ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

188,014 results

David Bombal Clips
Where to start with exploit development

Browser Exploitation Introduction: https://youtu.be/bcnV1dbfKcE Introduction to Buffer Overflows: https://youtu.be/DHCuvMfGLSU ...

13:59
Where to start with exploit development

25,512 views

2 years ago

Millionwords
The TRUTH About Exploit Dev Certifications (Tier List 2025)

In this video I rank the most popular exploit development certifications from trash to god-tier. You'll see which certs actually teach ...

9:35
The TRUTH About Exploit Dev Certifications (Tier List 2025)

118 views

6 months ago

Elevate Cyber
Why I'm quitting exploit development

Red Team R&D Blog: https://self-m4de.github.io/ Land a Cyber Security job in 6 months: https://elevatecybersecurity.net/o6za ...

10:06
Why I'm quitting exploit development

925 views

3 months ago

Cyber Rey
What is Exploit Development, EternalBlue & WannaCry

Exploit Development with EternalBlue & WannaCry is a comprehensive video explainer that walks through the process of exploit ...

6:37
What is Exploit Development, EternalBlue & WannaCry

35 views

2 months ago

CyberFlow
The 5 Levels of Hacking

Join up and get everything you *actually* need to start hacking like a pro ✨https://cyberflow-academy.github.io/ Everyone ...

5:19
The 5 Levels of Hacking

589,225 views

11 months ago

Andy Li
Working as an Exploit Developer at NSO Group

Trust talks about his experience working at NSO Group as an iOS exploit developer, discovering 0-click, 1-click zero-day ...

8:49
Working as an Exploit Developer at NSO Group

5,652 views

3 years ago

FarmHouse Of AI
Best Programming Language For Hacking

... which programming languages matter most in penetration testing, exploit development, web app hacking, reverse engineering, ...

8:53
Best Programming Language For Hacking

27 views

4 months ago

SANS Institute
What Do You Need To Know About SANS SEC760: Advanced Exploit Development for Penetration Testers?

Vulnerabilities in modern operating systems such as Microsoft Windows 7/8, Server 2012, and the latest Linux distributions are ...

5:05
What Do You Need To Know About SANS SEC760: Advanced Exploit Development for Penetration Testers?

4,015 views

6 years ago

Hack the Clown
My Journey to Exploit Development (Part 3)

Welcome to part 3 of the series! In this video, I will show you the major modifications I did to come up with the final exploit.

13:17
My Journey to Exploit Development (Part 3)

2,057 views

1 year ago

Privacy Matters
Every Level Of Hacking Explained in 8 Minutes

Try Cape now and secure your digital life: https://bit.ly/45CVU9I Get 33% OFF By Using Code: PRIVACYMATTERS33 Every ...

8:36
Every Level Of Hacking Explained in 8 Minutes

592,622 views

8 months ago

Hack the Clown
My Journey to Exploit Development (CVE-2024-23897)

In this series, I will show you how I developed my first real world windows exploit for CVE-2024-23897 (Jenkins Unauthenticated ...

14:40
My Journey to Exploit Development (CVE-2024-23897)

12,418 views

1 year ago

Zilox.
HACKERS use C Language for Hacking. Here WHY?

... C - how hacker use C for hacking - exploit development using C - hacking using C - how to hack using C - C for ethical hacking.

4:26
HACKERS use C Language for Hacking. Here WHY?

224,210 views

1 year ago

HackersArsenal
Programming for Hackers: Step-by-Step Guide to Becoming a Master Hacker

You'll learn how these languages power real-world hacking, from automation and scripting to exploit development and advanced ...

7:13
Programming for Hackers: Step-by-Step Guide to Becoming a Master Hacker

31,755 views

9 months ago

HackerSploit
Setting Up An Exploit Development Lab

Hey guys! HackerSploit here back again with another video, in this video, i will be demonstrating how to set up an exploit ...

11:35
Setting Up An Exploit Development Lab

44,339 views

7 years ago

Guided Hacking
Linux Buffer Overflow - Exploit Development 9

Learn the basics of exploit development on Linux. ‍ Buy Our Courses: https://guidedhacking.com/register/ Donate on ...

5:53
Linux Buffer Overflow - Exploit Development 9

3,931 views

2 years ago

Guided Hacking
WTF is Egg Hunter Shellcode? - Exploit Dev 11

Exploit Development 11 - Using Egghunters For Exploits​ How Does Egghunting Work?​ The overall concept of egghunting is ...

8:54
WTF is Egg Hunter Shellcode? - Exploit Dev 11

5,068 views

2 years ago

LiveOverflow
Writing a Simple Buffer Overflow Exploit

Feel free to follow along! Just a simple buffer overflow walkthrough. sources and solution: ...

19:41
Writing a Simple Buffer Overflow Exploit

150,147 views

6 years ago

Guided Hacking
Binary Exploit Development Tutorial - Simple Buffer Overflow

Learn how to exploit a simple buffer overflow in the first chapter of our binary exploitation tutorial series. Exploit development is a ...

13:15
Binary Exploit Development Tutorial - Simple Buffer Overflow

25,009 views

3 years ago

Hack the Clown
GOAD-Light OSCP Series: 2024 Exploit development using Python and Pwntools

This is an extension of the part 3 video. https://youtu.be/sedr9n9nRB0?si=HEzFVcfQJqy1WQ11 I will show you the process on ...

11:51
GOAD-Light OSCP Series: 2024 Exploit development using Python and Pwntools

4,709 views

1 year ago

Yaldobaoth
Clean Exploit Development - AChat CVE-2015-1578-PoC

This is a proof-of-concept exploit for CVE-2015-1578, targeting a buffer overflow vulnerability in AChat 0.150 beta7 on Windows.

5:19
Clean Exploit Development - AChat CVE-2015-1578-PoC

71 views

9 months ago