ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

24,033 results

Millionwords
The TRUTH About Exploit Dev Certifications (Tier List 2025)

In this video I rank the most popular exploit development certifications from trash to god-tier. You'll see which certs actually teach ...

9:35
The TRUTH About Exploit Dev Certifications (Tier List 2025)

115 views

6 months ago

Elevate Cyber
Why I'm quitting exploit development

Red Team R&D Blog: https://self-m4de.github.io/ Land a Cyber Security job in 6 months: https://elevatecybersecurity.net/o6za ...

10:06
Why I'm quitting exploit development

918 views

3 months ago

TechBlazes
Linux Heap Exploitation Part 1: Learn Real-World GLIBC Attacks

... 00:53:12 - Hands-On Exploit Development: Achieving Code Execution with House of Force MODULE 2: FASTBIN DUP (1 Hour) ...

4:51:24
Linux Heap Exploitation Part 1: Learn Real-World GLIBC Attacks

350 views

2 months ago

CyberFlow
The 5 Levels of Hacking

Join up and get everything you *actually* need to start hacking like a pro ✨https://cyberflow-academy.github.io/ Everyone ...

5:19
The 5 Levels of Hacking

588,287 views

11 months ago

Low Level
cybersecurity is about to get weird

https://www.anthropic.com/news/mozilla-firefox-security MY COURSES Sign-up for my FREE 3-Day C Course: ...

13:25
cybersecurity is about to get weird

543,897 views

7 days ago

BSides Canberra
KEYNOTE: The Exploit Development Life Cycle: From Concept to Compromise, Valentina Palmiotti

Best and so other steps of the uh exploit development cycle can come into play here so stability does the exploit crash because if ...

40:07
KEYNOTE: The Exploit Development Life Cycle: From Concept to Compromise, Valentina Palmiotti

4,054 views

11 months ago

The Exploit Lab
Exploit Development Full Video Tutorial

Learn exploit development from scratch! In this comprehensive tutorial, we break down memory corruption, shellcode injection, ...

45:22
Exploit Development Full Video Tutorial

1,037 views

8 months ago

Cyber Rey
What is Exploit Development, EternalBlue & WannaCry

Exploit Development with EternalBlue & WannaCry is a comprehensive video explainer that walks through the process of exploit ...

6:37
What is Exploit Development, EternalBlue & WannaCry

33 views

1 month ago

Cybernews
The Biggest Hacking Mystery of Our Time: Shadow Brokers

The Shadow Brokers leaks are one of the pivotal moments in history: not only did they create a massive wave of cybercrime and ...

49:42
The Biggest Hacking Mystery of Our Time: Shadow Brokers

1,860,532 views

8 months ago

FarmHouse Of AI
Best Programming Language For Hacking

... which programming languages matter most in penetration testing, exploit development, web app hacking, reverse engineering, ...

8:53
Best Programming Language For Hacking

27 views

4 months ago

Privacy Matters
Every Level Of Hacking Explained in 8 Minutes

Try Cape now and secure your digital life: https://bit.ly/45CVU9I Get 33% OFF By Using Code: PRIVACYMATTERS33 Every ...

8:36
Every Level Of Hacking Explained in 8 Minutes

591,328 views

8 months ago

TechBlazes
Master Advanced Malware Development - Real Techniques & Case Studies

Master Advanced Malware Development — Real Techniques & Case Studies (Full Course) Dive deep into advanced malware ...

5:37:38
Master Advanced Malware Development - Real Techniques & Case Studies

861 views

6 months ago

EuroPython Conference
Pwndbg: Low level debugging and exploit development with Python — disconnect3d

EuroPython 2025 — Terrace 2A on 2025-07-17] *Pwndbg: Low level debugging and exploit development with Python by ...

45:08
Pwndbg: Low level debugging and exploit development with Python — disconnect3d

486 views

4 months ago

Calina Dev
Exploits in Action 🔓 | Using Metasploit Exploit Modules Like a Pro

Discover how Metasploit exploits really work in real-world attacks. Learn the lifecycle of an exploit, how to select targets, ...

3:34
Exploits in Action 🔓 | Using Metasploit Exploit Modules Like a Pro

112 views

9 months ago

HackersArsenal
Programming for Hackers: Step-by-Step Guide to Becoming a Master Hacker

You'll learn how these languages power real-world hacking, from automation and scripting to exploit development and advanced ...

7:13
Programming for Hackers: Step-by-Step Guide to Becoming a Master Hacker

31,677 views

9 months ago

Jason Turley
The BEST exploit development course I've ever taken

Course: https://wargames.ret2.systems/course Modern Binary Exploitation by RPISEC: https://github.com/RPISEC/MBE Pwn ...

32:47
The BEST exploit development course I've ever taken

4,873 views

11 months ago

Off By One Security
Introductory Windows Stack Overflow Exploitation

In the Exploit Development playlist on this channel there are much more complex examples, such as Use After Free exploitation ...

29:14
Introductory Windows Stack Overflow Exploitation

1,514 views

Streamed 5 months ago

Bishop Fox
Social Engineering, Phishing, Edge Device Exploits & AI-Assisted Attacks

In this Initial Access episode, we examine how attackers are gaining initial access through social engineering, identity abuse, and ...

37:20
Social Engineering, Phishing, Edge Device Exploits & AI-Assisted Attacks

0 views

5 days ago

John Hammond
reverse engineering doesn't have to be hard

https://jh.live/hex-rays || Disassemble, decompile and debug with IDA Pro! Use promo code HAMMOND50 for 50% off any IDA Pro ...

24:43
reverse engineering doesn't have to be hard

65,229 views

5 months ago

The Exploit Lab
Binary Analysis Fundamentals for Exploit Development

Unlock the power of reverse engineering and binary analysis in this full-length tutorial! This video dives deep into the ...

4:00:29
Binary Analysis Fundamentals for Exploit Development

311 views

10 months ago