All
Search
Images
Videos
Shorts
Maps
News
More
Shopping
Flights
Travel
Notebook
Report an inappropriate content
Please select one of the options below.
Not Relevant
Offensive
Adult
Child Sexual Abuse
Length
All
Short (less than 5 minutes)
Medium (5-20 minutes)
Long (more than 20 minutes)
Date
All
Past 24 hours
Past week
Past month
Past year
Resolution
All
Lower than 360p
360p or higher
480p or higher
720p or higher
1080p or higher
Source
All
Dailymotion
Vimeo
Metacafe
Hulu
VEVO
Myspace
MTV
CBS
Fox
CNN
MSN
Price
All
Free
Paid
Clear filters
SafeSearch:
Moderate
Strict
Moderate (default)
Off
Filter
Malware Embedded in Microsoft Office Documents | DDE Exploit (
…
Jul 6, 2018
sentinelone.com
12:28
How Hackers Embed Trojans in Microsoft Documents
16.6K views
Mar 28, 2022
YouTube
b100dy_c0d3r
8:01
How to Exploit a CVE?| Remote Code Execution CVE | WordPress
…
12K views
Jun 11, 2021
YouTube
Info Ck
16:16
This Is A Bad Word Document! How can we create it and can we detec
…
1.4K views
May 1, 2023
YouTube
I.T Security Labs
1:58
Fud Excel Exploit || 2026 Convert Exe to Xls
178 views
4 months ago
YouTube
Olympos
2:24
What is an exploit and how you can protect yourself
17.6K views
Jul 14, 2015
YouTube
ESET
21:54
#2 How To Analyse a Malicious Word Document
26.2K views
Jul 5, 2020
YouTube
Neil Fox
12:56
Remote Command Execution Explained and Demonstrated!
73.9K views
Jun 11, 2022
YouTube
Loi Liang Yang
8:31
Hackers can now HACK you with just a Word Document! | Zero-Day
…
108.4K views
Jun 4, 2022
YouTube
Tech Raj
6:56
*WORKS* HOW TO FIX INJECTION FAILED FOR EXPLOITS! ERROR F
…
301.1K views
Nov 11, 2017
YouTube
EpicYoung
TallDev Silent Exploit [Private Tool] DOC | Advanced Document Embe
…
30 views
6 months ago
YouTube
Talldevils Hack
1:30
TallDev Silent Exploit [Private Tool] Excel | Advanced Document Embe
…
33 views
6 months ago
YouTube
Talldevils Hack
8:54
xWorm - Tutorial: How to Use Silent Word Exploit (2026)
2 views
1 month ago
YouTube
redline stealer
9:06
xWorm - Tutorial: How to Use Silent Word Exploit (2026)
76 views
2 months ago
YouTube
redline stealer
11:27
Downloading and Exploiting Vulnerable Apps From ExploitDB
32.3K views
Nov 24, 2020
YouTube
Elevate Cyber
7:15
Exploiting Windows RPC - CVE-2022-26809 Explained | Patch Ana
…
42.9K views
Apr 15, 2022
YouTube
Marcus Hutchins
1:38
Silent Macro Doc/XLS Exploit Fud Builder Source Code for Sale UPD
…
11 views
1 month ago
YouTube
Eye KRtest
11:25
How to use exploit-db.com - also tired of Metasploit?
15.2K views
Jan 31, 2022
YouTube
Security in mind
23:20
Dirty Pipe - CVE-2022-0847 - Linux Privilege Escalation
57.6K views
Mar 13, 2022
YouTube
HackerSploit
26:31
Malware analysis on Microsoft office documents - Threat Hunting like a
…
1.2K views
9 months ago
YouTube
deepanshu khanna
4:39
Crafting Malicious MS Word to Execute Reverse Shell (Macro)
35.8K views
Dec 10, 2020
YouTube
NobodyAtall
16:08
CVE-2017-11882 - 3 ways to perform technical analysis, 1 easy way to p
…
16.4K views
Dec 29, 2017
YouTube
cybercdh
1:59
DEX Explorer with JJSploit | Roblox Exploit
342.6K views
Mar 13, 2019
YouTube
WeAreDevs
20:44
Playing with Jenkins File Read [CVE-2024-23897]
5.2K views
Feb 11, 2024
YouTube
0xdf
10:30
Microsoft Word .Doc Exploit Without Any Software 2025 Just for educat
…
9 views
8 months ago
YouTube
Tokyo i007
3:52
[Exploit🔥] Codex for Windows - Showcase/Tutorial - PC! 🔥 Tutorial
…
11.2K views
Mar 25, 2024
YouTube
Sr. LDS
11:35
Setting Up An Exploit Development Lab
44.3K views
Dec 12, 2018
YouTube
HackerSploit
1:37
Silent DOC Exploit.mp4
6 views
Jul 29, 2022
Vimeo
coding core
1:18
Hacking Google Bard: Prompt Injection to Data Exfiltration via Im
…
7K views
Nov 4, 2023
YouTube
Embrace The Red
1:47
Clean Macro (FUD) Word exploit 2023 Bypass Windows (defender)
2.5K views
Aug 16, 2023
YouTube
VECNA CRYPTER
See more videos
More like this
Feedback