ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

612 results

GamefiedHacking
🛡️ CVE 2025 27636 Remote Code Execution - RCE Demo

CVE-2025-27636 — Practical Exploitation Lab for Apache Camel ## Overview CVE-2025-27636 is a critical Remote Code ...

30:26
🛡️ CVE 2025 27636 Remote Code Execution - RCE Demo

225 views

8 months ago

Daryl Shows His Work
Project 23 - Executing Local File Inclusion and Remote Code Execution with Burp Suite!

Steps taken/Commands Used (in the order they appear in the video) 1. Click and start up Burpsuite 2. Go to Proxy tab and turn off ...

25:35
Project 23 - Executing Local File Inclusion and Remote Code Execution with Burp Suite!

15 views

4 months ago

Daryl Shows His Work
Project 50 - Padding Oracle and Server-Side Template Injection Attacks

Steps Taken (in the order that they appear in the video): 1. Open a web browser, go to padding-oracle.com:5001 and click the ...

42:35
Project 50 - Padding Oracle and Server-Side Template Injection Attacks

8 views

3 months ago

WannaWatchMeCode?
🤫🤫 Adding remote execution to riscv chips - 2/2/2025 - Silent coding session 🤫🤫 - 3

Broadcasted live on Twitch -- Watch live at https://www.twitch.tv/wannawatchmecode Checkout the code on github!

1:30:20
🤫🤫 Adding remote execution to riscv chips - 2/2/2025 - Silent coding session 🤫🤫 - 3

26 views

11 months ago

ikem michael
TCN2501 XE105 INDUSTRIAL PROJECT DEFENSE
1:49:07
TCN2501 XE105 INDUSTRIAL PROJECT DEFENSE

14 views

9 months ago

DEVCLUB LV
When ORMs Don’t Save You: What Developers Should Really Watch Out For by Aytaj Guliyeva

ORM frameworks like Sequelize and Prisma are trusted by developers to prevent SQL injection and simplify database work.

25:01
When ORMs Don’t Save You: What Developers Should Really Watch Out For by Aytaj Guliyeva

52 views

2 months ago

Daryl Shows His Work
Project 15 - Hunting Down File Inclusions

Unable to share commands. There were too many that included special characters! My apologies.

22:02
Project 15 - Hunting Down File Inclusions

9 views

4 months ago

Daryl Shows His Work
Project 111 - Enabling RDP Post Exploitation (Capture The Flag Edition)

... functionality in ext.dll in BadBlue 2.72b and earlier allows remote attackers to execute arbitrary code via a long query string). 8.

28:37
Project 111 - Enabling RDP Post Exploitation (Capture The Flag Edition)

7 views

1 month ago

Daryl Shows His Work
Project 128 - Exploiting CVE-2017-0144: EternalBlue

Commands Used (in the order that they appear in the video): 1. service postgresql start && msfconsole 2. setg RHOSTS ...

21:42
Project 128 - Exploiting CVE-2017-0144: EternalBlue

7 views

2 weeks ago

Daryl Shows His Work
Project 51 - Exploiting Legacy Versions of Protocols

Commands Used/Steps Taken (in the order that they appear in the video): 1. cd Exploiting-Public-Facing-App (to change to the ...

50:37
Project 51 - Exploiting Legacy Versions of Protocols

12 views

3 months ago

SecureTechIn
0-days - explaining the basics, what are, how to prevent.
33:28
0-days - explaining the basics, what are, how to prevent.

45 views

4 months ago

GitHub
The Untold Story of Log4j and Log4Shell | Christian Grobmeier | GitHub

In late 2021, the Log4Shell vulnerability sent shockwaves through the global tech community. For the first time, we're sharing the ...

33:43
The Untold Story of Log4j and Log4Shell | Christian Grobmeier | GitHub

60,482 views

3 months ago

IppSec
HackTheBox - Ghost

00:00 - Intro 01:00 - Start of nmap 05:20 - Taking a look at all the websites 06:45 - Showing why you should be careful when ...

2:23:44
HackTheBox - Ghost

17,880 views

9 months ago

Seven Seas Security
Prompt Injection Methodology for GenAI Application Pentesting - Greet & Repeat Method

A 4 Step Prompt Injection Methodology - Greet and Repeat While tons of courses dive into pentesting GenAI-powered ...

24:35
Prompt Injection Methodology for GenAI Application Pentesting - Greet & Repeat Method

3,474 views

3 months ago

The Cherno
EASILY run code on the GPU!

To try everything Brilliant has to offer—free—for a full 30 days, visit https://brilliant.org/TheCherno . You'll also get 20% off an ...

24:21
EASILY run code on the GPU!

66,886 views

10 months ago

darkmage of evildojo
Using Lua To Break Redis (CVE-2025-46817)

Time to return to the new project. Our goal: successfully exploit the recent redis vulnerabilities, CVE-2025-49844, ...

3:48:40
Using Lua To Break Redis (CVE-2025-46817)

192 views

Streamed 3 months ago

HPE
Finding vulnerabilities in production with open source ThreatMapper

Listen to Owen Garrett from Deepfence explain ThreatMapper, an open source project that extends the goodness of Shift Left into ...

1:02:45
Finding vulnerabilities in production with open source ThreatMapper

179 views

1 month ago

OWASP Kuwait City Chapter
OWASP SecureApp 2025 | Component Analysis in Modern Software Development | Mohammed Alhajeri

OWASP SecureApp 2025 A joint summit between OWASP Kuwait City, Dubai and Riyadh chapters. This summit focused on ...

21:45
OWASP SecureApp 2025 | Component Analysis in Modern Software Development | Mohammed Alhajeri

9 views

2 months ago

NSM Barii
Making a Vulnerability Scanner Day 6

Im going to be making NetVuln 2.0, A vulnerability scanner that can perform a port scan, subdomain scan, directory scan, ...

7:45:47
Making a Vulnerability Scanner Day 6

849 views

Streamed 7 months ago

Tech Tutorials with Piyush
19/30 - Terraform Provisioners (with demo) - local vs remote vs file

Welcome back to day 19 of our Terraform series! In this video, I'll walk you through the complexities and power of Terraform ...

24:32
19/30 - Terraform Provisioners (with demo) - local vs remote vs file

913 views

1 month ago