Skip to content

Latest commit

 

History

History
40 lines (24 loc) · 1.97 KB

File metadata and controls

40 lines (24 loc) · 1.97 KB

Reverse Engineering & Binary Exploitation

{% hint style="success" %} Hack Responsibly.

Always ensure you have explicit permission to access any computer system before using any of the techniques contained in these documents. You accept full responsibility for your actions by applying any knowledge gained here. {% endhint %}

{% hint style="danger" %} Not much here yet...please feel free to contribute at my GitHub page. {% endhint %}

Ghidra!

{% embed url="https://ghidra-sre.org/" %}

gdb plugin for exploits/creates patterns for ROP determination: peda.py/pwndbg [gdb: pattern create ###]

ASLR Bypass/binary exploit/gdb:

Packetstorm /bin/sh shellcode

simple binary exploitation Ippsec:HacktheBox - Sneaky

protostar ctf for getting into binary exploitation

Find the location of a specific string to manipulate and its bit offset in an executable:strings -t d <file> | grep <string to locate in ELF>

If you like this content and would like to see more, please consider buying me a coffee!