ctfnote.com
House of Writuep
CryptoBook
Search…
/home/ret2basic
Pentest
Enumeration
Exploitation
Privilege Escalation (must read)
Active Directory (must read)
Pivoting
Password Cracking
Buffer Overflow
Report Writing
Web
OSWE Prerequisites
HTTP
Burp Suite
Information Gathering
OWASP Top 10
File Upload (must read)
SQL Injection (SQLi) (must read)
Cross-Site Scripting (XSS) (must read)
CSRF and SSRF
XML External Entities (XXE)
Insecure Deserialization
HTTP Request Smuggling
Other Attacks
Bug Bounty Report Writing
Crypto
Hash Functions
MAC
AES (must read)
Diffie-Hellman
RSA (must read)
ECC
Digital Signature
JWT (must read)
PRNG
SSL/TLS
Research (must read)
Computer Science
Python (must read)
The C Programming Language
Linux Command Line
Algorithms
The Linux Programming Interface
Computer Systems
Hexadecimal
Signedness
Registers
Instructions
Syscall
Process Memory
Stack Frame
Preemptive Multitasking
IPC
Threads
Distributed Systems
Practical Packet Analysis
Static Analysis
Pwn
Linux Exploitation
Windows Exploitation
Fuzzing
Reverse
Python Bytecode
angr Template
Misc
Forensics
Steganography
Powered By
GitBook
Computer Systems
TL;DR
Watch pwn.college lecture:
pwn.college
YouTube
pwn.college
Computer Architecture
Lecture
Computer Architecture lecture
Slides
Computer Architecture slides
Linux Process Loading
Lecture
Linux Process Loading lecture
Slides
Linux Process Loading slides
Linux Process Execution
Lecture
Linux Process Execution lecture
Slides
Linux Process Execution slides
Assembly
Lecture
Assembly lecture
Slides
Assembly slides
Binary Files
Lecture
Binary Files lecture
Slides
Binary Files slides
Previous
Sockets
Next
Hexadecimal
Last modified
1mo ago
Copy link
Contents
TL;DR
Computer Architecture
Lecture
Slides
Linux Process Loading
Lecture
Slides
Linux Process Execution
Lecture
Slides
Assembly
Lecture
Slides
Binary Files
Lecture
Slides