Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/jopraveen/exploit-development
Gonna share my writeups and resources here
https://github.com/jopraveen/exploit-development
Last synced: 2 months ago
JSON representation
Gonna share my writeups and resources here
- Host: GitHub
- URL: https://github.com/jopraveen/exploit-development
- Owner: jopraveen
- Created: 2021-04-13T17:01:05.000Z (almost 4 years ago)
- Default Branch: main
- Last Pushed: 2023-01-09T18:34:56.000Z (about 2 years ago)
- Last Synced: 2024-08-04T01:17:12.352Z (6 months ago)
- Language: Python
- Size: 27.4 MB
- Stars: 57
- Watchers: 2
- Forks: 15
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- All-In-One-CyberSecurity-Resources - Exploit Development
README
![banner](https://github.com/jopraveen/exploit-development/raw/main/pwn101%20banner.png)
I'll post some resources,writeups,exploits,source-codes in this repo
### Highly recommended site to learn/practice pwn : **https://dojo.pwn.college/**
### Blogs:-
* https://www.cs.wcupa.edu/schen/security/
* https://www.bordergate.co.uk/category/exploit-dev/
* https://ir0nstone.gitbook.io/notes/
* https://guyinatuxedo.github.io/index.html
* https://heap-exploitation.dhavalkapil.com/
* https://github.com/AidenPearce369/pwnable.kr
* https://github.com/AidenPearce369/ExploitDev
* https://github.com/AidenPearce369/phoenix
* https://faraz.faith/
* https://d4mianwayne.github.io/
* https://wiki.bi0s.in/pwning/roadmap/
* https://blog.skullsecurity.org/category/ctfs
* https://sploitfun.wordpress.com/
* https://ret2rop.blogspot.com/
* https://blog.fxiao.me/how-to-heap/
* https://www.youtube.com/watch?v=6-Et7M7qJJg#### Heap Exploitation
* https://0x434b.dev/overview-of-glibc-heap-exploitation-techniques/
* https://ir0nstone.gitbook.io/notes/types/heap/introduction-to-the-heap
* https://valsamaras.medium.com/the-toddlers-introduction-to-heap-exploitation-part-1-515b3621e0e8
* https://youtu.be/HPDBOhiKaD8
* https://www.0x0ff.info/2014/heap-based-buffer-overflow/
* https://youtu.be/woKGxIrKFBc
* https://devel0pment.de/?p=688
* https://sensepost.com/blog/2018/linux-heap-exploitation-intro-series-set-you-free-part-1/
* https://courseupload.com/linux-heap-exploitation-200321/
* https://heap-exploitation.dhavalkapil.com/
* http://blog.fxiao.me/how-to-heap/
* https://youtu.be/nnF4Avttbns
* https://youtu.be/A-Qf_Q_AeFw
* https://www.youtube.com/watch?v=PFqEKkj7wWs#### Kernel exploitation
* https://github.com/xairy/linux-kernel-exploitation/blob/master/README.md
* https://blog.lexfo.fr/cve-2017-11176-linux-kernel-exploitation-part4.html
* https://github.com/pr0cf5/kernel-exploit-practice/tree/master/bypass-smep
* https://arjunsreedharan.org/post/82710718100/kernel-101-lets-write-a-kernel
* https://web.archive.org/web/20171029060939/http://www.blackbunny.io/linux-kernel-x86-64-bypass-smep-kaslr-kptr_restric/
* https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/linux-kernel-rop-ropping-your-way-to-part-1/
* https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/linux-kernel-rop-ropping-your-way-to-part-2/#### Browser exploit
* https://youtube.com/playlist?list=PLhixgUqwRTjwufDsT1ntgOY9yjZgg5H_t
* https://blog.ret2.io/2018/06/05/pwn2own-2018-exploit-development/
* https://github.com/Escapingbug/awesome-browser-exploit
* https://youtu.be/3szZpS58Dqg
* https://github.com/Geluchat/chrome_v8_exploit### Youtube:-
* https://youtube.com/playlist?list=PLiCcguURxSpbD9M0ha-Mvs-vLYt-VKlWt
* https://www.youtube.com/c/pwncollege/playlists
* https://youtube.com/playlist?list=PL1H1sBF1VAKVg451vJ-rx0y_ZuQMHPamH
* https://www.youtube.com/channel/UCi-IXmtQLrJjg5Ji78DqvAg/videos
* https://youtube.com/playlist?list=PLhy9gU5W1fvUND_5mdpbNVHC1WCIaABbP
* https://www.youtube.com/c/BasteG0d69/videos
* https://www.youtube.com/playlist?list=PLhixgUqwRTjxglIswKp9mpkfPNfHkzyeN
* https://www.youtube.com/channel/UCW6MNdOsqv2E9AjQkv9we7A
* https://www.youtube.com/playlist?list=PLeSXUd883dhjnFXPf2QA0KnUnJnn9dPWy
* https://www.youtube.com/playlist?list=PLHUKi1UlEgOKAVRdiMlpX6hgayiY6dTwu### Wargames:-
* http://pwnable.kr/
* http://pwnable.tw/
* http://pwn.eonew.cn
* https://www.root-me.org/?lang=en
* http://smashthestack.org/
* https://exploit.education/### Pwn Related Stuffs:-
* How2Heap - https://github.com/shellphish/how2heap
* Tips & Trics - https://karol-mazurek95.medium.com/pwn-tips-tricks-linux-d10186e8580e
* PwnTips - https://github.com/Naetw/CTF-pwn-tips
* Quick guide -https://trailofbits.github.io/ctf/exploits/binary1.html
* Course materials for Modern Binary Exploitation by RPISEC - https://github.com/RPISEC/MBE
* Learn ROP - https://ropemporium.com/
* For Linux binary Exploitation - https://github.com/scwuaptx/HITCON-Training
* Intro to binary exploitation / reverse engineering course - https://guyinatuxedo.github.io/
* A collection of pwn/CTF related utilities for Ghidra - https://github.com/0xb0bb/pwndra
* Some pwn challenges selected for training and education. - https://github.com/BrieflyX/ctf-pwns
* A set of Linux binary exploitation tasks for beginners on various architectures - https://github.com/xairy/easy-linux-pwn
* ASM Basics - https://asmtutor.com/#lesson1
--=[ SOME GAME HACKING CTFs]==-
* https://github.com/mrT4ntr4/CTF-Game-ChallengesCredits:
Thanks for all open source contributers