Binary Exploitation Deep Dive: Return to LIBC (with Matt)
https://www.youtube.com/watch?v=tMN5N5oid2c
Discord: https://johnhammond.org/discord
Twitter: https://twitter.com/_johnhammond
GitHub: https://github.com/JohnHammond
📡- @hackLabel
https://www.youtube.com/watch?v=tMN5N5oid2c
Discord: https://johnhammond.org/discord
Twitter: https://twitter.com/_johnhammond
GitHub: https://github.com/JohnHammond
📡- @hackLabel
Educational Heap Exploitation
This repo is for learning various heap exploitation techniques.
https://github.com/shellphish/how2heap
📡- @hackLabel
This repo is for learning various heap exploitation techniques.
https://github.com/shellphish/how2heap
📡- @hackLabel
Nightmare is an Intro to Binary Exploitation / Reverse Engineering course based around Capture the Flag challenges available here created by GuyInATuxedo
https://github.com/hoppersroppers/nightmare
Content
• Foundational C
• Intro to Assembly
• Intro to Tooling
• Beginner RE
• Overflows
• Critical Misc.
• ROP
• More ROP
📡- @hackLabel
https://github.com/hoppersroppers/nightmare
Content
• Foundational C
• Intro to Assembly
• Intro to Tooling
• Beginner RE
• Overflows
• Critical Misc.
• ROP
• More ROP
📡- @hackLabel
This media is not supported in your browser
VIEW IN TELEGRAM
Modern Binary Exploitation - CSCI 4968
This repository contains the materials as developed and used by RPISEC to teach Modern Binary Exploitation at Rensselaer Polytechnic Institute in Spring 2015. This was a university course developed and run solely by students to teach skills in vulnerability research, reverse engineering, and binary exploitation.
https://github.com/RPISEC/MBE
📡- @hackLabel
This repository contains the materials as developed and used by RPISEC to teach Modern Binary Exploitation at Rensselaer Polytechnic Institute in Spring 2015. This was a university course developed and run solely by students to teach skills in vulnerability research, reverse engineering, and binary exploitation.
https://github.com/RPISEC/MBE
📡- @hackLabel
❤3⚡1
This media is not supported in your browser
VIEW IN TELEGRAM
Awesome Exploit Development
https://github.com/CyberSecurityUP/Awesome-Exploit-Development
📡- @hackLabel
https://github.com/CyberSecurityUP/Awesome-Exploit-Development
📡- @hackLabel
❤1
awesome-exploit-development
A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development.
A project by Fabio Baroni.
https://github.com/FabioBaroni/awesome-exploit-development
📡@hackLabel
A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development.
A project by Fabio Baroni.
https://github.com/FabioBaroni/awesome-exploit-development
📡@hackLabel
If you're in a hurry, you're almost certainly looking for the following resources:
• dostackbufferoverflowgood.exe - an intentionally vulnerable Windows program.
• dostackbufferoveflowgood_tutorial.pdf - A PDF tutorial that explains how to exploit the above program.
GitHub: https://github.com/justinsteven/dostackbufferoverflowgood
Youtube: https://youtube.com/justinsteven
Twitch: https://twitch.tv/justinsteven
📡@hackLabel
• dostackbufferoverflowgood.exe - an intentionally vulnerable Windows program.
• dostackbufferoveflowgood_tutorial.pdf - A PDF tutorial that explains how to exploit the above program.
GitHub: https://github.com/justinsteven/dostackbufferoverflowgood
Youtube: https://youtube.com/justinsteven
Twitch: https://twitch.tv/justinsteven
📡@hackLabel
C Programming and Assembly Resources
CMU Systems Programming course resources incl. course website, labs, schedule, & extra material. Books: "Computer Systems: A Programmer's Perspective" & "The C Programming Language". Repository includes resources on C programming, incl. Stanford engineering lectures, GCC's C99, & bit-hacking.
github: https://github.com/snowcra5h/c-systems-programming
Twitter: https://twitter.com/snowcra5h
📡@hackLabel
CMU Systems Programming course resources incl. course website, labs, schedule, & extra material. Books: "Computer Systems: A Programmer's Perspective" & "The C Programming Language". Repository includes resources on C programming, incl. Stanford engineering lectures, GCC's C99, & bit-hacking.
github: https://github.com/snowcra5h/c-systems-programming
Twitter: https://twitter.com/snowcra5h
📡@hackLabel
Malware Analysis Techniques. Tricks for the triage of adversarial software by Dylan Barker, 2021
Analyze malicious samples, write reports, and use industry-standard methodologies to confidently triage and analyze adversarial software and malware.
