diff --git a/README.md b/README.md index bf74d4a..828638a 100644 --- a/README.md +++ b/README.md @@ -176,17 +176,23 @@ My curated list of awesome links, resources and tools ##### Bypassing ASLR +**Any related techniques for ASLR bypassing** + - [Bypassing ASLR – Part I](https://sploitfun.wordpress.com/2015/05/08/bypassing-aslr-part-i/) - [Bypassing ASLR – Part II](https://sploitfun.wordpress.com/2015/05/08/bypassing-aslr-part-ii/) - [Bypassing ASLR – Part III](https://sploitfun.wordpress.com/2015/05/08/bypassing-aslr-part-iii/) ##### Format Strings +**Format strings exploitation** + - [Format String Exploitation Primer](https://borgandrew.blogspot.com/2017/01/h1-margin-bottom-0.html) - [X86 EXPLOITATION 101: “FORMAT STRINGS” – I’LL TELL YA WHAT TO SAY](https://gbmaster.wordpress.com/2015/12/08/x86-exploitation-101-format-strings-ill-tell-ya-what-to-say/) ##### Heap Exploitation +**Heap exploitation related articles and tutorials** + - [Heap Exploitation](https://www.gitbook.com/book/dhavalkapil/heap-exploitation/details) - [Heap Exploitation ~ Fastbin Attack](https://0x00sec.org/t/heap-exploitation-fastbin-attack/3627) - [Heap Exploitation ~ Abusing Use-After-Free](https://0x00sec.org/t/heap-exploitation-abusing-use-after-free/3580) @@ -202,11 +208,15 @@ My curated list of awesome links, resources and tools ##### Integer Overflow +**Integer overflow epxloitaion** + - [Integer Overflow](https://sploitfun.wordpress.com/2015/06/23/integer-overflow/) - [X86 EXPLOITATION 101: “INTEGER OVERFLOW” – ADDING ONE MORE… AAAAAAAAAAAND IT’S GONE](https://gbmaster.wordpress.com/2015/08/13/x86-exploitation-101-integer-overflow-adding-one-more-aaaaaaaaaaand-its-gone/) ##### Return Oriented Programming +**ROP cases and guidelines** + - [A ROP Primer solution 64-bit style](https://blog.techorganic.com/2015/10/09/a-rop-primer-solution-64-bit-style/) - [Blind Return Oriented Programming 102](https://oddcoder.com/BROP-102/) - [Intro to ROP: ROP Emporium — Split](https://medium.com/@iseethieves/intro-to-rop-rop-emporium-split-9b2ec6d4db08) @@ -218,11 +228,15 @@ My curated list of awesome links, resources and tools ##### return-to-libc +**return-to-libc techniques** + - [Bypassing NX bit using return-to-libc](https://sploitfun.wordpress.com/2015/05/08/bypassing-nx-bit-using-return-to-libc/) - [Bypassing NX bit using chained return-to-libc](https://sploitfun.wordpress.com/2015/05/08/bypassing-nx-bit-using-chained-return-to-libc/) ##### Stack Exploitation +**Corrupt the stack** + - [Buffer Overflow Explotation](https://0x00sec.org/t/buffer-overflow-explotation/3846/1) - [Classic Stack Based Buffer Overflow](https://sploitfun.wordpress.com/2015/05/08/classic-stack-based-buffer-overflow/) - [Exploiting 1-byte buffer overflows](https://www.welivesecurity.com/2016/05/10/exploiting-1-byte-buffer-overflows/) @@ -237,6 +251,8 @@ My curated list of awesome links, resources and tools ##### Use-After-Free +**Use-After-Free related arcitles** + - [Use-After-Free](https://sploitfun.wordpress.com/2015/06/16/use-after-free/) ### Malware Analysis