Categories

There are currently no items in your shopping cart.

User Panel

Forgot your password?.

Reverse Engineering and Exploit Development

Video Introducing this tutorial

Getting Started :
Important - Download These First - Working Files
Introduction To Reversing
About The Author
Ethical Considerations
Reversing Tools - Part 1
Reversing Tools - Part 2
Reversing Tools - Part 3
Reversing Tools - Part 4
Reversing Tools - Part 5
Reversing Tools - Part 6
How To Access Your Working Files


Reversing Compiled Windows Applications :
Vulnerabilities - Part 1
Vulnerabilities - Part 2
Vulnerabilities - Part 3
Using Fuzzing - Part 1
Using Fuzzing - Part 2
Using Fuzzing - Part 3
Using Fuzzing - Part 4
Just Enough Assembly - Part 1
Just Enough Assembly - Part 2
Just Enough Assembly - Part 3
Stack Overflows - Part 1
Stack Overflows - Part 2
Stack Overflows - Part 3
Heap Overflows - Part 1
Heap Overflows - Part 2
Heap Overflows - Part 3
Heap Overflows - Part 4
Format String Bugs - Part 1
Format String Bugs - Part 2
Format String Bugs - Part 3
Format String Bugs - Part 4
Section Overflows
Windows Kernel Flaws
Decompilers
Automation - Part 1
Automation - Part 2


Reversing Compiled OS X Applications :
Where Are The Vulnerabilities?
Locating Stack Overflows
Heap Overflows


Reversing Compiled Linux Applications :
Where Are The Vulnerabilities?
Linux Stack Overflows - Part 1
Linux Stack Overflows - Part 2
Linux Stack Overflows - Part 3
Linux Stack Overflows - Part 4
Linux Stack Overflows - Part 5
Linux Heap Overflows - Part 1
Linux Heap Overflows - Part 2
Linux Heap Overflows - Part 3
Linux Heap Overflows - Part 4
Linux Kernel Flaws - Part 1
Linux Kernel Flaws - Part 2


Reversing Android Applications :
Introduction To Android And ARM
Android Applications


Finding Other Vulnerabilities :
Web Site Vulnerabilities
Database Vulnerabilities


Simple Exploits :
Going From Vulnerability To Exploit
A Simple Exploit Script
Creating A Metasploit Module For An Exploit - Part 1
Creating A Metasploit Module For An Exploit - Part 2
Creating A Metasploit Module For An Exploit - Part 3


Exploit Payloads :
Shellcode - Part 1
Shellcode - Part 2
Shellcode - Part 3
Shellcode - Part 4


Making Exploits Harder To Detect :
Encoding Shellcode - Part 1
Encoding Shellcode - Part 2


Web Exploitation :
Web Exploits In Metasploit


ARM Exploitation :
Android Exploits In Metasploit


Future Directions :
Wrap Up And Suggestions For Further Study