ago

gamozolabs
Finding and exploiting a bug (LPE) in an old Android phone (Part 1/2)

In this video we find and write an exploit for a bug in an old Android phone, a Motorola Electrify, running Android 2.3.5. 00:00:00 ...

9:43:10
Finding and exploiting a bug (LPE) in an old Android phone (Part 1/2)

7,395 views

5 years ago

John Hammond
ShellShock & Kernel Exploits - TryHackMe! 0day

To help support me, check out Kite! Kite is a coding assistant that helps you faster, on any IDE offer smart completions and ...

35:10
ShellShock & Kernel Exploits - TryHackMe! 0day

83,228 views

5 years ago

media.ccc.de
Exploiting PHP7 unserialize (33c3)

https://media.ccc.de/v/33c3-7858-exploiting_php7_unserialize teaching a new dog old tricks PHP-7 is a new version of the most ...

44:02
Exploiting PHP7 unserialize (33c3)

6,619 views

9 years ago

DEFCONConference
DEF CON 32 - Clash, Burn, and Exploit  Manipulate Filters to Pwn kernelCTF - HexRabbit Chen

As the successor to the iptables, nftables stands as a crucial network component within the Linux kernel, managing packet filtering ...

37:40
DEF CON 32 - Clash, Burn, and Exploit Manipulate Filters to Pwn kernelCTF - HexRabbit Chen

530 views

1 year ago

DEFCONConference
DEF CON 31 - Azure B2C 0Day - An Exploit Chain from Public Keys to Microsoft Bug Bounty - John Novak

This presentation will cover a complete exploit chain in Azure B2C, starting with a discovery of cryptographic misuse and leading ...

40:14
DEF CON 31 - Azure B2C 0Day - An Exploit Chain from Public Keys to Microsoft Bug Bounty - John Novak

2,582 views

2 years ago

John Hammond
VULNSERVER Exploit: HTER w/ Assembly & Shellcode

If you would like to support me, please like, comment & subscribe, and check me out on Patreon: ...

32:47
VULNSERVER Exploit: HTER w/ Assembly & Shellcode

33,545 views

6 years ago

PentestClass
The Exploit Intelligence Project v1

Dan Guido, The Exploit Intelligence Project, April 2011 http://cryptocity.net/files/presentations/EIP-1.1.pdf.

59:55
The Exploit Intelligence Project v1

1,118 views

14 years ago

DEFCONConference
DEF CON 33 - Exploiting Security Side Channels in E2E Encrypted Msngrs - G Gegenheuber,  M Gunther

With billions of users worldwide, mobile messaging apps like WhatsApp and Signal have become critical for personal and ...

40:43
DEF CON 33 - Exploiting Security Side Channels in E2E Encrypted Msngrs - G Gegenheuber, M Gunther

8,285 views

5 months ago

John Hammond
TryHackMe! SweetRice Exploit & Stabilizing Shells

If you would like to support me, please like, comment & subscribe, and check me out on Patreon: ...

20:25
TryHackMe! SweetRice Exploit & Stabilizing Shells

58,014 views

5 years ago

EuroPython Conference
Pwndbg: Low level debugging and exploit development with Python — disconnect3d

EuroPython 2025 — Terrace 2A on 2025-07-17] *Pwndbg: Low level debugging and exploit development with Python by ...

45:08
Pwndbg: Low level debugging and exploit development with Python — disconnect3d

492 views

4 months ago

The Linux Foundation
Replace Your Exploit-Ridden Firmware with Linux - Ronald Minnich, Google

Replace Your Exploit-Ridden Firmware with Linux - Ronald Minnich, Google With the WikiLeaks release of the vault7 material, the ...

38:03
Replace Your Exploit-Ridden Firmware with Linux - Ronald Minnich, Google

72,118 views

8 years ago