Malware Analysis Techniques begins with an overview of the nature of malware, the current threat landscape, and its impact on businesses. Once you've covered the basics of malware, you'll move on to discover more about the technical nature of malicious software, including static characteristics and dynamic attack methods within the MITRE ATT&CK framework. You'll also find out how to perform practical malware analysis by applying all that you've learned to attribute the malware to a specific threat and weaponize the adversary's indicators of compromise (IOCs) and methodology against them to prevent them from attacking.
📡@hackLabel
Analyze malicious samples, write reports, and use industry-standard methodologies to confidently triage and analyze adversarial software and malware.
Malware Analysis Techniques begins with an overview of the nature of malware, the current threat landscape, and its impact on businesses. Once you've covered the basics of malware, you'll move on to discover more about the technical nature of malicious software, including static characteristics and dynamic attack methods within the MITRE ATT&CK framework. You'll also find out how to perform practical malware analysis by applying all that you've learned to attribute the malware to a specific threat and weaponize the adversary's indicators of compromise (IOCs) and methodology against them to prevent them from attacking.
📡@hackLabel
Malware_Analysis_Techniques_Tricks_for_the_triage_of_adversarial.pdf
7.2 MB
Malware Analysis Techniques. Tricks for the triage of adversarial software by Dylan Barker, 2021
❤🔥2
Rust_for_C++_Programmers_Learn_how_to_embed_Rust_in_C:C++_with_ease.pdf
7.5 MB
Rust for C++ Programmers: Learn how to embed Rust in C/C++ with ease
Автор: Mustafif Khan (2023)
📡@hackLabel
Автор: Mustafif Khan (2023)
📡@hackLabel
❤4
Media is too big
VIEW IN TELEGRAM
SOC Analyst Training: How to Analyze Malicious PDFs
In this webinar we show:
• Overview of the PDF file format
• Attack vectors and techniques using PDF files
• How investigators can detect and analyze potentially harmful PDF files
• Learn how Intezer analyzes all types of files and helps in malware analysis investigations
• A live demo of analyzing PDF files using open-source tools. We will work on files that were used in several phishing attacks that eventually infected the victims with backdoors and information stealing malware
🌐Link: https://www.youtube.com/watch?v=AzXf7GV0jew&t=5s
🖥blog: https://intezer.com/blog/incident-response/analyze-malicious-pdf-files/
📡@hackLabel
In this webinar we show:
• Overview of the PDF file format
• Attack vectors and techniques using PDF files
• How investigators can detect and analyze potentially harmful PDF files
• Learn how Intezer analyzes all types of files and helps in malware analysis investigations
• A live demo of analyzing PDF files using open-source tools. We will work on files that were used in several phishing attacks that eventually infected the victims with backdoors and information stealing malware
🌐Link: https://www.youtube.com/watch?v=AzXf7GV0jew&t=5s
🖥blog: https://intezer.com/blog/incident-response/analyze-malicious-pdf-files/
📡@hackLabel
❤3👍1
This project is an open-source framework to enable obfuscation of constants, variables, and strings.
The obfuscation techniques implemented in this project are not intended to be foolproof. They serve as a foundation that should be enhanced further. The goal of this project is not to provide absolute protection but to obfuscate data effectively. Please note the provided code is designed for MSVC and requires C++17 or newer.
github: https://github.com/Sherman0236/XorData
📡@hackLabel
The obfuscation techniques implemented in this project are not intended to be foolproof. They serve as a foundation that should be enhanced further. The goal of this project is not to provide absolute protection but to obfuscate data effectively. Please note the provided code is designed for MSVC and requires C++17 or newer.
github: https://github.com/Sherman0236/XorData
📡@hackLabel
❤2