robre's blog
  • Welcome
  • References
  • Disclosure
    • Untitled
  • Writeups
    • CTF
  • Tools
    • radare2 personal cheatsheet
    • gdb personal cheatsheet
    • Useful Linux text utilities
    • GDB tutorial
    • Replacing Kali
  • CTF Wiki
    • PWN
    • WEB
    • RE
    • MOBILE
    • CRYPTO
    • STEGO
    • MISC
    • NET
Powered by GitBook
On this page

Was this helpful?

References

Unordered collection of links and resources for various topics

Binary Exploitation

Link

Description

Blog on some exploitation techniques

Almost all Phracks from 49 contain juicy info exploitation info

Good Rop intro

Also good Rop intro

Advanced Win Exploitation stuff

Exploit Tuts

One of the best exploitation tutorials (check all parts)

pwn2own writeup

Jailbreaking

More Jailbreaking

Fuzzing Collection

Academic Modern Binary Exploitation Course

Memory Corruptions, how do they differ

Another Binary Exploitation Course

malloc visualizer

Bleeding Edge Exploit research

Some browser rce

Javascript Engine Backrounds

More JS Engine Backgrounds

YT Channel for all things security, also BinExpl, BrowserExploitation

some notes on bin expl

Web Exploitation

Link

Description

Collection of XSS Challenges

Blog

EdOverflows Bugbounty Cheatsheet

Blog

Blog on XSS

Other

Link

Description

Blog / Crypto

Lots of ctf writeups by this team

Blog

Mobile Security Guide

Mobile Hacking writeup

PreviousWelcomeNextUntitled

Last updated 5 years ago

Was this helpful?

ms to learn exploitations

http://www.auxy.xyz/
http://www.phrack.org/issues/49/1.html
https://exploit.education/
v
http://codearcana.com/posts/2013/05/28/introduction-to-return-oriented-programming-rop.html
https://de.slideshare.net/saumilshah/dive-into-rop-a-quick-introduction-to-return-oriented-programming
https://github.com/yeyintminthuhtut/Awesome-Advanced-Windows-Exploitation-References
https://www.fuzzysecurity.com/tutorials.html
https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/
https://blog.ret2.io/2018/06/05/pwn2own-2018-exploit-development/
https://geosn0w.github.io/Jailbreaks-Demystified/
https://www.exploit-db.com/docs/english/43945-jailbreaking-ios-11.1.2-an-adventure-into-the-xnu-kernel.pdf
https://github.com/secfigo/Awesome-Fuzzing
https://github.com/RPISEC/MBE
https://googleprojectzero.blogspot.com/2015/06/what-is-good-memory-corruption.html
http://csec.it/events/phd-course-binaries/
https://github.com/wapiflapi/villoc
https://googleprojectzero.blogspot.com/2019/08/jsc-exploits.html
https://www.n0tr00t.com/2016/12/26/115Browser-725-rce-vuln.html
https://medium.com/@bpmxmqd/v8-engine-jsobject-structure-analysis-and-memory-optimization-ideas-be30cfcdcd16
https://v8.dev/blog/fast-properties
https://liveoverflow.com/
https://github.com/jaybosamiya/security-notes
https://github.com/cure53/XSSChallengeWiki/wiki/Older-Challenges-and-Write-Ups
https://blog.zsec.uk/tag/ltr101/
https://github.com/EdOverflow/bugbounty-cheatsheet
https://whitton.io/
http://brutelogic.com.br/blog/
https://sockpuppet.org/blog/archives/
https://balsn.tw/ctf_writeup/
https://securit.ie/blog/
https://mobile-security.gitbook.io/mobile-security-testing-guide/
https://www.exploit-db.com/papers/44145