ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

6,327 results

DEFCONConference
DEF CON 32 - The Rise and Fall of Binary Exploitation - Stephen Sims

For the past 20+ years binary exploitation has been seen as the ultimate challenge and prize, when exploiting large applications ...

47:41
DEF CON 32 - The Rise and Fall of Binary Exploitation - Stephen Sims

5,714 views

1 year ago

media.ccc.de
34C3 -  1-day exploit development for Cisco IOS

https://media.ccc.de/v/34c3-8936-1-day_exploit_development_for_cisco_ios Year 2017 was rich in vulnerabilities discovered for ...

45:37
34C3 - 1-day exploit development for Cisco IOS

5,794 views

8 years ago

EuroPython Conference
Pwndbg: Low level debugging and exploit development with Python — disconnect3d

EuroPython 2025 — Terrace 2A on 2025-07-17] *Pwndbg: Low level debugging and exploit development with Python by ...

45:08
Pwndbg: Low level debugging and exploit development with Python — disconnect3d

491 views

4 months ago

media.ccc.de
35C3 -  The Layman's Guide to Zero-Day Engineering

https://media.ccc.de/v/35c3-9979-the_layman_s_guide_to_zero-day_engineering A demystification of the exploit development ...

57:04
35C3 - The Layman's Guide to Zero-Day Engineering

45,072 views

7 years ago

BSidesKC
Exploit Development Is Dead, Long Live Exploit Development!

It is no secret that the days of jmp esp are far gone. In the age of Virtualization-Based Security and Hypervisor Protected Code ...

47:57
Exploit Development Is Dead, Long Live Exploit Development!

9,965 views

4 years ago

BSides Budapest IT Security Conference
BSidesBUD2023: How I Got Into Hack?! - Cybersecurity in The Last Millenium

C, assembly, exploit development, x86/MISP/SPARC/HPPA/PPC. Understanding the value of exploitable bugs. Hacking scene ...

16:20
BSidesBUD2023: How I Got Into Hack?! - Cybersecurity in The Last Millenium

277 views

2 years ago

BSides Oslo
Chrome Browser Exploitation: from zero to heap sandbox escape - Matteo Malvica

... Malvica is a senior content developer and security researcher at OffSec focusing on vulnerability research, exploit development, ...

42:18
Chrome Browser Exploitation: from zero to heap sandbox escape - Matteo Malvica

64 views

2 weeks ago

Cooper
Hack.lu 2016 Exploit generation and JavaScript analysis automation with WinDBG

Exploit generation Many people are familiar with scripts which can help during an exploit development. But what if we automate ...

31:47
Hack.lu 2016 Exploit generation and JavaScript analysis automation with WinDBG

1,227 views

9 years ago

Nobody
Offensive Security 2013 - FSU - Lecture7: Fuzzing / Exploit Dev 101

This lecture covers an overview of fuzzing, and the basics of exploit development and writing shellcode. This course is geared for ...

1:11:04
Offensive Security 2013 - FSU - Lecture7: Fuzzing / Exploit Dev 101

10,320 views

12 years ago

Nobody
Offensive Security 2013 - FSU - Lecture8: Exploit Dev 102

This lecture covers exploit development and writing shellcode. This course is geared for pen-testers and incident responders, and ...

1:14:24
Offensive Security 2013 - FSU - Lecture8: Exploit Dev 102

7,112 views

12 years ago

DEFCONConference
DEF CON 18 - Jeremy Brown - Exploiting SCADA Systems

Jeremy enjoys vulnerability research and analysis, exploit development, programming, fuzzing, and reverse engineering. Twitter: ...

27:36
DEF CON 18 - Jeremy Brown - Exploiting SCADA Systems

716 views

12 years ago

media.ccc.de
Pegasus internals (33c3)

https://media.ccc.de/v/33c3-7901-pegasus_internals Technical Teardown of the Pegasus malware and Trident exploit chain This ...

29:39
Pegasus internals (33c3)

28,381 views

9 years ago

Exploit Development and Penetration Testing
win32 Exploit Development

I created this video to assist with anyone learning how to create shellcode that accesses the x86 win API, or simply trying to learn ...

2:30:58
win32 Exploit Development

2,175 views

10 years ago

OpenSecurityTraining2
Day 1 Part 1: Exploits1: Introduction to Software Exploits

The class materials are available at http://www.OpenSecurityTraining.info/Exploits1.html Follow us on Twitter for class news ...

58:59
Day 1 Part 1: Exploits1: Introduction to Software Exploits

38,955 views

13 years ago

The Hacktivists
Dissecting EggHunter on Exploit Development - Vinícius Vieira (aka. v1n1v131r4)

Vinícius Vieira (aka. v1n1v131r4) is a Cyber Security Researcher and Pentester with over 16 years of experience. He is Professor ...

24:35
Dissecting EggHunter on Exploit Development - Vinícius Vieira (aka. v1n1v131r4)

829 views

Streamed 5 years ago

DEFCONConference
Weston Hecker - PENTESTING How to Get into the Field Explained - DEF CON 27 Hack the Sea Village

Presentations from the DEF CON 27 Hack the Sea Village.

24:18
Weston Hecker - PENTESTING How to Get into the Field Explained - DEF CON 27 Hack the Sea Village

1,860 views

6 years ago

Nobody
Offensive Security 2013 - FSU - Lecture15: Web Application Hacking 104 & Exploit Development 104

This is the 15th video recorded course lecture for CIS5930/CIS4930 "Offensive Security" from Spring 2013 at the Florida State ...

1:20:48
Offensive Security 2013 - FSU - Lecture15: Web Application Hacking 104 & Exploit Development 104

4,306 views

12 years ago

Your Investigator
Exploit Development-Everything You Need to Know - Your Investigator

Your Investigator™ (Leading Fraud and Crime Investigation Training Providing Company) offers a wide range of courses and ...

21:27
Exploit Development-Everything You Need to Know - Your Investigator

29 views

5 years ago

Z. Cliffe Schreuders
Bug Hunting and Exploit Development 1: Finding Flaws Using Static Analysis

This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds ...

14:57
Bug Hunting and Exploit Development 1: Finding Flaws Using Static Analysis

16,057 views

10 years ago

pwn.college
pwn.college - Advanced Exploitation - Exploit Primitives

Let's learn about exploitation primitives! Module details at https://pwn.college/modules/exploitation2.

45:58
pwn.college - Advanced Exploitation - Exploit Primitives

3,484 views

5 years ago