Breaching Security of Palais des Congrès (in Minecraft) #shorts Post date April 3, 2022 Post author By LiveOverflow
I’ve been Hacking for 10 Years! (Stripe CTF Speedrun) Post date March 24, 2022 Post author By LiveOverflow
Finding 0day in Apache APISIX During CTF (CVE-2022-24112) Post date March 7, 2022 Post author By LiveOverflow
Exploiting Java Tomcat With a Crazy JSP Web Shell – Real World CTF 2022 Post date February 24, 2022 Post author By LiveOverflow
Fuzzing Java to Find Log4j Vulnerability – CVE-2021-45046 Post date February 1, 2022 Post author By LiveOverflow
Debugging The Failing sudoedit Exploit | Ep.16 Post date January 18, 2022 Post author By LiveOverflow
Creating The First (Failed) Sudoedit Exploit | Ep. 15 Post date January 11, 2022 Post author By LiveOverflow
Learning about nss (Linux Name Service Switch) During Sudo Exploitation | Ep. 14 Post date January 3, 2022 Post author By LiveOverflow
Log4j Lookups in Depth // Log4Shell CVE-2021-44228 – Part 2 Post date December 24, 2021 Post author By LiveOverflow
Log4j Vulnerability (Log4Shell) Explained // CVE-2021-44228 Post date December 17, 2021 Post author By LiveOverflow
Authorization vs. Authentication (Google Bug Bounty) Post date December 2, 2021 Post author By LiveOverflow
Developing GDB Extension for Heap Exploitation | Ep. 12 Post date November 18, 2021 Post author By LiveOverflow
Design Flaw in Security Product – ALLES! CTF 2021 Post date October 26, 2021 Post author By LiveOverflow
Fuzzing Heap Layout to Overflow Function Pointers | Ep. 11 Post date October 17, 2021 Post author By LiveOverflow
Did you really find a vulnerability in Google? – ft. @PwnFunction Post date September 26, 2021 Post author By LiveOverflow
Developing a Tool to Find Function Pointers on The Heap | Ep. 10 Post date September 19, 2021 Post author By LiveOverflow
What Ethereum Smart Contract Hacking Looks Like Post date September 12, 2021 Post author By LiveOverflow
Discussing Heap Exploit Strategies for sudo – Ep. 09 Post date September 4, 2021 Post author By LiveOverflow
using z3 to reverse a custom hash during a CTF be like #shorts Post date August 26, 2021 Post author By LiveOverflow
can you hack this screenshot service?? – CSCG 2021 Post date August 19, 2021 Post author By LiveOverflow
Reaching Vulnerable Code in sudo (C code review) Post date August 11, 2021 Post author By LiveOverflow
What is a Browser Security Sandbox?! (Learn to Hack Firefox) Post date July 10, 2021 Post author By LiveOverflow
Found a Crash Through Fuzzing? Minimize AFL Testcases! Post date June 25, 2021 Post author By LiveOverflow
Understand Security Risk vs. Security Vulnerability! Post date June 18, 2021 Post author By LiveOverflow
New Challenges Released for CSCG 2021 (including mine) #shorts Post date April 5, 2021 Post author By LiveOverflow
Start of Cyber Security Challenge Germany 2021 #shorts Post date March 3, 2021 Post author By LiveOverflow
Format String Exploit Troubleshooting Over Twitter – bin 0x11 b Post date February 25, 2021 Post author By LiveOverflow
How CPUs Access Hardware – Another SerenityOS Exploit Post date February 14, 2021 Post author By LiveOverflow
Reading Kernel Source Code – Analysis of an Exploit Post date January 22, 2021 Post author By LiveOverflow
Kernel Root Exploit via a ptrace() and execve() Race Condition Post date January 10, 2021 Post author By LiveOverflow
My Life in Short/Shirt Stories – The Time I Learned PenSpinning (~2007-2009) – Shirt Stories #1 Post date December 1, 2020 Post author By LiveOverflow
How Hacking Actually Looks Like – ALLES! CTF Team in Real Time Post date November 7, 2020 Post author By LiveOverflow