ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

146 results

NUS Hackers
Hackerschool: Python

Join us to learn the fundamentals of Python! It's one of the most popular and beginner-friendly programming languages, and is ...

1:50:19
Hackerschool: Python

67 views

5 months ago

Paris Kasidiaris
Hacking SourceLair S01E01 - Pygit2

Hacking SourceLair - Getting pygit2 to work.

21:04
Hacking SourceLair S01E01 - Pygit2

657 views

7 years ago

NUS Hackers
FH #279: Notional Machines for Modern Scripting Languages

Introductory CS courses often use scripting languages such as Python. A notional machine is a predictive set of abstractions ...

44:07
FH #279: Notional Machines for Modern Scripting Languages

93 views

7 months ago

DEFCONConference
DEF CON 23 - Shoshitaishvili and Wang - Angry Hacking: The next gen of binary analysis

Security has gone from a curiosity to a phenomenon in the last decade. Fortunately for us, despite the rise of memory-safe, ...

45:58
DEF CON 23 - Shoshitaishvili and Wang - Angry Hacking: The next gen of binary analysis

13,402 views

10 years ago

DEFCONConference
DEF CON Safe Mode - ayoul3 - Only Takes a Spark Popping a Shell on 1000 Nodes

Apache Spark is one of the major players if not the leader when it comes to distributed computing and processing. Want to use ...

45:03
DEF CON Safe Mode - ayoul3 - Only Takes a Spark Popping a Shell on 1000 Nodes

5,446 views

5 years ago

DEFCONConference
DEF CON 31 - HL7Magic  Medical Data Hacking Made Easy - Katie Inns

In recent years, the use of internet-connected devices has become more prevalent in the healthcare sector, particularly as a ...

21:36
DEF CON 31 - HL7Magic Medical Data Hacking Made Easy - Katie Inns

2,435 views

2 years ago

DEFCONConference
DEF CON 24 - Weston Hecker - Hacking Hotel Keys and POS systems

Take a look at weaknesses in Point of sale systems and the foundation of hotel key data and the Property management systems ...

44:20
DEF CON 24 - Weston Hecker - Hacking Hotel Keys and POS systems

5,539 views

9 years ago

DEFCONConference
DEF CON 24 - Alex Chapman and Paul Stone - Toxic Proxies: Bypassing HTTPS

Rogue access points provide attackers with powerful capabilities, but in 2016 modern privacy protections such as HTTPS ...

44:57
DEF CON 24 - Alex Chapman and Paul Stone - Toxic Proxies: Bypassing HTTPS

3,061 views

9 years ago

ProMind Finance & Knowledge Hub
Learn ethical hacking for free and what does ethical hacker do ? || Ethical Hacker Work

Ethical hacking involves an authorized attempt to get unauthorized access to a computer system or any software application, ...

9:56:19
Learn ethical hacking for free and what does ethical hacker do ? || Ethical Hacker Work

21 views

3 years ago

jiska
Bluetooth Hacking 101

You are interested in wireless hacking but have no idea where to start? In this talk you will learn about the current state of ...

23:57
Bluetooth Hacking 101

7,241 views

5 years ago

DEFCONConference
Omer Gull - SELECT code execution from using SQlite - DEF CON 27 Conference

Everyone knows that databases are the crown jewels from a hacker's point of view, but what if you could use a database as the ...

40:56
Omer Gull - SELECT code execution from using SQlite - DEF CON 27 Conference

2,367 views

6 years ago

DEFCONConference
DEF CON 23 - Ryan Mitchell - Separating Bots from the Humans

There's an escalating arms race between bots and the people who protect sites from them. Bots, or web scrapers, can be used to ...

24:26
DEF CON 23 - Ryan Mitchell - Separating Bots from the Humans

10,487 views

10 years ago

DEFCONConference
DEF CON 23 - Craig Young - How to Train Your RFID Hacking Tools

With insecure low frequency RFID access control badges still in use at businesses around the world and high frequency NFC ...

30:18
DEF CON 23 - Craig Young - How to Train Your RFID Hacking Tools

22,055 views

10 years ago

DEFCONConference
DEF CON 24 -  Przemek Jaroszewski - Hacking boarding passes for fun and profit

While traveling through airports, we usually don't give a second thought about why our boarding passes are scanned at various ...

45:21
DEF CON 24 - Przemek Jaroszewski - Hacking boarding passes for fun and profit

15,399 views

9 years ago

LiveOverflow
Hacking into Google's Network for $133,337

In this video we hear the story how Ezequiel Pereira found a critical vulnerability in Google Cloud and was awarded $164674 in ...

31:32
Hacking into Google's Network for $133,337

1,076,957 views

5 years ago

DEFCONConference
DEF CON 31 - Packet Hacking Village - Pwning the Pwners with Mindware - Frank D9 DiGiovanni

Traditionally the cyber attacker has an asymmetric advantage over the cyber defender. But does it have to be that way?

40:48
DEF CON 31 - Packet Hacking Village - Pwning the Pwners with Mindware - Frank D9 DiGiovanni

1,605 views

2 years ago

DEFCONConference
DEF CON 31 - Power Corrupts Corrupt It Back! Hacking Power Management in Data Centers - Quinn, Chick

Our current administration lists "Defend Critical Infrastructure" as the #1 item in the 2023 National Cybersecurity Strategy.

41:53
DEF CON 31 - Power Corrupts Corrupt It Back! Hacking Power Management in Data Centers - Quinn, Chick

2,156 views

2 years ago

DEFCONConference
DEF CON 24 - Anch - So you think you want to be a penetration tester

So, you think you want to be a penetration tester, or you already are and don't understand what the difference between you and all ...

41:59
DEF CON 24 - Anch - So you think you want to be a penetration tester

57,513 views

9 years ago

DEFCONConference
DEF CON 23 - Atlas - Fun with Symboliks

Materials Available ...

42:20
DEF CON 23 - Atlas - Fun with Symboliks

5,356 views

10 years ago

DEFCONConference
Brad Dixon - Cheating in eSports How to Cheat at Virtual Cycling - DEF CON 27 Conference

Athletes are competing in virtual cycling by riding real bikes on stationary trainers which power the in-game athletic performance.

39:03
Brad Dixon - Cheating in eSports How to Cheat at Virtual Cycling - DEF CON 27 Conference

135,246 views

6 years ago