ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

2,363 results

David Bombal
How to make Millions $$$ hacking zero days?

... courses // SANS Course sans.org. https://www.sans.org/cyber-security-courses/ - Advanced exploit development for penetration ...

1:12:52
How to make Millions $$$ hacking zero days?

170,395 views

3 years ago

Cybernews
The Biggest Hacking Mystery of Our Time: Shadow Brokers

The Shadow Brokers leaks are one of the pivotal moments in history: not only did they create a massive wave of cybercrime and ...

49:42
The Biggest Hacking Mystery of Our Time: Shadow Brokers

1,866,295 views

8 months ago

David Bombal
Reverse Engineering 101 tutorial with the amazing Stephen Sims!

... https://Brilliant.org/davidbombal // YouTube video REFERENCE // Free Exploit development training (beginner and advanced) ...

1:18:48
Reverse Engineering 101 tutorial with the amazing Stephen Sims!

135,576 views

1 year ago

SANS Digital Forensics and Incident Response
Meltdown and Spectre - Understanding and mitigating the threats - SANS DFIR Webcast

On Jan 3 2018, two new vulnerabilities (Meltdown and Spectre) were introduced that are in the architecture of processors in ...

54:36
Meltdown and Spectre - Understanding and mitigating the threats - SANS DFIR Webcast

46,642 views

8 years ago

Leet Cipher
Malware development 101: Creating your first ever MALWARE

in this video, we go through the process of malware development in real life. we'll talk about various concepts such as shellcode, ...

28:00
Malware development 101: Creating your first ever MALWARE

507,749 views

2 years ago

David Bombal
Buffer Overflow Hacking Tutorial (Bypass Passwords)

He's authored SANS most advanced course, SEC760: Advanced Exploit Development for Penetration Testers, was the 9th person ...

55:39
Buffer Overflow Hacking Tutorial (Bypass Passwords)

90,594 views

2 years ago

ZDResearch Training
ZDResearch Training Exploit Development -- Lecture 1: Introduction

In this lecture, you will go through the concepts behind exploit development, and see a hands-on demo of how to exploit binary ...

43:15
ZDResearch Training Exploit Development -- Lecture 1: Introduction

1,312 views

8 years ago

Hacker Gallery
I found out what hackers have been up to...

Compilation of 15 original stories detailing ransomware operations, real-world hacks, data breaches, and malware analysis.

2:34:56
I found out what hackers have been up to...

4,026 views

4 months ago

Senator Sheldon Whitehouse
SAVE America Act? More like the "Steal Our Next Election Act." Sen. Whitehouse Rips GOP Bill

March 21 | Senator Sheldon Whitehouse (D-RI) takes to the Senate Floor to speak against the so-called SAVE America Act.

47:23
SAVE America Act? More like the "Steal Our Next Election Act." Sen. Whitehouse Rips GOP Bill

919 views

36 minutes ago

Security Hub
DEF CON 24 - Amro Abdelgawad - The Remote Metamorphic Engine

... reverse engineering, exploit development and the defensive side as a chief security officer for software companies running wide ...

48:25
DEF CON 24 - Amro Abdelgawad - The Remote Metamorphic Engine

57 views

8 years ago

DEFCONConference
DEF CON 24 - Max Bazaliy - A Journey Through Exploit Mitigation Techniques in iOS

Over the past year, Apple has consistently added features to prevent exploitation of the iOS kernel. These features, while largely ...

20:11
DEF CON 24 - Max Bazaliy - A Journey Through Exploit Mitigation Techniques in iOS

2,259 views

9 years ago

Jack Rhysider
Hacker vs. Hacker: Why EVERYONE Hated His Genius Malware Kit🎙Darknet Diaries Ep. 114: HD

HD Moore is the brains behind Metasploit, the most popular hacking toolkit for penetration testers. It's crammed with tons of ...

1:16:04
Hacker vs. Hacker: Why EVERYONE Hated His Genius Malware Kit🎙Darknet Diaries Ep. 114: HD

145,034 views

2 years ago

Jack Rhysider
Why Governments Love to Buy the Bugs in Your Favorite Apps🎙Darknet Diaries Ep. 98: Zero Day Brokers

If a hacker finds a bug at Microsoft or Google, they could report it to the company, get it patched up, and get a nice reward.

50:14
Why Governments Love to Buy the Bugs in Your Favorite Apps🎙Darknet Diaries Ep. 98: Zero Day Brokers

87,565 views

2 years ago

LiveOverflow
Finding iOS Kernel Exploit // SockPuppet Jailbreak - CVE-2019-8605

Ned Williamson of Google Project Zero explains how he discovered the Sock Puppet vulnerability affecting the XNU Kernel in iOS ...

23:45
Finding iOS Kernel Exploit // SockPuppet Jailbreak - CVE-2019-8605

167,706 views

6 years ago

DEFCONConference
DEF CON 24 - Alex Chapman and Paul Stone - Toxic Proxies: Bypassing HTTPS

... in the UK, where he performs vulnerability discovery, exploit development, bespoke protocol analysis and reverse engineering.

44:57
DEF CON 24 - Alex Chapman and Paul Stone - Toxic Proxies: Bypassing HTTPS

3,055 views

9 years ago

Channel2600
HOPE XV (2024): Why Are We Insecure? An Ethical Hacker's Lonely Road to Cyber Dystopia

Friday, July 12, 2024: 11:00 am (Little Theatre): In this revealing presentation, an ethical hacker with 25 years of experience ...

51:13
HOPE XV (2024): Why Are We Insecure? An Ethical Hacker's Lonely Road to Cyber Dystopia

71 views

1 year ago

1r0n_f15t
Exploit Writing 1: Stack Based Overflows (corelan.be)

https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/ : reference Hope you guys ...

37:29
Exploit Writing 1: Stack Based Overflows (corelan.be)

1,932 views

7 years ago

The Cyber Mentor
IoT Hacking Stream

https://www.tcm.rocks/pipa-y - Become a certified IoT & hardware hacker with the Practical IoT Pentest Associate (PIPA!) Not ready ...

1:18:09
IoT Hacking Stream

3,019 views

Streamed 1 month ago

Cyber Technical knowledge
Metasploit For Beginners to Expert ||The Basics Modules, Exploits And Payloads

This framework has become the go-to exploit development and mitigation tool. Prior to Metasploit, pen testers had to perform all ...

2:00:03
Metasploit For Beginners to Expert ||The Basics Modules, Exploits And Payloads

3,096 views

3 years ago

freeCodeCamp.org
Web App Vulnerabilities - DevSecOps Course for Beginners

In this DevSecOps course, you will learn how to take advantage of common web vulnerabilities, how to fix those vulnerabilities, ...

1:28:49
Web App Vulnerabilities - DevSecOps Course for Beginners

210,749 views

4 years ago