Sinister Geek

Look at unknown and try to think of a familiar problem having the same or a similar unknown -" How to Solve It A New Aspect of Mathematical Method "

Wednesday, June 17, 2020

Exploit development!

1. https://securitywander.blogspot.com/2012/01/corelan-team-exploit-writing-tutorial_4111.html
2. http://repository.root-me.org/Exploitation%20-%20Syst%C3%A8me/Microsoft/EN%20-%20Corelan.be%20-%20Exploiting%20writing%20tutorial%20part1%20-%20Stack%20based%20overflows.pdf
Win32 Buffer Overflows
3. https://www.coalfire.com/The-Coalfire-Blog/January-2020/The-Basics-of-Exploit-Development-1
SEH Overflow
4. https://www.coalfire.com/The-Coalfire-Blog/March-2020/The-Basics-of-Exploit-Development-2-SEH-Overflows
Egg Hunters
5. https://www.coalfire.com/The-Coalfire-Blog/May-2020/The-Basics-of-Exploit-Development-3-Egg-Hunters
at June 17, 2020
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Pages

  • OSCP start up!
  • Reading material
  • Assemlby language note
  • Reverse Engineering Notes
  • Forum..!
  • Basic understanding of database and SQL queries
  • Using adb to Unlock Pattern
  • Exploit Development!
  • Software Cracking Guide
  • Reverse Engineering .....!!

Search This Blog

Report Abuse

Blog Archive

  • ►  2022 (1)
    • ►  March (1)
  • ►  2021 (13)
    • ►  July (4)
    • ►  June (6)
    • ►  May (3)
  • ▼  2020 (65)
    • ►  December (6)
    • ►  November (1)
    • ►  October (2)
    • ►  September (4)
    • ►  August (3)
    • ►  July (2)
    • ▼  June (8)
      • Cybersecurity free basic education
      • Algorithm Visualize
      • Python merg_pdf
      • DNS enumeration
      • Exploit development!
      • Vulnserver!
      • Malware Analysis!
      • AWAE prep
    • ►  May (8)
    • ►  April (6)
    • ►  March (9)
    • ►  February (3)
    • ►  January (13)
  • ►  2019 (10)
    • ►  December (10)
Picture Window theme. Theme images by johnwoodcock. Powered by Blogger.