• InfoSecUberWiki
  • Introduction
  • Penetration Testing/Assessment Workflow
    • Reconnaissance
      • Passive/Semi-Passive Recon
        • Tools
        • Third Party Resources
          • Locate Target Range
          • Fingerprint Domain/Website
            • Extended Network Information
            • Metasploit Scanning
            • Shodan
            • Censys
            • Zoomeye
            • Netcraft
            • DNS Enumeration
          • Social Media
        • Command Line Recon
          • Network Information
          • Fingerprint Security Mechanisms
          • Metadata
            • CLI Tools
            • Tools
        • People Search
      • Active Recon
        • Command Line Recon
          • General Recon
          • Tools
            • Wi-Fi (WPS) Information Gathering
            • Automating Pentesting Tasks
            • Various Tools
          • Domain/Subdomain Enumeration
          • Nmap
          • Create Custom Wordlist
        • GUI
          • FOCA
          • Maltego
          • Dirbuster
        • Misc.
          • Sending Fake Emails
      • Google Searching/Dorking
        • Queries
      • Phishing
        • Frameworks
        • Initial Access Techniques
          • Malicious Office XLS Macros
          • Transform EXE -> PPT
          • Basic AUTH - HTML & Word
        • Tools - Internal Use
          • Credential Harvesting
    • Enumeration
      • Internal
        • Scanning
          • Map Internal Network
            • Command Line Tools
              • Linux Tools
            • SMB
              • SMBSpider
              • Authenticated SMB Sessions
            • User-Focused
              • Automato
        • Pivoting
          • Port Forwarding/Pivoting
          • SSH Proxy Tunneling
      • External
        • Scanning
          • Port Scanning/Banner Grabbing
          • SQL Vulnerability Scanning
        • Wireless
          • Client Sniffing
        • AWS
          • Fingerprinting
          • Dump Buckets
    • Exploitation
      • External
        • IPv6
          • Attack Toolkit
          • Attack Guide
        • Attack Windows
          • Full Guide
        • Attack Linux
          • Full Guide
        • Attack Web Applications/Technologies
          • Full Attack Frameworks/Scanners
            • Frameworks
          • Web Vulnerability Scanners
          • Attack CMS
            • Vulnerability Scanning
            • Wordpress
            • Joomla
          • HTTP/S
            • Steal Cookies
          • XSS
            • Generate XSS Payloads
            • XSS Scanner
            • XSS Plugin (Burp)
            • Bypass/Evasion Techniques
          • CSRF
            • Bypass CSRF Protections
          • Attack WAF
            • Frameworks/Guides
            • WAF Bypass
            • WAF Payloads
          • Attack BASIC Auth
            • Burp
            • Ncrack
          • Attack Crossdomain Policies
            • Attack Framework
            • Exploiting Crossdomain
          • Attack Web Vulnerabilities
            • Command Injection
            • Local File Inclusion (LFI)
            • Methodology/Guide
          • Attack Web Servers
            • Apache
              • Struts
            • Nginx
        • Attack OWA/Exchange
          • Malicious Outlook Rules
          • Abuse Exchange Services
          • Search Users Mailbox
        • Attack Routers
          • Frameworks
          • Using Burp
        • Attack Databases
          • Mongo
        • Attack RDP
          • MitM RDP
        • Attack AWS
          • Intro to AWS Security
          • Scanning
        • Attack Printers
          • Wiki
          • Framework
      • Internal
        • IPv6
          • Attack Toolkit
        • LAN Attacks
          • Attack Windows
            • Attack Frameworks
            • Attack Active Directory
            • Attack Kerberos
            • Attack Group Policy
            • Attack WSUS
            • Powershell Attacks
              • Frameworks
            • Scapy Attacks
            • Misc.
            • PsExec
          • Attack Linux/*NIX
            • AIX
          • Attack Databases
            • SQL
            • MSSQL
          • Attack Printers
            • Toolkit
          • Attack Protocols
            • NFS
            • RDP
          • Attack ICS
            • Framework
        • Privilege Escalation & Lateral Movement
          • Privilege Escalation
            • Windows
            • Linux/*NIX
          • Lateral Movement/Pivoting
        • MITM
          • Frameworks
          • Misc.
        • Bypass Security (AV/IDS/UAC)
          • AV
          • IDS/IPS
          • Application Whitelisting
          • UAC
          • Misc.
      • Physical
        • NFC
      • IoT
        • List of Hacks
      • Exploits
        • Finding Exploits - Web
        • Finding Exploits - Nmap/CLI
      • Wireless
        • Exploitation
          • Pentesting with Docker
          • WPA/2 Packet Injection
          • Cracking WPA/2
            • Crack PSK
        • MitM/Rogue AP/Router
          • Frameworks
            • Rogue Access Points
            • MitM
            • Phishing
        • Testing/Assessment Suites
      • Attack Cellular Networks
        • Toolkits
      • Command Shells
        • Reverse Shells
    • Post Exploitation
      • Attack Windows
        • Frameworks
        • Crack Passwords/Hashes
        • Steal Passwords/Hashes
        • Common Commands
      • Attack Linux/*NIX
        • Frameworks
        • Password Sniffing
      • Attack Software
        • Splunk
      • Exfiltration
        • Via DNS
        • Via RDP
      • Privilege Escalation
        • Windows
          • SMB
          • RDP
          • Manual Exploitation
        • Linux/*NIX
          • Exploits
          • Manual Exploitation
    • Password/Hash Cracking
      • Guides
      • Wordlists
      • Tools
      • Web Services
    • Learning Resources
      • OSCP
      • "Getting Started"
      • Blogs
      • Video Channels/Series
      • Hacking Labs/VMs
      • Free Courses
      • Fun Challenges
      • Fun Reading
      • Books
      • "How to" Guides
      • Various Cheat Sheets
    • Specific Topic Learning
      • Web Application Security/Vulnerabilities
        • XSS
        • SQLi
        • Deserialization
      • Incident Response
      • Scripting/Coding
        • Python
        • Powershell
        • tcpdump
      • Malware Analysis/RE
      • Exploit Development
      • Cryptography
      • YARA
    • Collections of Tools & Resources
      • Penetration Testing/Hacking Tools
    • CTF Tools & Resources
      • Guides
      • Practice
  • Red Teaming
    • Videos
    • Phases
    • Tips and Tricks
    • Guides
Powered by GitBook

Exploit Development

Resources - https://www.peerlyst.com/posts/the-best-resources-for-learning-exploit-development

Modern Binary Exploitation - https://github.com/RPISEC/MBE

Linux (x86) Exploit Development - https://sploitfun.wordpress.com/2015/06/26/linux-x86-exploit-development-tutorial-series/

results matching ""

    No results matching ""