#
Exploit Development
Mainly binary exploitation on Windows, for now.
#
Basic Concepts
- CPU Architectures and Registers
- Assembly Code
- Stack buffer overflows
- SEH
- DEP
- ASLR
- CFG
Techniques / How to approach problems:
- Egg hunter
- Custom shellcode
- Bypassing DEP
- Bypassing ASLR
- ROP gadgets chaining
#
Intermediate Concepts
#
AV Evasion Techniques
On Disk:
- Obfuscation
- Encryption
- Packing (Packers)
- Protecting (Protectors)
In Memory:
- Encryption/Decryption
- Process Memory Injection
- DLL Injection
- Inline Hooking
- Process Hallowing
#
Advanced Concepts
Not even close :D
#
Tools
- GDB
- IDA / Ghidra
- WinDbg
- Text Editor
- OS: Linux/MacOS/iOS/Android/Windows
#
Courses
- SANS SEC760: Advanced Exploit Development for Penetration Testers
- OSED EXP-301
- OSMR EXP-312
- OSEE EXP-401
- ZeroPointSecurity Red Team Ops
- Sektor7 RED TEAM Operator
- Corelan Bootcamp / Advanced
#
Malware
If you search for malware and execute them without precautions it is going to be your fault! No one else will be liable, definitely not me! Look around at your own risk!
#
Blogs
#
Malware Collections
- The Zoo
- VX Underground