From 80ccbca617dc805fe17a4e92e2a885897b141447 Mon Sep 17 00:00:00 2001 From: pe3zx Date: Sat, 13 Oct 2018 16:28:10 +0700 Subject: [PATCH] Remove unreachable resources --- README.md | 12 ------------ 1 file changed, 12 deletions(-) diff --git a/README.md b/README.md index 96634dd..f3396d1 100644 --- a/README.md +++ b/README.md @@ -245,7 +245,6 @@ My curated list of awesome links, resources and tools - [Rotten Potato – Privilege Escalation from Service Accounts to SYSTEM](https://foxglovesecurity.com/2016/09/26/rotten-potato-privilege-escalation-from-service-accounts-to-system/) - [sam-b/windows_kernel_resources](https://github.com/sam-b/windows_kernel_resources) - [Sharks in the Pool :: Mixed Object Exploitation in the Windows Kernel Pool](http://srcincite.io/blog/2017/09/06/sharks-in-the-pool-mixed-object-exploitation-in-the-windows-kernel-pool.html) -- [Signing Mimikatz](https://twitter.com/subTee/status/912769644473098240) - [Skeleton in the closet. MS Office vulnerability you didn’t know about](https://embedi.com/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about/) - [Starting with Windows Kernel Exploitation – part 1 – setting up the lab](https://hshrzd.wordpress.com/2017/05/28/starting-with-windows-kernel-exploitation-part-1-setting-up-the-lab/) - [Starting with Windows Kernel Exploitation – part 2 – getting familiar with HackSys Extreme Vulnerable Driver](https://hshrzd.wordpress.com/2017/06/05/starting-with-windows-kernel-exploitation-part-2/) @@ -719,10 +718,8 @@ _return-to-libc techniques_
  • Decrypting APT33’s Dropshot Malware with Radare2 and Cutter – Part 2
  • An Intro to x86_64 Reverse Engineering
  • Emulating Assembly in Radare2
  • -
  • Emulating Decryption Function With Radare2
  • Pwnable.kr - Passcode
  • r2wiki
  • -
  • Reverse Engineering Using Radare2
  • @@ -766,7 +763,6 @@ _return-to-libc techniques_ #### Web Application Security: Technique: CORS -- [Advanced CORS Exploitation Techniques](https://www.sxcurity.pro/advanced-cors-techniques/) - [Exploiting CORS misconfigurations for Bitcoins and bounties](https://portswigger.net/blog/exploiting-cors-misconfigurations-for-bitcoins-and-bounties) #### Web Application Security: Technique: Cross-site Request Forgery @@ -1028,10 +1024,6 @@ _return-to-libc techniques_ avast-tl/retdec RetDec is a retargetable machine-code decompiler based on LLVM - - Compiler Explorer - Online compiler explorer - enkomio/shed .NET runtine inspector. Shed - Inspect .NET malware like a Sir @@ -1950,10 +1942,6 @@ _return-to-libc techniques_ byt3bl33d3r/MITMf Framework for Man-In-The-Middle attacks - - DNSDB - Global DNS Search Engine - eldraco/domain_analyzer Analyze the security of any domain by finding all the information possible. Made in python.