ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

1,209 results

Dr. Pavel Vlašánek
Can You Crack This Program? (Beginner Reverse Engineering Tutorial)

Curious how software cracks actually work? In this video, I walk you through a beginner‑friendly reverse‑engineering challenge ...

12:19
Can You Crack This Program? (Beginner Reverse Engineering Tutorial)

19,057 views

8 months ago

Cooper
Hack.lu 2016 The Legend of Windows: A Link to the Hash by m4xk and sıx

He grew a passion for reverse engineering software and hardware. He is deeply interested in breaking and exploiting computers ...

17:09
Hack.lu 2016 The Legend of Windows: A Link to the Hash by m4xk and sıx

847 views

9 years ago

Robert Baruch
How I reverse engineer a chip

"Reverse engineering" doesn't just mean "I don't know how this works", but "I want to find out exactly how this was implemented".

5:10
How I reverse engineer a chip

457,633 views

8 years ago

OpenSecurityTraining2
Dbg3301: HyperDbg 03 05 Windows Internal Basics: Processes & Threads

Whether you have an interest in reverse engineering or seek to elevate your reverse engineering skills with hypervisor-assisted ...

4:34
Dbg3301: HyperDbg 03 05 Windows Internal Basics: Processes & Threads

402 views

2 years ago

InternetBizUni
Reverse Engineering Your Goals & Projects Double Double Book Summary Chapter 2 Cameron Herold

Reverse Engineering Your Goals & Projects Double Double Book Summary Chapter 2 Cameron Herold Learn what you need to ...

9:10
Reverse Engineering Your Goals & Projects Double Double Book Summary Chapter 2 Cameron Herold

272 views

Streamed 9 years ago

Mental Outlaw
How Hackers Take Over Computers With Reverse Shells

In this video I give a demonstration of how reverse shell can be used to take over a Windows 11 machine. My merch is available at ...

11:17
How Hackers Take Over Computers With Reverse Shells

139,932 views

1 year ago

DEFCONConference
DEF CON 26 - George Tarnovsky - You Can Run but You Cant Hide Reverse Engineering Using X-Ray

Most of us have knowledge of PCB construction. In the past reversing someone's design was an easy task due to the simplicity of ...

18:36
DEF CON 26 - George Tarnovsky - You Can Run but You Cant Hide Reverse Engineering Using X-Ray

8,413 views

7 years ago

Dr. Pavel Vlašánek
Can You Crack This Password? (Advanced Reverse Engineering Tutorial)

Ready for a tougher reverse-engineering challenge packed with tricks and anti-debug defenses? In this episode, we take on a ...

10:01
Can You Crack This Password? (Advanced Reverse Engineering Tutorial)

1,295 views

7 months ago

OpenSecurityTraining2
Exploitation 4011, Windows Kernel: Race + UAF in KTM 07 1 Heap Spray vs Feng Shui

View the full free MOOC at https://ost2.fyi/Exp4011. This is it! This is the class that *actually* teaches you how to exploit a race ...

7:55
Exploitation 4011, Windows Kernel: Race + UAF in KTM 07 1 Heap Spray vs Feng Shui

441 views

1 year ago

Learn Hacking With NK
Best Tools For Learninng Reverse Engineering in 2021

Reverse Engineer's Toolkit Description : This is a collection of tools you may like if you are interested on reverse engineering ...

4:00
Best Tools For Learninng Reverse Engineering in 2021

222 views

4 years ago

OpenSecurityTraining2
Dbg3301: HyperDbg 06 03 Heavens Gate

Whether you have an interest in reverse engineering or seek to elevate your reverse engineering skills with hypervisor-assisted ...

16:26
Dbg3301: HyperDbg 06 03 Heavens Gate

216 views

2 years ago

OpenSecurityTraining2
Dbg3301: HyperDbg 04 09 Hands on Recap

Whether you have an interest in reverse engineering or seek to elevate your reverse engineering skills with hypervisor-assisted ...

18:02
Dbg3301: HyperDbg 04 09 Hands on Recap

155 views

2 years ago

OpenSecurityTraining2
Dbg3301: HyperDbg 08 02 MSRs

Whether you have an interest in reverse engineering or seek to elevate your reverse engineering skills with hypervisor-assisted ...

12:12
Dbg3301: HyperDbg 08 02 MSRs

124 views

2 years ago

sxntxsxj
Reverse Engineering DOS Software as if It Were 1990

This is about running SoftICE, a popular DOS and Windows debugger, in an emulated MS-DOS environment. And about ...

8:13
Reverse Engineering DOS Software as if It Were 1990

2,398 views

2 years ago

OpenSecurityTraining2
Exploitation 4011, Windows Kernel Exploitation: Race + UAF in KTM 13 1 Arbitrary Increment Primitive

View the full free MOOC at https://ost2.fyi/Exp4011. This is it! This is the class that *actually* teaches you how to exploit a race ...

10:58
Exploitation 4011, Windows Kernel Exploitation: Race + UAF in KTM 13 1 Arbitrary Increment Primitive

158 views

1 year ago

pwn.college
pwn.college - Reverse Engineering - Real-world Applications

Let's learn about real-world applications of reverse engineering! Module details at: https://pwn.college/modules/reversing.

13:29
pwn.college - Reverse Engineering - Real-world Applications

6,564 views

5 years ago

OpenSecurityTraining2
Dbg3301: HyperDbg 03 08 Structures

Whether you have an interest in reverse engineering or seek to elevate your reverse engineering skills with hypervisor-assisted ...

6:07
Dbg3301: HyperDbg 03 08 Structures

240 views

2 years ago

ToorCon
ToorCon XX — SHINING A LIGHT ON A BLACK BOX: REVERSE ENGINEERING PROTOCOLS - Rick Ramgattie

IoT devices often present unique and unexpected challenges for hackers to overcome. In this talk, we provide an in-depth ...

18:16
ToorCon XX — SHINING A LIGHT ON A BLACK BOX: REVERSE ENGINEERING PROTOCOLS - Rick Ramgattie

86 views

7 years ago

OpenSecurityTraining2
Dbg3301: HyperDbg 08 03 CPUID Hooking

Whether you have an interest in reverse engineering or seek to elevate your reverse engineering skills with hypervisor-assisted ...

16:49
Dbg3301: HyperDbg 08 03 CPUID Hooking

278 views

2 years ago

OpenSecurityTraining2
Dbg3301: HyperDbg 06 01 Intro and System Call Hooks

Whether you have an interest in reverse engineering or seek to elevate your reverse engineering skills with hypervisor-assisted ...

10:09
Dbg3301: HyperDbg 06 01 Intro and System Call Hooks

240 views

2 years ago