Profile Picture
  • All
  • Search
  • Images
  • Videos
  • Maps
  • News
  • More
    • Shopping
    • Flights
    • Travel
  • Notebook
Report an inappropriate content
Please select one of the options below.
  • Length
    AllShort (less than 5 minutes)Medium (5-20 minutes)Long (more than 20 minutes)
  • Date
    AllPast 24 hoursPast weekPast monthPast year
  • Resolution
    AllLower than 360p360p or higher480p or higher720p or higher1080p or higher
  • Source
    All
    Dailymotion
    Vimeo
    Metacafe
    Hulu
    VEVO
    Myspace
    MTV
    CBS
    Fox
    CNN
    MSN
  • Price
    AllFreePaid
  • Clear filters
  • SafeSearch:
  • Moderate
    StrictModerate (default)Off
Filter
Malware development 101: Creating your first ever MALWARE
28:00
YouTubeLeet Cipher
Malware development 101: Creating your first ever MALWARE
in this video, we go through the process of malware development in real life. we'll talk about various concepts such as shellcode, the windows api and many more, then we are going to explain what are injection attacks/techniques and how do they work behind the scenes. we will also implement your first ever malware with all these concepts and ...
498.7K viewsFeb 25, 2024
Shellcode Tutorial
Wait for it... Malware Shellcode! 😱
1:42
Wait for it... Malware Shellcode! 😱
YouTubeSuit Up and Hack
2 months ago
Shellcode Obfuscation Made Simple
6:24
Shellcode Obfuscation Made Simple
YouTubeRed Siege
370 views1 month ago
Executing Custom Shellcode after the Stack Pivot
18:58
Executing Custom Shellcode after the Stack Pivot
YouTubeDr Josh Stroschein - The
27 views2 months ago
Top videos
How to Write Shellcode in 3 Minutes!
3:00
How to Write Shellcode in 3 Minutes!
YouTubeThe Cyber Mentor
9.3K views7 months ago
Creating Shellcode in C and x64 Assembly
33:57
Creating Shellcode in C and x64 Assembly
YouTubeJason Turley
3.5K viewsJun 7, 2024
Process Injection Techniques: Deep Dive into Process Hollowing & Shellcode
1:32:48
Process Injection Techniques: Deep Dive into Process Hollowing & Shellcode
YouTubeOff By One Security
3.9K viewsMay 31, 2024
Shellcode Examples
Here are some examples of my projects that use the “Pepper’s Ghost” effect. It’s called “Pepper’s Ghost” because it was used in a stage act in the 1800s and made popular by John Pepper. Sometimes it’s was called “Pepper’s Mystery”. Anyway, there weren’t TVs or iPads to reflect off of back then, so they did it with a large piece of glass and objects hidden offstage that were illuminated by gaslight. To the audience, they would appear as ghosts. In my work, I avoid calling them holograms. Hologram
1:27
Here are some examples of my projects that use the “Pepper’s Ghost” effect. It’s called “Pepper’s Ghost” because it was used in a stage act in the 1800s and made popular by John Pepper. Sometimes it’s was called “Pepper’s Mystery”. Anyway, there weren’t TVs or iPads to reflect off of back then, so they did it with a large piece of glass and objects hidden offstage that were illuminated by gaslight. To the audience, they would appear as ghosts. In my work, I avoid calling them holograms. Hologram
FacebookEllingson
774.6K viewsApr 6, 2023
Learn These 8 Magic Words 🪙🐟 | Compound Words Cartoon Animation
0:31
Learn These 8 Magic Words 🪙🐟 | Compound Words Cartoon Animation
YouTubeAnokha
11.6M views2 weeks ago
【Dragonball Z Kakarot】majin buu arc second half (SPOILERS!!) #calliolive
4:05:14
【Dragonball Z Kakarot】majin buu arc second half (SPOILERS!!) #calliolive
YouTubeMori Calliope Ch. hololive-EN
99.4K views1 week ago
How to Write Shellcode in 3 Minutes!
3:00
How to Write Shellcode in 3 Minutes!
9.3K views7 months ago
YouTubeThe Cyber Mentor
Creating Shellcode in C and x64 Assembly
33:57
Creating Shellcode in C and x64 Assembly
3.5K viewsJun 7, 2024
YouTubeJason Turley
Process Injection Techniques: Deep Dive into Process Hollowing & Shellcode
1:32:48
Process Injection Techniques: Deep Dive into Process Hollowing & Sh…
3.9K viewsMay 31, 2024
YouTubeOff By One Security
ShellCode
2:13
ShellCode
23.1K viewsJun 6, 2016
YouTubeUdacity
Cyber Security – Convert EXE to Shellcode + Execute In-Memory (Educational Demonstration)
3:18
Cyber Security – Convert EXE to Shellcode + Execute In-Memory (E…
856 views9 months ago
YouTubeHexSecTeam
The EASY WAY to Control Program Execution with Shellcode
1:33
The EASY WAY to Control Program Execution with Shellcode
219 views2 months ago
YouTubeSuit Up and Hack
Cobalt Strike Loader Internals: From Loader to Shellcode Execution
29:22
Cobalt Strike Loader Internals: From Loader to Shellcode Execution
1K views2 months ago
YouTubeAhmedS Kasmani
7:56
Hiding Shellcode in Images
1 views1 month ago
YouTubeRed Siege
14:06
Introduction to Reverse Engineering - Shellcode
1 views4 months ago
YouTubeOliveStem
See more videos
Static thumbnail place holder
More like this
Feedback
  • Privacy
  • Terms