Material for the YouTube series
☆514Apr 1, 2022Updated 3 years ago
Alternatives and similar repositories for liveoverflow_youtube
Users that are interested in liveoverflow_youtube are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Wiki-like CTF write-ups repository, maintained by the community. 2016☆26Mar 28, 2016Updated 9 years ago
- UNIX-like reverse engineering framework and command-line toolset☆23,269Updated this week
- Minecraft:Hacked is a video series exploring various technical areas of Minecraft.☆217Dec 2, 2022Updated 3 years ago
- CVE-2021-3156 - Sudo Baron Samedit☆225Feb 12, 2022Updated 4 years ago
- PwnAdventure3 Server☆668Oct 5, 2021Updated 4 years ago
- Saleae Logic Analyzer for the NEC/IR-Remote Protocol☆52Sep 1, 2016Updated 9 years ago
- CTF framework and exploit development library☆13,328Updated this week
- PEDA - Python Exploit Development Assistance for GDB☆6,110Jul 29, 2024Updated last year
- GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Li…☆8,058Mar 18, 2026Updated last week
- Automatically exported from code.google.com/p/protostar-solutions☆13Mar 26, 2015Updated 10 years ago
- Amazing CryptoWAF was a CTF challenge for ALLES! CTF 2021☆34Oct 26, 2021Updated 4 years ago
- Rhme2 challenge (2016)☆330Jun 12, 2017Updated 8 years ago
- Course materials for Modern Binary Exploitation by RPISEC☆5,950Dec 9, 2021Updated 4 years ago
- Intro to radare2 presentation files.☆83Feb 26, 2018Updated 8 years ago
- A collection of vulnerable ARM binaries for practicing exploit development☆940Nov 15, 2021Updated 4 years ago
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.☆1,823Jun 8, 2019Updated 6 years ago
- Free Course Materials for LOL-Pwn☆20May 29, 2020Updated 5 years ago
- Exploit Development and Reverse Engineering with GDB & LLDB Made Easy☆10,230Updated this week
- Resources for the Pwn Adventure 3 challenges from GITS'15 (http://ghostintheshellcode.com/2015-final/)☆101Oct 15, 2022Updated 3 years ago
- Automatically exported from code.google.com/p/dsocks☆14Aug 1, 2015Updated 10 years ago
- This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format…☆4,392Dec 16, 2025Updated 3 months ago
- My challenges for AIS3 pre-exam 2019 and MyFirstCTF 2019☆21Jun 16, 2019Updated 6 years ago
- Vault 7: CIA Hacking Tools Revealed☆17Mar 8, 2017Updated 9 years ago
- Reverse engineering challenges☆52Nov 3, 2019Updated 6 years ago
- Various snippets created during malware analysis☆464Oct 3, 2025Updated 5 months ago
- Vulnerable server used for learning software exploitation☆1,107Oct 9, 2020Updated 5 years ago
- This repo contain Android malware samples and analysis☆13Apr 3, 2021Updated 4 years ago
- Solutions and write-ups to challenges from Pwny Racing☆24Jan 30, 2020Updated 6 years ago
- Phoenix☆49Jan 16, 2019Updated 7 years ago
- Enable Cydia Extender on jailbroken devices☆13Mar 12, 2017Updated 9 years ago
- The best tool for finding one gadget RCE in libc.so.6☆2,304Mar 5, 2026Updated 2 weeks ago
- An example in C# for programmatically calling UAC to escalate to admin☆14Aug 13, 2018Updated 7 years ago
- A series of tutorials about radare2 framework from https://www.megabeets.net☆527Jan 17, 2021Updated 5 years ago
- Very simple script(s) to hasten binary exploit creation☆93May 27, 2021Updated 4 years ago
- Reversing list☆149Jan 9, 2024Updated 2 years ago
- Repo for CSAW CTF 2018 Quals challenges☆44Sep 17, 2017Updated 8 years ago
- ☆10Feb 3, 2021Updated 5 years ago
- Some security related notes☆461Aug 13, 2017Updated 8 years ago
- A Course on Intermediate Level Linux Exploitation☆1,010Aug 24, 2020Updated 5 years ago