Reverse Engineering & Binary Exploitation
Last updated
Was this helpful?
Last updated
Was this helpful?
Hack Responsibly.
Always ensure you have explicit permission to access any computer system before using any of the techniques contained in these documents. You accept full responsibility for your actions by applying any knowledge gained here.
Not much here yet...please feel free to contribute at .
!
gdb plugin for exploits/creates patterns for ROP determination: peda.py
/pwndbg
[gdb: pattern create ###]
ASLR Bypass/binary exploit/gdb:
Find the location of a specific string to manipulate and its bit offset in an executable:strings -t d <file> | grep <string to locate in ELF>
- Reverse engineering reading list
- File signatures for just about any file type
-
/bin/sh shellcode
simple binary exploitation
for getting into binary exploitation
If you like this content and would like to see more, please consider !