ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

10,750 results

Elevate Cyber
Why I'm quitting exploit development

Red Team R&D Blog: https://self-m4de.github.io/ Land a Cyber Security job in 6 months: https://elevatecybersecurity.net/o6za ...

10:06
Why I'm quitting exploit development

678 views

1 month ago

CyberFlow
The 5 Levels of Hacking

Join up and get everything you *actually* need to start hacking like a pro ✨https://cyberflow-academy.github.io/ Everyone ...

5:19
The 5 Levels of Hacking

561,606 views

10 months ago

HackersArsenal
Reverse Engineering in 7 INSANE Steps 🧠 | Hack Any Software Like a Pro!

... ethical hacking, malware analysis, or want to dive deep into exploit development, this video is your shortcut to becoming a pro.

6:36
Reverse Engineering in 7 INSANE Steps 🧠 | Hack Any Software Like a Pro!

82,373 views

5 months ago

Writeto Zealdefense
Adv Exploit Development
7:07
Adv Exploit Development

0 views

5 hours ago

HackersArsenal
Programming for Hackers: Step-by-Step Guide to Becoming a Master Hacker

You'll learn how these languages power real-world hacking, from automation and scripting to exploit development and advanced ...

7:13
Programming for Hackers: Step-by-Step Guide to Becoming a Master Hacker

29,877 views

8 months ago

HackersArsenal
Hacking With Programming: Find Out What Makes You Truly Dangerous?

Can you be a hacker without knowing how to code? Or does real power come from programming skills? In this video, we break ...

5:10
Hacking With Programming: Find Out What Makes You Truly Dangerous?

10,632 views

8 months ago

Privacy Matters
Every Level Of Hacking Explained in 8 Minutes

Try Cape now and secure your digital life: https://bit.ly/45CVU9I Get 33% OFF By Using Code: PRIVACYMATTERS33 Every ...

8:36
Every Level Of Hacking Explained in 8 Minutes

554,933 views

7 months ago

Millionwords
The TRUTH About Exploit Dev Certifications (Tier List 2025)

In this video I rank the most popular exploit development certifications from trash to god-tier. You'll see which certs actually teach ...

9:35
The TRUTH About Exploit Dev Certifications (Tier List 2025)

90 views

4 months ago

Billy Ellis
This Video Can Exploit Your iPhone (CVE-2025-31200 #1)

Are you a security researcher or reverse engineer? For 50% off IDA Products use promo code BILLY50, ...

16:37
This Video Can Exploit Your iPhone (CVE-2025-31200 #1)

129,735 views

8 months ago

whoamitang
Finding people's locations | The tools hackers use

... ethical hacking tutorial, penetration testing course, vulnerability scanning tools, exploit development basics, linux hacking, cyber ...

6:20
Finding people's locations | The tools hackers use

1,051 views

10 hours ago

mushroomhead🍄
EXPLOIT DEVELOPMENT
19:04
EXPLOIT DEVELOPMENT

11 views

5 months ago

Hacker Blueprint
Hack Your Brain to Learn Hacking

20+ Hour Complete OSCP Course (FREE Trial!): https://hackerblueprint.netlify.app/ OSCP Cherrytree & Obsidian (Pentesting) ...

6:42
Hack Your Brain to Learn Hacking

16,306 views

10 months ago

Aashika Giri
CW2  (Exploit Development)

VIDEO DEMONSTRATION OF STACK -BASED BUFFER OVERFLOW VULNERABILITY.

19:48
CW2 (Exploit Development)

12 views

1 day ago

Linux AI Tech
Why Hackers Prefer Linux OS in 2026: Secrets, Tools & Hacking Explained

linux #linuxtech #1M Discover why Linux is the ultimate choice for hackers and cybersecurity enthusiasts in 2026.

10:40
Why Hackers Prefer Linux OS in 2026: Secrets, Tools & Hacking Explained

245 views

10 days ago

HackersArsenal
10 Steps to Make Your Hacking at 10x Speed with AI

... with AI AI exploit development OSINT automation hack smarter not harder GPT-4 pentesting 10x hacking productivity AI hacking ...

11:58
10 Steps to Make Your Hacking at 10x Speed with AI

9,549 views

6 months ago

FlashGenius
GIAC GXPN Certification Guide 2026 | Exploit Researcher & Advanced Penetration Tester

Are you preparing for the GIAC Exploit Researcher & Advanced Penetration Tester (GXPN) certification? This video covers ...

7:23
GIAC GXPN Certification Guide 2026 | Exploit Researcher & Advanced Penetration Tester

144 views

4 months ago

Yaldobaoth
Clean Exploit Development - AChat CVE-2015-1578-PoC

This is a proof-of-concept exploit for CVE-2015-1578, targeting a buffer overflow vulnerability in AChat 0.150 beta7 on Windows.

5:19
Clean Exploit Development - AChat CVE-2015-1578-PoC

69 views

7 months ago

whoamitang
How To Get REMOTE ACCESS To Phones - Using AndroRAT

... ethical hacking tutorial, penetration testing course, vulnerability scanning tools, exploit development basics, linux hacking, cyber ...

5:06
How To Get REMOTE ACCESS To Phones - Using AndroRAT

64,231 views

1 month ago

Elevate Cyber
Use After Free Vulnerabilities Demystified

Fast track your journey into cyber security https://elevatecybersecurity.net/ci1a.

14:59
Use After Free Vulnerabilities Demystified

383 views

10 months ago

FarmHouse Of AI
Best Programming Language For Hacking

... which programming languages matter most in penetration testing, exploit development, web app hacking, reverse engineering, ...

8:53
Best Programming Language For Hacking

26 views

3 months ago

PrimeTech
Metasploit for Absolute Beginners: Your First Exploit Walkthrough! (Zero to Compromise) 💻🔓

Dive into Metasploit from zero experience to your first successful exploit! In this step-by-step walkthrough, you'll learn how to: ...

13:50
Metasploit for Absolute Beginners: Your First Exploit Walkthrough! (Zero to Compromise) 💻🔓

254 views

5 months ago

Rising Ray
How Do Roblox Hackers Actually Hack?

Ever wondered how Roblox hackers actually pull it off? I went deep into Roblox exploits, digging through scripts, forums, and even ...

17:05
How Do Roblox Hackers Actually Hack?

481,396 views

8 months ago

Z3R0 (0x30)
Exploit Development - Polkit 2021 vuln | Cybersecurity Awareness | H4cking

CVE-2021-4034 - Polkit Local Privilege Escalation (PwnKit) | Exploit Development Tutorial In this video, I demonstrate the ...

17:53
Exploit Development - Polkit 2021 vuln | Cybersecurity Awareness | H4cking

22 views

7 months ago

whoamitang
Turn a PDF into a Reverse Shell with Setoolkit

... ethical hacking tutorial, penetration testing course, vulnerability scanning tools, exploit development basics, linux hacking, cyber ...

7:07
Turn a PDF into a Reverse Shell with Setoolkit

11,536 views

1 month ago

Sam Bowne
ED 230

A college course in Exploit Development See: https://samsclass.info/127/127_S25.shtml.

8:21
ED 230

61 views

10 months ago