Reverse Engineering & Binary Exploitation

Ghidra!

gdb plugin for exploits/creates patterns for ROP determination: peda.py/pwndbg [gdb: pattern create ###]

ASLR Bypass/binary exploit/gdb:

Packetstorm /bin/sh shellcode

simple binary exploitation Ippsec:HacktheBox - Sneaky

protostar ctf for getting into binary exploitation

Find the location of a specific string to manipulate and its bit offset in an executable:strings -t d <file> | grep <string to locate in ELF>

If you like this content and would like to see more, please consider buying me a coffee!

Last updated

Was this helpful?