ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

180,389 results

David Bombal Clips
Where to start with exploit development

Browser Exploitation Introduction: https://youtu.be/bcnV1dbfKcE Introduction to Buffer Overflows: https://youtu.be/DHCuvMfGLSU ...

13:59
Where to start with exploit development

24,873 views

2 years ago

Elevate Cyber
Why I'm quitting exploit development

Red Team R&D Blog: https://self-m4de.github.io/ Land a Cyber Security job in 6 months: https://elevatecybersecurity.net/o6za ...

10:06
Why I'm quitting exploit development

678 views

1 month ago

CyberFlow
The 5 Levels of Hacking

Join up and get everything you *actually* need to start hacking like a pro ✨https://cyberflow-academy.github.io/ Everyone ...

5:19
The 5 Levels of Hacking

561,556 views

10 months ago

SANS Institute
What Do You Need To Know About SANS SEC760: Advanced Exploit Development for Penetration Testers?

Vulnerabilities in modern operating systems such as Microsoft Windows 7/8, Server 2012, and the latest Linux distributions are ...

5:05
What Do You Need To Know About SANS SEC760: Advanced Exploit Development for Penetration Testers?

3,970 views

6 years ago

Zilox.
HACKERS use C Language for Hacking. Here WHY?

... C - how hacker use C for hacking - exploit development using C - hacking using C - how to hack using C - C for ethical hacking.

4:26
HACKERS use C Language for Hacking. Here WHY?

223,691 views

1 year ago

areyou1or0
Exploit Development v4: SEH (Structured Exception Handler) Exploitation: Soritong MP3 Player

Hi all, In the 4th video, I wrote a python script to exploit "Soritong MP3 Player" using Structured Exception Handler (SEH) ...

7:55
Exploit Development v4: SEH (Structured Exception Handler) Exploitation: Soritong MP3 Player

2,429 views

4 years ago

Hack the Clown
My Journey to Exploit Development (CVE-2024-23897)

In this series, I will show you how I developed my first real world windows exploit for CVE-2024-23897 (Jenkins Unauthenticated ...

14:40
My Journey to Exploit Development (CVE-2024-23897)

12,172 views

1 year ago

HackersArsenal
Programming for Hackers: Step-by-Step Guide to Becoming a Master Hacker

You'll learn how these languages power real-world hacking, from automation and scripting to exploit development and advanced ...

7:13
Programming for Hackers: Step-by-Step Guide to Becoming a Master Hacker

29,870 views

8 months ago

HackersArsenal
Reverse Engineering in 7 INSANE Steps 🧠 | Hack Any Software Like a Pro!

... ethical hacking, malware analysis, or want to dive deep into exploit development, this video is your shortcut to becoming a pro.

6:36
Reverse Engineering in 7 INSANE Steps 🧠 | Hack Any Software Like a Pro!

82,373 views

5 months ago

Hack the Clown
My Journey to Exploit Development (Part 3)

Welcome to part 3 of the series! In this video, I will show you the major modifications I did to come up with the final exploit.

13:17
My Journey to Exploit Development (Part 3)

2,019 views

1 year ago

Millionwords
The TRUTH About Exploit Dev Certifications (Tier List 2025)

In this video I rank the most popular exploit development certifications from trash to god-tier. You'll see which certs actually teach ...

9:35
The TRUTH About Exploit Dev Certifications (Tier List 2025)

90 views

4 months ago

Guided Hacking
WTF is Egg Hunter Shellcode? - Exploit Dev 11

Exploit Development 11 - Using Egghunters For Exploits​ How Does Egghunting Work?​ The overall concept of egghunting is ...

8:54
WTF is Egg Hunter Shellcode? - Exploit Dev 11

4,980 views

2 years ago

DAY[0]
Future of Exploit Development - 2021 and Beyond

00:00:00 - Introduction 00:00:22 - Professional demand and methodology shift 00:01:58 - Timeline of mitigations and memory ...

19:11
Future of Exploit Development - 2021 and Beyond

9,961 views

4 years ago

HackerSploit
Setting Up An Exploit Development Lab

Hey guys! HackerSploit here back again with another video, in this video, i will be demonstrating how to set up an exploit ...

11:35
Setting Up An Exploit Development Lab

44,206 views

7 years ago

Guided Hacking
Linux Buffer Overflow - Exploit Development 9

Learn the basics of exploit development on Linux. ‍ Buy Our Courses: https://guidedhacking.com/register/ Donate on ...

5:53
Linux Buffer Overflow - Exploit Development 9

3,882 views

2 years ago

Andy Li
Working as an Exploit Developer at NSO Group

Trust talks about his experience working at NSO Group as an iOS exploit developer, discovering 0-click, 1-click zero-day ...

8:49
Working as an Exploit Developer at NSO Group

5,561 views

3 years ago

areyou1or0
Exploit Development v3: SEH (Structured Exception Handler) Exploitation: Easy CD DVD Copy 1.3.24

Hi all, In the 3rd video, I wrote a python script to exploit "Easy CD DVD Copy 1.3.24" using Structured Exception Handler (SEH) ...

7:31
Exploit Development v3: SEH (Structured Exception Handler) Exploitation: Easy CD DVD Copy 1.3.24

2,158 views

4 years ago

areyou1or0
Exploit Development v1: Stack Buffer Overflow: Easy RM to MP3 Converter

Hi all, In the 1st video, I wrote a python script to exploit "Easy RM to MP3 Converter Stack Buffer Overflow". This is the first video for ...

15:00
Exploit Development v1: Stack Buffer Overflow: Easy RM to MP3 Converter

4,326 views

4 years ago

Guided Hacking
Exploit Development 5 - DEP Bypass with WriteProcessMemory

DEP Bypass again, but this time using WriteProcessMemory instead of VirtualAlloc Support us on GH: ...

19:40
Exploit Development 5 - DEP Bypass with WriteProcessMemory

13,915 views

3 years ago

Hack the Clown
GOAD-Light OSCP Series: 2024 Exploit development using Python and Pwntools

This is an extension of the part 3 video. https://youtu.be/sedr9n9nRB0?si=HEzFVcfQJqy1WQ11 I will show you the process on ...

11:51
GOAD-Light OSCP Series: 2024 Exploit development using Python and Pwntools

4,452 views

1 year ago