ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

454 results

EuroPython Conference
Pwndbg: Low level debugging and exploit development with Python — disconnect3d

EuroPython 2025 — Terrace 2A on 2025-07-17] *Pwndbg: Low level debugging and exploit development with Python by ...

45:08
Pwndbg: Low level debugging and exploit development with Python — disconnect3d

491 views

4 months ago

BSides Oslo
Chrome Browser Exploitation: from zero to heap sandbox escape - Matteo Malvica

... Malvica is a senior content developer and security researcher at OffSec focusing on vulnerability research, exploit development, ...

42:18
Chrome Browser Exploitation: from zero to heap sandbox escape - Matteo Malvica

64 views

2 weeks ago

BSides Cape Town
SpeedRunners: The Hackers of the Gaming World - Nunudzai Mrewa

Speedrunning, the art of completing games with incredible speed, has evolved into more than a gaming feat—it's a showcase of ...

32:14
SpeedRunners: The Hackers of the Gaming World - Nunudzai Mrewa

191 views

11 months ago

VulnVibes
Access Compromised: The UniFi RCE That Broke the Door - CVE-2025-52665

Researchers discovered a critical remote-code-execution vulnerability in UniFi Access that allowed unauthenticated command ...

12:09
Access Compromised: The UniFi RCE That Broke the Door - CVE-2025-52665

201 views

4 months ago

Declan Middleton
Manjaro Linux for Hacking?! The Arch Setup Hackers Actually Use

... higher speed • Perfect for scripting, automation, and exploit development Want to learn cybersecurity or improve your skills?

18:40
Manjaro Linux for Hacking?! The Arch Setup Hackers Actually Use

648 views

3 months ago

OWASP Foundation
No Fate But What We Make: Doing Intrusion Prediction

Craig Chamberlain discusses doing intrusion prediction.

48:08
No Fate But What We Make: Doing Intrusion Prediction

58 views

8 months ago

NorthSec
NorthSec 2025 - Jeremy Miller - From Security to Safety

This talk explores the intersection of philosophy, ethics, security, and AI. As AI systems like LLMs become increasingly ubiquitous ...

27:13
NorthSec 2025 - Jeremy Miller - From Security to Safety

67 views

5 months ago

Cyb3rPeter - Cybersecurity
🐍 Python in Cybersecurity: Automate, Analyze, and Attack! 🛡️

... Requests (for web interaction/exploit development), and Nmap integration (for scanning). Hands-On Use Cases: See practical ...

1:59
🐍 Python in Cybersecurity: Automate, Analyze, and Attack! 🛡️

14 views

3 months ago

BSidesSLC
BSidesSLC 2025 | Atomic Honeypot – A MySQL Honeypot That Fights Back | Alexander Rubin

... red teaming, and CTF-style exploit development. Originally presented at DEF CON 2024, this version includes new material and ...

39:01
BSidesSLC 2025 | Atomic Honeypot – A MySQL Honeypot That Fights Back | Alexander Rubin

112 views

9 months ago

NorthSec
NorthSec 2025 - Jake Mayhew - Red Team Road Rage: Weaponizing Vulnerable Drivers to Blind EDR

Endpoint Detection & Response (EDR) tools are becoming more and more sophisticated, requiring attackers (both good & evil) to ...

29:51
NorthSec 2025 - Jake Mayhew - Red Team Road Rage: Weaponizing Vulnerable Drivers to Blind EDR

476 views

5 months ago

DEFCONConference
DEF CON 33 - 40 Years Of Phrack: Hacking, Zines & Digital Dissent -richinseattle, Netspooky, Chompie

For 40 years, Phrack has published papers from the hacker underground. Join us as we discuss the evolution of hacking, hacker ...

42:30
DEF CON 33 - 40 Years Of Phrack: Hacking, Zines & Digital Dissent -richinseattle, Netspooky, Chompie

13,317 views

6 months ago

HITCON
25 YEARS OF ATTACKS AND DEFENSE

For over two decades, working as an cybersecurity entrepreneur, researcher and instructor, I have heard over and over again that ...

