Reverse Engineering & Binary Exploitation
Last updated
Last updated
Hack Responsibly.
Always ensure you have explicit permission to access any computer system before using any of the techniques contained in these documents. You accept full responsibility for your actions by applying any knowledge gained here.
Not much here yet...please feel free to contribute at my GitHub page.
https://github.com/onethawt/reverseengineering-reading-list - Reverse engineering reading list
https://www.filesignatures.net/index.php?page=all - File signatures for just about any file type
gdb plugin for exploits/creates patterns for ROP determination: peda.py
/pwndbg
[gdb: pattern create ###]
ASLR Bypass/binary exploit/gdb:
Packetstorm /bin/sh shellcode
simple binary exploitation Ippsec:HacktheBox - Sneaky
protostar ctf for getting into binary exploitation
Find the location of a specific string to manipulate and its bit offset in an executable:strings -t d <file> | grep <string to locate in ELF>
If you like this content and would like to see more, please consider buying me a coffee!