ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

602 results

EuroPython Conference
Pwndbg: Low level debugging and exploit development with Python — disconnect3d

EuroPython 2025 — Terrace 2A on 2025-07-17] *Pwndbg: Low level debugging and exploit development with Python by ...

45:08
Pwndbg: Low level debugging and exploit development with Python — disconnect3d

332 views

3 months ago

Declan Middleton
Manjaro Linux for Hacking?! The Arch Setup Hackers Actually Use

... higher speed • Perfect for scripting, automation, and exploit development Want to learn cybersecurity or improve your skills?

18:40
Manjaro Linux for Hacking?! The Arch Setup Hackers Actually Use

536 views

1 month ago

HITCON
25 YEARS OF ATTACKS AND DEFENSE

For over two decades, working as an cybersecurity entrepreneur, researcher and instructor, I have heard over and over again that ...

50:44
25 YEARS OF ATTACKS AND DEFENSE

66 views

5 months ago

OWASP Foundation
No Fate But What We Make: Doing Intrusion Prediction

Craig Chamberlain discusses doing intrusion prediction.

48:08
No Fate But What We Make: Doing Intrusion Prediction

57 views

6 months ago

NorthSec
NorthSec 2025 - Jake Mayhew - Red Team Road Rage: Weaponizing Vulnerable Drivers to Blind EDR

Endpoint Detection & Response (EDR) tools are becoming more and more sophisticated, requiring attackers (both good & evil) to ...

29:51
NorthSec 2025 - Jake Mayhew - Red Team Road Rage: Weaponizing Vulnerable Drivers to Blind EDR

445 views

3 months ago

DEFCONConference
DEF CON 33 - 40 Years Of Phrack: Hacking, Zines & Digital Dissent -richinseattle, Netspooky, Chompie

For 40 years, Phrack has published papers from the hacker underground. Join us as we discuss the evolution of hacking, hacker ...

42:30
DEF CON 33 - 40 Years Of Phrack: Hacking, Zines & Digital Dissent -richinseattle, Netspooky, Chompie

12,832 views

4 months ago

Infin1teXploit
Does Microsoft Defender Protect You From Getting Hacked?

... hacking tutorial cyber security ethical hacking red team exploit development remote access reverse shell attack hacking tools.

14:54
Does Microsoft Defender Protect You From Getting Hacked?

60 views

9 months ago

Erarnitox
Write to Memory using ROP - Linux x64 [Rop Emporium 0x3] - write4

In this video we will take a look at how to utilize radare2, gdb gef and pwntools to write a simple exploit for the fourth challenge ...

10:29
Write to Memory using ROP - Linux x64 [Rop Emporium 0x3] - write4

127 views

4 months ago

DevConf
Locking Down PII: Why a Strong Frontend is Your First Defense - DevConf.CZ 2025

Speaker(s): Ayushi Midha Since 2020, there has been a significant rise not only in threats to our health but also in **cyberattacks, ...

15:14
Locking Down PII: Why a Strong Frontend is Your First Defense - DevConf.CZ 2025

11 views

7 months ago

BSides Belfast
History of Video Game Console Hacking - Matthew Reaney

Want to learn how gamers broke the encryption of the Xbox 360 by drilling through the DVD drive microcontroller? Although the ...

38:11
History of Video Game Console Hacking - Matthew Reaney

62 views

1 month ago

BSides Cape Town
Find and fix Vulnerabilities within open source projects - Callian

It's actually pretty easy to find and fix vulnerabilities within open-source projects. With the right tools and techniques, identifying ...

11:48
Find and fix Vulnerabilities within open source projects - Callian

198 views

10 months ago

Erarnitox
x64 Linux - ROPing with Pwntools [Rop Emporium 0x1] - Split

In this video we will take a look at how to utilize radare2, gdb gef and pwntools to write a simple exploit for the second challenge ...

11:26
x64 Linux - ROPing with Pwntools [Rop Emporium 0x1] - Split

87 views

5 months ago

Cyb3rPeter - Cybersecurity
🐍 Python in Cybersecurity: Automate, Analyze, and Attack! 🛡️

... Requests (for web interaction/exploit development), and Nmap integration (for scanning). Hands-On Use Cases: See practical ...

1:59
🐍 Python in Cybersecurity: Automate, Analyze, and Attack! 🛡️

14 views

2 months ago

Southern California Linux Expo
Navigating Security in Generative AI Development

Talk by Katherine Druckman ...

44:07
Navigating Security in Generative AI Development

47 views

10 months ago

Gnar Coding
How I’d Learn Python for Cybersecurity If I Started in 2025

Some highlights from the last live session. MUCH LOVE SQUAD DISCLAIMER: Everything in this video is for entertainment and ...

22:24
How I’d Learn Python for Cybersecurity If I Started in 2025

1,903 views

7 months ago

ZeroDay Vault
Hacking with AI?! 🔥 KaliGPT Will Blow Your Mind!

Welcome to the Future of Hacking! Soc Analyst L1 Masterclass ...

49:11
Hacking with AI?! 🔥 KaliGPT Will Blow Your Mind!

1,293 views

Streamed 6 months ago

Erarnitox
Call Me! - Linux x64 [Rop Emporium 0x2] - Callme

In this video we will take a look at how to utilize radare2, gdb gef and pwntools to write a simple exploit for the third challenge ...

9:24
Call Me! - Linux x64 [Rop Emporium 0x2] - Callme

85 views

5 months ago

NorthSec
NorthSec 2025 - Jeremy Miller - From Security to Safety

This talk explores the intersection of philosophy, ethics, security, and AI. As AI systems like LLMs become increasingly ubiquitous ...

27:13
NorthSec 2025 - Jeremy Miller - From Security to Safety

66 views

3 months ago

BSidesSLC
BSidesSLC 2025 | Atomic Honeypot – A MySQL Honeypot That Fights Back | Alexander Rubin

... red teaming, and CTF-style exploit development. Originally presented at DEF CON 2024, this version includes new material and ...

39:01
BSidesSLC 2025 | Atomic Honeypot – A MySQL Honeypot That Fights Back | Alexander Rubin

91 views

7 months ago

HITCON
Compromising Linux the Right Way: 0-days, Novel Techniques, and Lessons from Failure

The talk will conclude with key takeaways on kernel research mindset, exploit development, and the novel techniques derived ...

42:25
Compromising Linux the Right Way: 0-days, Novel Techniques, and Lessons from Failure

119 views

4 months ago