ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

24,057 results

Millionwords
The TRUTH About Exploit Dev Certifications (Tier List 2025)

In this video I rank the most popular exploit development certifications from trash to god-tier. You'll see which certs actually teach ...

9:35
The TRUTH About Exploit Dev Certifications (Tier List 2025)

117 views

6 months ago

Elevate Cyber
Why I'm quitting exploit development

Red Team R&D Blog: https://self-m4de.github.io/ Land a Cyber Security job in 6 months: https://elevatecybersecurity.net/o6za ...

10:06
Why I'm quitting exploit development

920 views

3 months ago

CyberFlow
The 5 Levels of Hacking

Join up and get everything you *actually* need to start hacking like a pro ✨https://cyberflow-academy.github.io/ Everyone ...

5:19
The 5 Levels of Hacking

589,032 views

11 months ago

Privacy Matters
Every Level Of Hacking Explained in 8 Minutes

Try Cape now and secure your digital life: https://bit.ly/45CVU9I Get 33% OFF By Using Code: PRIVACYMATTERS33 Every ...

8:36
Every Level Of Hacking Explained in 8 Minutes

592,361 views

8 months ago

TechBlazes
Linux Heap Exploitation Part 1: Learn Real-World GLIBC Attacks

... 00:53:12 - Hands-On Exploit Development: Achieving Code Execution with House of Force MODULE 2: FASTBIN DUP (1 Hour) ...

4:51:24
Linux Heap Exploitation Part 1: Learn Real-World GLIBC Attacks

359 views

2 months ago

BSides Canberra
KEYNOTE: The Exploit Development Life Cycle: From Concept to Compromise, Valentina Palmiotti

Best and so other steps of the uh exploit development cycle can come into play here so stability does the exploit crash because if ...

40:07
KEYNOTE: The Exploit Development Life Cycle: From Concept to Compromise, Valentina Palmiotti

4,066 views

11 months ago

The Exploit Lab
Exploit Development Full Video Tutorial

Learn exploit development from scratch! In this comprehensive tutorial, we break down memory corruption, shellcode injection, ...

45:22
Exploit Development Full Video Tutorial

1,041 views

9 months ago

Cybernews
The Biggest Hacking Mystery of Our Time: Shadow Brokers

The Shadow Brokers leaks are one of the pivotal moments in history: not only did they create a massive wave of cybercrime and ...

49:42
The Biggest Hacking Mystery of Our Time: Shadow Brokers

1,866,211 views

8 months ago

FarmHouse Of AI
Best Programming Language For Hacking

... which programming languages matter most in penetration testing, exploit development, web app hacking, reverse engineering, ...

8:53
Best Programming Language For Hacking

27 views

4 months ago

Cyber Rey
What is Exploit Development, EternalBlue & WannaCry

Exploit Development with EternalBlue & WannaCry is a comprehensive video explainer that walks through the process of exploit ...

6:37
What is Exploit Development, EternalBlue & WannaCry

34 views

2 months ago

TechBlazes
Master Advanced Malware Development - Real Techniques & Case Studies

Master Advanced Malware Development — Real Techniques & Case Studies (Full Course) Dive deep into advanced malware ...

5:37:38
Master Advanced Malware Development - Real Techniques & Case Studies

863 views

6 months ago

HackersArsenal
Programming for Hackers: Step-by-Step Guide to Becoming a Master Hacker

You'll learn how these languages power real-world hacking, from automation and scripting to exploit development and advanced ...

7:13
Programming for Hackers: Step-by-Step Guide to Becoming a Master Hacker

31,743 views

9 months ago

EuroPython Conference
Pwndbg: Low level debugging and exploit development with Python — disconnect3d

EuroPython 2025 — Terrace 2A on 2025-07-17] *Pwndbg: Low level debugging and exploit development with Python by ...

45:08
Pwndbg: Low level debugging and exploit development with Python — disconnect3d

492 views

4 months ago

Calina Dev
Exploits in Action 🔓 | Using Metasploit Exploit Modules Like a Pro

Discover how Metasploit exploits really work in real-world attacks. Learn the lifecycle of an exploit, how to select targets, ...

3:34
Exploits in Action 🔓 | Using Metasploit Exploit Modules Like a Pro

113 views

9 months ago

Jason Turley
The BEST exploit development course I've ever taken

Course: https://wargames.ret2.systems/course Modern Binary Exploitation by RPISEC: https://github.com/RPISEC/MBE Pwn ...

32:47
The BEST exploit development course I've ever taken

4,880 views

11 months ago

John Hammond
reverse engineering doesn't have to be hard

https://jh.live/hex-rays || Disassemble, decompile and debug with IDA Pro! Use promo code HAMMOND50 for 50% off any IDA Pro ...

24:43
reverse engineering doesn't have to be hard

65,364 views

5 months ago

The Exploit Lab
Binary Analysis Fundamentals for Exploit Development

Unlock the power of reverse engineering and binary analysis in this full-length tutorial! This video dives deep into the ...

4:00:29
Binary Analysis Fundamentals for Exploit Development

311 views

10 months ago

HackersArsenal
10 Steps to Make Your Hacking at 10x Speed with AI

... with AI AI exploit development OSINT automation hack smarter not harder GPT-4 pentesting 10x hacking productivity AI hacking ...

11:58
10 Steps to Make Your Hacking at 10x Speed with AI

9,810 views

8 months ago

BSides Oslo
Chrome Browser Exploitation: from zero to heap sandbox escape - Matteo Malvica

... Malvica is a senior content developer and security researcher at OffSec focusing on vulnerability research, exploit development, ...

42:18
Chrome Browser Exploitation: from zero to heap sandbox escape - Matteo Malvica

65 views

2 weeks ago

HackersArsenal
Reverse Engineering in 7 INSANE Steps 🧠 | Hack Any Software Like a Pro!

... ethical hacking, malware analysis, or want to dive deep into exploit development, this video is your shortcut to becoming a pro.

6:36
Reverse Engineering in 7 INSANE Steps 🧠 | Hack Any Software Like a Pro!

85,476 views

6 months ago