Binary Exploitation Tutorial Logo

Binary Exploitation Tutorial

0
Free
Visit Website

This tutorial provides a comprehensive guide on modern exploitation techniques, focusing on understanding exploitation from scratch, including topics like memory layout of C programs, ELF binaries, stack overview during function calls, assembly code for function calls and returns, concept of $ebp and $esp, and executable memory. The tutorial also includes setting up the system using a vagrant file on a virtual box.

FEATURES

ALTERNATIVES

A tool to dump login passwords from Linux desktop users, leveraging cleartext credentials in memory.

Covenant is a .NET C2 framework for red teamers, facilitating collaborative and efficient management of red team operations.

Collection of vulnerable ARM binaries for beginner vulnerability researchers & exploit developers.

Emulate offensive attack techniques in the cloud with a self-contained Go binary.

A Python script for creating a cohesive and up-to-date penetration testing framework.

A collection of payloads and methodologies for web pentesting.

Stealing Signatures and Making One Invalid Signature at a Time.

High-performant, coroutines-driven, and fully customisable Low & Slow load generator for real-world pentesting with undetectability through Tor.

PINNED