Forwarded from Source Byte (Anastasia 🐞)
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Source Byte (Anastasia 🐞)
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Source Byte (Anastasia 🐞)
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Source Byte (Anastasia 🐞)
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Source Byte (Anastasia 🐞)
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from white2hack 📚
Advanced Software Exploitation by Ptrace Security, 2019
In the first half of the course, attendees will use fuzzing, reverse engineering, and source code auditing, to attack a wide variety of applications (e.g. iTunes, Firefox, Vulnserver, etc.) and then use proven exploitation techniques to develop an exploit for one of the VMs (Windows 7, Windows 8.1 and Windows 10).
Then, in the second half of the course, the focus will shift from classic vulnerabilities to more advanced ones. In this section, students will learn how to escape Java sandbox using a type confusion vulnerability, how to circumvent the ASLR without pointer leaks, and how to use precise heap spraying, just to name a few.
By the end of this course, students will know how to find software vulnerabilities using fuzzing, reverse engineering, and source code auditing, and then how to write their own exploits in Python, JavaScript, or Java.
GitHub
About the course
Official page
#education #reverse #coding #python
In the first half of the course, attendees will use fuzzing, reverse engineering, and source code auditing, to attack a wide variety of applications (e.g. iTunes, Firefox, Vulnserver, etc.) and then use proven exploitation techniques to develop an exploit for one of the VMs (Windows 7, Windows 8.1 and Windows 10).
Then, in the second half of the course, the focus will shift from classic vulnerabilities to more advanced ones. In this section, students will learn how to escape Java sandbox using a type confusion vulnerability, how to circumvent the ASLR without pointer leaks, and how to use precise heap spraying, just to name a few.
By the end of this course, students will know how to find software vulnerabilities using fuzzing, reverse engineering, and source code auditing, and then how to write their own exploits in Python, JavaScript, or Java.
GitHub
About the course
Official page
#education #reverse #coding #python
Forwarded from white2hack 📚
Advanced Software Exploitation.7z
10.8 MB
Advanced Software Exploitation by Ptrace Security, 2019
Forwarded from white2hack 📚
Hacking Windows, first edition, Kevin Thomas, 2022
On November 20, 1985, Microsoft introduced the Windows operating environment which was nothing more than a graphical operating shell for MS-DOS.
Today we begin our journey into the Win32API. This book will take you step-by-step writing very simple Win32API’s in both x86 and x64 platforms in C and then reversing them both very carefully using the world’s most popular Hey Rays IDA Free tool which is a stripped down version of the IDA Pro tool used in more professional Reverse Engineering environments. Let’s begin...
#book #windows
On November 20, 1985, Microsoft introduced the Windows operating environment which was nothing more than a graphical operating shell for MS-DOS.
Today we begin our journey into the Win32API. This book will take you step-by-step writing very simple Win32API’s in both x86 and x64 platforms in C and then reversing them both very carefully using the world’s most popular Hey Rays IDA Free tool which is a stripped down version of the IDA Pro tool used in more professional Reverse Engineering environments. Let’s begin...
#book #windows
❤2 1
Forwarded from white2hack 📚
learn hacking window.pdf
4.9 MB
Hacking Windows, first edition, Kevin Thomas, 2022
❤2
Forwarded from RedBlueTM Hit (Hide01)
#Exclusive 🔥
x33fcon - From zero to first 0-day
Download: https://hide01.ir/from-zero-to-first-0-day
How to download the course? Please visit this links👇🏻
https://hide01.ir/usage
https://t.iss.one/Hide01/509
@Hide01 📰
@RedBlueHit 💀👀
@RedBlueTM 🔒
x33fcon - From zero to first 0-day
Download: https://hide01.ir/from-zero-to-first-0-day
How to download the course? Please visit this links👇🏻
https://hide01.ir/usage
https://t.iss.one/Hide01/509
@Hide01 📰
@RedBlueHit 💀👀
@RedBlueTM 🔒
❤2 1
Forwarded from Order of Six Angles
Native code virtualizer for x64 binaries Native code virtualizer for x64 binaries
https://github.com/notpidgey/EagleVM
https://github.com/notpidgey/EagleVM
GitHub
GitHub - snowsnowsnows/EagleVM: Native code virtualizer for x64 binaries
Native code virtualizer for x64 binaries. Contribute to snowsnowsnows/EagleVM development by creating an account on GitHub.
Forwarded from Some Security Notes
#windows #drivers #winapi #programming
Очень хороший вводный цикл статей рассматривающий процесс разработки драйвера под windows (NT):
Часть 1, часть 2, часть 3,
4-я часть, 5-я часть, 6-я часть.
(Материал старый, но вполне вполне актуальный)
Очень хороший вводный цикл статей рассматривающий процесс разработки драйвера под windows (NT):
Часть 1, часть 2, часть 3,
4-я часть, 5-я часть, 6-я часть.
(Материал старый, но вполне вполне актуальный)
CodeProject
Driver Development Part 1: Introduction to Drivers
This article will go into the basics of creating a simple driver.
Forwarded from RedBlueTM Hit (./TaK.FaNaR)
Win32 Shellcoding.zip
545.8 MB
#Udemy | Win32 Shellcoding
Info: https://www.udemy.com/course/win32-shellcoding/
Password: @redbluehit
@Hide01 📰
@RedBlueHit 💀👀
@RedBlueTM 🔒
Info: https://www.udemy.com/course/win32-shellcoding/
Password: @redbluehit
@Hide01 📰
@RedBlueHit 💀👀
@RedBlueTM 🔒
❤🔥5❤1