Computer Science from the Bottom Up https://www.bottomupcs.com/
π1
Forwarded from /archive/ (monero chan)
Introduction_to_data_compression.pdf
3.7 MB
Malware Development Course
Note: if you not want install VS, you could use w64devkit to grasp Windows API with gcc.
magnet:?xt=urn:btih:74c93b4fedb93786528944d3ae91a8da6496e5fc&dn=Sektor7+-+RED+TEAM+Operator&tr=udp://tracker.openbittorrent.com:80&tr=udp://tracker.opentrackr.org:1337/announce
Note: if you not want install VS, you could use w64devkit to grasp Windows API with gcc.
β‘2
Compsci Library π
BBv3.pdf
I made an implementation C2 based on this book, still prototype anyway. The main concept like message broker, in my opinion. I use Laravel for fast prototyping and for cheap shared hosting. Maybe in future, I like rewrite to performant language after the feature quite stable, maybe elixir or go with htmx still cant decide for now.
Enjoy, if you find interesting, please consider leave a star UwU
https://github.com/norabellm/providence-app
Enjoy, if you find interesting, please consider leave a star UwU
https://github.com/norabellm/providence-app
GitHub
GitHub - multidecay/providence-app: Experimental General-purpose Command and Control
Experimental General-purpose Command and Control . Contribute to multidecay/providence-app development by creating an account on GitHub.
The Architecture of Open Source Applications (Volume 1)
LLVM
Chris Lattner
https://aosabook.org/en/v1/llvm.html
LLVM
Chris Lattner
https://aosabook.org/en/v1/llvm.html
How_Cybersecurity_Really_Works_A_Hands_On_Guide_for_Total_Beginners.pdf
15.4 MB
How Cybersecurity Really Works : A Hands On Guide for Total Beginners
Great book to grasp what is and is not Cybersecurity. If you have access, quite interest and money, I suggest to buy the physical book.
Great book to grasp what is and is not Cybersecurity. If you have access, quite interest and money, I suggest to buy the physical book.
β€βπ₯2
Forwarded from vx-underground
Hello, how are you?
After almost 1 year of work our second zine is complete. We are happy to announce the release of Black Mass Volume II.
The PDF is free. Physical copies will be available worldwide for purchase in the next 24 - 72 hours.
Free PDF: https://samples.vx-underground.org/root/Papers/Other/VXUG%20Zines/2023-09-19%20-%20Black%20Mass%20Volume%20II.pdf
After almost 1 year of work our second zine is complete. We are happy to announce the release of Black Mass Volume II.
The PDF is free. Physical copies will be available worldwide for purchase in the next 24 - 72 hours.
Free PDF: https://samples.vx-underground.org/root/Papers/Other/VXUG%20Zines/2023-09-19%20-%20Black%20Mass%20Volume%20II.pdf
π1
SpamChannel: Spoofing emails from 2M domains and virtually becoming Satan [pdf] https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/byt3bl33d3r%20-%20SpamChannel%20Spoofing%20Emails%20From%202%20Million%20Domains%20and%20Virtually%20Becoming%20Satan.pdf
Windows Exploit Writing Tutorial by Corelan Security Research
01. Stack Based Overflow
https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/
02. Stack Based Overflow - Jumping Shellcode
https://www.corelan.be/index.php/2009/07/23/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-2/
03. SEH Based Exploit
https://www.corelan.be/index.php/2009/07/25/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-3-seh/
03b. SEH Based Exploit Example
https://www.corelan.be/index.php/2009/07/28/seh-based-exploit-writing-tutorial-continued-just-another-example-part-3b/
04. From Exploit to Metasploit
https://www.corelan.be/index.php/2009/08/12/exploit-writing-tutorials-part-4-from-exploit-to-metasploit-the-basics/
05. How Debugger Module and Plugin can speed up Basic Exploit Development
