Binary Exploitation Tutorial Logo

Binary Exploitation Tutorial

0
Free
Visit Website

This tutorial provides a comprehensive guide on modern exploitation techniques, focusing on understanding exploitation from scratch, including topics like memory layout of C programs, ELF binaries, stack overview during function calls, assembly code for function calls and returns, concept of $ebp and $esp, and executable memory. The tutorial also includes setting up the system using a vagrant file on a virtual box.

FEATURES

ALTERNATIVES

An open source network penetration testing framework with automatic recon and scanning capabilities.

A tool for generating .NET serialized gadgets for triggering .NET assembly load/execution.

Using Apache mod_rewrite as a redirector to filter C2 traffic for Cobalt Strike servers.

A framework for exploiting Android-based devices and applications

Automatic tool for DNS rebinding-based SSRF attacks

A free and open source C2 and proxy for penetration testers

A penetration testing tool for intercepting SSH connections and logging plaintext passwords.

Fast web spider written in Go