ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

7,582 results

pwn.college
CSE 598: Applied Vulnerability Research - Final Presentations

The final presentations of ASU's CSE 598, Applied Vulnerability Research. This course was a follow on to ASU's CSE 466 ...

2:52:22
CSE 598: Applied Vulnerability Research - Final Presentations

4,057 views

4 years ago

NorthSec
NorthSec 2025 - François Labrèche - How not to do ML

Machine learning has been used extensively for the prediction of cyber security threats for a number of years. More specifically ...

25:49
NorthSec 2025 - François Labrèche - How not to do ML

87 views

3 months ago

media.ccc.de
35C3 -  The Layman's Guide to Zero-Day Engineering

https://media.ccc.de/v/35c3-9979-the_layman_s_guide_to_zero-day_engineering A demystification of the exploit development ...

57:04
35C3 - The Layman's Guide to Zero-Day Engineering

44,820 views

7 years ago

media.ccc.de
35C3 -  From Zero to Zero Day

https://media.ccc.de/v/35c3-9657-from_zero_to_zero_day In this talk I will share my story of how in a little over a year, a high ...

48:29
35C3 - From Zero to Zero Day

32,042 views

7 years ago

DEFCONConference
DEF CON 31 - Retro Exploitation - Vintage Computing as a Vuln Research Playground - Wesley McGrew

It can be very difficult for those new to hacking to learn about vulnerability discovery and exploit development on modern ...

44:15
DEF CON 31 - Retro Exploitation - Vintage Computing as a Vuln Research Playground - Wesley McGrew

671 views

2 years ago

DEFCONConference
DEF CON 32 - Anyone can hack IoT- Beginner’s Guide to Hacking Your First IoT Device - Andrew Bellini

Yes, anyone can hack IoT devices and I'll show you how! It doesn't matter if you're an experienced pen tester in other fields, ...

54:12
DEF CON 32 - Anyone can hack IoT- Beginner’s Guide to Hacking Your First IoT Device - Andrew Bellini

294,000 views

1 year ago

DEFCONConference
DEF CON 33 - Red Russians: How Russian APT groups follow offensive security research - Will Thomas

Offensive security is meant to improve defenses, but what happens when hostile nation-states start learning from us too? This talk ...

24:17
DEF CON 33 - Red Russians: How Russian APT groups follow offensive security research - Will Thomas

2,004 views

4 months ago

WHY2025
WHY 2025 - From WAN to NAS: A Pwn2Own Journey Through the SOHO Attack Surface

https://media.ccc.de/v/why2025-99-from-wan-to-nas-a-pwn2own-journey-through-the-soho-attack-surface The SOHO Smashup is ...

47:53
WHY 2025 - From WAN to NAS: A Pwn2Own Journey Through the SOHO Attack Surface

503 views

6 months ago

DEFCONConference
DEF CON 33 - Exploiting Security Side Channels in E2E Encrypted Msngrs - G Gegenheuber,  M Gunther

With billions of users worldwide, mobile messaging apps like WhatsApp and Signal have become critical for personal and ...

40:43
DEF CON 33 - Exploiting Security Side Channels in E2E Encrypted Msngrs - G Gegenheuber, M Gunther

7,938 views

4 months ago

DEFCON Switzerland
#days: Andrei Costin: Hacking Printers: 10 years of public research and lessons learned

days Security & Risk Conference: Andrei Costin: Hacking Printers: 10 years of public research and lessons learned.

1:00:10
#days: Andrei Costin: Hacking Printers: 10 years of public research and lessons learned

455 views

14 years ago

NorthSec
NSEC2023 - Q&A; Vulnerability Research

Q&A panel for the Vulnerability Research block. Ron Bowes Lead Security Researcher, Rapid7 Dirk-jan Mollema Security ...

28:55
NSEC2023 - Q&A; Vulnerability Research

149 views

1 year ago

Lawrence Systems
How to Vet a Security Researcher's Credibility With These 6 Rules

https://lawrence.video/biz Connecting With Us --------------------------------------------------- + Hire Us For A Project: ...

20:17
How to Vet a Security Researcher's Credibility With These 6 Rules

9,481 views

2 years ago

DEFCON Switzerland
Action Anomalies: A Hackers Guide To Github Actions - Elliot Ward

Elliot Ward (Snyk) In the DevOps era of frequent releases, CI tools such as Github actions are powerful platforms to enable secure ...

49:17
Action Anomalies: A Hackers Guide To Github Actions - Elliot Ward

689 views

1 year ago

DEFCONConference
DEF CON 25 BioHacking Village  - Jay Radcliffe - The Scientific Method in Security Research

One of the huge criticisms of Security research is the lack of process and adherence to traditional research methods. Quite often ...

50:17
DEF CON 25 BioHacking Village - Jay Radcliffe - The Scientific Method in Security Research

790 views

8 years ago

CNCF [Cloud Native Computing Foundation]
Understanding Exploitability with VEX, EPSS, and Other Standard Frameworks - Ayse Kaya, Root

Don't miss out! Join us at our next Flagship Conference: KubeCon + CloudNativeCon North America in Salt Lake City from ...

32:04
Understanding Exploitability with VEX, EPSS, and Other Standard Frameworks - Ayse Kaya, Root

168 views

1 year ago

DEFCONConference
DEF CON 33 - DisguiseDelimit: Exploiting Synology NAS with Delimiters and Novel Tricks - Ryan Emmon

Network Attached Storage (NAS) devices are indispensable in many corporate and home environments. These devices often live ...

39:39
DEF CON 33 - DisguiseDelimit: Exploiting Synology NAS with Delimiters and Novel Tricks - Ryan Emmon

4,212 views

7 days ago

DEFCONConference
DEF CON 32 - The Way To Android Root: Exploiting Smartphone GPU - Xiling Gong, Eugene Rodionov

GPU security is a vital area of mobile security highlighted both by public security research as well as by in-the-wild attacks. Due to ...

46:18
DEF CON 32 - The Way To Android Root: Exploiting Smartphone GPU - Xiling Gong, Eugene Rodionov

1,994 views

1 year ago

DEFCONConference
DEF CON 32 - Bug Hunting In VMware Device Virtualization - JiaQing Huang, Hao Zheng, Yue Liu

In this presentation, we will unveil a new attack surface: Device Virtualization in VMKernel. This isan unknown territory that has not ...

39:12
DEF CON 32 - Bug Hunting In VMware Device Virtualization - JiaQing Huang, Hao Zheng, Yue Liu

597 views

1 year ago

OWASP Foundation
The evolution of exploiting memory vulnerabilities in Linux

Slides: https://static.sched.com/hosted_files/owasp2023globalappsecwashin/6a/Exploiting%20Memory%20Vulnerabilities.pdf ...

35:15
The evolution of exploiting memory vulnerabilities in Linux

775 views

2 years ago

DEFCONConference
DEF CON 25 IoT Village - Rick Ramgattie  -  Rethinking the Researcher-Vendor Relationshipe

Disclosing vulnerabilities to a vendor, especially one that doesn't seem to prioritize security the same way we do, can be a source ...

24:17
DEF CON 25 IoT Village - Rick Ramgattie - Rethinking the Researcher-Vendor Relationshipe

941 views

8 years ago