Forwarded from r0 Crew (Channel)
Reverse engineering 32 and 64 bits binaries with Radare2 series
Part 1: https://artik.blue/reversing-radare2-1
Part 2: https://artik.blue/reversing-radare2-2
Part 3 - funcs, cases and loops: https://artik.blue/reversing-radare-3
Part 4 - arrays and strings: https://artik.blue/reversing-radare-4
Part 4.II - more strings: https://artik.blue/reversing-radare-4-ii
Part 5 - var types and casting: https://artik.blue/reversing-radare-5
#reverse #radare2 #dukeBarman
Part 1: https://artik.blue/reversing-radare2-1
Part 2: https://artik.blue/reversing-radare2-2
Part 3 - funcs, cases and loops: https://artik.blue/reversing-radare-3
Part 4 - arrays and strings: https://artik.blue/reversing-radare-4
Part 4.II - more strings: https://artik.blue/reversing-radare-4-ii
Part 5 - var types and casting: https://artik.blue/reversing-radare-5
#reverse #radare2 #dukeBarman
Forwarded from r0 Crew (Channel)
Posts about Game Hacking by CaptnBanana https://twitter.com/CaptnBanana/status/1259226596331982849?s=19
Game Hacking #1: Developing Hacks for idTech3 Based Games https://bananamafia.dev/post/multihack/
Game Hacking #2: Coding A CS:GO Hack https://bananamafia.dev/post/bananabot/
#reverse #dukeBarman
Game Hacking #1: Developing Hacks for idTech3 Based Games https://bananamafia.dev/post/multihack/
Game Hacking #2: Coding A CS:GO Hack https://bananamafia.dev/post/bananabot/
#reverse #dukeBarman
X (formerly Twitter)
banane (@CaptnBanana) on X
Since @BSidesMunich didn't happen (😢) I wasn't able to give my game hacking talk "Rush B, Blyat! - Game Hacking for Noobs". Therefore I've decided to add more content to my game hacking blog posts at https://t.co/jafjCjWrli 🤓 enjoy <3
Forwarded from white2hack 📚
EC_Council_CEH_v10_Complete_Training.pdf
60 MB
Друзья, по многочисленным просьбам для тех кто не смог найти гайд по лабам для курса CEH v.10 - выкладываю PDF отдельным файлом
Forwarded from white2hack 📚
EC-Council CEH v10_ Exam_[w2hack].pdf
2.6 MB
Вопросы с ответами к экзамену 312-50 по курсу CEH v.10
Forwarded from white2hack 📚
Видео лекции на английском языке для курса CEH v.10
https://mega.nz/#F!9QYkRCgC!qvSOMae3mHs_ykZBBbOLDg!oBg3mCrC
https://mega.nz/#F!9QYkRCgC!qvSOMae3mHs_ykZBBbOLDg!oBg3mCrC
Эксплойтинг для пентестеров - \OSCP\OSCE (Exploit-Dev) | XSS.is (ex DaMaGeLaB)
https://xss.is/threads/37258/
https://xss.is/threads/37258/
Linux (x86) Exploit Development Series – sploitF-U-N
https://sploitfun.wordpress.com/2015/06/26/linux-x86-exploit-development-tutorial-series/
https://sploitfun.wordpress.com/2015/06/26/linux-x86-exploit-development-tutorial-series/
sploitF-U-N
Linux (x86) Exploit Development Series
First of all I would like to thank phrack articles, its author and other security researchers for teaching me about different exploit techniques, without whom none of the posts would have been poss…
Статья - Luke, I am your fuzzer. Автоматизируем поиск уязвимостей в программах. | XSS.is (ex DaMaGeLaB)
https://xss.is/threads/29467/
https://xss.is/threads/29467/
XSS.is (ex DaMaGeLaB)
Статья - Luke, I am your fuzzer. Автоматизируем поиск уязвимостей...
Фаззинг все чаще применяют и программисты — для проверки своих приложений на прочность, и исследователи безопасности, и хакеры. Но пользоваться фаззерами не выйдет, если не понимаешь, что именно...
Forwarded from dukeBarman
@p1r0t3xn1k тут на днях вышло очень подробное видео https://www.youtube.com/watch?v=O3hb6HV1ZQo
YouTube
FUZZING FOR BEGINNERS (KUGG teaches STÖK American fuzzy lop)
In this episode of "STÖK, time to learn something new". KUGG (Christoffer Jerkeby) From F-Secure shows STÖK the basics of FUZZING using American Fuzzy lop. They FUZZ a HTTP server and get two crashes, crashes that with the right exploit could give an attacker…
Forwarded from r0 Crew (Bot, Bear0)
Exploit Development Student v1.7z.002
813.9 MB
#forward from @Razdva36
Forwarded from Order of Six Angles
Подробный технический туториал по подготовке к экзамену OSCE
Для начала, что такое vulnserver
https://github.com/stephenbradshaw/vulnserver
Часть 1.Настраиваем окружение, для дальнейшей работы
https://epi052.gitlab.io/notes-to-self/blog/2020-05-13-osce-exam-practice-part-one/
Часть 2. Эксплуатация vulnserver
https://epi052.gitlab.io/notes-to-self/blog/2020-05-14-osce-exam-practice-part-two/
Часть 3. SEH overwrite/Egg hunting
https://epi052.gitlab.io/notes-to-self/blog/2020-05-18-osce-exam-practice-part-three/
Часть 4. Stack pivot
https://epi052.gitlab.io/notes-to-self/blog/2020-05-19-osce-exam-practice-part-four/
Часть 5. Эксплуатация команды Vulnserver KSTET
https://epi052.gitlab.io/notes-to-self/blog/2020-05-19-osce-exam-practice-part-five/
Для начала, что такое vulnserver
https://github.com/stephenbradshaw/vulnserver
Часть 1.Настраиваем окружение, для дальнейшей работы
https://epi052.gitlab.io/notes-to-self/blog/2020-05-13-osce-exam-practice-part-one/
Часть 2. Эксплуатация vulnserver
https://epi052.gitlab.io/notes-to-self/blog/2020-05-14-osce-exam-practice-part-two/
Часть 3. SEH overwrite/Egg hunting
https://epi052.gitlab.io/notes-to-self/blog/2020-05-18-osce-exam-practice-part-three/
Часть 4. Stack pivot
https://epi052.gitlab.io/notes-to-self/blog/2020-05-19-osce-exam-practice-part-four/
Часть 5. Эксплуатация команды Vulnserver KSTET
https://epi052.gitlab.io/notes-to-self/blog/2020-05-19-osce-exam-practice-part-five/