ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

2,079 results

David Bombal
How to make Millions $$$ hacking zero days?

... courses // SANS Course sans.org. https://www.sans.org/cyber-security-courses/ - Advanced exploit development for penetration ...

1:12:52
How to make Millions $$$ hacking zero days?

168,242 views

3 years ago

Leet Cipher
Malware development 101: Creating your first ever MALWARE

in this video, we go through the process of malware development in real life. we'll talk about various concepts such as shellcode, ...

28:00
Malware development 101: Creating your first ever MALWARE

501,980 views

1 year ago

David Bombal
Reverse Engineering 101 tutorial with the amazing Stephen Sims!

... https://Brilliant.org/davidbombal // YouTube video REFERENCE // Free Exploit development training (beginner and advanced) ...

1:18:48
Reverse Engineering 101 tutorial with the amazing Stephen Sims!

131,299 views

1 year ago

DEFCONConference
Dr Bramwell Brizendine - JOP ROCKET A Wicked Tool for JOP Gadget Discovery - DEF CON 27 Conference

Return-oriented Programming (ROP) has been the predominate code-reuse attack for over a decade, but there are other options.

22:22
Dr Bramwell Brizendine - JOP ROCKET A Wicked Tool for JOP Gadget Discovery - DEF CON 27 Conference

1,365 views

6 years ago

DEFCONConference
DEF CON 31 - Retro Exploitation - Vintage Computing as a Vuln Research Playground - Wesley McGrew

It can be very difficult for those new to hacking to learn about vulnerability discovery and exploit development on modern ...

44:15
DEF CON 31 - Retro Exploitation - Vintage Computing as a Vuln Research Playground - Wesley McGrew

665 views

2 years ago

DEFCONConference
DEF CON 23 - Ionut Popescu - NetRipper: Smart Traffic Sniffing for Penetration Testers

He is passionate about ASM, reverse engineering, shellcode and exploit development and he has a MCTS Windows Internals ...

41:56
DEF CON 23 - Ionut Popescu - NetRipper: Smart Traffic Sniffing for Penetration Testers

7,436 views

10 years ago

ZDResearch Training
ZDResearch Training Exploit Development -- Lecture 1: Introduction

In this lecture, you will go through the concepts behind exploit development, and see a hands-on demo of how to exploit binary ...

43:15
ZDResearch Training Exploit Development -- Lecture 1: Introduction

1,305 views

7 years ago

Hacker Gallery
I found out what hackers have been up to...

Compilation of 15 original stories detailing ransomware operations, real-world hacks, data breaches, and malware analysis.

2:34:56
I found out what hackers have been up to...

3,724 views

2 months ago

RSA Conference
The Five Most Dangerous New Attack Techniques

Moderator: Ed Skoudis, President, SANS Technology Institute College Panelists: Heather Mahalik, DFIR Curriculum Lead, SANS ...

48:12
The Five Most Dangerous New Attack Techniques

1,517 views

2 years ago

RSA Conference
The Five Most Dangerous New Attack Techniques You Need to Know About

Moderator: Ed Skoudis, President, SANS Technology Institute College Panelists: Heather Mahalik Barnhart, DFIR Curriculum ...

47:11
The Five Most Dangerous New Attack Techniques You Need to Know About

3,187 views

1 year ago

Bug Bounty Reports Explained
From reporting self-XSSes to improving browser security mechanisms - Michał Bentkowski

Subscribe to BBRE Premium: https://bbre.dev/premium ✉️ Sign up for the mailing list: https://bbre.dev/nl Follow me on Twitter: ...

1:30:29
From reporting self-XSSes to improving browser security mechanisms - Michał Bentkowski

3,511 views

2 years ago

HACKMATE
Complete Ethical Hacking Bootcamp 2023 Zero to pro || security bugs & vulnerabilities tutorial -4

Welcome to "hackmate," your trusted source for all things cybersecurity! Our YouTube channel is your gateway to the fascinating ...

55:01
Complete Ethical Hacking Bootcamp 2023 Zero to pro || security bugs & vulnerabilities tutorial -4

40 views

2 years ago

DEFCONConference
DEF CON 21 - Fatih Ozavci - VoIP Wars Return of the SIP

... also well versed at network penetration testing, web application testing, reverse engineering, fuzzing and exploit development.

47:11
DEF CON 21 - Fatih Ozavci - VoIP Wars Return of the SIP

4,281 views

12 years ago

Security Hub
DEF CON 24 - Amro Abdelgawad - The Remote Metamorphic Engine

... reverse engineering, exploit development and the defensive side as a chief security officer for software companies running wide ...

48:25
DEF CON 24 - Amro Abdelgawad - The Remote Metamorphic Engine

57 views

8 years ago

DEFCONConference
DEF CON 30 - Kyle Avery - Avoiding Memory Scanners - Customizing Malware to Evade YARA, PE-sieve

Tired of obfuscating strings and recompiling to break signatures? Wish you could keep PE-sieve from ripping your malware out of ...

43:34
DEF CON 30 - Kyle Avery - Avoiding Memory Scanners - Customizing Malware to Evade YARA, PE-sieve

10,138 views

3 years ago

NetworkChuck
i created malware with Python (it's SCARY easy!!)

Create your Python Malware lab: https://ntck.co/linode (you get a $100 Credit good for 60 days as a new user!) We are going to ...

25:18
i created malware with Python (it's SCARY easy!!)

2,878,707 views

3 years ago

DEFCONConference
DEF CON 24 - Max Bazaliy - A Journey Through Exploit Mitigation Techniques in iOS

Over the past year, Apple has consistently added features to prevent exploitation of the iOS kernel. These features, while largely ...

20:11
DEF CON 24 - Max Bazaliy - A Journey Through Exploit Mitigation Techniques in iOS

2,254 views

9 years ago

LiveOverflow
Finding iOS Kernel Exploit // SockPuppet Jailbreak - CVE-2019-8605

Ned Williamson of Google Project Zero explains how he discovered the Sock Puppet vulnerability affecting the XNU Kernel in iOS ...

23:45
Finding iOS Kernel Exploit // SockPuppet Jailbreak - CVE-2019-8605

167,434 views

6 years ago

Marco Ortisi
💥 CVE-2025-23209 RCE on CraftCMS – Full Exploitation Walkthrough [ITA + ENG SUB]

I break down the vulnerability step-by-step and explore the early stages of exploit development. The video is in Italian with English ...

37:08
💥 CVE-2025-23209 RCE on CraftCMS – Full Exploitation Walkthrough [ITA + ENG SUB]

128 views

5 months ago

Cybernews
The Biggest Hacking Mystery of Our Time: Shadow Brokers

The Shadow Brokers leaks are one of the pivotal moments in history: not only did they create a massive wave of cybercrime and ...

49:42
The Biggest Hacking Mystery of Our Time: Shadow Brokers

1,724,413 views

6 months ago