Compsci Library πŸ“š
224 subscribers
13 photos
86 files
434 links
Resource about my compsci study, random topic related mostly about system, compiler and programing language.
Download Telegram
The Architecture of Open Source Applications (Volume 1)
LLVM

Chris Lattner

https://aosabook.org/en/v1/llvm.html
How_Cybersecurity_Really_Works_A_Hands_On_Guide_for_Total_Beginners.pdf
15.4 MB
How Cybersecurity Really Works : A Hands On Guide for Total Beginners

Great book to grasp what is and is not Cybersecurity. If you have access, quite interest and money, I suggest to buy the physical book.
❀‍πŸ”₯2
Forwarded from vx-underground
Hello, how are you?

After almost 1 year of work our second zine is complete. We are happy to announce the release of Black Mass Volume II.

The PDF is free. Physical copies will be available worldwide for purchase in the next 24 - 72 hours.

Free PDF: https://samples.vx-underground.org/root/Papers/Other/VXUG%20Zines/2023-09-19%20-%20Black%20Mass%20Volume%20II.pdf
πŸ‘1
Like Lolbins but for Trusted Site

https://lots-project.com/
Windows Exploit Writing Tutorial by Corelan Security Research

01. Stack Based Overflow
https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/

02. Stack Based Overflow - Jumping Shellcode
https://www.corelan.be/index.php/2009/07/23/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-2/

03. SEH Based Exploit
https://www.corelan.be/index.php/2009/07/25/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-3-seh/

03b. SEH Based Exploit Example
https://www.corelan.be/index.php/2009/07/28/seh-based-exploit-writing-tutorial-continued-just-another-example-part-3b/

04. From Exploit to Metasploit
https://www.corelan.be/index.php/2009/08/12/exploit-writing-tutorials-part-4-from-exploit-to-metasploit-the-basics/

05. How Debugger Module and Plugin can speed up Basic Exploit Development
https://www.corelan.be/index.php/2009/09/05/exploit-writing-tutorial-part-5-how-debugger-modules-plugins-can-speed-up-basic-exploit-development/

06. Bypassing Stack Cookies, SafeSEH, SEHOP, HW DEP and ASLR
https://www.corelan.be/index.php/2009/09/21/exploit-writing-tutorial-part-6-bypassing-stack-cookies-safeseh-hw-dep-and-aslr/

07. Unicode to Calc
https://www.corelan.be/index.php/2009/11/06/exploit-writing-tutorial-part-7-unicode-from-0x00410041-to-calc/

08. Win32 Egg Hunting
https://www.corelan.be/index.php/2010/01/09/exploit-writing-tutorial-part-8-win32-egg-hunting/

09. Introduction to Win32 Shellcoding
https://www.corelan.be/index.php/2010/02/25/exploit-writing-tutorial-part-9-introduction-to-win32-shellcoding/

10. Chainnig DEP with ROP
https://www.corelan.be/index.php/2010/06/16/exploit-writing-tutorial-part-10-chaining-dep-with-rop-the-rubikstm-cube/

11. Heap Spraying Demystified
https://www.corelan.be/index.php/2011/12/31/exploit-writing-tutorial-part-11-heap-spraying-demystified/
Reversing - Secrets Of Reverse Engineering (2005).pdf
8.5 MB
Reversing : Secret of Reverse Engineering
Eldad Eliam
The Linux Command Line (Fifth Internet Edition)
William Shotts
Forwarded from akmal’s bunker | Meme Driven Development (акмаль)
TLCL-19.01.pdf
2 MB
❀‍πŸ”₯1
Introduction_to_shellcode_development.pdf
1.5 MB
Introduction to Shellcode Development

Ionut Popescu
πŸ‘3
Why ML/OCaml are good for writing compilers
Dwight VandenBerghe

https://flint.cs.yale.edu/cs421/case-for-ml.html