ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

6,106,976 results

Cybernews
Where People Go When They Want to Hack You

What do you need to hack any system on the planet? Whatever it is, you can certainly find it on the Zero-day market: a network that ...

34:40
Where People Go When They Want to Hack You

4,083,671 views

2 years ago

ThioJoe
Weird Ai Exploits to Watch Out For

If you don't know about them, they'll be used against you. With the upcoming rise of AI agents that will be working on our behalf, ...

11:44
Weird Ai Exploits to Watch Out For

25,968 views

3 days ago

LiveOverflow
Kernel Root Exploit via a ptrace() and execve() Race Condition

Let's have a look at a recent kernel local privilege escalation exploit! Exploit Source: ...

15:23
Kernel Root Exploit via a ptrace() and execve() Race Condition

103,439 views

5 years ago

ThioJoe
ANOTHER Linux Exploit - And It's Even Worse

Wasn't expecting a sequel Yet another Linux zero-day exploit happened called Dirty Frag, and the circumstances around it are ...

10:02
ANOTHER Linux Exploit - And It's Even Worse

64,606 views

9 days ago

ThioJoe
The New Windows Shortcut Exploit (Watch Out)

I can't believe Microsoft won't even fix it ⇒ Become a channel member for special emojis, early videos, and more! Check it out ...

6:36
The New Windows Shortcut Exploit (Watch Out)

62,129 views

1 year ago

What is cybersecurity?
What is an exploit?

An exploit is a way of using a vulnerability to cause a compromise (https://youtu.be/MDtCagy1jjU).

1:35
What is an exploit?

863 views

1 year ago

Techlore
Update Your Distro Right Now: 3rd Exploit Found

Linux gets hit with a third major vulnerability in as many weeks, a Palantir-built database of 20 million people, and Android ...

37:07
Update Your Distro Right Now: 3rd Exploit Found

31,281 views

5 days ago

BE AMAZED
Loopholes You Can Exploit to Cheat the System

This guy used PUDDING to get free vacations forever... and I've found plenty more legal loopholes just like it! Suggest a topic here ...

39:33
Loopholes You Can Exploit to Cheat the System

4,294,642 views

2 years ago

CyberFlow
Hackers Use This Database to Break Into EVERYTHING!

Join up and get everything you *actually* need to start hacking like a pro ✨https://whop.com/c/cyberflow/exploitdb ...

5:58
Hackers Use This Database to Break Into EVERYTHING!

11,393 views

1 year ago

CyberFlow
The 5 Levels of Hacking

Join up and get everything you *actually* need to start hacking like a pro ✨https://cyberflow-academy.github.io/ Everyone ...

5:19
The 5 Levels of Hacking

618,922 views

1 year ago

Tech Sudama Lab
Is Your Windows PC Safe? BlueHammer Zero-Day Exploit (CVE-2026-21513)

Is your Windows PC really safe right now? A newly leaked Windows Zero-Day exploit (CVE-2026-21513)—known as ...

3:53
Is Your Windows PC Safe? BlueHammer Zero-Day Exploit (CVE-2026-21513)

1,043 views

1 month ago

LED
The Most Powerful TF2 Exploit of All Time is Back

It is back. The most powerful TF2 exploit of all time has returned... ▷ Color Correction Video: ...

12:59
The Most Powerful TF2 Exploit of All Time is Back

200,585 views

1 year ago

Seytonic
This image Can Hack You (The .webp Exploit)

Free $100 Cloud Computing Credit https://seytonic.cc/linode 0:00 Why webp is hated 1:15 How The Hack Works 2:42 Not just ...

5:38
This image Can Hack You (The .webp Exploit)

221,550 views

2 years ago

Channels new to you

ThioJoe
Big Linux Exploit Just Happened

A major new linux exploit just dropped, and it ain't pretty A brand new Linux exploit called "Copy Fail" was just publicly released.

8:04
Big Linux Exploit Just Happened

138,589 views

2 weeks ago

ThioJoe
🚨UPDATE NOW🚨- New Exploit Found in Chrome (Also Edge/Brave/Opera)

Patch now, another new zero-day exploit was just found in Google Chrome, Microsoft Edge, and other Chromium-based browsers ...

4:02
🚨UPDATE NOW🚨- New Exploit Found in Chrome (Also Edge/Brave/Opera)

86,259 views

3 months ago

DB Tech
Dirty Frag Won't Be The Last Exploit

Days after Copy Fail sent Linux administrators scrambling to patch, a new universal Linux privilege escalation dropped today after ...

6:54
Dirty Frag Won't Be The Last Exploit

4,937 views

11 days ago

Hacker Joe
Hacking 5G! (The GTP U Tunneling Exploit)

WHAT YOU WILL LEARN 5G Architecture: Understanding the N3, N4, and N6 interfaces. Packet Injection: How to encapsulate ...

10:34
Hacking 5G! (The GTP U Tunneling Exploit)

33,570 views

4 months ago

Terrasteel
Some Trick-Exploits That Still Work in Terraria 1.4.5

4 Handy Trickxploits That Still Work in Terraria 1.4.5 Nothing new. Discord: https://discord.gg/yJrCt9YFz5 join: ...

4:23
Some Trick-Exploits That Still Work in Terraria 1.4.5

129,588 views

3 months ago

ThioJoe
These Windows Settings Stop Exploits You've Never Heard Of

Sponsored: Get 90 Days of Bitdefender Premium Security - Absolutely Free: https://bitdefend.me/90ThioJoe Time Stamps: 0:00 ...

14:27
These Windows Settings Stop Exploits You've Never Heard Of

35,135 views

9 months ago

LiveOverflow
The Heap: How do use-after-free exploits work? - bin 0x16

Solving heap2 from exploit.education to learn about heap use-after-free (UAF) exploits heap2: ...

8:42
The Heap: How do use-after-free exploits work? - bin 0x16

101,558 views

9 years ago

AmanBytes
Payload, Exploit And Vulnerability Explained In A Minute!!

Payload, Exploit & Vulnerability. You must've heard these three words a lot of times in cybersecurity. So what do these three ...

1:11
Payload, Exploit And Vulnerability Explained In A Minute!!

18,227 views

3 years ago