ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

78 results

Dr. Pavel Vlašánek
Can You Crack This Program? (Beginner Reverse Engineering Tutorial)

Curious how software cracks actually work? In this video, I walk you through a beginner‑friendly reverse‑engineering challenge ...

12:19
Can You Crack This Program? (Beginner Reverse Engineering Tutorial)

19,496 views

8 months ago

Dr. Pavel Vlašánek
Can You Crack This Password? (Advanced Reverse Engineering Tutorial)

Ready for a tougher reverse-engineering challenge packed with tricks and anti-debug defenses? In this episode, we take on a ...

10:01
Can You Crack This Password? (Advanced Reverse Engineering Tutorial)

1,318 views

7 months ago

DEFCONConference
DEF CON 33 - 7 Vulns in 7 Days - Breaking Bloatware Faster Than It’s Built - Leon 'leonjza' Jacobs

I'll cover everything from the initial attack surface discovery, reverse engineering and finally exploitation of several vulnerabilities.

39:57
DEF CON 33 - 7 Vulns in 7 Days - Breaking Bloatware Faster Than It’s Built - Leon 'leonjza' Jacobs

19,761 views

5 months ago

The Coding Gopher
99% of Developers Don't Get Sockets

Get 40% OFF CodeCrafters: https://app.codecrafters.io/join?via=the-coding-gopher ⬆️ Best project-based coding platform.

12:05
99% of Developers Don't Get Sockets

519,904 views

11 months ago

HITCON
What the hell is Windows's CLIP Service - Reversing and exploiting the obfuscated code at its core.

With a focus on Reverse Engineering and Vulnerability Research, Philippe uses his background in Embedded Security and ...

40:18
What the hell is Windows's CLIP Service - Reversing and exploiting the obfuscated code at its core.

133 views

7 months ago

DEFCONConference
DEF CON 33 - Infecting the Boot to Own the Kernel - Alejandro Vazquez, Maria San Jose

Bootkits and Rootkits represent some of the most complex and stealthy forms of malware, capable of achieving full system control ...

39:29
DEF CON 33 - Infecting the Boot to Own the Kernel - Alejandro Vazquez, Maria San Jose

1,379 views

5 months ago

DEFCONConference
DEF CON 33 - The Ghost of Internet Explorer in Windows - George Hughey, Rohit Mothe

In 2023, Microsoft detected a nation state actor (Forest Blizzard/STRONTIUM) exploiting a "zero-click" remote code execution ...

44:17
DEF CON 33 - The Ghost of Internet Explorer in Windows - George Hughey, Rohit Mothe

2,385 views

5 months ago

harriebird
Notepad++ (related to CVE-2025-49144) Reverse Shell on Windows

If someone is trying to send or let you download Notepad++ (version 8.8.1 and lower) together with a file named regsvr32.exe, ...

2:34
Notepad++ (related to CVE-2025-49144) Reverse Shell on Windows

352 views

9 months ago

Reverse Everything
Windows Binary Exploitation with ExpWin by Danilo Erazo

Spanish talk (activate the English subtitles please)- Windows Binary Exploitation with ExpWin v1.0 - FLISoL 2025 By Danilo Erazo ...

40:37
Windows Binary Exploitation with ExpWin by Danilo Erazo

175 views

11 months ago

BSidesSLC
BSidesSLC 2025 | Start - Recon - Exploit: A Framework for Desktop App Pentesting

He's a reverse engineering and cryptography enthusiast with a growing focus on product security. Learn more about ...

24:39
BSidesSLC 2025 | Start - Recon - Exploit: A Framework for Desktop App Pentesting

193 views

9 months ago

Mental Outlaw
Based Developer Makes AirPods Open Source

In this video I discuss how a Free Software Developer has created software that allows people to use all the features of airpods ...

9:10
Based Developer Makes AirPods Open Source

359,818 views

4 months ago

HITCON
ReVault! Compromised by your Secure SoC

With a focus on Reverse Engineering and Vulnerability Research, Philippe uses his background in Embedded Security and ...

39:32
ReVault! Compromised by your Secure SoC

301 views

6 months ago

MalwareAnalysisForHedgehogs
Malware Analysis - Malicious MS Office files without Macros

... https://ko-fi.com/struppigel Follow me on Twitter: https://twitter.com/struppigel #malware #malwareanalysis #reverseengineering ...

19:53
Malware Analysis - Malicious MS Office files without Macros

4,056 views

2 months ago

The Debug Zone
Understanding IMAGE_SECTION_HEADER: VirtualAddress vs PointerToRawData Explained

In this video, we delve into the intricacies of the IMAGE_SECTION_HEADER structure, a crucial component in the Portable ...

2:19
Understanding IMAGE_SECTION_HEADER: VirtualAddress vs PointerToRawData Explained

4 views

6 months ago

DEFCONConference
DEF CON 33  - Can't Stop the ROP: Automating Universal ASLR Bypasses - Bramwell Brizendine

High-entropy ASLR was supposed to make bypasses of ASLR on Windows virtually impossible - until now! This talk will debut ...

42:45
DEF CON 33 - Can't Stop the ROP: Automating Universal ASLR Bypasses - Bramwell Brizendine

2,288 views

1 month ago

Nida Karagoz
Which Windows kernel function is responsible for creating a crash dump file?

Which Windows kernel function is responsible for creating a crash dump file? ✧ I really hope you found a helpful solution!

1:29
Which Windows kernel function is responsible for creating a crash dump file?

0 views

11 months ago

PlumCasualties
ReactOS on Real Hardware in 2025 (0.4.15)

ReactOS is an open source operating system that aims to be binary compatible with Microsoft Windows (Currently compatible with ...

15:59
ReactOS on Real Hardware in 2025 (0.4.15)

18,787 views

11 months ago

The Debug Zone
How to Execute an Executable from Memory: Techniques and Examples

... #softwareexecutionmethods, #advancedexecutiontechniques, #cybersecuritytechniques, #reverseengineering.

1:32
How to Execute an Executable from Memory: Techniques and Examples

2 views

10 months ago

Erarnitox
The Most Useful C++ Libraries

Core Libraries: - 1) 0:30 | https://pocoproject.org - 2) 1:58 | https://github.com/facebook/folly - 3) 2:08 ...

22:13
The Most Useful C++ Libraries

793 views

4 months ago

Cyber Wizards
🕵️🦠 FLARE-VM + VirtualBox for Malware Analysis

... designed for malware analysis and reverse engineering. Email attachment that you're uncertain about? analyze it in Flare-VM.

29:16
🕵️🦠 FLARE-VM + VirtualBox for Malware Analysis

382 views

10 months ago