dostackbufferoverflowgood
nightmare
Our great sponsors
dostackbufferoverflowgood | nightmare | |
---|---|---|
13 | 5 | |
1,379 | 2,446 | |
- | - | |
0.0 | 4.5 | |
about 3 years ago | 5 months ago | |
C | Python | |
- | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
dostackbufferoverflowgood
-
Pre-OSCP Knowledge
This one: https://github.com/justinsteven/dostackbufferoverflowgood
-
BOF Learning Resources?
IDK if the type of BOF has changed since I did it, but https://github.com/justinsteven/dostackbufferoverflowgood was VERY helpful to me.
- Need resources for BO and AD study
-
Asking for help
A topic that many start with is buffer overflows so there are a lot of tutorials it. Maybe start there. A resource on learning that topic that I liked is https://github.com/justinsteven/dostackbufferoverflowgood
-
Important PWK Machines
Master buffer overflows so you can get 25 points out the gate, while you're scanning the other boxes (Yeh...that was a pro tip 😁). Justin Stevens will set you right. https://github.com/justinsteven/dostackbufferoverflowgood/blob/master/dostackbufferoverflowgood_tutorial.md
-
BOF in Proving Grounds?
Completing this https://github.com/justinsteven/dostackbufferoverflowgood a few times (the YouTube video is fun and informative to watch too) and a methodical script template that a friend crafted and taught me to use got me over on the BOF. PG and THM didn't exist when I did my last attempt but I would certainly use them if I was taking the exam today. All the best!
-
BOF - Where do I Practice(outside the lab)?
dotackbufferoverflowgood - If you’re interested to get a more in-depth understanding of BoF in order to better apply it in a wider variety of scenarios, do check out https://github.com/justinsteven/dostackbufferoverflowgood. Replicate the PDF step-by-step, you’ll learn a lot from this. It also goes through interesting payloads other than the typical reverse shell we normally use.
- For whatever reason, I am having a lot of trouble grasping buffer overflows. What is your favorite resource/video that spelled it out for you when you learned?
- Linux Buffer Overflow on OSCP exam?
-
Tib3rius Tryhackme for BOF of OSCP?
DoStackBufferOverFlowGood: https://github.com/justinsteven/dostackbufferoverflowgood
nightmare
-
Binary Exploitation resources
pwn.college comes highly recommended from some friends. Nightmare is another solid resource https://github.com/guyinatuxedo/nightmare and pwnable.kr is always good for Rev Eng. practice.
-
BOF Learning Resources?
https://github.com/guyinatuxedo/nightmare - Haven't dug in yet, but looks good from a glance.
-
How to start learning assembly?
Recently I've been trying a 'Nightmare' challenge every day.
-
Is there a place for Assembly and other lower-level languages in cybersecurity and hacking? How do they fit in?
edit: check this out https://github.com/guyinatuxedo/nightmare
-
Computer science student. Just figured out what I want to do with my degree. Hacking.
(1) OpenSecurityTraining: Introduction to Exploits (2) https://github.com/guyinatuxedo/nightmare (2) https://github.com/RPISEC/MBE
What are some alternatives?
OSCP-BoF - This is a walkthrough about understanding the #BoF machine present in the #OSCP exam.
MBE - Course materials for Modern Binary Exploitation by RPISEC
Buffer-Overflow-Exploit-Development-Practice - Good For OSCP Training
Ripes - A graphical processor simulator and assembly editor for the RISC-V ISA
HackSysExtremeVulnerableDriver - HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux
be-a-hacker - roadmap for a self-taught hacker
PWK-OSCP-Preparation-Roadmap - Roadmap for preparing for OSCP, anyone is free to use this, and also feedback and contributions are welcome
modern-cpp-tutorial - 📚 Modern C++ Tutorial: C++11/14/17/20 On the Fly | https://changkun.de/modern-cpp/
Privilege_Escalation
OSCE - Some exploits, which I’ve created during my OSCE preparation.
GOAD - game of active directory
vulnerable-AD - Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab