https://github.com/voidsec/slae
SecurityTube Linux Assembly Expert x86 Exam
https://github.com/voidsec/slae
exploit exploitation metasploit pentester shellcode slae voidsec
Last synced: 9 months ago
JSON representation
SecurityTube Linux Assembly Expert x86 Exam
- Host: GitHub
- URL: https://github.com/voidsec/slae
- Owner: VoidSec
- Created: 2020-01-09T09:59:33.000Z (about 6 years ago)
- Default Branch: master
- Last Pushed: 2020-04-06T08:07:41.000Z (almost 6 years ago)
- Last Synced: 2025-03-23T22:38:09.832Z (10 months ago)
- Topics: exploit, exploitation, metasploit, pentester, shellcode, slae, voidsec
- Language: Assembly
- Homepage: https://voidsec.com/category/blog/slae/
- Size: 296 KB
- Stars: 11
- Watchers: 2
- Forks: 3
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# SecurityTube Linux Assembly Expert x86 Exam (SLAE)
Paolo Stagno aka [VoidSec](https://voidsec.com)
This blog post has been created for completing the requirements of the SecurityTube Linux Assembly Expert certification:
http://securitytube-training.com/online-courses/securitytube-linux-assembly-expert/
Student ID: SLAE-1511
## Articles
* Assignment 1: [Linux x86 Bind TCP Shellcode](https://voidsec.com/slae-assignment-1-bind-tcp-shell)
* Assignment 2: [Linux x86 Reverse TCP Shellcode](https://voidsec.com/slae-assignment-2-reverse-tcp-shell/)
* Assignment 3: [Linux x86 Egghunter Shellcode](https://voidsec.com/slae-assignment-3-egghunter/)
* Assignment 4: [Linux x86 Byte Swapper Shellcode Encoder](https://voidsec.com/slae-assignment-4-custom-shellcode-encoder)
* Assignment 5: [Linux x86 Metasploit Shellcode Analysis](https://voidsec.com/assignment-5-metasploit-shellcode-analysis)
* Assignment 6: [Linux x86 Polymorphic Shellcodes](https://voidsec.com/slae-assignment-6-polymorphic-shellcode/)
* Assignment 7: [Linux x86 Custom Shellcode Crypter](https://voidsec.com/slae-assignment-7-custom-shellcode-crypter)
* Bonus Assignment 1: [Linux x64 EXECVE shellcode executing ls](https://github.com/VoidSec/SLAE/blob/master/bonus/x64_execve_ls.nasm)