z3r0xk.dll 🇵🇸
@z3r01kودِدْتُ أنِّي نَجَوْتُ منها كَفَافًا، لا لي ولَا عَلَيَّ
Similar User
@_public_void
@a7mad__n1
@0xUchihamrx
@0xRAYAN7
@ved4vyasan
@Error_foysal
@GodfatherOrwa
@_Zer0Sec_
@badcrack3r
@sl4x0
@_2os5
@Bug_X_hunter
@Br0k3n_1337
@3nc0d3dGuY
@RahmatQurishi
بمناسبة الاخت نضال دودة الكتب الشقية "طريقة قراءة الكتب هى التى تخرج العلماء و أنصاف العلماء و أشباه العلماء" -دكتور محمد أبو موسى
It is one of the best sites to improve your reverse engineering skills. Site Link: crackmes.one Reverse Engineering Toolkit: github.com/mohitmishra786…
From Code to Execution: The Journey of a C/C++ Program Compilation Mini-Book On ELF Executables: github.com/mohitmishra786… This flow illustrates the transformation of high-level language source code into an executable program, highlighting the roles of preprocessing, compilation,…
x64 Assembly & Shellcoding 101 : g3tsyst3m.github.io/shellcoding/as… Part 2 : g3tsyst3m.github.io/shellcoding/as… Part 3 : g3tsyst3m.github.io/shellcoding/as… Part 4 : g3tsyst3m.github.io/shellcoding/as… Part 5 : g3tsyst3m.github.io/shellcoding/as… credits @G3tSyst3m
Exploit Development (Format Strings Series 1 - 6 which covers : Intro & dumping sensitive data Redirecting code flow More control over the writing process Rewriting the GOT table Memory leak + ASLR bypass x86 exploitation : youtube.com/playlist?list=… credits @0x4ndr3
Linux (x86) Exploit Development Series : sploitfun.wordpress.com/2015/06/26/lin… A-1 ) Classic Stack Based Buffer Overflow : sploitfun.wordpress.com/2015/05/08/cla… A-2 ) Integer Overflow : sploitfun.wordpress.com/2015/06/23/int… A-3 ) Off-By-One Vulnerability (Stack Based) : sploitfun.wordpress.com/2015/06/07/off…
Introduction to x64 Linux Binary Exploitation (Part 1) : valsamaras.medium.com/introduction-t… Part 2—return into libc: valsamaras.medium.com/introduction-t… Part 3 - RoP Chains: valsamaras.medium.com/introduction-t… Part 4 - Stack Canaries: valsamaras.medium.com/introduction-t… 5 - ASLR: valsamaras.medium.com/introduction-t… credits @Ch0pin
100 Days of Hacking! Day 40 #Special ⬇ ~# Exploit Development 🔥📢 - Learn Assembly Language asmtutor.com/#lesson1 - Lectures on Operating Systems cse.iitb.ac.in/~mythili/os - PWN college is organized as a set of modules covering different topics. Each module has a set of…
If you want to learn more about Binary Exploitation checkout these resources. guyinatuxedo.github.io secret.club opensecuritytraining.info/Exploits1.html exploit.education/protostar/ ropemporium.com youtube.com/playlist?list=… #bugbountytips #bugbounty #bugbountytip #redteam…
Introduction to x64 Linux Binary Exploitation (Part 1) valsamaras.medium.com/introduction-t…
Introduction to x64 Linux Binary Exploitation Author: Valsamaras Source: valsamaras.medium.com/introduction-t…
Just found the holy grail of binary exploitation and reverse engineering education. Fully browser-based and gamified, it's the best I've seen in my life. 🧵1/2👇Link
انا كنت معيدة و بدرس مادة الcompilers في قسم علوم حاسب كنا بندرس الBNF و lexical analysis و Javacc و اشياء من ضمنها الgarbage collection و الmemory handling و ازاي تعمل اي layer انت عايزها فوق الكود بتاعك. الاستفادة الاولى كانت و لازالت تبقى حاسس بحتة الحديد و البلاستيك دي…
straight to the point, no bullshit, low-level systems programming tutorials peak kino
A god tier introduction to reverse engineering and a breakdown of Portable Executable image file headers and sections! Read this entire thing right now! x86re . com
United States Trends
- 1. #UFC309 56,1 B posts
- 2. #MissUniverse 130 B posts
- 3. Brian Kelly 9.398 posts
- 4. Jim Miller 5.486 posts
- 5. Beck 14,9 B posts
- 6. #AEWCollision 11,2 B posts
- 7. Mizzou 6.850 posts
- 8. Feds 37,3 B posts
- 9. Nebraska 12,4 B posts
- 10. Romero 18,2 B posts
- 11. Onama 2.794 posts
- 12. Tennessee 40,3 B posts
- 13. Gators 11,4 B posts
- 14. Louisville 7.256 posts
- 15. Wisconsin 45 B posts
- 16. Dinamarca 9.082 posts
- 17. #LAMH 1.283 posts
- 18. #Svengoolie 2.176 posts
- 19. Dylan Sampson 1.572 posts
- 20. Locke 3.996 posts
Who to follow
-
Mohamed Fodil
@_public_void -
a7madn1
@a7mad__n1 -
Abdelrhman Amin🇵🇸
@0xUchihamrx -
0xRAYAN
@0xRAYAN7 -
Vedavyasan S
@ved4vyasan -
foysal_joy
@Error_foysal -
Godfather Orwa 🇯🇴
@GodfatherOrwa -
ℤ𝔼ℝ𝟘
@_Zer0Sec_ -
mhmd berro (badcracker)
@badcrack3r -
Abdelrhman Allam 🇵🇸
@sl4x0 -
Fares
@_2os5 -
Bug X Hunter 💻
@Bug_X_hunter -
Sourav Khan🇧🇩 🇵🇸
@Br0k3n_1337 -
encodedguy - jsmon.sh
@3nc0d3dGuY -
Rahmat Qurishi
@RahmatQurishi
Something went wrong.
Something went wrong.