Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
6,327 results
For the past 20+ years binary exploitation has been seen as the ultimate challenge and prize, when exploiting large applications ...
5,714 views
1 year ago
https://media.ccc.de/v/34c3-8936-1-day_exploit_development_for_cisco_ios Year 2017 was rich in vulnerabilities discovered for ...
5,794 views
8 years ago
EuroPython 2025 — Terrace 2A on 2025-07-17] *Pwndbg: Low level debugging and exploit development with Python by ...
491 views
4 months ago
https://media.ccc.de/v/35c3-9979-the_layman_s_guide_to_zero-day_engineering A demystification of the exploit development ...
45,072 views
7 years ago
It is no secret that the days of jmp esp are far gone. In the age of Virtualization-Based Security and Hypervisor Protected Code ...
9,965 views
4 years ago
C, assembly, exploit development, x86/MISP/SPARC/HPPA/PPC. Understanding the value of exploitable bugs. Hacking scene ...
277 views
2 years ago
... Malvica is a senior content developer and security researcher at OffSec focusing on vulnerability research, exploit development, ...
64 views
2 weeks ago
Exploit generation Many people are familiar with scripts which can help during an exploit development. But what if we automate ...
1,227 views
9 years ago
This lecture covers an overview of fuzzing, and the basics of exploit development and writing shellcode. This course is geared for ...
10,320 views
12 years ago
This lecture covers exploit development and writing shellcode. This course is geared for pen-testers and incident responders, and ...
7,112 views
Jeremy enjoys vulnerability research and analysis, exploit development, programming, fuzzing, and reverse engineering. Twitter: ...
716 views
https://media.ccc.de/v/33c3-7901-pegasus_internals Technical Teardown of the Pegasus malware and Trident exploit chain This ...
28,381 views
I created this video to assist with anyone learning how to create shellcode that accesses the x86 win API, or simply trying to learn ...
2,175 views
10 years ago
The class materials are available at http://www.OpenSecurityTraining.info/Exploits1.html Follow us on Twitter for class news ...
38,955 views
13 years ago
Vinícius Vieira (aka. v1n1v131r4) is a Cyber Security Researcher and Pentester with over 16 years of experience. He is Professor ...
829 views
Streamed 5 years ago
Presentations from the DEF CON 27 Hack the Sea Village.
1,860 views
6 years ago
This is the 15th video recorded course lecture for CIS5930/CIS4930 "Offensive Security" from Spring 2013 at the Florida State ...
4,306 views
Your Investigator™ (Leading Fraud and Crime Investigation Training Providing Company) offers a wide range of courses and ...
29 views
5 years ago
This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds ...
16,057 views
Let's learn about exploitation primitives! Module details at https://pwn.college/modules/exploitation2.
3,484 views