ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

211 results

DEFCONConference
Dr Bramwell Brizendine - JOP ROCKET A Wicked Tool for JOP Gadget Discovery - DEF CON 27 Conference

Return-oriented Programming (ROP) has been the predominate code-reuse attack for over a decade, but there are other options.

22:22
Dr Bramwell Brizendine - JOP ROCKET A Wicked Tool for JOP Gadget Discovery - DEF CON 27 Conference

1,368 views

6 years ago

DEFCONConference
DEF CON 31 - Retro Exploitation - Vintage Computing as a Vuln Research Playground - Wesley McGrew

It can be very difficult for those new to hacking to learn about vulnerability discovery and exploit development on modern ...

44:15
DEF CON 31 - Retro Exploitation - Vintage Computing as a Vuln Research Playground - Wesley McGrew

669 views

2 years ago

DEFCONConference
DEF CON 23 - Ionut Popescu - NetRipper: Smart Traffic Sniffing for Penetration Testers

He is passionate about ASM, reverse engineering, shellcode and exploit development and he has a MCTS Windows Internals ...

41:56
DEF CON 23 - Ionut Popescu - NetRipper: Smart Traffic Sniffing for Penetration Testers

7,437 views

10 years ago

DEFCONConference
DEF CON 21 - Fatih Ozavci - VoIP Wars Return of the SIP

... also well versed at network penetration testing, web application testing, reverse engineering, fuzzing and exploit development.

47:11
DEF CON 21 - Fatih Ozavci - VoIP Wars Return of the SIP

4,286 views

12 years ago

DEFCONConference
DEF CON 21 - Soen - Evolving Exploits Through Genetic Algorithms

Evolving Exploits Through Genetic Algorithms SOEN HACKER FOR TEAM VANNED This talk will discuss the next logical step ...

23:35
DEF CON 21 - Soen - Evolving Exploits Through Genetic Algorithms

4,454 views

12 years ago

DEFCONConference
DEF CON 23 - Panel - Abusing Adobe Readers JavaScript APIs

His focus includes performing root-cause analysis, fuzzing and exploit development. Prior to joining HP, Hariri worked as an ...

36:58
DEF CON 23 - Panel - Abusing Adobe Readers JavaScript APIs

3,091 views

10 years ago

DEFCONConference
DEF CON 23 - Daniel Selifonov - Drinking from LETHE: Exploiting Memory Corruption Vulns

Memory corruption vulnerabilities have plagued computer systems since we started programming software. Techniques for ...

43:09
DEF CON 23 - Daniel Selifonov - Drinking from LETHE: Exploiting Memory Corruption Vulns

3,849 views

10 years ago

DEFCONConference
DEF CON 31 - Attacking And Securing the Pixel Modem  - Karimi,  Xing , Gong, Rodionov

To ensure Google Pixel devices are always at their most secure, the Android Red Team continuously attacks the riskiest areas of ...

48:11
DEF CON 31 - Attacking And Securing the Pixel Modem - Karimi, Xing , Gong, Rodionov

1,815 views

2 years ago

DEFCONConference
Douglas McKee - HVACking Understand the Delta Between Security and Reality - DEF CON 27 Conference

... systems program, Mark's work has focused primarily on vulnerability discovery and exploit development for embedded systems.

40:06
Douglas McKee - HVACking Understand the Delta Between Security and Reality - DEF CON 27 Conference

7,440 views

6 years ago

Channel2600
HOPE XV (2024): Why Are We Insecure? An Ethical Hacker's Lonely Road to Cyber Dystopia

Friday, July 12, 2024: 11:00 am (Little Theatre): In this revealing presentation, an ethical hacker with 25 years of experience ...

51:13
HOPE XV (2024): Why Are We Insecure? An Ethical Hacker's Lonely Road to Cyber Dystopia

70 views

1 year ago

Samuel Henrique
The Security of Debian - An introduction to advanced users  - DebConf25

How Debian handles security vulnerabilities (CVEs) for its packages. Learn how security vulnerabilities are tracked and fixed, ...

43:52
The Security of Debian - An introduction to advanced users - DebConf25

635 views

2 months ago

DEFCONConference
Jesse Michael - Get Off the Kernel if You Can't Drive - DEF CON 27 Conference

His primary areas of expertise include reverse engineering embedded firmware and exploit development. He has also presented ...

48:49
Jesse Michael - Get Off the Kernel if You Can't Drive - DEF CON 27 Conference

5,588 views

6 years ago

DEFCONConference
DEF CON 24 - Alex Chapman and Paul Stone - Toxic Proxies: Bypassing HTTPS

... in the UK, where he performs vulnerability discovery, exploit development, bespoke protocol analysis and reverse engineering.

44:57
DEF CON 24 - Alex Chapman and Paul Stone - Toxic Proxies: Bypassing HTTPS

3,053 views

9 years ago

DEFCONConference
DEF CON 23 - Tony Trummer and Tushar Dalvi - QARK: Android App Exploit and SCA Tool

Ever wonder why there isn't a metasploit-style framework for Android apps? We did! Whether you're a developer trying to protect ...

47:07
DEF CON 23 - Tony Trummer and Tushar Dalvi - QARK: Android App Exploit and SCA Tool

6,175 views

10 years ago

DEFCONConference
DEF CON 31 - StackMoonwalk  - Alessandro Magnosi, Arash  Parsa, Athanasios Tserpelis

The rapid advancement of cyber defense products has led to an increase in sophisticated memory evasion techniques employed ...

39:41
DEF CON 31 - StackMoonwalk - Alessandro Magnosi, Arash Parsa, Athanasios Tserpelis

1,529 views

2 years ago

DEFCONConference
DEF CON 24 - Amro Abdelgawad - The Remote Metamorphic Engine

... reverse engineering, exploit development and the defensive side as a chief security officer for software companies running wide ...

48:25
DEF CON 24 - Amro Abdelgawad - The Remote Metamorphic Engine

1,436 views

9 years ago

DEFCONConference
DEF CON 30 - Gal Zror - Hacking ISPs with Point-to-Pwn Protocol over Ethernet (PPPoE)

Hello, my name is BWL-X8620, and I'm a SOHO router. For many years my fellow SOHO routers and I were victims of endless ...

39:19
DEF CON 30 - Gal Zror - Hacking ISPs with Point-to-Pwn Protocol over Ethernet (PPPoE)

39,615 views

3 years ago

OpenSecurityTraining2
Vulns1001 03 Heap Buffer Overflow 🥷CVE-2020-0917🦾 03 Exploit

View the full free MOOC at https://ost2.fyi/Vulns1001. This class is for C/C++ developers learning secure development, and ...

25:12
Vulns1001 03 Heap Buffer Overflow 🥷CVE-2020-0917🦾 03 Exploit

1,353 views

2 years ago

Asso HZV
🇫🇷 The Last Resort: Debugging Embedded Systems with Unconventional Methods - Vincent Lopes

A debugger is always a valuable tool when searching for vulnerabilities, particularly in embedded systems where multiple ...

26:40
🇫🇷 The Last Resort: Debugging Embedded Systems with Unconventional Methods - Vincent Lopes

266 views

6 days ago

DEFCONConference
DEF CON 30 - Adam Zabrocki, Alex Tereshkin - Exploitation in the era of Formal Verification

For decades, software vulnerabilities have remained an unsolvable security problem regardless of years of investment in various ...

41:48
DEF CON 30 - Adam Zabrocki, Alex Tereshkin - Exploitation in the era of Formal Verification

5,589 views

3 years ago