50:44
25 YEARS OF ATTACKS AND DEFENSE

66 views

7 months ago

HITCON
Compromising Linux the Right Way: 0-days, Novel Techniques, and Lessons from Failure

The talk will conclude with key takeaways on kernel research mindset, exploit development, and the novel techniques derived ...

42:25
Compromising Linux the Right Way: 0-days, Novel Techniques, and Lessons from Failure

135 views

5 months ago

NorthSec
NorthSec 2025 - Pierre Nicolas Allard Coutu - Stolen Laptops

Laptops have become ubiquitous in modern times. An all but guaranteed organizational asset that quite literally holds keys to the ...

41:13
NorthSec 2025 - Pierre Nicolas Allard Coutu - Stolen Laptops

277 views

5 months ago

VulnVibes
Microsoft Addresses Four Critical Vulnerabilities in Azure and Power Apps

Microsoft has remediated a group of critical vulnerabilities impacting key cloud services such as Azure Automation, Azure Storage, ...

5:01
Microsoft Addresses Four Critical Vulnerabilities in Azure and Power Apps

26 views

10 months ago

Gnar Coding
How I’d Learn Python for Cybersecurity If I Started in 2025

Some highlights from the last live session. MUCH LOVE SQUAD DISCLAIMER: Everything in this video is for entertainment and ...

22:24
How I’d Learn Python for Cybersecurity If I Started in 2025

1,988 views

9 months ago

OWASP Foundation
Attacking AI

Attacking AI is a one of a kind session releasing case studies, tactics, and methodology from Arcanum's AI assessments in 2024 ...

47:38
Attacking AI

210 views

3 months ago

Cooper
Exploiting Legit APIs For Covert C2: A New Perspective On Cloud-based Malware Operations- Cocomelonc

... me I'm working on in seven generation companies also writing different books related to malware development and research uh ...

30:23
Exploiting Legit APIs For Covert C2: A New Perspective On Cloud-based Malware Operations- Cocomelonc

422 views

4 months ago

DEFCONConference
DEF CON 33 - China's 5+ year campaign to penetrate perimeter network defenses - Andrew  Brandt

For more than five years, firewall vendors have been under persistent, cyclical struggle against a well-resourced and relentless ...

35:12
DEF CON 33 - China's 5+ year campaign to penetrate perimeter network defenses - Andrew Brandt

106,091 views

5 months ago

VulnVibes
IBM Maximo Vulnerability Exposes Industrial Analytics — CVE-2025-36386

A critical flaw (CVE-2025-36386) in IBM Maximo Manage allows remote attackers to bypass authentication and gain access to ...

9:40
IBM Maximo Vulnerability Exposes Industrial Analytics — CVE-2025-36386

17 views

4 months ago

Global Initiative of Academic Networks - GIAN
LECTURE 4 Smart cybersecrity Leveraging AI for threat analysis and responseSCALE

... uh and uh uh exploit development so exploit development are needed to uh what do you know what is exploit vulnerabilities uh ...

1:19:52
LECTURE 4 Smart cybersecrity Leveraging AI for threat analysis and responseSCALE

9 views

4 months ago

OWASP Foundation
How to get developers to want to adopt AppSec - Matan Rabi

As engineers, our goal is to deliver new features to the product, bringing clear value to customers. All of our KPIs and tools are ...

36:41
How to get developers to want to adopt AppSec - Matan Rabi

94 views

11 months ago

Southern California Linux Expo
Strengthening Vulnerability Management in Cloud Development Environments

Talk by Rob Fletcher ...

7:58
Strengthening Vulnerability Management in Cloud Development Environments

37 views

11 months ago

BSidesLV
Keeping Our History Alive: The Hacker’s Guide to Sticker Preservation

Identifier: JJUSHH Description: - “Keeping Our History Alive: The Hacker's Guide to Sticker Preservation” - Explores cultural ...

21:09
Keeping Our History Alive: The Hacker’s Guide to Sticker Preservation

6 views

3 months ago

Infin1teXploit
Does Microsoft Defender Protect You From Getting Hacked?

... hacking tutorial cyber security ethical hacking red team exploit development remote access reverse shell attack hacking tools.

14:54
Does Microsoft Defender Protect You From Getting Hacked?

61 views

11 months ago