Binary Exploitation Tutorial Logo

Binary Exploitation Tutorial

0
Free
Visit Website

This tutorial provides a comprehensive guide on modern exploitation techniques, focusing on understanding exploitation from scratch, including topics like memory layout of C programs, ELF binaries, stack overview during function calls, assembly code for function calls and returns, concept of $ebp and $esp, and executable memory. The tutorial also includes setting up the system using a vagrant file on a virtual box.

FEATURES

ALTERNATIVES

A free, safe, and legal training ground for ethical hackers to test and expand their skills

Collection of Windows oneliners for executing arbitrary code and downloading remote payloads.

A tool for mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing

Rip web accessible (distributed) version control systems: SVN, GIT, Mercurial/hg, bzr, ...

A tool that simplifies the installation of tools and configuration for Kali Linux

AEM (Adobe Experience Manager) Hacker is a tool designed to help security researchers and penetration testers identify and exploit vulnerabilities in AEM-based systems.

A tool for interacting with the MSBuild API, enabling malicious activities and evading detection.

SauronEye helps in identifying files containing sensitive data such as passwords through targeted directory searches.