{"id":23811714,"url":"https://github.com/x86byte/exploit-development-notes","last_synced_at":"2025-06-20T17:09:49.533Z","repository":{"id":265169779,"uuid":"853012766","full_name":"x86byte/Exploit-Development-Notes","owner":"x86byte","description":"Exploit development Notes - Exploit development RoadMap - Exploit development advices - Exploit development Tips - Exploit development Windows - Exploit development Kernel Mode \u0026 User Mode - learning about Exploit Development","archived":false,"fork":false,"pushed_at":"2024-09-12T04:05:23.000Z","size":18291,"stargazers_count":4,"open_issues_count":0,"forks_count":0,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-01-02T01:29:26.324Z","etag":null,"topics":["cfg","exploit-development","kaslr","kernel-mode","reverse-engineering","user-mode","windows-exploitation"],"latest_commit_sha":null,"homepage":"","language":null,"has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/x86byte.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2024-09-05T20:30:26.000Z","updated_at":"2024-12-09T13:02:20.000Z","dependencies_parsed_at":"2024-11-28T05:02:13.020Z","dependency_job_id":null,"html_url":"https://github.com/x86byte/Exploit-Development-Notes","commit_stats":null,"previous_names":["x86byte/exploit-development-notes","ring0-c0d3-br34k3r/exploit-development-notes"],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/x86byte%2FExploit-Development-Notes","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/x86byte%2FExploit-Development-Notes/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/x86byte%2FExploit-Development-Notes/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/x86byte%2FExploit-Development-Notes/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/x86byte","download_url":"https://codeload.github.com/x86byte/Exploit-Development-Notes/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":240072083,"owners_count":19743527,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["cfg","exploit-development","kaslr","kernel-mode","reverse-engineering","user-mode","windows-exploitation"],"created_at":"2025-01-02T01:29:29.029Z","updated_at":"2025-02-21T19:10:54.133Z","avatar_url":"https://github.com/x86byte.png","language":null,"funding_links":[],"categories":[],"sub_categories":[],"readme":"# Readme File\n- if u have all this Pre required things go to [Exploit development Notes \"ExpDev_NOTEs.txt\"](https://github.com/0xp17j8/Exploit-Development-Notes/blob/main/ExpDev_NOTEs.txt).\n---\n\n# Prerequisites to Start Windows Exploit Development\n\nBefore diving into Windows exploit development or going to ExpDev_NOTEs.txt, make sure you have the following skills and tools :\n\n![365475112-c19e1d8a-7a2a-43aa-a1b0-6aff87a5a3a9](https://github.com/user-attachments/assets/b4e56ef2-b62e-40d7-9e36-5226204b38b0)\n\n---\n\n## 0x1. Programming Knowledge\n\n- **C/C++**: Crucial for low-level memory manipulation and understanding Windows internals.\n- **Python**: Useful for scripting and automating tasks.\n- **Assembly (x86/x64)**: Essential for understanding instruction-level behavior and writing shellcode.\n\n---\n\n## 0x2. Understanding Windows Internals\n\n- **Windows APIs**: Learn how applications interact with Windows through system calls.\n- **Memory Management**: Understand the stack, heap, and virtual memory layouts.\n- **PE File Format**: Know how Windows executables are structured.\n- **Windows Security Mechanisms**: Familiarize yourself with ASLR, DEP, and SEH to understand how to bypass them.\nNote : windows Internals is required \u003c3\n---\n\n## 0x3. Knowledge of Common Vulnerabilities \"just understand the meaning etc..\"\n\n- **Buffer Overflows**: Learn how stack and heap overflows work.\n- **Use-After-Free**: Know how dangling pointers can lead to exploits.\n- **Integer Overflows**: Understand how incorrect calculations can result in vulnerabilities.\n- **Race Conditions**: Be aware of multithreading issues that can be exploited.\n\n---\n\n## 0x4. Debugging and Reverse Engineering \"make sure to have a good knowledge in reverse engineering\"\n\n- **Debuggers**: WinDbg, x64dbg, and OllyDbg are essential tools.\n- **Disassemblers**: Use IDA Pro or Ghidra to reverse engineer binaries.\n- **PE Analysis**: Learn to analyze PE files and modify their structures.\n- **start learn Reverse Engineering**: from [0xp17j8/RE-MA-Roadmap](https://github.com/0xp17j8/RE-MA-Roadmap).\n---\n\n## 0x5. Knowledge of Exploit Mitigations \"just understand the meaning etc..\"\n\n- **ASLR (Address Space Layout Randomization)**: Understand how to bypass it.\n- **DEP (Data Execution Prevention)**: just understand, after that u will need to know how to execute code in non-executable regions.\n- **Stack Canaries**: Understand stack protection techniques.\n- **SEH (Structured Exception Handling)**: just understand, after that u will need to know how to bypass SEH protections.\n\n---\n\n## 0x6. Hands-On Practice\n- [start searching and learning by practice](https://github.com/0xp17j8/Exploit-Development-Notes/blob/main/ExpDev_NOTEs.txt)\n- **Recreate Exploits**: Practice by replicating known Windows exploits.\n- **Buffer Overflow Exploits**: Start with basic stack overflows and gradually tackle security mitigations.\n- **Write Shellcode**: Learn to develop Windows-specific shellcode.\n---\n\nWith these prerequisites, you’ll have the foundational knowledge to start developing Windows exploits. Keep practicing, stay persistent, and keep learning!\n\n![365475182-d48d1e40-f601-4d90-a13b-7f442a938d69](https://github.com/user-attachments/assets/599ee752-a7a3-49a6-b526-c49c2b8d0287)\n","project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fx86byte%2Fexploit-development-notes","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fx86byte%2Fexploit-development-notes","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fx86byte%2Fexploit-development-notes/lists"}