ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

831 results

MalwareAnalysisForHedgehogs
Malware Analysis - Malicious MS Office files without Macros

We look at two techniques for MS Office files to load and execute malicious code without Macros, namely VSTO Add-ins and ...

19:53
Malware Analysis - Malicious MS Office files without Macros

2,493 views

4 days ago

John Hammond
Clawdbot Malware

https://jh.live/hex-rays || Disassemble, decompile and debug with IDA Pro! Use promo code HAMMOND50 for 50% off any IDA Pro ...

43:10
Clawdbot Malware

68,916 views

1 day ago

Matt Johansen
new phishing technique, new malware, fake browser extensions...

... CrashFix malware analysis from Huntress - https://www.huntress.com/blog/malicious-browser-extention-crashfix-kongtuke MY ...

17:24
new phishing technique, new malware, fake browser extensions...

2,779 views

6 days ago

SIEM XPERT
CrowdStrike Falcon EDR Full Breakdown | SOC Operations, IR & Malware Analysis

In this Day 1 session of our CrowdStrike Falcon EDR Workshop, we cover the core fundamentals of Endpoint Detection ...

2:14:00
CrowdStrike Falcon EDR Full Breakdown | SOC Operations, IR & Malware Analysis

241 views

9 hours ago

Hack the Clown
No curl. No wget. Just "Living off the Land" with BASH.

In this 2‑minute demo, I show how an attacker can use a simple Bash HTTP client to pull malware onto a target even when curl, ...

3:06
No curl. No wget. Just "Living off the Land" with BASH.

5,269 views

2 days ago

Invoke RE
Floxif File Infector String Decryption and Analysis (Stream Part 2 - 13/01/2026)

... API Overview 36:26 Custom String API Working 1:19:58 Malware Analysis Discussion 1:25:54 Stack String Decryption Script.

1:52:22
Floxif File Infector String Decryption and Analysis (Stream Part 2 - 13/01/2026)

32 views

1 hour ago

Andrew Jones
5 Cybersecurity Tools I Actually Use Daily (2026)

Want to work with me to land your first cybersecurity job? - APPLY HERE https://empirical.training/about/info Join my free ...

12:48
5 Cybersecurity Tools I Actually Use Daily (2026)

171 views

6 days ago

Taylor Walton
Volatility 3 Will Change How You Hunt Malware (Full Tutorial)

In this full Volatility 3 tutorial, we walk through the exact memory forensics workflow you need to hunt malware like a pro — using a ...

8:47
Volatility 3 Will Change How You Hunt Malware (Full Tutorial)

3,649 views

6 days ago

0xDTC
Malicious AutoIT | Malware Analysis | Decompilation | PE Analysis with Detect It Easy | Let's Defend

Let's Defend Malicious AutoIT Challenge | Static Malware Analysis & Reverse Engineering In this video, I analyze a malicious ...

1:25:24
Malicious AutoIT | Malware Analysis | Decompilation | PE Analysis with Detect It Easy | Let's Defend

6 views

11 hours ago

𝙇𝙤𝙨𝙩𝙨𝙚𝙘
Best Way to Do Fuzzing and Scanning for Bug Bounty

With a strong passion for technology and expertise in malware analysis, vulnerability assessment, and bug hunting, my goal is to ...

4:29
Best Way to Do Fuzzing and Scanning for Bug Bounty

5,623 views

6 days ago

Aleksa Tamburkovski
Using AI in Cyber Security & Ethical Hacking (Hands-On)

You'll learn real-world AI and machine learning use cases including attack detection, anomaly detection, malware analysis and ...

2:17:02
Using AI in Cyber Security & Ethical Hacking (Hands-On)

188 views

7 days ago

The Security Analyst
Malware Analysis Process

In this video, we're going to take a look at a common malware analysis process, naming some important steps and some ...

2:51
Malware Analysis Process

14 views

7 days ago

John Hammond
🤖🤖🤖

Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training See what else I'm up to with: ...

1:32:05
🤖🤖🤖

5,199 views

Streamed 6 days ago

TeraByte
Are you interested in hacking, cybersecurity, or digital forensics? Best Linux Security Distros

Are you interested in ethical hacking, cybersecurity, or digital forensics? Then this video is just for you! Today, we are going to ...

2:36
Are you interested in hacking, cybersecurity, or digital forensics? Best Linux Security Distros

0 views

7 days ago

Smockeyy
X-Worm Malware Analysis for Beginners | Revealing IOC Using DNSpy & FLARE-VM

In this video, we perform a beginner-friendly malware analysis on X-Worm and demonstrate how to reveal Indicators of ...

24:44
X-Worm Malware Analysis for Beginners | Revealing IOC Using DNSpy & FLARE-VM

94 views

5 days ago

SpecterAI Quantum Security
Video 37:  EMBER 2024 Malware Detection Fails Here - a Quantum Reframing

EMBER 2024 and similar malware datasets frame detection as a geometric problem: extract high-dimensional features from ...

13:57
Video 37: EMBER 2024 Malware Detection Fails Here - a Quantum Reframing

12,882 views

3 days ago

Level Effect
Cybersecurity in 2026: It's Over. (part 1)

Hiring. Working. Tooling. Learning. Landscape. Policy. It's all changing. We're back to streaming! Let's start things off in 2026 with ...

25:18
Cybersecurity in 2026: It's Over. (part 1)

2,117 views

Streamed 6 days ago

InkSec
SOC Malware Analysis – Malicious DOC Dropper Investigation (LetsDefend Malware Challenge)

SOC-style malware analysis investigation of a malicious Microsoft Word document from the LetsDefend Malicious Doc challenge.

8:19
SOC Malware Analysis – Malicious DOC Dropper Investigation (LetsDefend Malware Challenge)

0 views

4 days ago

Booz Allen Hamilton
Vellox Reverser Maximize Cyber Defense | Faster Malware Analysis by Booz Allen

This technical overview, learn how Vellox Reverser works and gives you an inside look the platform. Built for modern cyber ...

2:24
Vellox Reverser Maximize Cyber Defense | Faster Malware Analysis by Booz Allen

50 views

6 days ago

John Hammond
🤖🤖

Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training See what else I'm up to with: ...

4:29:09
🤖🤖

8,920 views

Streamed 6 days ago