Compsci Library π
BBv3.pdf
I made an implementation C2 based on this book, still prototype anyway. The main concept like message broker, in my opinion. I use Laravel for fast prototyping and for cheap shared hosting.  Maybe in future, I like rewrite to performant language after the feature quite stable, maybe elixir or go with htmx still cant decide for now.
Enjoy, if you find interesting, please consider leave a star UwU
https://github.com/norabellm/providence-app
  
  Enjoy, if you find interesting, please consider leave a star UwU
https://github.com/norabellm/providence-app
GitHub
  
  GitHub - multidecay/providence-app: Experimental General-purpose Command and Control
  Experimental General-purpose Command and Control . Contribute to multidecay/providence-app development by creating an account on GitHub.
  The Architecture of Open Source Applications (Volume 1)
LLVM
Chris Lattner
https://aosabook.org/en/v1/llvm.html
  LLVM
Chris Lattner
https://aosabook.org/en/v1/llvm.html
How_Cybersecurity_Really_Works_A_Hands_On_Guide_for_Total_Beginners.pdf
    15.4 MB
  How Cybersecurity Really Works : A Hands On Guide for Total Beginners
Great book to grasp what is and is not Cybersecurity. If you have access, quite interest and money, I suggest to buy the physical book.
Great book to grasp what is and is not Cybersecurity. If you have access, quite interest and money, I suggest to buy the physical book.
β€βπ₯2
  Forwarded from vx-underground
  
Hello, how are you?
After almost 1 year of work our second zine is complete. We are happy to announce the release of Black Mass Volume II.
The PDF is free. Physical copies will be available worldwide for purchase in the next 24 - 72 hours.
Free PDF: https://samples.vx-underground.org/root/Papers/Other/VXUG%20Zines/2023-09-19%20-%20Black%20Mass%20Volume%20II.pdf
After almost 1 year of work our second zine is complete. We are happy to announce the release of Black Mass Volume II.
The PDF is free. Physical copies will be available worldwide for purchase in the next 24 - 72 hours.
Free PDF: https://samples.vx-underground.org/root/Papers/Other/VXUG%20Zines/2023-09-19%20-%20Black%20Mass%20Volume%20II.pdf
π1
  SpamChannel: Spoofing emails from 2M domains and virtually becoming Satan [pdf]  https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/byt3bl33d3r%20-%20SpamChannel%20Spoofing%20Emails%20From%202%20Million%20Domains%20and%20Virtually%20Becoming%20Satan.pdf
  
  
  
  
  
  Windows Exploit Writing Tutorial by Corelan Security Research
01. Stack Based Overflow
https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/
02. Stack Based Overflow - Jumping Shellcode
https://www.corelan.be/index.php/2009/07/23/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-2/
03. SEH Based Exploit
https://www.corelan.be/index.php/2009/07/25/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-3-seh/
03b. SEH Based Exploit Example
https://www.corelan.be/index.php/2009/07/28/seh-based-exploit-writing-tutorial-continued-just-another-example-part-3b/
04. From Exploit to Metasploit
https://www.corelan.be/index.php/2009/08/12/exploit-writing-tutorials-part-4-from-exploit-to-metasploit-the-basics/
05. How Debugger Module and Plugin can speed up Basic Exploit Development
https://www.corelan.be/index.php/2009/09/05/exploit-writing-tutorial-part-5-how-debugger-modules-plugins-can-speed-up-basic-exploit-development/
06. Bypassing Stack Cookies, SafeSEH, SEHOP, HW DEP and ASLR
https://www.corelan.be/index.php/2009/09/21/exploit-writing-tutorial-part-6-bypassing-stack-cookies-safeseh-hw-dep-and-aslr/
07. Unicode to Calc
https://www.corelan.be/index.php/2009/11/06/exploit-writing-tutorial-part-7-unicode-from-0x00410041-to-calc/
08. Win32 Egg Hunting
https://www.corelan.be/index.php/2010/01/09/exploit-writing-tutorial-part-8-win32-egg-hunting/
09. Introduction to Win32 Shellcoding
https://www.corelan.be/index.php/2010/02/25/exploit-writing-tutorial-part-9-introduction-to-win32-shellcoding/
10. Chainnig DEP with ROP
https://www.corelan.be/index.php/2010/06/16/exploit-writing-tutorial-part-10-chaining-dep-with-rop-the-rubikstm-cube/
11. Heap Spraying Demystified
https://www.corelan.be/index.php/2011/12/31/exploit-writing-tutorial-part-11-heap-spraying-demystified/
  
