An open API service indexing awesome lists of open source software.

https://github.com/nimaarek/exploit-development-resources

All Things about Exploit Development
https://github.com/nimaarek/exploit-development-resources

Last synced: 3 months ago
JSON representation

All Things about Exploit Development

Awesome Lists containing this project

README

        

# Exploit-Development-resources
All Things about Exploit Development

# free course & Presentations & PDF & Blog post
https://github.com/connormcgarr/Presentations
1. STL CyberCon 2019 "_Hands Up! This Is a ROPpery!: Introduction to Defeating DEP with ROP_"
2. BSides Dayton 2020 "_From JMP ESP to CET: The Current State of Exploit Development_"
3. BSides Kansas City 2021 "_Exploit Development is Dead, Long Live Exploit Development!_"

https://github.com/connormcgarr/Kernel-Exploits

https://github.com/connormcgarr/Exploit-Development

https://connormcgarr.github.io/type-confusion-part-1/
https://connormcgarr.github.io/type-confusion-part-2/
connormcgarr.github.io

https://github.com/connormcgarr/An-Intro-2-Win-ED
An Introduction to Windows Exploit Development
_An Introduction to Windows Exploit Development_ is a free course I created for the students of Southeast Missouri State University- based on my exploit development background. Feel free to use this lab manual and follow along. I hope this course inspires you to want to know more. It is all about knowledge sharing :)
Topics include (over the span of multiple lab manuals):
1. Fuzzing (basic concepts)
2. Instruction pointer overwrites
3. Structured exception handler (SEH) bypasses
4. Bypassing restrictive space
5. Manual and alphanumeric shellcoding
6. Bypassing ASLR and DEP
7. Kernel mode exploitaiton

https://jb05s.github.io/

https://github.com/Jb05s/Exploit-Dev-C

https://github.com/Jb05s/Exploit-Dev

https://github.com/Jb05s/WindowsKernelProgramming

https://github.com/Jb05s/Exploit-Dev

# Shellcode
https://github.com/connormcgarr/Shellcode
Various Shellcodes

1. `x64_pebWalk.asm`: Locates the PEB for the current process and walks it until a specified DLL (KERNEL32.DLL as a placeholder) is located