{% hint style="success" %} Hack Responsibly.
Always ensure you have explicit permission to access any computer system before using any of the techniques contained in these documents. You accept full responsibility for your actions by applying any knowledge gained here. {% endhint %}
{% hint style="danger" %} Not much here yet...please feel free to contribute at my GitHub page. {% endhint %}
{% embed url="https://ghidra-sre.org/" %}
- https://github.com/onethawt/reverseengineering-reading-list - Reverse engineering reading list
- http://shell-storm.org/online/Online-Assembler-and-Disassembler/
- https://www.filesignatures.net/index.php?page=all - File signatures for just about any file type
gdb plugin for exploits/creates patterns for ROP determination: peda.py
/pwndbg
[gdb: pattern create ###]
ASLR Bypass/binary exploit/gdb:
Packetstorm /bin/sh shellcode
simple binary exploitation Ippsec:HacktheBox - Sneaky
protostar ctf for getting into binary exploitation
Find the location of a specific string to manipulate and its bit offset in an executable:strings -t d <file> | grep <string to locate in ELF>
If you like this content and would like to see more, please consider buying me a coffee!