MBE
Course materials for Modern Binary Exploitation by RPISEC (by RPISEC)
be-a-hacker
roadmap for a self-taught hacker (by s0md3v)
Our great sponsors
MBE | be-a-hacker | |
---|---|---|
7 | 4 | |
5,295 | 1,744 | |
1.4% | - | |
0.0 | 4.1 | |
over 2 years ago | 4 months ago | |
C | ||
BSD 2-clause "Simplified" License | GNU General Public License v3.0 or later |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
MBE
Posts with mentions or reviews of MBE.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2021-05-01.
- How to get started with cyber forensics
-
BOF: How to calculate the exact number of NOPS and length of ESP
It's not super current, but I really recommend the [Modern Binary Exploitation}(https://github.com/RPISEC/MBE) course produced by RPISEC if you haven't seen it. It approaches things in a nice structured way.
-
How to learn buffer overflow and/or memory exploits easily?
https://github.com/RPISEC/MBE is a really good resource - it's quite a bit more advanced than the usual resources offered, but this is a good thing, because most of the '101' type articles you'll find (which you should still make use of!) will assume we stopped implementing exploit mitigations in 1999, and leave you highly confused when you attempt to do anything real with your new found knowledge :)
-
Any class that will teach you everything for exploit dev?
The modern binary exploitation (MBE) series from Rpisec from 2015 is an awesome. Although itโs on 32-bit, the concepts are still super relevant. The course has a pre-built VM with nice slides. https://github.com/RPISEC/MBE and https://devel0pment.de/?cat=26
-
Looking for current book on binary exploitation
I personally used Modern Binary Exploitation from RPISEC to learn the material. Then, from there, you should be able to go on your own to learn the recent protections.
-
Computer science student. Just figured out what I want to do with my degree. Hacking.
(1) OpenSecurityTraining: Introduction to Exploits (2) https://github.com/guyinatuxedo/nightmare (2) https://github.com/RPISEC/MBE
- What are your views on Binary exploitation? How should one get started with it from zero? Any suggestions? Books to read? Prerequisites required for it?
be-a-hacker
Posts with mentions or reviews of be-a-hacker.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-07-17.
-
Which domain to pick for mandatory internships (kind of a course)
Cyber Security is a vast domain in itself. You can take a look at this repo: https://github.com/s0md3v/be-a-hacker
-
Pls suggest alternative jobs to software engineering in the tech domain.
Refer to this link to look at infosec from a psychological point of view: link
-
Cyber Security Roadmap - Follow or Not?
Try this one as a start, https://github.com/s0md3v/be-a-hacker
- Computer science student. Just figured out what I want to do with my degree. Hacking.
What are some alternatives?
When comparing MBE and be-a-hacker you can also consider the following projects:
nightmare
modern-cpp-tutorial - ๐ Modern C++ Tutorial: C++11/14/17/20 On the Fly | https://changkun.de/modern-cpp/
isoalloc - A general purpose memory allocator that implements an isolation security strategy to mitigate memory safety issues while maintaining good performance
Awesome-Hacking - A collection of various awesome lists for hackers, pentesters and security researchers
rizin - UNIX-like reverse engineering framework and command-line toolset.
cybersecurity-resources - Resources for learning about cybersecurity and CTFs
HackSysExtremeVulnerableDriver - HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux
CTF-Market - This is CTF market