mirror of
https://github.com/pe3zx/my-infosec-awesome.git
synced 2024-12-11 17:14:21 -05:00
Add description for exploitation techniques
This commit is contained in:
parent
7eea27870b
commit
55396a2713
16
README.md
16
README.md
@ -176,17 +176,23 @@ My curated list of awesome links, resources and tools
|
||||
|
||||
##### Bypassing ASLR
|
||||
|
||||
**Any related techniques for ASLR bypassing**
|
||||
|
||||
- [Bypassing ASLR – Part I](https://sploitfun.wordpress.com/2015/05/08/bypassing-aslr-part-i/)
|
||||
- [Bypassing ASLR – Part II](https://sploitfun.wordpress.com/2015/05/08/bypassing-aslr-part-ii/)
|
||||
- [Bypassing ASLR – Part III](https://sploitfun.wordpress.com/2015/05/08/bypassing-aslr-part-iii/)
|
||||
|
||||
##### Format Strings
|
||||
|
||||
**Format strings exploitation**
|
||||
|
||||
- [Format String Exploitation Primer](https://borgandrew.blogspot.com/2017/01/h1-margin-bottom-0.html)
|
||||
- [X86 EXPLOITATION 101: “FORMAT STRINGS” – I’LL TELL YA WHAT TO SAY](https://gbmaster.wordpress.com/2015/12/08/x86-exploitation-101-format-strings-ill-tell-ya-what-to-say/)
|
||||
|
||||
##### Heap Exploitation
|
||||
|
||||
**Heap exploitation related articles and tutorials**
|
||||
|
||||
- [Heap Exploitation](https://www.gitbook.com/book/dhavalkapil/heap-exploitation/details)
|
||||
- [Heap Exploitation ~ Fastbin Attack](https://0x00sec.org/t/heap-exploitation-fastbin-attack/3627)
|
||||
- [Heap Exploitation ~ Abusing Use-After-Free](https://0x00sec.org/t/heap-exploitation-abusing-use-after-free/3580)
|
||||
@ -202,11 +208,15 @@ My curated list of awesome links, resources and tools
|
||||
|
||||
##### Integer Overflow
|
||||
|
||||
**Integer overflow epxloitaion**
|
||||
|
||||
- [Integer Overflow](https://sploitfun.wordpress.com/2015/06/23/integer-overflow/)
|
||||
- [X86 EXPLOITATION 101: “INTEGER OVERFLOW” – ADDING ONE MORE… AAAAAAAAAAAND IT’S GONE](https://gbmaster.wordpress.com/2015/08/13/x86-exploitation-101-integer-overflow-adding-one-more-aaaaaaaaaaand-its-gone/)
|
||||
|
||||
##### Return Oriented Programming
|
||||
|
||||
**ROP cases and guidelines**
|
||||
|
||||
- [A ROP Primer solution 64-bit style](https://blog.techorganic.com/2015/10/09/a-rop-primer-solution-64-bit-style/)
|
||||
- [Blind Return Oriented Programming 102](https://oddcoder.com/BROP-102/)
|
||||
- [Intro to ROP: ROP Emporium — Split](https://medium.com/@iseethieves/intro-to-rop-rop-emporium-split-9b2ec6d4db08)
|
||||
@ -218,11 +228,15 @@ My curated list of awesome links, resources and tools
|
||||
|
||||
##### return-to-libc
|
||||
|
||||
**return-to-libc techniques**
|
||||
|
||||
- [Bypassing NX bit using return-to-libc](https://sploitfun.wordpress.com/2015/05/08/bypassing-nx-bit-using-return-to-libc/)
|
||||
- [Bypassing NX bit using chained return-to-libc](https://sploitfun.wordpress.com/2015/05/08/bypassing-nx-bit-using-chained-return-to-libc/)
|
||||
|
||||
##### Stack Exploitation
|
||||
|
||||
**Corrupt the stack**
|
||||
|
||||
- [Buffer Overflow Explotation](https://0x00sec.org/t/buffer-overflow-explotation/3846/1)
|
||||
- [Classic Stack Based Buffer Overflow](https://sploitfun.wordpress.com/2015/05/08/classic-stack-based-buffer-overflow/)
|
||||
- [Exploiting 1-byte buffer overflows](https://www.welivesecurity.com/2016/05/10/exploiting-1-byte-buffer-overflows/)
|
||||
@ -237,6 +251,8 @@ My curated list of awesome links, resources and tools
|
||||
|
||||
##### Use-After-Free
|
||||
|
||||
**Use-After-Free related arcitles**
|
||||
|
||||
- [Use-After-Free](https://sploitfun.wordpress.com/2015/06/16/use-after-free/)
|
||||
|
||||
### Malware Analysis
|
||||
|
Loading…
Reference in New Issue
Block a user