githubEdit

Reverse Engineering & Binary Exploitation

circle-check
triangle-exclamation

Ghidraarrow-up-right!

gdb plugin for exploits/creates patterns for ROP determination: peda.py/pwndbg [gdb: pattern create ###]

ASLR Bypass/binary exploit/gdb:

Packetstormarrow-up-right /bin/sh shellcode

simple binary exploitation Ippsec:HacktheBox - Sneakyarrow-up-right

protostar ctfarrow-up-right for getting into binary exploitation

Find the location of a specific string to manipulate and its bit offset in an executable:strings -t d <file> | grep <string to locate in ELF>

If you like this content and would like to see more, please consider buying me a coffeearrow-up-right!

Last updated