ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

2,154 results

David Bombal
How to make Millions $$$ hacking zero days?

... courses // SANS Course sans.org. https://www.sans.org/cyber-security-courses/ - Advanced exploit development for penetration ...

1:12:52
How to make Millions $$$ hacking zero days?

168,642 views

3 years ago

David Bombal
Reverse Engineering 101 tutorial with the amazing Stephen Sims!

... Exploit development training (beginner and advanced) https://youtu.be/LWmy3t84AIo Buffer Overflow Hacking Tutorial (Bypass ...

1:18:48
Reverse Engineering 101 tutorial with the amazing Stephen Sims!

132,209 views

1 year ago

DEFCONConference
DEF CON 31 - Retro Exploitation - Vintage Computing as a Vuln Research Playground - Wesley McGrew

It can be very difficult for those new to hacking to learn about vulnerability discovery and exploit development on modern ...

44:15
DEF CON 31 - Retro Exploitation - Vintage Computing as a Vuln Research Playground - Wesley McGrew

668 views

2 years ago

Leet Cipher
Malware development 101: Creating your first ever MALWARE

in this video, we go through the process of malware development in real life. we'll talk about various concepts such as shellcode, ...

28:00
Malware development 101: Creating your first ever MALWARE

503,283 views

1 year ago

DEFCONConference
Dr Bramwell Brizendine - JOP ROCKET A Wicked Tool for JOP Gadget Discovery - DEF CON 27 Conference

Return-oriented Programming (ROP) has been the predominate code-reuse attack for over a decade, but there are other options.

22:22
Dr Bramwell Brizendine - JOP ROCKET A Wicked Tool for JOP Gadget Discovery - DEF CON 27 Conference

1,367 views

6 years ago

Cybernews
The Biggest Hacking Mystery of Our Time: Shadow Brokers

The Shadow Brokers leaks are one of the pivotal moments in history: not only did they create a massive wave of cybercrime and ...

49:42
The Biggest Hacking Mystery of Our Time: Shadow Brokers

1,761,276 views

7 months ago

DEFCONConference
DEF CON 23 - Ionut Popescu - NetRipper: Smart Traffic Sniffing for Penetration Testers

He is passionate about ASM, reverse engineering, shellcode and exploit development and he has a MCTS Windows Internals ...

41:56
DEF CON 23 - Ionut Popescu - NetRipper: Smart Traffic Sniffing for Penetration Testers

7,437 views

10 years ago

NetworkChuck
i created malware with Python (it's SCARY easy!!)

Create your Python Malware lab: https://ntck.co/linode (you get a $100 Credit good for 60 days as a new user!) We are going to ...

25:18
i created malware with Python (it's SCARY easy!!)

2,885,217 views

3 years ago

Hacker Gallery
I found out what hackers have been up to...

Compilation of 15 original stories detailing ransomware operations, real-world hacks, data breaches, and malware analysis.

2:34:56
I found out what hackers have been up to...

3,758 views

3 months ago

ZDResearch Training
ZDResearch Training Exploit Development -- Lecture 1: Introduction

In this lecture, you will go through the concepts behind exploit development, and see a hands-on demo of how to exploit binary ...

43:15
ZDResearch Training Exploit Development -- Lecture 1: Introduction

1,307 views

7 years ago

LiveOverflow
Finding iOS Kernel Exploit // SockPuppet Jailbreak - CVE-2019-8605

Ned Williamson of Google Project Zero explains how he discovered the Sock Puppet vulnerability affecting the XNU Kernel in iOS ...

23:45
Finding iOS Kernel Exploit // SockPuppet Jailbreak - CVE-2019-8605

167,476 views

6 years ago

David Bombal
Ex-NSA hacker tells us how to get into hacking!

This is the path to becoming a hacker. Follow the advice and change your life! Menu: How to get experience to become an Ethical ...

51:52
Ex-NSA hacker tells us how to get into hacking!

2,070,861 views

5 years ago

Bug Bounty Reports Explained
From reporting self-XSSes to improving browser security mechanisms - Michał Bentkowski

Subscribe to BBRE Premium: https://bbre.dev/premium ✉️ Sign up for the mailing list: https://bbre.dev/nl Follow me on Twitter: ...

1:30:29
From reporting self-XSSes to improving browser security mechanisms - Michał Bentkowski

3,511 views

2 years ago

RSA Conference
The Five Most Dangerous New Attack Techniques You Need to Know About

Moderator: Ed Skoudis, President, SANS Technology Institute College Panelists: Heather Mahalik Barnhart, DFIR Curriculum ...

47:11
The Five Most Dangerous New Attack Techniques You Need to Know About

3,193 views

1 year ago

RSA Conference
The Five Most Dangerous New Attack Techniques

Moderator: Ed Skoudis, President, SANS Technology Institute College Panelists: Heather Mahalik, DFIR Curriculum Lead, SANS ...

48:12
The Five Most Dangerous New Attack Techniques

1,518 views

2 years ago

DEFCONConference
DEF CON 21 - Fatih Ozavci - VoIP Wars Return of the SIP

... also well versed at network penetration testing, web application testing, reverse engineering, fuzzing and exploit development.

47:11
DEF CON 21 - Fatih Ozavci - VoIP Wars Return of the SIP

4,284 views

12 years ago

Security Hub
DEF CON 24 - Amro Abdelgawad - The Remote Metamorphic Engine

... reverse engineering, exploit development and the defensive side as a chief security officer for software companies running wide ...

48:25
DEF CON 24 - Amro Abdelgawad - The Remote Metamorphic Engine

57 views

8 years ago

DEFCONConference
DEF CON 21 - Soen - Evolving Exploits Through Genetic Algorithms

Evolving Exploits Through Genetic Algorithms SOEN HACKER FOR TEAM VANNED This talk will discuss the next logical step ...

23:35
DEF CON 21 - Soen - Evolving Exploits Through Genetic Algorithms

4,454 views

12 years ago

DEFCONConference
DEF CON 30 - Kyle Avery - Avoiding Memory Scanners - Customizing Malware to Evade YARA, PE-sieve

Tired of obfuscating strings and recompiling to break signatures? Wish you could keep PE-sieve from ripping your malware out of ...

43:34
DEF CON 30 - Kyle Avery - Avoiding Memory Scanners - Customizing Malware to Evade YARA, PE-sieve

10,168 views

3 years ago

HACKMATE
Complete Ethical Hacking Bootcamp 2023 Zero to pro || security bugs & vulnerabilities tutorial -4

Welcome to "hackmate," your trusted source for all things cybersecurity! Our YouTube channel is your gateway to the fascinating ...

55:01
Complete Ethical Hacking Bootcamp 2023 Zero to pro || security bugs & vulnerabilities tutorial -4

40 views

2 years ago