Binary Exploitation Tutorial Logo

Binary Exploitation Tutorial

0
Free
Updated 11 March 2025
Visit Website

This tutorial provides a comprehensive guide on modern exploitation techniques, focusing on understanding exploitation from scratch, including topics like memory layout of C programs, ELF binaries, stack overview during function calls, assembly code for function calls and returns, concept of $ebp and $esp, and executable memory. The tutorial also includes setting up the system using a vagrant file on a virtual box.

FEATURES

EXPLORE BY TAGS

SIMILAR TOOLS

Collection of Return-Oriented Programming challenges for practicing exploitation skills.

A domain reconnaissance tool that automates subdomain discovery, port scanning, and monitoring with support for multiple data sources and notification integrations.

A post-exploitation framework for attacking running AWS infrastructure

A standard for conducting penetration tests, covering seven main sections from planning to reporting.

Wfuzz is a tool designed for bruteforcing Web Applications with multiple features like multiple injection points, recursion, and payload combinations.

A tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) for offensive security purposes.

A COM Command & Control framework using JScript for stealthy and flexible command and control capabilities on Windows systems.

BeEF is a specialized penetration testing tool for exploiting web browser vulnerabilities to assess security.

Tool for enumerating proxy configurations and generating CobaltStrike-compatible shellcode.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved