isoalloc
MBE
isoalloc | MBE | |
---|---|---|
3 | 7 | |
365 | 5,493 | |
- | 1.3% | |
7.4 | 0.0 | |
5 months ago | about 3 years ago | |
C | C | |
Apache License 2.0 | BSD 2-clause "Simplified" License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
isoalloc
MBE
- How to get started with cyber forensics
-
BOF: How to calculate the exact number of NOPS and length of ESP
It's not super current, but I really recommend the [Modern Binary Exploitation}(https://github.com/RPISEC/MBE) course produced by RPISEC if you haven't seen it. It approaches things in a nice structured way.
-
How to learn buffer overflow and/or memory exploits easily?
https://github.com/RPISEC/MBE is a really good resource - it's quite a bit more advanced than the usual resources offered, but this is a good thing, because most of the '101' type articles you'll find (which you should still make use of!) will assume we stopped implementing exploit mitigations in 1999, and leave you highly confused when you attempt to do anything real with your new found knowledge :)
-
Any class that will teach you everything for exploit dev?
The modern binary exploitation (MBE) series from Rpisec from 2015 is an awesome. Although itโs on 32-bit, the concepts are still super relevant. The course has a pre-built VM with nice slides. https://github.com/RPISEC/MBE and https://devel0pment.de/?cat=26
-
Looking for current book on binary exploitation
I personally used Modern Binary Exploitation from RPISEC to learn the material. Then, from there, you should be able to go on your own to learn the recent protections.
-
Computer science student. Just figured out what I want to do with my degree. Hacking.
(1) OpenSecurityTraining: Introduction to Exploits (2) https://github.com/guyinatuxedo/nightmare (2) https://github.com/RPISEC/MBE
- What are your views on Binary exploitation? How should one get started with it from zero? Any suggestions? Books to read? Prerequisites required for it?
What are some alternatives?
herpaderping - Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
nightmare
buddy_alloc - A single header buddy memory allocator for C & C++
be-a-hacker - roadmap for a self-taught hacker
hardened_malloc - Hardened allocator designed for modern systems. It has integration into Android's Bionic libc and can be used externally with musl and glibc as a dynamic library for use on other Linux-based platforms. It will gain more portability / integration over time.
HackSysExtremeVulnerableDriver - HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux
heap-exploitation - This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structure.
modern-cpp-tutorial - ๐ Modern C++ Tutorial: C++11/14/17/20 On the Fly | https://changkun.de/modern-cpp/
memreduct - Lightweight real-time memory management application to monitor and clean system memory on your computer.
rizin - UNIX-like reverse engineering framework and command-line toolset.
libqstr - c library for handling strings efficiently
CTF-Market - This is CTF market