x86 Intel Assembly
•Portable Executable File Format
•WinDBG
•WinDbg Automation with Python
•IDA
•Stack Overflows
•SEH Overflows
•EggHunters
•Reverse Engineering For Bugs
•DEP Bypass
•ASLR Bypass
•Format Strings Vulnerabilities
•Practicing
https://zeyadazima.com/notes/osednotes/
•Portable Executable File Format
•WinDBG
•WinDbg Automation with Python
•IDA
•Stack Overflows
•SEH Overflows
•EggHunters
•Reverse Engineering For Bugs
•DEP Bypass
•ASLR Bypass
•Format Strings Vulnerabilities
•Practicing
https://zeyadazima.com/notes/osednotes/
Zeyad Azima
OSED Notes: (Offensive Security Exploit Developer)
OSED Notes and Guide Lines
Forwarded from 1N73LL1G3NC3
This media is not supported in your browser
VIEW IN TELEGRAM
CVE-2024-1086 Linux kernel LPE
Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.
A full write-up of the exploit - including background information and loads of useful diagrams - can be found in the Flipping Pages blogpost.
Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.
A full write-up of the exploit - including background information and loads of useful diagrams - can be found in the Flipping Pages blogpost.
👍1
What Ayatollah Khamenei says to you, the young people of the world:
#LETTER4U
https://idc0-cdn0.khamenei.ir/ndata/news/28731/index.html#en
#LETTER4U
https://idc0-cdn0.khamenei.ir/ndata/news/28731/index.html#en
idc0-cdn0.khamenei.ir
KHAMENEI.IR - پايگاه اطلاعرسانی دفتر حفظ و نشر آثار حضرت آيتاللهالعظمی سيدعلی خامنهای | #LETTER4U
Message of Ayatollah Seyyed Ali Khamenei To the Youth in Europe and North America, letter4u
👎1
Inside Linux Kernel
https://0xax.gitbooks.io/linux-insides/content/
https://0xax.gitbooks.io/linux-insides/content/
0xax.gitbooks.io
Introduction · Linux Inside
👍1🔥1
Exploit Development
https://0xninjacyclone.github.io/posts/exploitdev_1_intro/
https://0xninjacyclone.github.io/posts/exploitdev_2_stack/
https://0xninjacyclone.github.io/posts/exploitdev_3_heap/
https://0xninjacyclone.github.io/posts/exploitdev_4_binfiles/
https://0xninjacyclone.github.io/posts/exploitdev_5_winpe/
https://0xninjacyclone.github.io/posts/exploitdev_6_elf/
https://0xninjacyclone.github.io/posts/exploitdev_7_strfmt/
https://0xninjacyclone.github.io/posts/exploitdev_8_bor/
https://0xninjacyclone.github.io/posts/exploitdev_1_intro/
https://0xninjacyclone.github.io/posts/exploitdev_2_stack/
https://0xninjacyclone.github.io/posts/exploitdev_3_heap/
https://0xninjacyclone.github.io/posts/exploitdev_4_binfiles/
https://0xninjacyclone.github.io/posts/exploitdev_5_winpe/
https://0xninjacyclone.github.io/posts/exploitdev_6_elf/
https://0xninjacyclone.github.io/posts/exploitdev_7_strfmt/
https://0xninjacyclone.github.io/posts/exploitdev_8_bor/
👍2