All Projects → dobin → Yookiterm Slides

dobin / Yookiterm Slides

Exploitation and Mitigation Slides

Projects that are alternatives of or similar to Yookiterm Slides

moonwalk
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. 👻🐚
Stars: ✭ 544 (+635.14%)
Mutual labels:  exploit, exploitation
Cve 2019 11708
Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.
Stars: ✭ 581 (+685.14%)
Mutual labels:  exploit, exploitation
Androrat
AndroRAT | Remote Administrator Tool for Android OS Hacking
Stars: ✭ 340 (+359.46%)
Mutual labels:  exploit, exploitation
Bash
Collection of bash scripts I wrote to make my life easier or test myself that you may find useful.
Stars: ✭ 19 (-74.32%)
Mutual labels:  exploit, exploitation
Featherduster
An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Stars: ✭ 876 (+1083.78%)
Mutual labels:  exploit, exploitation
browserrecon-php
Advanced Web Browser Fingerprinting
Stars: ✭ 29 (-60.81%)
Mutual labels:  exploit, exploitation
Heap Viewer
An IDA Pro plugin to examine the glibc heap, focused on exploit development
Stars: ✭ 574 (+675.68%)
Mutual labels:  exploit, exploitation
exploits
Some of my public exploits
Stars: ✭ 50 (-32.43%)
Mutual labels:  exploit, exploitation
Xattacker
X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+1112.16%)
Mutual labels:  exploit, exploitation
Shellen
🌸 Interactive shellcoding environment to easily craft shellcodes
Stars: ✭ 799 (+979.73%)
Mutual labels:  exploit, exploitation
Python
Python Powered Repository
Stars: ✭ 17 (-77.03%)
Mutual labels:  exploit, exploitation
Cve 2020 15906
Writeup of CVE-2020-15906
Stars: ✭ 39 (-47.3%)
Mutual labels:  exploit, exploitation
exploiting
Exploiting challenges in Linux and Windows
Stars: ✭ 122 (+64.86%)
Mutual labels:  exploit, exploitation
nocom-explanation
block game military grade radar
Stars: ✭ 544 (+635.14%)
Mutual labels:  exploit, exploitation
SubRosa
Basic tool to automate backdooring PE files
Stars: ✭ 48 (-35.14%)
Mutual labels:  exploit, exploitation
Autosploit
Automated Mass Exploiter
Stars: ✭ 4,500 (+5981.08%)
Mutual labels:  exploit, exploitation
tryhackme-ctf
TryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (+89.19%)
Mutual labels:  exploit, exploitation
inthewilddb
Hourly updated database of exploit and exploitation reports
Stars: ✭ 127 (+71.62%)
Mutual labels:  exploit, exploitation
Herpaderping
Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
Stars: ✭ 614 (+729.73%)
Mutual labels:  exploit, exploitation
Pysploit
Remote exploitation framework written in Python
Stars: ✭ 37 (-50%)
Mutual labels:  exploit, exploitation

yookiterm-slides

Slides for BFH Exploiting & Defense course.

It includes slides for 7x4h content (seven days).

Content:

  • PC / CPU basics
  • Process memory layout
  • C Arrays and other data structures
  • Assembler Intro
  • Shellcode
  • Function Call Convention
  • Debugging
  • Buffer Overflows
  • Exploit creation (summary of all above)
  • Remote Exploit
  • Exploit Mitigations (ASLR, DEP, Stack Canary)
  • ROP Intro
  • Heap Intro
  • Heap Exploiting
  • Windows Exploiting
  • Secure Coding
  • Fuzzing basics
  • Linux Hardening
  • Kernel Exploitation basics
  • Hardware Hacking

Links / Resources

See Resources

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].