-
Some ways to jump to the shellcode
Corelan's "Exploit writing tutorial part 2" walkthrough
-
Stack Based Overflow Example (Windows x86)
Corelan's "Exploit writing tutorial part 1 - Stack Based Overflows" walkthrough
-
SLAE: Custom Shellcode Crypter
Simple XOR shellcode crypter
-
SLAE: Polymorphic Shellcodes
Creating some polymorhic shellcodes for linux/x86
-
SLAE: linux_x86_shell_reverse_tcp Shellcode Analysis
The process of "linux_x86_shell_reverse_tcp" shellcode analysis in gdb
-
SLAE: linux_x86_read_file Shellcode Analysis
The process of "linux_x86_read_file" shellcode analysis in gdb
-
SLAE: linux_x86_exec Shellcode Analysis
The process of "linux/x86/exec" shellcode analysis in gdb
-
SLAE: Writing XOR Shellcode Encoder/Decoder
The process of creation custom XOR encoder/decoder
-
SLAE: Writing simple Egg Hunter
The process of creation of simple Egg Hunter
-
SLAE: Writing shell_reverse_tcp shellcode
The process of creation connect-back shellcode
-
SLAE: Simple shell_bind_tcp shellcode
The process of creation port-binding shellcode
-
Hashcat Cheatsheet
Some useful hashcat tips
-
Buffer Overflow Basics
Some useful tips about buffer overflow exploitation
-
Windows Privilege Escalation
Some useful tips about windows privesc
-
Metasploit Cheatsheet
List of most common msf modules and options
-
Linux Privilege Escalation Cheatsheet
Some useful tips for exploitation and privesc