ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

59 results

media.ccc.de
35C3 -  From Zero to Zero Day

https://media.ccc.de/v/35c3-9657-from_zero_to_zero_day In this talk I will share my story of how in a little over a year, a high ...

48:29
35C3 - From Zero to Zero Day

31,884 views

7 years ago

DEFCONConference
DEF CON 30  - Jake Labelle - Doing the Impossible - How I Found Mainframe Buffer Overflows

Mainframes run the world, literally. Have you ever paid for something, a mainframe was involved, flown? Used a bank? Gone to ...

38:52
DEF CON 30 - Jake Labelle - Doing the Impossible - How I Found Mainframe Buffer Overflows

1,652 views

3 years ago

John Hammond
Basic Buffer Overflow - VulnServer TRUN

To help support me, check out Kite! Kite is a coding assistant that helps you faster, on any IDE offer smart completions and ...

1:03:04
Basic Buffer Overflow - VulnServer TRUN

202,090 views

5 years ago

John Hammond
HTA JScript to PowerShell - Novter Malware Analysis

For more content, subscribe on Twitch! https://twitch.tv/johnhammond010 If you would like to support me, please like, comment ...

1:24:19
HTA JScript to PowerShell - Novter Malware Analysis

106,070 views

4 years ago

OWASP Foundation
AppSecEU 16 - Dan Cornell - The ABCs of Source-Assisted Web Application Penetration Testing

From AppSecEU 2016 in Rome https://2016.appsec.eu/ - Managed by the official OWASP Media Project ...

44:57
AppSecEU 16 - Dan Cornell - The ABCs of Source-Assisted Web Application Penetration Testing

449 views

9 years ago

OWASP Foundation
Popular Approaches to Preventing Code Injection Attacks are Dangerously Wrong - AppSecUSA 2017

Popular Approaches to Preventing Code Injection Attacks are Dangerously Wrong According to the 2016 Verizon Data Breach ...

46:05
Popular Approaches to Preventing Code Injection Attacks are Dangerously Wrong - AppSecUSA 2017

1,240 views

8 years ago

SreenuTech
Spring Cloud with Microservices (Complete Course in 15hrs) Part-1 | By Mr. Sreenivas

About Sreenu Technologies: Sreenu Technologies has established in 2013 May. We are experts on Java Realtime Project ...

4:53:01
Spring Cloud with Microservices (Complete Course in 15hrs) Part-1 | By Mr. Sreenivas

9,767 views

3 years ago

SreenuTech
Spring Boot (Complete Course in 16 Hours) Part-1 | By Mr. Sreenivas

About Sreenu Technologies: Sreenu Technologies has established in 2013 May. We are experts on Java Realtime Project ...

5:05:39
Spring Boot (Complete Course in 16 Hours) Part-1 | By Mr. Sreenivas

45,360 views

3 years ago

Howard Abrams
Demonstration of demo-it

A demonstration of my Emacs demonstration tool, demo-it, given at the PDX Emacs Hacker night. Sorry that the recording just cuts ...

24:16
Demonstration of demo-it

4,098 views

9 years ago

Nobody
Offensive Security 2013 - FSU - Lecture4: Rootkits / Code Auditing

This is the 4th video recorded course lecture for CIS5930/CIS4930 "Offensive Security" from Spring 2013 at the Florida State ...

1:07:37
Offensive Security 2013 - FSU - Lecture4: Rootkits / Code Auditing

7,407 views

12 years ago

The Linux Foundation
Bypassing Many Kernel Protections Using Elastic Objects - Yueqi Chen & Zhepeng Lin, Ph.D. Students

Bypassing Many Kernel Protections Using Elastic Objects - Yueqi Chen & Zhepeng Lin, Ph.D. Students.

40:46
Bypassing Many Kernel Protections Using Elastic Objects - Yueqi Chen & Zhepeng Lin, Ph.D. Students

480 views

5 years ago

Paul Irish
Building a Better Web Browser - James Mickens - Harvard CS Colloquium 2015

2015-02-26. CS Colloquium at Harvard School of Engineering and Applied Sciences. Notes from this talk: ...

1:07:46
Building a Better Web Browser - James Mickens - Harvard CS Colloquium 2015

29,049 views

10 years ago

The Linux Foundation
Where is my Code Vulnerable: Matching CVEs and Source Code - David A. Barrett & Peter Shin

Where is my Code Vulnerable: Matching CVEs and Source Code - David A. Barrett & Peter Shin, Canvass Labs Surprisingly, often ...

32:50
Where is my Code Vulnerable: Matching CVEs and Source Code - David A. Barrett & Peter Shin

460 views

6 years ago

The Linux Foundation
Mitigating (Some) Use-after-frees in the Linux Kernel - Jann Horn, Google

Mitigating (Some) Use-after-frees in the Linux Kernel - Jann Horn, Google.

45:30
Mitigating (Some) Use-after-frees in the Linux Kernel - Jann Horn, Google

1,070 views

5 years ago

DEFCONConference
DEF CON 15 - Damian Gomez - Intelligent Debugging

Damian Gomez: Intelligent debugging for vuln-dev Damian Gomez is a Security Researcher at Immunity, which he joined in ...

29:12
DEF CON 15 - Damian Gomez - Intelligent Debugging

224 views

11 years ago

Nobody
Offensive Security 2013 - FSU - Lecture15: Web Application Hacking 104 & Exploit Development 104

This is the 15th video recorded course lecture for CIS5930/CIS4930 "Offensive Security" from Spring 2013 at the Florida State ...

1:20:48
Offensive Security 2013 - FSU - Lecture15: Web Application Hacking 104 & Exploit Development 104

4,299 views

12 years ago

Nobody
Offensive Security 2013 - FSU - Lecture16: Midterm review & Exploit Development 105

This is the 16th video recorded course lecture for CIS5930/CIS4930 "Offensive Security" from Spring 2013 at the Florida State ...

56:45
Offensive Security 2013 - FSU - Lecture16: Midterm review & Exploit Development 105

2,093 views

12 years ago

Nobody
Offensive Security 2013 - FSU - Lecture7: Fuzzing / Exploit Dev 101

This is the 7th video recorded course lecture for CIS5930/CIS4930 "Offensive Security" from Spring 2013 at the Florida State ...

1:11:04
Offensive Security 2013 - FSU - Lecture7: Fuzzing / Exploit Dev 101

10,317 views

12 years ago

CCS 2016
CCS 2016 - CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump

Authors: Jun Xu (Pennsylvania State University), Dongliang Mu (Nanjing University) Ping Chen, Xinyu Xing and Peng Liu ...

23:09
CCS 2016 - CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump

387 views

9 years ago

John Hammond
BEGINNER Capture The Flag - PicoCTF 2021 001 "Obedient Cat"

If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer ...

22:16
BEGINNER Capture The Flag - PicoCTF 2021 001 "Obedient Cat"

502,868 views

4 years ago