ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

233 results

hexdump
Format String vulnerabilities

Hi there! This video introduces the core ideas behind format string vulnerabilities. We quickly review what is a format string, what ...

33:59
Format String vulnerabilities

1,563 views

8 months ago

Off By One Security
Format String Vulnerabilities and Exploitation   Are they still be useful

In this video we talk about the history of format string bugs and how they can still be useful today for exploitation. We look at an ...

38:33
Format String Vulnerabilities and Exploitation Are they still be useful

1,957 views

10 months ago

RazviOverflow
vfprintf internal buffer - Advanced Format String (part 1) - Binary Exploitation PWN101

We will see how to find the internal vfprintf buffer and how to overwrite it in order to modify printf's arguments on the fly, allowing us ...

33:50
vfprintf internal buffer - Advanced Format String (part 1) - Binary Exploitation PWN101

2,146 views

8 months ago

pwn.college
Format String Vulnerabilities - CSE598 - Robert - 2025.01.29

Broadcasted live on Twitch -- Watch live at https://www.twitch.tv/pwncollege.

1:47:55
Format String Vulnerabilities - CSE598 - Robert - 2025.01.29

974 views

11 months ago

Jason Turley
Leaking Addresses with Format Strings | PicoCTF 2025 "Pie Time 2"

Merch: https://shop.jasonturley.xyz/ ==== Social Media ==== Discord: https://discord.gg/v2BVAUyj3P Blog: ...

20:36
Leaking Addresses with Format Strings | PicoCTF 2025 "Pie Time 2"

115 views

3 months ago

CyberSecurity Summary
Writing Security Tools and Exploits

This Book excerpt on writing security exploits and tools. It covers various software vulnerabilities, such as buffer overflows (stack ...

25:51
Writing Security Tools and Exploits

38 views

9 months ago

CyberspACe securiTy and forensIcs lab (CactiLab)
Northeastern CY 5770 Spring 2025 [Week 10 Format String Vulnerability]

... where overwrite the caler okay so the goal here is use the format string to figure out what the CER is then write the exploit in this ...

2:53:14
Northeastern CY 5770 Spring 2025 [Week 10 Format String Vulnerability]

190 views

10 months ago

HMCyberAcademy - Cybersecurity meets Clarity!
Behemoth 3 | Format Strings Gone Wild!!!

Sharing is caring! If you enjoyed this video, help more learners by sharing it. If you find our content valuable, you can also support ...

30:59
Behemoth 3 | Format Strings Gone Wild!!!

67 views

9 months ago

RazviOverflow
Abusing %n and %s - Advanced Format String (part 2) - Binary Exploitation PWN101

Fully weaponizing a write-what-where primitive abusing a vulnerable printf function (Format String) in order to bend the program ...

28:44
Abusing %n and %s - Advanced Format String (part 2) - Binary Exploitation PWN101

1,384 views

8 months ago

COZT
PicoCTF format-string-3

PicoCTF format-string-3 PWN Challenge https://play.picoctf.org Github : https://github.com/dannytzoc.

21:34
PicoCTF format-string-3

239 views

7 months ago

0xdf
Farewell [0xff: One Last Address]

The HTB Content team made me a goodbye CTF consisting of four challenges. In this video, I'll solve Farewell, a format string pwn ...

27:38
Farewell [0xff: One Last Address]

4,321 views

3 months ago

Junhua's Cyber Lab
CTF | Narnia | Level 7 | Exploiting Format String to Redirect Execution

Ready to level up your CTF skills? In this video, we tackle Level 7 of the Narnia wargame on OverTheWire, where we exploit a ...

20:50
CTF | Narnia | Level 7 | Exploiting Format String to Redirect Execution

187 views

9 months ago

POC2026
POC2025 | From Buffer Overflows to Breaking AI: Two Decades of ZDI Vulnerability Research

Title From Buffer Overflows to Breaking AI: Two Decades of ZDI Vulnerability Research Speaker Brian Gorenc Trend Micro's ...

50:40
POC2025 | From Buffer Overflows to Breaking AI: Two Decades of ZDI Vulnerability Research

621 views

1 month ago

CodeHut
Long live exploit development

Download 1M+ code from https://codegive.com/d5ff54f long live exploit development: a comprehensive tutorial exploit ...

36:53
Long live exploit development

12 views

10 months ago

CyberSecurity Summary
The Shellcoder's Handbook: Discovering and Exploiting Security Holes

The provided Book is an excerpt from "The Shellcoder's Handbook," a book detailing the exploitation of software security ...

21:58
The Shellcoder's Handbook: Discovering and Exploiting Security Holes

62 views

9 months ago

Utshav Adhikari
Exploit development CW2 video | Stack Overflow
40:11
Exploit development CW2 video | Stack Overflow

35 views

5 months ago

SIGPwny
SP2025 Week 01: Web Hacking III - Server-Side Exploits (2025-01-30)

This meeting covers SSRF, SSTI, and other server-based web application vulnerabilities. Recorded on 2025-01-30. This meeting ...

22:48
SP2025 Week 01: Web Hacking III - Server-Side Exploits (2025-01-30)

53 views

11 months ago

Off-By-One Comms Team
Off-By-One 2025 Day 1: Qian Chen & Zibo Li

Regarding the vulnerabilities, CVE-2024-23113 is a format string vulnerability found in the fgfmd component. We will give a brief ...

41:42
Off-By-One 2025 Day 1: Qian Chen & Zibo Li

258 views

6 months ago

CodeBeam
Binary aberration derelict m lange

Download 1M+ code from https://codegive.com/8759615 binary aberration derelict: a deep dive into exploiting memory corruption ...

21:17
Binary aberration derelict m lange

0 views

8 months ago

Caleb Gross
O(N) the Money: Scaling Vulnerability Research w/LLMs

A talk by Caleb Gross at inaugural Offensive AI Con in October 2025 (offensiveaicon.com) O(N) The Money: Scaling LLM-Based ...

22:52
O(N) the Money: Scaling Vulnerability Research w/LLMs

813 views

2 months ago