Home
Changelog
Nix solves this
1.
Research
1.1.
Interesting Talks & Videos
Exploitation
2.
General Theory
2.1.
C Language
2.1.1.
Common Issues
2.2.
System Architecture
2.2.1.
x86 & IA32 Assembly
2.2.2.
Memory & Program Layout (🚧)
2.2.3.
Creating Shellcode
3.
Strategy
3.1.
Fuzzing (🚧)
3.2.
Command Injection
3.3.
Local Attacks & Code Pointers
3.3.1.
Global Offset Table & Procedure Linking Table (🚧)
3.4.
Performing Remote Attacks (🚧)
3.5.
Privilege Escalation
4.
Reverse Engineering
4.1.
Analysing Binaries
4.2.
Debugging 101
5.
Binary Exploitation
5.1.
Stack Overflows
5.2.
String Vulnerabilities
5.3.
Common Defenses
5.3.1.
Canaries
5.3.2.
No Execute
5.3.3.
Address Space Layout Randomisation (ASLR)
5.3.4.
Relocation Read-Only (RELRO)
5.4.
Advanced Attacks
5.4.1.
Return-Oriented Programming
5.4.2.
ret2…
Web
6.
Web Exploitation
6.1.
Template Injection
Cryptography
7.
Cryptography
7.1.
Common Ciphers
7.2.
Specific Attacks
7.2.1.
Cracking ZIP Archives
Forensics
8.
Network Analysis
8.1.
Wireshark
9.
File Analysis
9.1.
EXIF Metadata
9.2.
Analysing OLE files (MS Word, Excel, PPT, …) (🚧)
Light
Rust
Coal
Navy
Ayu
My Little Security Wiki