ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

32 results

StudyLearnGrow
3 Pico CTF Binary Search

If the contents are helpful consider subscribing to my channel!! Thank you.

4:53
3 Pico CTF Binary Search

10 views

10 months ago

David Bombal
Linux Basics you need to know: Who Am I? #shorts #linux #kalilinux

If you want to learn a lot more, watch the Linux Basics for Hackers video series with OTW. First video: ...

0:51
Linux Basics you need to know: Who Am I? #shorts #linux #kalilinux

688,344 views

2 years ago

Python Morsels
Representing binary data with bytes in Python

In Python, strings are used to represent text and 'bytes' are used to represent binary data. If you end up with bytes that ...

3:26
Representing binary data with bytes in Python

602 views

2 years ago

Computerphile
Endianness Explained With an Egg - Computerphile

Byte ordering, or boiled egg orientation, endianness is important! Dr Steve Bagley on the computer science topic named after ...

10:46
Endianness Explained With an Egg - Computerphile

149,774 views

7 years ago

LiveOverflow
Bruteforce 32bit Stack Cookie. stack0: part 3 - bin 0x23

Bruteforcing stack canary, stack guard, stack cookie with a C program. brute_cookie.c: ...

12:53
Bruteforce 32bit Stack Cookie. stack0: part 3 - bin 0x23

29,982 views

8 years ago

LiveOverflow
Format String to dump binary and gain RCE - 33c3ctf ESPR (pwn 150)

Solving Eat Sleep Pwn Repeat (ESPR - 150 pwn) challenge from the 33c3ctf. Dumping the binary through a format string ...

13:25
Format String to dump binary and gain RCE - 33c3ctf ESPR (pwn 150)

48,022 views

8 years ago

LiveOverflow
Reverse Engineering with Binary Ninja and gdb a key checking algorithm - TUMCTF 2016 Zwiebel part 1

Part 1 is about understanding the algorithm with binary.ninja and gdb. Zwiebel is a reversing CTF challenge with encrypted ...

9:25
Reverse Engineering with Binary Ninja and gdb a key checking algorithm - TUMCTF 2016 Zwiebel part 1

42,327 views

9 years ago

0x4ndr3
Exploit Development | Format Strings Series 4/6 - Rewriting the GOT table

Code on vid4 folder at https://gitlab.com/0x4ndr3/format-strings-series-utube/ Environment: Ubuntu 16.04 x86 gcc flags for RELRO ...

7:49
Exploit Development | Format Strings Series 4/6 - Rewriting the GOT table

713 views

5 years ago

OSINT Dojo
OSINT Challenge: Marina Geolocation

This video provides you with an #OSINT challenge to solve. See if you can geolocate where I snapped this photo. *Instructions:* ...

7:25
OSINT Challenge: Marina Geolocation

17,104 views

2 years ago

LiveOverflow
Introducing Weird Machines: ROP Differently Explaining part 1 - bin 0x29

Let's introduce the concept of a weird machine in order to understand ROP differently. It's maybe a bad tutorial. What Hacker ...

11:59
Introducing Weird Machines: ROP Differently Explaining part 1 - bin 0x29

59,851 views

6 years ago

Inkbox
What's inside a .EXE File?

What is inside the Windows Executable or the executables for other operating systems? I take a look at the past from the days of ...

8:27
What's inside a .EXE File?

476,010 views

2 years ago

MIT OpenCourseWare
12.2.1 Procedures

MIT 6.004 Computation Structures, Spring 2017 Instructor: Chris Terman View the complete course: https://ocw.mit.edu/6-004S17 ...

10:04
12.2.1 Procedures

2,658 views

6 years ago

atuanlab
[2024] CÙNG MÌNH CHƠI THỬ CTF VỚI PICOCTF 2024 [General SKill - P2]

TIÊU ĐỀ: CÙNG MÌNH CHƠI THỬ CTF VỚI PICOCTF 2024 (Blame Game ,Collaborative Development, binhexa và Binary ...

16:09
[2024] CÙNG MÌNH CHƠI THỬ CTF VỚI PICOCTF 2024 [General SKill - P2]

223 views

1 year ago

LiveOverflow
Python code audit of a firmware update - 34C3 CTF software_update (crypto) part 1/2

This challenge from the 34C3 CTF implemented a software update in python. In part 1/2 we try to understand the code and think ...

12:48
Python code audit of a firmware update - 34C3 CTF software_update (crypto) part 1/2

52,553 views

7 years ago

LiveOverflow
MD5 Length Extension and Blind SQL Injection - BruCON CTF part 3

Last video from the BRUCON CTF 2016. Covering "Breaking the crypto", "Log Analysis BSQLi" and "Crypto". Topics covered: hash ...

10:30
MD5 Length Extension and Blind SQL Injection - BruCON CTF part 3

29,758 views

9 years ago

CTFSolutions
CTF Solution - The Linux Demon - Boot2Root
11:31
CTF Solution - The Linux Demon - Boot2Root

33 views

4 years ago

LiveOverflow
Live Hacking - Internetwache CTF 2016 - crypto60, crypto70, crypto90

Commented walkthrough of the security CTF Internetwache 2016. Crypto challenges. -=[ Stuff I use ]=- → Microphone:* ...

27:34
Live Hacking - Internetwache CTF 2016 - crypto60, crypto70, crypto90

20,799 views

9 years ago

LiveOverflow
int0x80 from DualCore lent me his lockpicking set and I'm a horse - BruCON CTF part 2

Failed challenge that exposed real security issues with an anonymous mail service, and solving "Lockpicking" and "Restricted ...

8:33
int0x80 from DualCore lent me his lockpicking set and I'm a horse - BruCON CTF part 2

13,734 views

9 years ago

LiveOverflow
Forensics with fls, Volatility and Timeline Explorer - ft. 13cubed

In this guest video 13cubed shows us some forensics work combining data from fls and volatility and then exploring the data with ...

19:39
Forensics with fls, Volatility and Timeline Explorer - ft. 13cubed

41,018 views

6 years ago

Simons Institute for the Theory of Computing
Datalog and Equality Saturation

Max Willsey (UC Berkeley) https://simons.berkeley.edu/talks/max-willsey-uc-berkeley-2023-11-15 Logic and Algebra for Query ...

1:00:41
Datalog and Equality Saturation

665 views

Streamed 2 years ago