ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

4,357 results

DEFCONConference
DEF CON 26  - Alexei Bulazel - Reverse Engineering Windows Defenders Emulator

Windows Defender Antivirus's mpengine.dll implements the core of Defender's functionality in an enormous ~11 MB, 30000+ ...

46:46
DEF CON 26 - Alexei Bulazel - Reverse Engineering Windows Defenders Emulator

45,989 views

7 years ago

DEFCONConference
DEF CON 26 - zerosum0x0 - Demystifying MS17 010 Reverse Engineering the ETERNAL Exploits

MS17-010 is the most important patch in the history of operating systems, fixing remote code execution vulnerabilities in the world ...

48:14
DEF CON 26 - zerosum0x0 - Demystifying MS17 010 Reverse Engineering the ETERNAL Exploits

17,687 views

7 years ago

Dr. Pavel Vlašánek
Can You Crack This Program? (Beginner Reverse Engineering Tutorial)

Curious how software cracks actually work? In this video, I walk you through a beginner‑friendly reverse‑engineering challenge ...

12:19
Can You Crack This Program? (Beginner Reverse Engineering Tutorial)

19,081 views

8 months ago

Velimir Radlovački
Demystifying MS17-010: Reverse Engineering the ETERNAL Exploits

PLEASE SUBSCRIBE, LIKE AND COMMENT TO KEEP THIS CHANNEL ALIVE! Tip Jar: https://paypal.me/radlovacki MS17-010 is ...

48:14
Demystifying MS17-010: Reverse Engineering the ETERNAL Exploits

82 views

7 years ago

Robert Baruch
How I reverse engineer a chip

"Reverse engineering" doesn't just mean "I don't know how this works", but "I want to find out exactly how this was implemented".

5:10
How I reverse engineer a chip

457,636 views

8 years ago

Velimir Radlovački
Reverse Engineering Windows Defenders Emulator

PLEASE SUBSCRIBE TO KEEP THIS CHANNEL ALIVE! Tip Jar: https://paypal.me/radlovacki Windows Defender Antivirus's ...

46:46
Reverse Engineering Windows Defenders Emulator

550 views

7 years ago

LinuxConfAu 2018 - Sydney, Australia
Tap On to Reverse Engineering

Michael Farrell http://lca2018.linux.org.au/schedule/presentation/78/ Since 2015, I've been working on reverse engineering ...

40:48
Tap On to Reverse Engineering

2,404 views

8 years ago

DEFCONConference
DEF CON 31 - #NoFilter  Abusing Windows Filtering Platform for privilege escalation - Ron Ben Yizhak

Privilege escalation is a common attack vector in the Windows OS. Today, there are multiple offensive tools in the wild that can ...

35:41
DEF CON 31 - #NoFilter Abusing Windows Filtering Platform for privilege escalation - Ron Ben Yizhak

3,701 views

2 years ago

OpenSecurityTraining2
Dbg3301: HyperDbg 03 05 Windows Internal Basics: Processes & Threads

Whether you have an interest in reverse engineering or seek to elevate your reverse engineering skills with hypervisor-assisted ...

4:34
Dbg3301: HyperDbg 03 05 Windows Internal Basics: Processes & Threads

402 views

2 years ago

John Hammond
Google CTF - BEGINNER Reverse Engineering w/ ANGR

Hang with our community on Discord! https://johnhammond.org/discord If you would like to support me, please like, comment ...

39:47
Google CTF - BEGINNER Reverse Engineering w/ ANGR

304,010 views

5 years ago

DEFCONConference
DEF CON 31 - Game Changing Advances in Windows Shellcode Analysis - Brizendine,  Kersten, Hince

Shellcode is omnipresent, seen or unseen. Yet tooling to analyze shellcode is lacking. We present the cutting-edge SHAREM ...

43:28
DEF CON 31 - Game Changing Advances in Windows Shellcode Analysis - Brizendine, Kersten, Hince

1,622 views

2 years ago

Cooper
Hack.lu 2016 The Legend of Windows: A Link to the Hash by m4xk and sıx

He grew a passion for reverse engineering software and hardware. He is deeply interested in breaking and exploiting computers ...

17:09
Hack.lu 2016 The Legend of Windows: A Link to the Hash by m4xk and sıx

847 views

9 years ago

Dr. Pavel Vlašánek
Can You Crack This Password? (Advanced Reverse Engineering Tutorial)

Ready for a tougher reverse-engineering challenge packed with tricks and anti-debug defenses? In this episode, we take on a ...

10:01
Can You Crack This Password? (Advanced Reverse Engineering Tutorial)

1,297 views

7 months ago

media.ccc.de
Jethro Beekman: Reversing UEFI by execution

This talk will be an overview of how to reverse-engineer Unified Extensible Firmware Interface (UEFI) firmware, the replacement ...

24:53
Jethro Beekman: Reversing UEFI by execution

1,559 views

10 years ago

MAXOENGINEERING
DEF CON 26    Alexei Bulazel   Reverse Engineering Windows Defenders Emulator

ndustrial engineering is an inter-disciplinary profession that is concerned with the optimization of complex processes, systems, ...

46:46
DEF CON 26 Alexei Bulazel Reverse Engineering Windows Defenders Emulator

16 views

7 years ago

BSides SATX
Christopher Doege - Intro to Reverse Engineering with Ghidra Taming The Dragon

Title: Intro to Reverse Engineering with Ghidra Taming The Dragon Presenter: Christopher Doege - @Chris_Doege Track: In The ...

54:32
Christopher Doege - Intro to Reverse Engineering with Ghidra Taming The Dragon

380 views

6 years ago

DEFCONConference
DEF CON 23 - Chris Domas - Repsych: Psychological Warfare in Reverse Engineering

Your precious 0-day? That meticulously crafted exploit? The perfect foothold? At some point, they'll be captured, dissected, and ...

38:49
DEF CON 23 - Chris Domas - Repsych: Psychological Warfare in Reverse Engineering

168,009 views

10 years ago

OpenNSM
OpenNSM (Reverse Engineering Cryptolocker - Brandon Tansey)

Brandon discusses the basics of reverse engineering malware by investigating Cryptolocker. Detailed meeting notes: ...

1:18:01
OpenNSM (Reverse Engineering Cryptolocker - Brandon Tansey)

2,940 views

11 years ago

HITCON
What the hell is Windows's CLIP Service - Reversing and exploiting the obfuscated code at its core.

With a focus on Reverse Engineering and Vulnerability Research, Philippe uses his background in Embedded Security and ...

40:18
What the hell is Windows's CLIP Service - Reversing and exploiting the obfuscated code at its core.

133 views

7 months ago

潜龙勿用
Lab12 Malware Reverse Engineering

1. Extract strings from malwares with strings.exe from command line 2. Decomplie .Net executables with ILSpy 3. Exploit ...

1:04:35
Lab12 Malware Reverse Engineering

265 views

4 years ago