forked from e-a-security/Exploit-Dev-OSCE
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Useful-Links
45 lines (30 loc) · 2.31 KB
/
Useful-Links
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
OSCE Study Plan:
https://www.abatchy.com/2017/03/osce-study-plan
CTP Summary:
https://h0mbre.github.io/CTP_Summary/#
OSCE pre: https://stacktrac3.co/category/osce-prep/
Loads of BO exploit codes in prep for OSCE: https://github.com/ihack4falafel/OSCE
Exploit Development:
X86 Assembly Short and Conditional Jump Cheat Sheet: https://vellosec.net/2018/08/x86-assembly-short-and-conditional-jump-cheat-sheet/
Using SHORT (two-byte) Relativite Jump Instructions: https://thestarman.pcministry.com/asm/2bytejumps.htm
Jumping with Bad Characters: https://buffered.io/posts/jumping-with-bad-chars/
X86-JUMPS: http://www.unixwiz.net/techtips/x86-jumps.html
Intel x86 Assembly Instruction Set Opcode Table: http://sparksandflames.com/files/x86InstructionChart.html
Windows Exploit Development – Part 1: The Basics http://www.securitysift.com/windows-exploit-development-part-1-basics/
Windows Exploit Development – Part 2: Intro to Stack Based Overflows - http://www.securitysift.com/windows-exploit-development-part-2-intro-stack-overflow/
Windows Exploit Development – Part 3: Changing Offsets and Rebased Modules - http://www.securitysift.com/windows-exploit-development-part-3-changing-offsets-and-rebased-modules/
Windows Exploit Development – Part 4: Locating Shellcode With Jumps - http://www.securitysift.com/windows-exploit-development-part-4-locating-shellcode-jumps/
Windows Exploit Development – Part 5: Locating Shellcode With Egghunting - http://www.securitysift.com/windows-exploit-development-part-5-locating-shellcode-egghunting
Windows Exploit Development – Part 6: SEH Exploits - http://www.securitysift.com/windows-exploit-development-part-6-seh-exploits
Capt. Meelo ExploitDev category: https://captmeelo.com/category/exploitdev
Purpl3 F-x Secur1ty OSCE Prep articles: https://purpl3f0xsec.tech/
Jump if Condition is Met:
https://c9x.me/x86/html/file_module_x86_id_146.html
https://xavibel.com/category/exploiting/
Bypassing ASLR on Windows:
https://www.abatchy.com/2017/06/exploit-dev-101-bypassing-aslr-on.html
Bypassing Anti-Virus:
https://pentest.blog/art-of-anti-detection-1-introduction-to-av-detection-techniques/
https://pentest.blog/art-of-anti-detection-2-pe-backdoor-manufacturing/
Deeper dive into Windows Architecture:
https://docs.microsoft.com/en-us/archive/blogs/hanybarakat/deeper-into-windows-architecture