ignore blog posts in search
This commit is contained in:
parent
0c2f5800bd
commit
4d81bfb2cb
228 changed files with 912 additions and 0 deletions
4
0/0.md
4
0/0.md
|
@ -1,3 +1,7 @@
|
|||
---
|
||||
search:
|
||||
exclude: true
|
||||
---
|
||||
# Binary Exploitation
|
||||
|
||||
## Title
|
||||
|
|
4
0/gdb.md
4
0/gdb.md
|
@ -1,3 +1,7 @@
|
|||
---
|
||||
search:
|
||||
exclude: true
|
||||
---
|
||||
# GDB + GEF
|
||||
|
||||
GDB, the GNU project debugger, allows you to see what is going on inside another program while it executes, or what said program was doing at the moment it crashed. GDB supports Ada, Assembly, C, C++, D, Frotan, Go, Objective-C, OpenCL, Modula-2, Pascal and Rust. For more information, click [here](https://www.gnu.org/software/gdb/).
|
||||
|
|
|
@ -1,3 +1,7 @@
|
|||
---
|
||||
search:
|
||||
exclude: true
|
||||
---
|
||||
# Ghidra
|
||||
|
||||
Ghidra is a software reverse engineering (SRE) framework created and maintained by the National Security Agency Research Directorate. This framework includes a suite of full-featured, high-end software analysis tools that enable users to analyze compiled code on a variety of platforms including Windows, macOS, and Linux. Capabilities include disassembly, assembly, decompilation, graphing, and scripting, along with hundreds of other features. Ghidra supports a wide variety of processor instruction sets and executable formats and can be run in both user-interactive and automated modes.
|
||||
|
|
|
@ -1,3 +1,7 @@
|
|||
---
|
||||
search:
|
||||
exclude: true
|
||||
---
|
||||
# Python Pwntools
|
||||
|
||||
Pwntools is a python ctf library designed for rapid exploit development. It helps us write exploits quickly, thanks to the functionnalities behind it. Pwntools has python2 and python3 versions, In this course we will use the python3 version since it is the most up to date.
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue