ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

2,982 results

TheZZAZZGlitch
Pokémon Emerald: Arbitrary code execution with glitch move animations

More arbitrary code execution in Gen III. This time, 100% crash sound free! Glitch moves have glitch animations. Some glitch ...

5:44
Pokémon Emerald: Arbitrary code execution with glitch move animations

118,231 views

9 years ago

TASVideosChannel
[TAS] NES Super Mario Bros. 3 "arbitrary code execution" by Lord_Tom in 08:16.23

This is a tool-assisted speedrun. For more information, see https://tasvideos.org/3050M TAS originally published on 2016-01-13 ...

10:39
[TAS] NES Super Mario Bros. 3 "arbitrary code execution" by Lord_Tom in 08:16.23

567,304 views

10 years ago

SethBling
SNES Code Injection -- Flappy Bird in SMW

Using various Super Mario World glitches, I injected the code for Flappy Bird (code written by p4plus2). This is the first time a ...

6:31
SNES Code Injection -- Flappy Bird in SMW

2,943,057 views

9 years ago

Professor Messer
Arbitrary and Remote Code Execution - CompTIA Security+ SY0-401: 3.5

Security+ Training Course Index: http://professormesser.link/sy0401 Professor Messer's Course Notes: ...

3:15
Arbitrary and Remote Code Execution - CompTIA Security+ SY0-401: 3.5

25,967 views

11 years ago

TheZZAZZGlitch
Pokemon Blue: Running homebrew software with 8F arbitrary code execution

For more information and more item lists visit: http://forums.glitchcity.info/index.php/topic,6638.0.html Code: ...

3:55
Pokemon Blue: Running homebrew software with 8F arbitrary code execution

177,930 views

12 years ago

Flashback Team
DNS Remote Code Execution: Finding the Vulnerability 👾 (Part 1)

Learn tricks and techniques like these, with us, in our amazing training courses! https://flashback.sh/training In 2019 and 2020, we ...

29:31
DNS Remote Code Execution: Finding the Vulnerability 👾 (Part 1)

301,796 views

2 years ago

TheZZAZZGlitch
Pokemon Gold/Silver: Arbitrary code execution with Coin Case

More information (including instructions and item lists): http://forums.glitchcity.info/index.php/topic,6716.0.html Thanks to Sanqui ...

3:21
Pokemon Gold/Silver: Arbitrary code execution with Coin Case

14,767 views

12 years ago

TheZZAZZGlitch
Pokemon Emerald: Arbitrary code execution - warping to the Hall of Fame

Finally. This method is TAS-only though. Code: http://pastebin.com/raw.php?i=Rn6tANQV More information: ...

3:43
Pokemon Emerald: Arbitrary code execution - warping to the Hall of Fame

27,249 views

11 years ago

East Exploit
Remote code execution EaST Framework module tutorial (w/ subtitles)

EaST Framework https://github.com/C0reL0ader/EaST # Apache Struts RCE original PoC ...

27:10
Remote code execution EaST Framework module tutorial (w/ subtitles)

175 views

7 years ago

Infosec Now
Critical n8n Vulnerability: Arbitrary Code Execution Risk Explained

What youll learn: In this video, we will explore a critical security vulnerability recently discovered in the n8n workflow automation ...

7:28
Critical n8n Vulnerability: Arbitrary Code Execution Risk Explained

16 views

9 days ago

Retro Game Mechanics Explained
Finally Obtaining the Triforce in Ocarina of Time: Triforce Percent Explained

Is the Triforce truly obtainable in The Legend of Zelda: Ocarina of Time? I suppose so! How was it done though? It's all explained ...

34:25
Finally Obtaining the Triforce in Ocarina of Time: Triforce Percent Explained

268,957 views

3 years ago

Karamba Security
Karamba Researcher Bypasses OS Defense with Remote Code Execution

In this demo, Karamba Security Researcher Aviv Sinai shows how three different IoT devices stand up against attempts to force ...

3:31
Karamba Researcher Bypasses OS Defense with Remote Code Execution

1,039 views

6 years ago

Tetrane
Analysis of VLC - Arbitrary Code Execution (CVE-2018-11529) with Tetrane

In this video, we analyze a CVE and an exploit using Tetrane Reverse Engineering Platform (REVEN) and its timeless analysis ...

11:52
Analysis of VLC - Arbitrary Code Execution (CVE-2018-11529) with Tetrane

307 views

6 years ago

Kosmic
Speedrunning Super Mario Bros. INSIDE Mario World?!

Speedrunception! Speedrunning a game within a game, by the craziest means yet. In addition to getting a really good speedrun, ...

26:53
Speedrunning Super Mario Bros. INSIDE Mario World?!

332,283 views

4 years ago

Matt Johansen
one request = full remote code execution (IngressNightmare Kubernetes hack explained)

Subscribe to my free weekly newsletter: https://vulnu.com/subscribe Save $1000 off Vanta with my discount code at ...

16:39
one request = full remote code execution (IngressNightmare Kubernetes hack explained)

1,865 views

9 months ago

Penligent
CVE-2025-12762 PoC: Critical pgAdmin 4 Remote Code Execution via PLAIN Dump Restore

https://penligent.ai/ When you are looking at CVE-2025-12762 — a remote code execution bug in pgAdmin 4's restore feature.

0:42
CVE-2025-12762 PoC: Critical pgAdmin 4 Remote Code Execution via PLAIN Dump Restore

386 views

1 month ago

TheZZAZZGlitch
Pokemon Emerald: Arbitrary code execution (no external save file)

Arbitrary code without external save files! The method has still a bit of randomness in it, but is completely usable. The code: movs ...

4:44
Pokemon Emerald: Arbitrary code execution (no external save file)

58,821 views

11 years ago

Pink Boo
Remote code execution via server-side prototype pollution | PortSwigger Academy tutorial

PortSwigger Academy Lab: ...

5:16
Remote code execution via server-side prototype pollution | PortSwigger Academy tutorial

1,407 views

1 year ago

Penligent
CVE-2025-65964: One-Click PoC to RCE in n8n Git Node (Full Exploit Walkthrough)

hooksPath, an attacker can drop a malicious pre-commit hook and get code execution on the n8n host. With our one-click PoC, ...

0:38
CVE-2025-65964: One-Click PoC to RCE in n8n Git Node (Full Exploit Walkthrough)

221 views

1 month ago

KacperSzurekEN
YAML: code execution using !!python/object

A popular opinion says to not use the pickle class on a data given by user because on deserialization it may lead to the object ...

2:46
YAML: code execution using !!python/object

14,153 views

6 years ago