Scala Streams are similar to Lists but evalute their elements lazily. This small detail makes a world of difference. This post explores Streams and how they can encapsulate infinite sets.
Learn to develop a stack buffer overflow exploit from scratch. This is an intermediate difficulty walkthrough as ASLR and NX mitigations are enabled. The exploit is developed as a Metasploit module.
Was fusion level00 a breeze? This walkthrough explores developing the same exploit with ASLR enabled. Understanding ASLR is required for attempting the next challenges.