Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
2,363 results
... courses // SANS Course sans.org. https://www.sans.org/cyber-security-courses/ - Advanced exploit development for penetration ...
170,395 views
3 years ago
The Shadow Brokers leaks are one of the pivotal moments in history: not only did they create a massive wave of cybercrime and ...
1,866,295 views
8 months ago
... https://Brilliant.org/davidbombal // YouTube video REFERENCE // Free Exploit development training (beginner and advanced) ...
135,576 views
1 year ago
On Jan 3 2018, two new vulnerabilities (Meltdown and Spectre) were introduced that are in the architecture of processors in ...
46,642 views
8 years ago
in this video, we go through the process of malware development in real life. we'll talk about various concepts such as shellcode, ...
507,749 views
2 years ago
He's authored SANS most advanced course, SEC760: Advanced Exploit Development for Penetration Testers, was the 9th person ...
90,594 views
In this lecture, you will go through the concepts behind exploit development, and see a hands-on demo of how to exploit binary ...
1,312 views
Compilation of 15 original stories detailing ransomware operations, real-world hacks, data breaches, and malware analysis.
4,026 views
4 months ago
March 21 | Senator Sheldon Whitehouse (D-RI) takes to the Senate Floor to speak against the so-called SAVE America Act.
919 views
36 minutes ago
... reverse engineering, exploit development and the defensive side as a chief security officer for software companies running wide ...
57 views
Over the past year, Apple has consistently added features to prevent exploitation of the iOS kernel. These features, while largely ...
2,259 views
9 years ago
HD Moore is the brains behind Metasploit, the most popular hacking toolkit for penetration testers. It's crammed with tons of ...
145,034 views
If a hacker finds a bug at Microsoft or Google, they could report it to the company, get it patched up, and get a nice reward.
87,565 views
Ned Williamson of Google Project Zero explains how he discovered the Sock Puppet vulnerability affecting the XNU Kernel in iOS ...
167,706 views
6 years ago
... in the UK, where he performs vulnerability discovery, exploit development, bespoke protocol analysis and reverse engineering.
3,055 views
Friday, July 12, 2024: 11:00 am (Little Theatre): In this revealing presentation, an ethical hacker with 25 years of experience ...
71 views
https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/ : reference Hope you guys ...
1,932 views
7 years ago
https://www.tcm.rocks/pipa-y - Become a certified IoT & hardware hacker with the Practical IoT Pentest Associate (PIPA!) Not ready ...
3,019 views
Streamed 1 month ago
This framework has become the go-to exploit development and mitigation tool. Prior to Metasploit, pen testers had to perform all ...
3,096 views
In this DevSecOps course, you will learn how to take advantage of common web vulnerabilities, how to fix those vulnerabilities, ...
210,749 views
4 years ago