  01. Stack Based Overflow
https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/
02. Stack Based Overflow - Jumping Shellcode
https://www.corelan.be/index.php/2009/07/23/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-2/
03. SEH Based Exploit
https://www.corelan.be/index.php/2009/07/25/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-3-seh/
03b. SEH Based Exploit Example
https://www.corelan.be/index.php/2009/07/28/seh-based-exploit-writing-tutorial-continued-just-another-example-part-3b/
04. From Exploit to Metasploit
https://www.corelan.be/index.php/2009/08/12/exploit-writing-tutorials-part-4-from-exploit-to-metasploit-the-basics/
05. How Debugger Module and Plugin can speed up Basic Exploit Development
https://www.corelan.be/index.php/2009/09/05/exploit-writing-tutorial-part-5-how-debugger-modules-plugins-can-speed-up-basic-exploit-development/
06. Bypassing Stack Cookies, SafeSEH, SEHOP, HW DEP and ASLR
https://www.corelan.be/index.php/2009/09/21/exploit-writing-tutorial-part-6-bypassing-stack-cookies-safeseh-hw-dep-and-aslr/
07. Unicode to Calc
https://www.corelan.be/index.php/2009/11/06/exploit-writing-tutorial-part-7-unicode-from-0x00410041-to-calc/
08. Win32 Egg Hunting
https://www.corelan.be/index.php/2010/01/09/exploit-writing-tutorial-part-8-win32-egg-hunting/
09. Introduction to Win32 Shellcoding
https://www.corelan.be/index.php/2010/02/25/exploit-writing-tutorial-part-9-introduction-to-win32-shellcoding/
10. Chainnig DEP with ROP
https://www.corelan.be/index.php/2010/06/16/exploit-writing-tutorial-part-10-chaining-dep-with-rop-the-rubikstm-cube/
11. Heap Spraying Demystified
https://www.corelan.be/index.php/2011/12/31/exploit-writing-tutorial-part-11-heap-spraying-demystified/
Corelan Team
  
  Exploit writing tutorial part 1 : Stack Based Overflows | Corelan Cybersecurity Research
  Last friday (july 17th 2009), somebody (nick)named βCrazy_Hackerβ has reported a vulnerability in Easy RM to MP3 Conversion Utility (on XP SP2 En), via packetstormsecurity.org. (see http://packetstormsecurity.org/0907-exploits/). The vulnerability reportβ¦
  Reversing - Secrets Of Reverse Engineering (2005).pdf
    8.5 MB
  Reversing : Secret of Reverse Engineering
Eldad Eliam
  Eldad Eliam
Forwarded from akmalβs bunker | Meme Driven Development (Π°ΠΊΠΌΠ°Π»Ρ)
  
  TLCL-19.01.pdf
    2 MB
  β€βπ₯1
  I think this gold mine for bug hunter, especially on web exploitation.
https://github.com/daffainfo/AllAboutBugBounty/tree/master
  
  https://github.com/daffainfo/AllAboutBugBounty/tree/master
GitHub
  
  GitHub - daffainfo/AllAboutBugBounty: All about bug bounty (bypasses, payloads, and etc)
  All about bug bounty (bypasses, payloads, and etc) - daffainfo/AllAboutBugBounty
β‘3
  Forwarded from Hacker News (yahnc_bot)
The Deep Link Equating Math Proofs and Computer Programs  https://www.quantamagazine.org/the-deep-link-equating-math-proofs-and-computer-programs-20231011/
  
  Quanta Magazine
  
  The Deep Link Equating Math Proofs and Computer Programs
  Mathematical logic and the code of computer programs are, in an exact way, mirror images of each other.
π3
  Neat, clear and straightforward practice tutorial creating a compiler, imo.
https://github.com/DoctorWkt/acwj
  
  https://github.com/DoctorWkt/acwj
GitHub
  
  GitHub - DoctorWkt/acwj: A Compiler Writing Journey
  A Compiler Writing Journey. Contribute to DoctorWkt/acwj development by creating an account on GitHub.
π3
  Introduction_to_shellcode_development.pdf
    1.5 MB
  Introduction to Shellcode Development
Ionut Popescu
Ionut Popescu
π3