From 9730bf8ed89ad56bff01e1aa760a385ca0cfe7be Mon Sep 17 00:00:00 2001 From: pe3zx Date: Wed, 20 Dec 2017 15:55:40 +0700 Subject: [PATCH] Add 'Shellcoding' section to Exploitation Techniques --- README.md | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/README.md b/README.md index 29fc71e..da1a04e 100644 --- a/README.md +++ b/README.md @@ -234,6 +234,14 @@ My curated list of awesome links, resources and tools - [Bypassing NX bit using return-to-libc](https://sploitfun.wordpress.com/2015/05/08/bypassing-nx-bit-using-return-to-libc/) - [Bypassing NX bit using chained return-to-libc](https://sploitfun.wordpress.com/2015/05/08/bypassing-nx-bit-using-chained-return-to-libc/) +#### Shellcoding + +*Art of crafting shellcode* + +- [SLAE: Bind TCP Shell – Assignment 1](http://0xdeadcode.se/archives/637) +- [SLAE: Reverse TCP Shell – Assignment 2](http://0xdeadcode.se/archives/689) +- [SLAE: Egg Hunter – Assignment 3](http://0xdeadcode.se/archives/707) + ##### Stack Exploitation *Corrupt the stack*