Binary Exploitation Tutorial Logo

Binary Exploitation Tutorial

0
Free
Visit Website

This tutorial provides a comprehensive guide on modern exploitation techniques, focusing on understanding exploitation from scratch, including topics like memory layout of C programs, ELF binaries, stack overview during function calls, assembly code for function calls and returns, concept of $ebp and $esp, and executable memory. The tutorial also includes setting up the system using a vagrant file on a virtual box.

FEATURES

ALTERNATIVES

Inceptor is a template-driven framework for evading Anti-Virus and Endpoint Detection and Response solutions, allowing users to create custom evasion techniques and test their security controls.

Modular framework for web services penetration testing with support for various attacks.

AzureC2Relay enhances security by validating and relaying Cobalt Strike beacon traffic through Azure Functions.

Hidden parameters discovery suite

A tool that simplifies the installation of tools and configuration for Kali Linux

An image with commonly used tools for creating a pentest environment easily and quickly, with detailed instructions for launching in a VPS.

Introduction to using GScript for Red Teams

OWASP OWTF is a penetration testing framework focused on efficiency and alignment with security standards.