https://www.corelan.be/index.php/2009/09/05/exploit-writing-tutorial-part-5-how-debugger-modules-plugins-can-speed-up-basic-exploit-development/
06. Bypassing Stack Cookies, SafeSEH, SEHOP, HW DEP and ASLR
https://www.corelan.be/index.php/2009/09/21/exploit-writing-tutorial-part-6-bypassing-stack-cookies-safeseh-hw-dep-and-aslr/
07. Unicode to Calc
https://www.corelan.be/index.php/2009/11/06/exploit-writing-tutorial-part-7-unicode-from-0x00410041-to-calc/
08. Win32 Egg Hunting
https://www.corelan.be/index.php/2010/01/09/exploit-writing-tutorial-part-8-win32-egg-hunting/
09. Introduction to Win32 Shellcoding
https://www.corelan.be/index.php/2010/02/25/exploit-writing-tutorial-part-9-introduction-to-win32-shellcoding/
10. Chainnig DEP with ROP
https://www.corelan.be/index.php/2010/06/16/exploit-writing-tutorial-part-10-chaining-dep-with-rop-the-rubikstm-cube/
11. Heap Spraying Demystified
https://www.corelan.be/index.php/2011/12/31/exploit-writing-tutorial-part-11-heap-spraying-demystified/
01. Stack Based Overflow
https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/
02. Stack Based Overflow - Jumping Shellcode
https://www.corelan.be/index.php/2009/07/23/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-2/
03. SEH Based Exploit
https://www.corelan.be/index.php/2009/07/25/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-3-seh/
03b. SEH Based Exploit Example
https://www.corelan.be/index.php/2009/07/28/seh-based-exploit-writing-tutorial-continued-just-another-example-part-3b/
04. From Exploit to Metasploit
https://www.corelan.be/index.php/2009/08/12/exploit-writing-tutorials-part-4-from-exploit-to-metasploit-the-basics/
05. How Debugger Module and Plugin can speed up Basic Exploit Development
https://www.corelan.be/index.php/2009/09/05/exploit-writing-tutorial-part-5-how-debugger-modules-plugins-can-speed-up-basic-exploit-development/
06. Bypassing Stack Cookies, SafeSEH, SEHOP, HW DEP and ASLR
https://www.corelan.be/index.php/2009/09/21/exploit-writing-tutorial-part-6-bypassing-stack-cookies-safeseh-hw-dep-and-aslr/
07. Unicode to Calc
https://www.corelan.be/index.php/2009/11/06/exploit-writing-tutorial-part-7-unicode-from-0x00410041-to-calc/
08. Win32 Egg Hunting
https://www.corelan.be/index.php/2010/01/09/exploit-writing-tutorial-part-8-win32-egg-hunting/
09. Introduction to Win32 Shellcoding
https://www.corelan.be/index.php/2010/02/25/exploit-writing-tutorial-part-9-introduction-to-win32-shellcoding/
10. Chainnig DEP with ROP
https://www.corelan.be/index.php/2010/06/16/exploit-writing-tutorial-part-10-chaining-dep-with-rop-the-rubikstm-cube/
11. Heap Spraying Demystified
https://www.corelan.be/index.php/2011/12/31/exploit-writing-tutorial-part-11-heap-spraying-demystified/
Corelan Team
Exploit writing tutorial part 1 : Stack Based Overflows | Corelan Cybersecurity Research
Last friday (july 17th 2009), somebody (nick)named βCrazy_Hackerβ has reported a vulnerability in Easy RM to MP3 Conversion Utility (on XP SP2 En), via packetstormsecurity.org. (see http://packetstormsecurity.org/0907-exploits/). The vulnerability reportβ¦
Reversing - Secrets Of Reverse Engineering (2005).pdf
8.5 MB
Reversing : Secret of Reverse Engineering
Eldad Eliam
Eldad Eliam
Forwarded from akmalβs bunker | Meme Driven Development (Π°ΠΊΠΌΠ°Π»Ρ)
TLCL-19.01.pdf
2 MB
β€βπ₯1
I think this gold mine for bug hunter, especially on web exploitation.
https://github.com/daffainfo/AllAboutBugBounty/tree/master
https://github.com/daffainfo/AllAboutBugBounty/tree/master
GitHub
GitHub - daffainfo/AllAboutBugBounty: All about bug bounty (bypasses, payloads, and etc)
All about bug bounty (bypasses, payloads, and etc) - daffainfo/AllAboutBugBounty
β‘3