https://github.com/nimaarek/exploit-development-resources
All Things about Exploit Development
https://github.com/nimaarek/exploit-development-resources
Last synced: 3 months ago
JSON representation
All Things about Exploit Development
- Host: GitHub
- URL: https://github.com/nimaarek/exploit-development-resources
- Owner: nimaarek
- Created: 2022-03-16T16:46:59.000Z (about 3 years ago)
- Default Branch: main
- Last Pushed: 2022-03-16T17:08:37.000Z (about 3 years ago)
- Last Synced: 2025-01-16T03:15:17.006Z (4 months ago)
- Size: 1.95 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Exploit-Development-resources
All Things about Exploit Development# free course & Presentations & PDF & Blog post
https://github.com/connormcgarr/Presentations
1. STL CyberCon 2019 "_Hands Up! This Is a ROPpery!: Introduction to Defeating DEP with ROP_"
2. BSides Dayton 2020 "_From JMP ESP to CET: The Current State of Exploit Development_"
3. BSides Kansas City 2021 "_Exploit Development is Dead, Long Live Exploit Development!_"https://github.com/connormcgarr/Kernel-Exploits
https://github.com/connormcgarr/Exploit-Development
https://connormcgarr.github.io/type-confusion-part-1/
https://connormcgarr.github.io/type-confusion-part-2/
connormcgarr.github.iohttps://github.com/connormcgarr/An-Intro-2-Win-ED
An Introduction to Windows Exploit Development
_An Introduction to Windows Exploit Development_ is a free course I created for the students of Southeast Missouri State University- based on my exploit development background. Feel free to use this lab manual and follow along. I hope this course inspires you to want to know more. It is all about knowledge sharing :)
Topics include (over the span of multiple lab manuals):
1. Fuzzing (basic concepts)
2. Instruction pointer overwrites
3. Structured exception handler (SEH) bypasses
4. Bypassing restrictive space
5. Manual and alphanumeric shellcoding
6. Bypassing ASLR and DEP
7. Kernel mode exploitaitonhttps://jb05s.github.io/
https://github.com/Jb05s/Exploit-Dev-C
https://github.com/Jb05s/Exploit-Dev
https://github.com/Jb05s/WindowsKernelProgramming
https://github.com/Jb05s/Exploit-Dev
# Shellcode
https://github.com/connormcgarr/Shellcode
Various Shellcodes1. `x64_pebWalk.asm`: Locates the PEB for the current process and walks it until a specified DLL (KERNEL32.DLL as a placeholder) is located