Giter Site home page Giter Site logo

0xroman1 / scuffed_low_level_stash Goto Github PK

View Code? Open in Web Editor NEW
95.0 2.0 12.0 210 KB

Stash for Binary Exploitation and Reverse Engineering Resources

Home Page: https://twitter.com/0xroman1

binary-exploitation assembly reverse-engineers linux radare2 gdb ctf ctf-tools

scuffed_low_level_stash's Introduction

🔺 Scuffed Low Level Stash 🔺

Scuffed Stash for everything Binary Exploitation and Reverse Engineering related

pepe hax

📢 Introductory Information

Here are some recommended recourses to browse through if you are just starting off.

What is x86-64

What is the x64 Architecture

Assembly Language Book

AT&T Syntax versus Intel Syntax

X86 Assembly/GAS Syntax

x86 and amd64 instruction reference

Understanding the differences between 8bit, 16bit, 32bit, and 64bit

LordNoteworthy CPU Internals

FLAGS register

Stack Frames and how they work

Anatomy of a Program in Memory

What is NX?

What is DEP?

What are Stack Canaries?

What does PIE Mean?

What is ASLR?

Virtual Memory and Address Translation

PC Assembly Language

Visual Studio Code Assembly

Exploit a basic buffer overflow

Risc-V resources

💡 Tutorials/Courses

Here are some great free courses and tutorials. The first 5 links contain some great information.

Nightmare

Nightmare Book

BinExp Course

Offensive Software Exploitation (OSE) Course

Modern Binary Exploitation - CSCI 4968

PWN College

Exploit Education

OpenSecurityTraining

Let's Learn x86-64 Assembly!

x86 Assembly Crash Course

A Crash Course in x86 Assembly for Reverse Engineers

x86-64 Assembly Language Programming with Ubuntu

TryHackMe x86-64 Assembly Documentation

Quick Guide to Assembly in 161

Z0F-Course on Reverse Engineering

Fuzzy Security

Exploit Development Community Course

NASM Tutorial

Introduction to Computer Organization: ARM Assembly Language Using the Raspberry Pi

A gentle introduction to multithreading

Abatchy's Blog

Connor Mcgarr's Blog

SEH Based Exploits

COM Hijacking for Lateral Movement

Exploit Mitigation Techniques - Stack Canaries

0ctf babystack with return-to dl-resolve

Format String Exploitation-Tutorial

ARM64 Reversing and Exploitation

🐧 Linux Exploitation

Linux System Call Table 32 Bit

Linux System Call Table 64 Bit

A gentle introduction to Linux Kernel fuzzing

The never ending problems of local ASLR holes in Linux

Unleashing Use-After-Free Vulnerabilities in Linux Kernel

Exploiting A Use-After-Free With radare2 - CTF Challenge

🌆 Windows Exploitation

Windows Exploitation Resources

Buffer overflow Windows exploit development practice - 50 proof of concepts

An In-Depth Look into the Win32 Portable Executable File Format

Basics of Windows shellcode writing

Understanding Windows Shellcode

Bypassing Windows Hardware-enforced Data Execution Prevention

A Beginner’s Guide to Windows Shellcode Execution Techniques

Windows 10 Mitigation Improvements

Mitigating arbitrary native code execution in Microsoft Edge

Bypassing Control Flow Guard in Windows 10

Bypassing Mitigations by Attacking JIT Server in Microsoft Edge

Understanding type confusion vulnerabilities

Kernel-mode Payloads on Windows

Windows SMEP bypass

Kernel Hacking With HEVD

DLL Injection Using LoadLibrary in C

Use After Free

🤖 Return Oriented Programming

Return Oriented Programming Techniques

Deep Dive into ROP Payload Analysis

Return Oriented Programming Tetzank Guide

Return-into-libc without Function Calls

Chaining DEP with ROP

return-to-csu: A New Method to Bypass 64-bit Linux ASLR

ROP Emporium - ret2csu

Framing Signals—A Return to Portable Shellcode

Slides for Framing Signals—A Return to Portable Shellcode

SROP Exploitation with radare2

Sigreturn-Oriented Programming

ret2dlresolve

Jump-Oriented Programming

Utilizing Code Reuse/ROP in PHP Application Exploits

🤸 Heap Exploitation

Heap Exploitation Book

Understanding the Low Fragmentation Heap

Heap Overflows for Humans

how2heap

Linux Heap TCache Poisoning

Remote Code Execution via Tcache Poisoning

Applying Return Oriented and Jump Oriented Programming Exploitation Techniques with Heap Spraying

💻 Programming

Assembly’s Perspective of C

Creating a Rootkit to Learn C

The 5-Minute Guide to C Pointers

🔄 Reverse Engineering

RE Reading List

IDAPython

IDAPython Book

A journey into Radare 2

Introduction To Reverse Engineering With Radare2

Cutter RE Platform Powered by Radare2

Reverse Engineering Resources

Getting Started with Reverse Engineering

Reverse Engineering for Beginners

Malware Unicorn Reverse Engineering 101

Applied Reverse Engineering Series

Reverse Engineering Videos

Malware Analysis For Hedgehogs

Python for Reverse Engineering

Knockin’ on Heaven’s Gate – Dynamic Processor Mode Switching

🛎️ Useful Slides

The info leak era on software exploitation

Case Study of VMware Guest-To-Host escape vulnrabilities

Escape from VMware Workstation by using "Hearthstone"

VMWare GuestRPC mechanism

AngelBoy1 Presentations

Make PE Backdooring Great Again

📝 Certification Preparation

PWK/OSCP Preparation

CTP/OSCE Course Preparation - HeapSpray + SEH + EggHunter

AWE/OSEE Preparation

🥼 Labs/Wargames

RET2 WarGames (Paid)

ROP Emporium

pwnable xyz

pwnable kr

pwnable tw

0x0539

crackmes

Embedded Security CTF

HackSys Extreme Vulnerable Driver

Vulnserver

Perfect Malware Samples

Damn Vulnerable Router Firmware

Exploit Exercises

📰 Other

Bit Twiddling Hacks

i8086 and DOS interrupts

Getting familiar with HackSys Extreme Vulnerable Driver

Magic Number Database

Online Crypto Course

Awesome Pen Testing

Sample Pen Test Resume

Cheatsheet God

scuffed_low_level_stash's People

Contributors

0xroman1 avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.