From 6733adfed756f0bf9ce5f85a49e1ed3b5953c0f1 Mon Sep 17 00:00:00 2001 From: Omar Santos Date: Mon, 3 Jul 2023 14:05:40 -0400 Subject: [PATCH] Update README.md Fixes #157 --- exploit_development/README.md | 1 - 1 file changed, 1 deletion(-) diff --git a/exploit_development/README.md b/exploit_development/README.md index b865874..038619e 100644 --- a/exploit_development/README.md +++ b/exploit_development/README.md @@ -126,7 +126,6 @@ The following are some of the most popular reverse engineering tools. HOWEVER! G + [Exploiting Freelist[0] On XP Service Pack 2](http://www.orkspace.net/secdocs/Windows/Protection/Bypass/Exploiting%20Freelist%5B0%5D%20On%20XP%20Service%20Pack%202.pdf) - by Brett Moore [2005] + [Kernel-mode Payloads on Windows in uninformed](http://www.uninformed.org/?v=3&a=4&t=pdf) + [Exploiting 802.11 Wireless Driver Vulnerabilities on Windows](http://www.uninformed.org/?v=6&a=2&t=pdf) -+ [Exploiting Comon Flaws In Drivers](http://www.reversemode.com/index.php?option=com_content&task=view&id=38&Itemid=1) + [Heap Feng Shui in JavaScript](http://www.blackhat.com/presentations/bh-europe-07/Sotirov/Presentation/bh-eu-07-sotirov-apr19.pdf) by Alexander sotirov [2007] + [Understanding and bypassing Windows Heap Protection](http://kkamagui.springnote.com/pages/1350732/attachments/579350) - by Nicolas Waisman [2007] + [Heaps About Heaps](http://www.insomniasec.com/publications/Heaps_About_Heaps.ppt) - by Brett moore [2008]