Compsci Library πŸ“š
224 subscribers
13 photos
86 files
434 links
Resource about my compsci study, random topic related mostly about system, compiler and programing language.
Download Telegram
Windows Exploit Writing Tutorial by Corelan Security Research

01. Stack Based Overflow
https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/

02. Stack Based Overflow - Jumping Shellcode
https://www.corelan.be/index.php/2009/07/23/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-2/

03. SEH Based Exploit
https://www.corelan.be/index.php/2009/07/25/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-3-seh/

03b. SEH Based Exploit Example
https://www.corelan.be/index.php/2009/07/28/seh-based-exploit-writing-tutorial-continued-just-another-example-part-3b/

04. From Exploit to Metasploit
https://www.corelan.be/index.php/2009/08/12/exploit-writing-tutorials-part-4-from-exploit-to-metasploit-the-basics/

05. How Debugger Module and Plugin can speed up Basic Exploit Development
https://www.corelan.be/index.php/2009/09/05/exploit-writing-tutorial-part-5-how-debugger-modules-plugins-can-speed-up-basic-exploit-development/

06. Bypassing Stack Cookies, SafeSEH, SEHOP, HW DEP and ASLR
https://www.corelan.be/index.php/2009/09/21/exploit-writing-tutorial-part-6-bypassing-stack-cookies-safeseh-hw-dep-and-aslr/

07. Unicode to Calc
https://www.corelan.be/index.php/2009/11/06/exploit-writing-tutorial-part-7-unicode-from-0x00410041-to-calc/

08. Win32 Egg Hunting
https://www.corelan.be/index.php/2010/01/09/exploit-writing-tutorial-part-8-win32-egg-hunting/

09. Introduction to Win32 Shellcoding
https://www.corelan.be/index.php/2010/02/25/exploit-writing-tutorial-part-9-introduction-to-win32-shellcoding/

10. Chainnig DEP with ROP
https://www.corelan.be/index.php/2010/06/16/exploit-writing-tutorial-part-10-chaining-dep-with-rop-the-rubikstm-cube/

11. Heap Spraying Demystified
https://www.corelan.be/index.php/2011/12/31/exploit-writing-tutorial-part-11-heap-spraying-demystified/
Reversing - Secrets Of Reverse Engineering (2005).pdf
8.5 MB
Reversing : Secret of Reverse Engineering
Eldad Eliam
The Linux Command Line (Fifth Internet Edition)
William Shotts
Forwarded from akmal’s bunker | Meme Driven Development (акмаль)
TLCL-19.01.pdf
2 MB
❀‍πŸ”₯1
Introduction_to_shellcode_development.pdf
1.5 MB
Introduction to Shellcode Development

Ionut Popescu
πŸ‘3
Why ML/OCaml are good for writing compilers
Dwight VandenBerghe

https://flint.cs.yale.edu/cs421/case-for-ml.html
Forwarded from epic links / resources (⁠⁠)
The Grug Brained Developer

A layman's guide to thinking like the self-aware smol brained

https://grugbrain.dev/
🌚1
Forwarded from /archive/ (monero chan)
BlueTeamHandbookIR.pdf
50.7 MB
Blue Team Handbook: Incident Response Edition
(not available on z-library)
Beej's Quick Guide to GDB (2009)  https://beej.us/guide/bggdb/
❀‍πŸ”₯3