Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
2,079 results
... courses // SANS Course sans.org. https://www.sans.org/cyber-security-courses/ - Advanced exploit development for penetration ...
168,242 views
3 years ago
in this video, we go through the process of malware development in real life. we'll talk about various concepts such as shellcode, ...
501,980 views
1 year ago
... https://Brilliant.org/davidbombal // YouTube video REFERENCE // Free Exploit development training (beginner and advanced) ...
131,299 views
Return-oriented Programming (ROP) has been the predominate code-reuse attack for over a decade, but there are other options.
1,365 views
6 years ago
It can be very difficult for those new to hacking to learn about vulnerability discovery and exploit development on modern ...
665 views
2 years ago
He is passionate about ASM, reverse engineering, shellcode and exploit development and he has a MCTS Windows Internals ...
7,436 views
10 years ago
In this lecture, you will go through the concepts behind exploit development, and see a hands-on demo of how to exploit binary ...
1,305 views
7 years ago
Compilation of 15 original stories detailing ransomware operations, real-world hacks, data breaches, and malware analysis.
3,724 views
2 months ago
Moderator: Ed Skoudis, President, SANS Technology Institute College Panelists: Heather Mahalik, DFIR Curriculum Lead, SANS ...
1,517 views
Moderator: Ed Skoudis, President, SANS Technology Institute College Panelists: Heather Mahalik Barnhart, DFIR Curriculum ...
3,187 views
Subscribe to BBRE Premium: https://bbre.dev/premium ✉️ Sign up for the mailing list: https://bbre.dev/nl Follow me on Twitter: ...
3,511 views
Welcome to "hackmate," your trusted source for all things cybersecurity! Our YouTube channel is your gateway to the fascinating ...
40 views
... also well versed at network penetration testing, web application testing, reverse engineering, fuzzing and exploit development.
4,281 views
12 years ago
... reverse engineering, exploit development and the defensive side as a chief security officer for software companies running wide ...
57 views
8 years ago
Tired of obfuscating strings and recompiling to break signatures? Wish you could keep PE-sieve from ripping your malware out of ...
10,138 views
Create your Python Malware lab: https://ntck.co/linode (you get a $100 Credit good for 60 days as a new user!) We are going to ...
2,878,707 views
Over the past year, Apple has consistently added features to prevent exploitation of the iOS kernel. These features, while largely ...
2,254 views
9 years ago
Ned Williamson of Google Project Zero explains how he discovered the Sock Puppet vulnerability affecting the XNU Kernel in iOS ...
167,434 views
I break down the vulnerability step-by-step and explore the early stages of exploit development. The video is in Italian with English ...
128 views
5 months ago
The Shadow Brokers leaks are one of the pivotal moments in history: not only did they create a massive wave of cybercrime and ...
1,724,413 views
6 months ago