The Architecture of Open Source Applications (Volume 1)
LLVM
Chris Lattner
https://aosabook.org/en/v1/llvm.html
LLVM
Chris Lattner
https://aosabook.org/en/v1/llvm.html
How_Cybersecurity_Really_Works_A_Hands_On_Guide_for_Total_Beginners.pdf
15.4 MB
How Cybersecurity Really Works : A Hands On Guide for Total Beginners
Great book to grasp what is and is not Cybersecurity. If you have access, quite interest and money, I suggest to buy the physical book.
Great book to grasp what is and is not Cybersecurity. If you have access, quite interest and money, I suggest to buy the physical book.
β€βπ₯2
Forwarded from vx-underground
Hello, how are you?
After almost 1 year of work our second zine is complete. We are happy to announce the release of Black Mass Volume II.
The PDF is free. Physical copies will be available worldwide for purchase in the next 24 - 72 hours.
Free PDF: https://samples.vx-underground.org/root/Papers/Other/VXUG%20Zines/2023-09-19%20-%20Black%20Mass%20Volume%20II.pdf
After almost 1 year of work our second zine is complete. We are happy to announce the release of Black Mass Volume II.
The PDF is free. Physical copies will be available worldwide for purchase in the next 24 - 72 hours.
Free PDF: https://samples.vx-underground.org/root/Papers/Other/VXUG%20Zines/2023-09-19%20-%20Black%20Mass%20Volume%20II.pdf
π1
SpamChannel: Spoofing emails from 2M domains and virtually becoming Satan [pdf] https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/byt3bl33d3r%20-%20SpamChannel%20Spoofing%20Emails%20From%202%20Million%20Domains%20and%20Virtually%20Becoming%20Satan.pdf
Windows Exploit Writing Tutorial by Corelan Security Research
01. Stack Based Overflow
https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/
02. Stack Based Overflow - Jumping Shellcode
https://www.corelan.be/index.php/2009/07/23/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-2/
03. SEH Based Exploit
https://www.corelan.be/index.php/2009/07/25/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-3-seh/
03b. SEH Based Exploit Example
https://www.corelan.be/index.php/2009/07/28/seh-based-exploit-writing-tutorial-continued-just-another-example-part-3b/
04. From Exploit to Metasploit
https://www.corelan.be/index.php/2009/08/12/exploit-writing-tutorials-part-4-from-exploit-to-metasploit-the-basics/
05. How Debugger Module and Plugin can speed up Basic Exploit Development
https://www.corelan.be/index.php/2009/09/05/exploit-writing-tutorial-part-5-how-debugger-modules-plugins-can-speed-up-basic-exploit-development/
06. Bypassing Stack Cookies, SafeSEH, SEHOP, HW DEP and ASLR
https://www.corelan.be/index.php/2009/09/21/exploit-writing-tutorial-part-6-bypassing-stack-cookies-safeseh-hw-dep-and-aslr/
07. Unicode to Calc
https://www.corelan.be/index.php/2009/11/06/exploit-writing-tutorial-part-7-unicode-from-0x00410041-to-calc/
08. Win32 Egg Hunting
https://www.corelan.be/index.php/2010/01/09/exploit-writing-tutorial-part-8-win32-egg-hunting/
09. Introduction to Win32 Shellcoding
https://www.corelan.be/index.php/2010/02/25/exploit-writing-tutorial-part-9-introduction-to-win32-shellcoding/
10. Chainnig DEP with ROP
https://www.corelan.be/index.php/2010/06/16/exploit-writing-tutorial-part-10-chaining-dep-with-rop-the-rubikstm-cube/
11. Heap Spraying Demystified
https://www.corelan.be/index.php/2011/12/31/exploit-writing-tutorial-part-11-heap-spraying-demystified/
01. Stack Based Overflow
https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/
02. Stack Based Overflow - Jumping Shellcode
https://www.corelan.be/index.php/2009/07/23/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-2/
03. SEH Based Exploit
https://www.corelan.be/index.php/2009/07/25/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-3-seh/
03b. SEH Based Exploit Example
https://www.corelan.be/index.php/2009/07/28/seh-based-exploit-writing-tutorial-continued-just-another-example-part-3b/
04. From Exploit to Metasploit
https://www.corelan.be/index.php/2009/08/12/exploit-writing-tutorials-part-4-from-exploit-to-metasploit-the-basics/
05. How Debugger Module and Plugin can speed up Basic Exploit Development
