ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

466 results

EuroPython Conference
Pwndbg: Low level debugging and exploit development with Python — disconnect3d

EuroPython 2025 — Terrace 2A on 2025-07-17] *Pwndbg: Low level debugging and exploit development with Python by ...

45:08
Pwndbg: Low level debugging and exploit development with Python — disconnect3d

419 views

4 months ago

Erarnitox
Write to Memory using ROP - Linux x64 [Rop Emporium 0x3] - write4

In this video we will take a look at how to utilize radare2, gdb gef and pwntools to write a simple exploit for the fourth challenge ...

10:29
Write to Memory using ROP - Linux x64 [Rop Emporium 0x3] - write4

128 views

5 months ago

Erarnitox
x64 Linux - ROPing with Pwntools [Rop Emporium 0x1] - Split

In this video we will take a look at how to utilize radare2, gdb gef and pwntools to write a simple exploit for the second challenge ...

11:26
x64 Linux - ROPing with Pwntools [Rop Emporium 0x1] - Split

87 views

6 months ago

Declan Middleton
Manjaro Linux for Hacking?! The Arch Setup Hackers Actually Use

... higher speed • Perfect for scripting, automation, and exploit development Want to learn cybersecurity or improve your skills?

18:40
Manjaro Linux for Hacking?! The Arch Setup Hackers Actually Use

599 views

2 months ago

DEFCONConference
DEF CON 33 - 40 Years Of Phrack: Hacking, Zines & Digital Dissent -richinseattle, Netspooky, Chompie

For 40 years, Phrack has published papers from the hacker underground. Join us as we discuss the evolution of hacking, hacker ...

42:30
DEF CON 33 - 40 Years Of Phrack: Hacking, Zines & Digital Dissent -richinseattle, Netspooky, Chompie

13,134 views

5 months ago

Infin1teXploit
Does Microsoft Defender Protect You From Getting Hacked?

... hacking tutorial cyber security ethical hacking red team exploit development remote access reverse shell attack hacking tools.

14:54
Does Microsoft Defender Protect You From Getting Hacked?

61 views

10 months ago

NorthSec
NorthSec 2025 - Jake Mayhew - Red Team Road Rage: Weaponizing Vulnerable Drivers to Blind EDR

Endpoint Detection & Response (EDR) tools are becoming more and more sophisticated, requiring attackers (both good & evil) to ...

29:51
NorthSec 2025 - Jake Mayhew - Red Team Road Rage: Weaponizing Vulnerable Drivers to Blind EDR

464 views

4 months ago

HITCON
25 YEARS OF ATTACKS AND DEFENSE

For over two decades, working as an cybersecurity entrepreneur, researcher and instructor, I have heard over and over again that ...

50:44
25 YEARS OF ATTACKS AND DEFENSE

66 views

6 months ago

Erarnitox
Call Me! - Linux x64 [Rop Emporium 0x2] - Callme

In this video we will take a look at how to utilize radare2, gdb gef and pwntools to write a simple exploit for the third challenge ...

9:24
Call Me! - Linux x64 [Rop Emporium 0x2] - Callme

85 views

6 months ago

OWASP Foundation
No Fate But What We Make: Doing Intrusion Prediction

Craig Chamberlain discusses doing intrusion prediction.

48:08
No Fate But What We Make: Doing Intrusion Prediction

58 views

7 months ago

BSides Belfast
History of Video Game Console Hacking - Matthew Reaney

Want to learn how gamers broke the encryption of the Xbox 360 by drilling through the DVD drive microcontroller? Although the ...

38:11
History of Video Game Console Hacking - Matthew Reaney

71 views

2 months ago

Erarnitox
A Simple x64 Linux Buffer Overflow Exploit [Rop Emporium 0x0] - Ret2Win

In this video we will take a look at how to utilize radare2, gdb gef and pwntools to write a simple exploit for the first challenge ...

7:45
A Simple x64 Linux Buffer Overflow Exploit [Rop Emporium 0x0] - Ret2Win

135 views

6 months ago

Lookas et bella
The 3-Step Economy System That Actually Works in EU5 2026

This is an EU5 guide to Economy. Everything you need to know, explained like a 5-year-old. You can buy EU5 here and support ...

23:17
The 3-Step Economy System That Actually Works in EU5 2026

45,127 views

2 months ago

BSides Cape Town
Find and fix Vulnerabilities within open source projects - Callian

It's actually pretty easy to find and fix vulnerabilities within open-source projects. With the right tools and techniques, identifying ...

11:48
Find and fix Vulnerabilities within open source projects - Callian

217 views

11 months ago

Cooper
Exploiting Legit APIs For Covert C2: A New Perspective On Cloud-based Malware Operations- Cocomelonc

... me I'm working on in seven generation companies also writing different books related to malware development and research uh ...

30:23
Exploiting Legit APIs For Covert C2: A New Perspective On Cloud-based Malware Operations- Cocomelonc

415 views

4 months ago

ZeroDay Vault
Hacking with AI?! 🔥 KaliGPT Will Blow Your Mind!

Welcome to the Future of Hacking! Soc Analyst L1 Masterclass ...

49:11
Hacking with AI?! 🔥 KaliGPT Will Blow Your Mind!

1,401 views

Streamed 7 months ago

Gnar Coding
How I’d Learn Python for Cybersecurity If I Started in 2025

Some highlights from the last live session. MUCH LOVE SQUAD DISCLAIMER: Everything in this video is for entertainment and ...

22:24
How I’d Learn Python for Cybersecurity If I Started in 2025

1,948 views

8 months ago

HITCON
Compromising Linux the Right Way: 0-days, Novel Techniques, and Lessons from Failure

The talk will conclude with key takeaways on kernel research mindset, exploit development, and the novel techniques derived ...

42:25
Compromising Linux the Right Way: 0-days, Novel Techniques, and Lessons from Failure

128 views

4 months ago

Talking Sasquach
Master The Flipper Zero: Ultimate 2026 Starter Guide (Momentum Firmware)

Master the Flipper Zero in 2025 with this complete beginner's guide! Whether you're new to ethical hacking, cybersecurity, or just ...

24:35
Master The Flipper Zero: Ultimate 2026 Starter Guide (Momentum Firmware)

167,281 views

4 months ago

Cyb3rPeter - Cybersecurity
🐍 Python in Cybersecurity: Automate, Analyze, and Attack! 🛡️

... Requests (for web interaction/exploit development), and Nmap integration (for scanning). Hands-On Use Cases: See practical ...

1:59
🐍 Python in Cybersecurity: Automate, Analyze, and Attack! 🛡️

14 views

3 months ago