Overflowme is a walkthrough to learn the basics of binary exploitation. Detailed instructions, stack diagrams and fully commented assembly source code are provided for each of the challenges. There are multiple levels with each level building on the next to introduce new techniques.
☆67Apr 30, 2025Updated 10 months ago
Alternatives and similar repositories for overflowme
Users that are interested in overflowme are comparing it to the libraries listed below
Sorting:
- ☆32Updated this week
- ☆20Jul 4, 2022Updated 3 years ago
- This is an Active Directory Pentesting Lab created by me which includes attacks like IPV6 DNS takeover, Smb relay, unconstrained delegati…☆22Jan 23, 2024Updated 2 years ago
- Deny list generator for password filters☆26Jul 29, 2024Updated last year
- Harness the Power of AI for all your reporting needs.☆28Apr 17, 2023Updated 2 years ago
- SPAMer work☆10Oct 18, 2019Updated 6 years ago
- Check Your IP Address☆10Mar 12, 2022Updated 3 years ago
- A collection of art inspired by the world of cybersecurity and hacking culture.☆42May 14, 2025Updated 9 months ago
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 6 months ago
- ☆16Jan 20, 2026Updated last month
- Backdoors & Breaches: Campaigns. These are short guides to help Incident Captains by giving them game ideas based on actual breaches.☆42Dec 4, 2023Updated 2 years ago
- A disassembler for 8080 byte code running as a static browser based application with no server components☆14Apr 23, 2024Updated last year
- A semantic analysis tool for debugging python code☆24Jan 12, 2026Updated last month
- buffer overflow skeleton scripts, can be used for any TCP based socket flows.☆10Oct 14, 2020Updated 5 years ago
- 🐙 Yusher Web Browsers☆12Nov 2, 2021Updated 4 years ago
- A simple python script to follow stock market papers in your portfolio☆12Jun 29, 2020Updated 5 years ago
- A curated list of awesome AI tools for generating and manipulating 3D models using text, images, or AI-enhanced modeling engines.☆14Apr 19, 2025Updated 10 months ago
- 🔐 EntroPy Password Generator A powerful Python-based password generator with 20+ modes, producing high-entropy passwords (15–128 chars, …☆20Nov 23, 2025Updated 3 months ago
- Mishky's AD Range & The Escalation Path from Hell, Version 1.1☆11May 7, 2025Updated 10 months ago
- PC based on 65816☆16Jul 9, 2022Updated 3 years ago
- Inspired by the Tryhackme.com Room "Python for Pentesters"☆10Jun 9, 2024Updated last year
- PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Iv…☆49Jan 16, 2025Updated last year
- A (very) simple 32-bit RISCV processor with a loaded Pong game to show it off☆11May 10, 2024Updated last year
- ☆15Oct 13, 2024Updated last year
- US Government controls formatted for usability☆16Jul 21, 2021Updated 4 years ago
- Hybrid AI is the future of explainable intelligence. This article explores how combining vector search, knowledge graphs, and retrieval-a…☆23Nov 1, 2025Updated 4 months ago
- https://langjamgamejam.com/☆21Dec 17, 2025Updated 2 months ago
- Mongoose OS based code to call links whenever the ESP is powered up☆11Jun 16, 2017Updated 8 years ago
- Minimal OS written in Jack.☆12Nov 24, 2022Updated 3 years ago
- ☆16Feb 19, 2026Updated 2 weeks ago
- Collection of PC and Arduino Neural Network Applications☆11Sep 4, 2023Updated 2 years ago
- My os thingy☆10Mar 28, 2022Updated 3 years ago
- ☆10Oct 1, 2024Updated last year
- How to Authenticate an SSL Connection using pre-determined Certificate values☆10Oct 5, 2018Updated 7 years ago
- The code implements ransomware-like behavior, encrypting files by changing their extensions to "k3vil." It includes a decryption process …☆19May 23, 2024Updated last year
- Modern Ansible Management Interface☆17Sep 8, 2025Updated 6 months ago
- WiFi enable cheap 433MHz sensors to create a simple home alarm system.☆10May 30, 2017Updated 8 years ago
- AI-powered code review assistant for GitHub Pull Requests using OpenAI GPT-4 and Claude with automated feedback and analytics dashboard.☆22Dec 13, 2025Updated 2 months ago
- Reversed WintaPix Malware Source code | That targets countries in the Middle East and abuse KeServiceDescriptorTable(SSDT), persistence a…☆22Jul 6, 2024Updated last year