https://www.corelan.be/index.php/2009/09/05/exploit-writing-tutorial-part-5-how-debugger-modules-plugins-can-speed-up-basic-exploit-development/
06. Bypassing Stack Cookies, SafeSEH, SEHOP, HW DEP and ASLR
https://www.corelan.be/index.php/2009/09/21/exploit-writing-tutorial-part-6-bypassing-stack-cookies-safeseh-hw-dep-and-aslr/
07. Unicode to Calc
https://www.corelan.be/index.php/2009/11/06/exploit-writing-tutorial-part-7-unicode-from-0x00410041-to-calc/
08. Win32 Egg Hunting
https://www.corelan.be/index.php/2010/01/09/exploit-writing-tutorial-part-8-win32-egg-hunting/
09. Introduction to Win32 Shellcoding
https://www.corelan.be/index.php/2010/02/25/exploit-writing-tutorial-part-9-introduction-to-win32-shellcoding/
10. Chainnig DEP with ROP
https://www.corelan.be/index.php/2010/06/16/exploit-writing-tutorial-part-10-chaining-dep-with-rop-the-rubikstm-cube/
11. Heap Spraying Demystified
https://www.corelan.be/index.php/2011/12/31/exploit-writing-tutorial-part-11-heap-spraying-demystified/
Corelan Team
Exploit writing tutorial part 1 : Stack Based Overflows | Corelan Cybersecurity Research
Last friday (july 17th 2009), somebody (nick)named βCrazy_Hackerβ has reported a vulnerability in Easy RM to MP3 Conversion Utility (on XP SP2 En), via packetstormsecurity.org. (see http://packetstormsecurity.org/0907-exploits/). The vulnerability reportβ¦
Reversing - Secrets Of Reverse Engineering (2005).pdf
8.5 MB
Reversing : Secret of Reverse Engineering
Eldad Eliam
Eldad Eliam
Forwarded from akmalβs bunker | Meme Driven Development (Π°ΠΊΠΌΠ°Π»Ρ)
TLCL-19.01.pdf
2 MB
β€βπ₯1
I think this gold mine for bug hunter, especially on web exploitation.
https://github.com/daffainfo/AllAboutBugBounty/tree/master
https://github.com/daffainfo/AllAboutBugBounty/tree/master
GitHub
GitHub - daffainfo/AllAboutBugBounty: All about bug bounty (bypasses, payloads, and etc)
All about bug bounty (bypasses, payloads, and etc) - daffainfo/AllAboutBugBounty
β‘3
Forwarded from Hacker News (yahnc_bot)
The Deep Link Equating Math Proofs and Computer Programs https://www.quantamagazine.org/the-deep-link-equating-math-proofs-and-computer-programs-20231011/
Quanta Magazine
The Deep Link Equating Math Proofs and Computer Programs
Mathematical logic and the code of computer programs are, in an exact way, mirror images of each other.
π3
Neat, clear and straightforward practice tutorial creating a compiler, imo.
https://github.com/DoctorWkt/acwj
https://github.com/DoctorWkt/acwj
GitHub
GitHub - DoctorWkt/acwj: A Compiler Writing Journey
A Compiler Writing Journey. Contribute to DoctorWkt/acwj development by creating an account on GitHub.
π3
Introduction_to_shellcode_development.pdf
1.5 MB
Introduction to Shellcode Development
Ionut Popescu
Ionut Popescu
π3
Compsci Library π
I made an implementation C2 based on this book, still prototype anyway. The main concept like message broker, in my opinion. I use Laravel for fast prototyping and for cheap shared hosting. Maybe in future, I like rewrite to performant language after theβ¦
Update, I recently finish implement basic functionality for defining Maid scheme and simple code gen (unfortunately it still empty).
https://github.com/norabellm/providence-app
Wiki: https://github.com/norabellm/providence-app/wiki/Getting-Started
https://github.com/norabellm/providence-app
Wiki: https://github.com/norabellm/providence-app/wiki/Getting-Started
GitHub
GitHub - multidecay/providence-app: Experimental General-purpose Command and Control
Experimental General-purpose Command and Control . Contribute to multidecay/providence-app development by creating an account on GitHub.
π3
Why ML/OCaml are good for writing compilers
Dwight VandenBerghe
https://flint.cs.yale.edu/cs421/case-for-ml.html
Dwight VandenBerghe
https://flint.cs.yale.edu/cs421/case-for-ml.html
We have used too many levels of abstractions and now the future looks bleak
https://unixsheikh.com/articles/we-have-used-too-many-levels-of-abstractions-and-now-the-future-looks-bleak.html
https://unixsheikh.com/articles/we-have-used-too-many-levels-of-abstractions-and-now-the-future-looks-bleak.html