Reverse Engineering & Binary Exploitation

Hack Responsibly.

Always ensure you have explicit permission to access any computer system before using any of the techniques contained in these documents. You accept full responsibility for your actions by applying any knowledge gained here.

Not much here yet...please feel free to contribute at my GitHub page.

Ghidra!

gdb plugin for exploits/creates patterns for ROP determination: peda.py/pwndbg [gdb: pattern create ###]

ASLR Bypass/binary exploit/gdb:

Packetstorm /bin/sh shellcode

simple binary exploitation Ippsec:HacktheBox - Sneaky

protostar ctf for getting into binary exploitation

Find the location of a specific string to manipulate and its bit offset in an executable:strings -t d <file> | grep <string to locate in ELF>

If you like this content and would like to see more, please consider buying me a coffee!

Last updated