Overflowme is a walkthrough to learn the basics of binary exploitation. Detailed instructions, stack diagrams and fully commented assembly source code are provided for each of the challenges. There are multiple levels with each level building on the next to introduce new techniques.
☆70Apr 30, 2025Updated 11 months ago
Alternatives and similar repositories for overflowme
Users that are interested in overflowme are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆59Apr 10, 2026Updated last week
- Advanced Malware Analysis [video], published by Packt☆22Jan 24, 2023Updated 3 years ago
- ☆23Aug 24, 2025Updated 7 months ago
- ☆20Jul 4, 2022Updated 3 years ago
- Interactive simulation of a fictional ransomware group's dashboard☆12Sep 30, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Inspired by the Tryhackme.com Room "Python for Pentesters"☆10Jun 9, 2024Updated last year
- ☆18Jan 20, 2026Updated 2 months ago
- A collection of art inspired by the world of cybersecurity and hacking culture.☆42May 14, 2025Updated 11 months ago
- Real-Time JavaScript reverse engineering and debugging suite - Burp Suite, but for JavaScript☆17Jul 23, 2025Updated 8 months ago
- This is a RSS feed collection for all the InfoSec Content Creators☆35Nov 2, 2023Updated 2 years ago
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 7 months ago
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆13May 28, 2025Updated 10 months ago
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆17Feb 15, 2022Updated 4 years ago
- Deny list generator for password filters☆26Jul 29, 2024Updated last year
- Repository containing all training and tutorials completed in preparation for the OSEE in conjunction with the AWE course.☆122Nov 5, 2025Updated 5 months ago
- ☆23Oct 21, 2024Updated last year
- Tool to fuzz for interesting vhost.☆24Jan 8, 2025Updated last year
- The aim of the project is to develop intentionally vulnerable source code in various languages.☆16Mar 3, 2026Updated last month
- A checklist for systematically going through the OWASP Testing Guide V4☆17Jan 14, 2025Updated last year
- This is Web Application Penetration Testing Report made for everybody who wanted a glance of how to make a professional report for pentet…☆18Sep 3, 2021Updated 4 years ago
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆15Jul 17, 2025Updated 9 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆12Jun 11, 2024Updated last year
- ☆14Oct 23, 2021Updated 4 years ago
- A curated list of awesome command-line frameworks, toolkits, guides and gizmos. Inspired by awesome-php. With repository stars⭐ and forks…☆26Updated this week
- Convert digital images into georeferenced rasters☆14Updated this week
- Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable container☆10Dec 16, 2017Updated 8 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- Exploring hands-on Cybersecurity techniques with a comprehensive repository covering offensive and defensive tools for home-lab environme…☆21Mar 27, 2024Updated 2 years ago
- Data Brokers Information and Out-Out Links☆17Apr 12, 2024Updated 2 years ago
- A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.☆20Jul 17, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆24Mar 2, 2026Updated last month
- ☆52Oct 10, 2025Updated 6 months ago
- Example of hooking native functions in Android apps using Frida and JEB. Includes JNI analysis, sample app, and step-by-step guide for se…☆46Aug 2, 2024Updated last year
- Docker container for running CobaltStrike 4.7 and above☆25Mar 20, 2025Updated last year
- 😎 A curated list of the awesome resources about the security research☆14Updated this week
- Free Windows privilege escalation lab inspired by HTB Devel, built for PNPT and OSCP practice.☆23Jan 13, 2026Updated 3 months ago
- Slides for my RLadies NYC Presentation☆11Feb 27, 2020Updated 6 years ago