Channel Avatar

LiveOverflow @UClcE-kVhqyiHCcjYwcpfj9w@youtube.com

898K subscribers - no pronouns :c

just a wannabe hacker... making videos about various IT secu


24:07
Google's Mobile VRP Behind the Scenes with Kristoffer Blasiak (Hextree Podcast Ep.1)
15:03
My theory on how the webp 0day was discovered (BLASTPASS)
23:11
Learn Android Hacking! - University Nevada, Las Vegas (2024)
26:35
My Trip to Las Vegas for DEFCON & Black Hat
24:11
Finding The .webp Vulnerability in 8s (Fuzzing with AFL++)
18:00
A Vulnerability to Hack The World - CVE-2023-4863
20:37
Reinventing Web Security
22:13
The Circle of Unfixable Security Issues
13:47
Hacker Tweets Explained
26:46
Zenbleed (CVE-2023-20593)
19:43
The Discovery of Zenbleed ft. Tavis Ormandy
18:09
Asking Android Developers About Security at Droidcon Berlin
20:48
Local Root Exploit in HospitalRun Software
20:14
Android App Bug Bounty Secrets
14:05
Generic HTML Sanitizer Bypass Investigation
21:59
Hacking Google Cloud?
18:07
Trying to Find a Bug in WordPress
13:24
Authentication Bypass Using Root Array
35:00
My YouTube Financials - The Future of LiveOverflow
17:12
Defending LLM - Prompt Injection
12:07
Accidental LLM Backdoor - Prompt Tricks
13:23
Attacking LLM - Prompt Injection
04:11
Our Future As Hackers Is At Stake!
15:20
Cyber Security Challenge Germany (2023)
11:16
Cybercrime is Not Hacking!
16:31
Attacking Language Server JSON RPC
17:02
Advanced Teleport Hack (stolen from cheaters)
13:12
VPNs, Proxies and Secure Tunnels Explained (Deepdive)
14:18
Velocity Exploit on Paper?
14:52
Computer Networking (Deepdive)
09:18
Revisiting 2b2t Tamed Animal Coordinate Exploit
18:14
What is a Protocol? (Deepdive)
55:16
Can AI Create a Minecraft Hack?
12:03
Minecraft Reach Hack
24:28
Cat Coordinate Exploit 1.19.2
17:51
What is a Server? (Deepdive)
24:06
Server Griefed and New Beginnings ...
17:20
I Leaked My IP Address!
19:29
WorldGuard Bypass
14:21
The Origin of Cross-Site Scripting (XSS) - Hacker Etymology
12:35
The Age of Universal XSS
13:12
The End Of Humans In Minecraft
11:59
The Three JavaScript Hacking Legends
21:44
Minecraft Force-OP Exploit!
25:24
How The RIDL CPU Vulnerability Was Found
13:14
Code Review vs. Dynamic Testing explained with Minecraft
09:09
Self-Learning Reverse Engineering in 2022
12:19
The Same Origin Policy - Hacker History
33:37
They Cracked My Server!
21:54
Is Hacking Illegal? A Deeper Look at Hacking Laws
22:32
Are Resource Packs Safe?
27:05
The State of log4shell in Minecraft Months Later
24:55
Could I Hack into Google Cloud?
26:40
Scanning The Internet for Minecraft Servers
28:09
Crafting a Minecraft 0day...
25:20
Flying Without Elytra
22:23
Modding is Hacking...
10:51
Awkward VLOG at Nullcon Berlin 2022
18:02
Minecraft, But It's Reverse Engineered...
19:40
I Spent 100 Days Hacking Minecraft