ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

2,430 results

PlayStation Hacks & Exploits | Michael Crump
Luac0re 1.0 RELEASED, but...

... is a mast1c0re variation that uses Lua scripting for easier exploit development. https://github.com/Gezine/Luac0re/tree/main (20) ...

8:53
Luac0re 1.0 RELEASED, but...

2,118 views

2 weeks ago

Georgia Weidman
48 - Pentest Academy Class: Exploit Dev Part 1

Videos following updated exercises from the first book from a now-defunct online platform. If you enjoy this, please donate so I can ...

38:07
48 - Pentest Academy Class: Exploit Dev Part 1

81 views

4 weeks ago

Writeto Zealdefense
Adv Exploit Development
7:07
Adv Exploit Development

0 views

9 hours ago

Clear Tech
Smashing the Stack: How Buffer Overflow Attacks Work (Cybersecurity Lab)

Dive deep into one of the most classic and devastating vulnerabilities in software history: the buffer overrun. This video explores ...

6:38
Smashing the Stack: How Buffer Overflow Attacks Work (Cybersecurity Lab)

60 views

3 weeks ago

whoamitang
I Forced a Stranger to Pay My Bill... (JWT Tokens)

... ethical hacking tutorial, penetration testing course, vulnerability scanning tools, exploit development basics, linux hacking, cyber ...

3:07
I Forced a Stranger to Pay My Bill... (JWT Tokens)

831 views

7 days ago

whoamitang
Finding people's locations | The tools hackers use

... ethical hacking tutorial, penetration testing course, vulnerability scanning tools, exploit development basics, linux hacking, cyber ...

6:20
Finding people's locations | The tools hackers use

1,228 views

15 hours ago

Aashika Giri
CW2  (Exploit Development)

VIDEO DEMONSTRATION OF STACK -BASED BUFFER OVERFLOW VULNERABILITY.

19:48
CW2 (Exploit Development)

12 views

1 day ago

Obsidian
reacting to cyber flows 5 levels of hacking

hacking.

9:41
reacting to cyber flows 5 levels of hacking

75 views

13 days ago

Cyber Rey
Case Study in Modern Exploit Development with examples from EternalBlue & WannaCry

Exploit Development with EternalBlue & WannaCry is a comprehensive video explainer that walks through the process of exploit ...

6:37
Case Study in Modern Exploit Development with examples from EternalBlue & WannaCry

4 views

12 days ago

Critical Thinking - Bug Bounty Podcast
Crushing Pwn2Own & H1 with Kernel Driver Exploits (Ep. 157)

... HackerOne Ecosystem vs Pwn2Own Ecosystem (01:17:00) Kernel Utils (01:26:46) Real World Bugs for Exploit Development vs ...

1:35:01
Crushing Pwn2Own & H1 with Kernel Driver Exploits (Ep. 157)

2,648 views

2 weeks ago

Linux AI Tech
Why Hackers Prefer Linux OS in 2026: Secrets, Tools & Hacking Explained

linux #linuxtech #1M Discover why Linux is the ultimate choice for hackers and cybersecurity enthusiasts in 2026.

10:40
Why Hackers Prefer Linux OS in 2026: Secrets, Tools & Hacking Explained

245 views

10 days ago

Cyber Station
Kali Linux 2026 Released with 11 New Hacking Tools

Dive into the exciting world of cybersecurity with our latest video: "Kali Linux 2026: 11 New Hacking Tools Unveiled!" Explore the ...

10:51
Kali Linux 2026 Released with 11 New Hacking Tools

426 views

9 days ago

VIEH Group
FREE Elite Hacking & AI Security Courses 😱 Red Team, Exploit Dev, Reverse Engineering

What You'll Learn for Free: - Red Teaming and Adversary Simulation - Exploit Development using Assembly and C (MSAC+) ...

3:31
FREE Elite Hacking & AI Security Courses 😱 Red Team, Exploit Dev, Reverse Engineering

628 views

2 days ago

whoamitang
Full Website Compromise in 5 Minutes (Ethical Hacking)

... ethical hacking tutorial, penetration testing course, vulnerability scanning tools, exploit development basics, linux hacking, cyber ...

5:54
Full Website Compromise in 5 Minutes (Ethical Hacking)

3,338 views

13 days ago

Proper Honest Tech
How Secure are Apple Products REALLY?

Go to https://nordvpn.com/pht to get a 2-year plan plus 4 additional months with a huge discount. It's risk-free with Nord's 30-day ...

27:04
How Secure are Apple Products REALLY?

38,064 views

2 days ago

Bite Technology
Ethical Hacking Roadmap

Phase 6: Advanced Topics For those looking to go further, we touch on Malware Analysis, Exploit Development (such as buffer ...

6:14
Ethical Hacking Roadmap

22 views

4 weeks ago

Wild West Hackin' Fest
"Everything is a Proxy if You Try Hard Enough"- Old RFCs, New Exploits | Ken Pyle

"Everything is a Proxy if You Try Hard Enough" - Exploiting Old RFCs for New Types of Exploitation Speaker: Ken Pyle The core ...

53:53
"Everything is a Proxy if You Try Hard Enough"- Old RFCs, New Exploits | Ken Pyle

1,227 views

2 weeks ago

whoamitang
How I Logged IPs With a Discord Image... (stay safe)

... ethical hacking tutorial, penetration testing course, vulnerability scanning tools, exploit development basics, linux hacking, cyber ...

7:01
How I Logged IPs With a Discord Image... (stay safe)

23,234 views

2 weeks ago

BlackBox Reversing
Reverse Engineering a Game’s Anti-Cheat Logic (Linux ELF)

This video demonstrates a real reverse-engineering lab performed on OpenTyrian, an open-source Linux game. The goal of this ...

5:29
Reverse Engineering a Game’s Anti-Cheat Logic (Linux ELF)

15 views

2 weeks ago

CyberSecurityStandards
Obtain Capabilities: Exploits (T1588.005)

In this video we cover the technique T1588.005 from MITRE ATT&CK. Enjoy! Chapters: [0:00] Intro [1:04] Technique-Overview ...

10:46
Obtain Capabilities: Exploits (T1588.005)

7 views

2 weeks ago

Matt Johansen
LIVE: This week in Cybersecurity w/ mattjay

Let's hang and talk about this week's news in infosec. I'm collecting stories for my newsletter @ vulnu.com.

1:29:37
LIVE: This week in Cybersecurity w/ mattjay

155 views

Streamed 11 days ago

bandit sec
DNS Brute Forcing And Permutations

... ethical hacking tutorial, penetration testing course, vulnerability scanning tools, exploit development basics, linux hacking, cyber ...

7:03
DNS Brute Forcing And Permutations

122 views

3 weeks ago

Johnny Leone
Intro to Metasploit Video part 1 TryHackMe

ZeroDay Maverick — Cyber Ops & Ethical Hacking Walkthrough, recon, exploitation, and full methodology breakdown. Tools ...

30:53
Intro to Metasploit Video part 1 TryHackMe

0 views

9 days ago

Cyber Duality
Ethical Hacking Roadmap for Beginners (Avoid Wasting Years)

Phase 5: Programming Programming for ethical hackers allows for automation and custom exploit development. Using Python for ...

5:19
Ethical Hacking Roadmap for Beginners (Avoid Wasting Years)

16 views

8 days ago

whoamitang
Password Reset Poisoning | Account Takeover in 5 Minutes

... ethical hacking tutorial, penetration testing course, vulnerability scanning tools, exploit development basics, linux hacking, cyber ...

4:23
Password Reset Poisoning | Account Takeover in 5 Minutes

2,551 views

4 weeks ago