ctfnote.com
Search
⌃K
🧙♂
/home/ret2basic.eth
Auditing
Ethereum and Solidity
Secureum
The EVM Handbook
The MEV Handbook
The DeFi Handbook
PoC Writing
Research
ZK - Todo
ZK Math
ZK MOOC: An Auditor's Perspective
0xparc
Programming
Python
HTML, CSS, JavaScript, and React
Rust, Cairo, and Noir
C, C++, and C#
Cryptography
Hash Functions
MAC
AES
Diffie-Hellman
RSA
ECC
Digital Signature
JWT
PRNG
SSL/TLS
Research
Computer Science
Data Structures and Algorithms
The Linux Programming Interface
Computer Systems
Databases
Distributed Systems
Static Analysis
Red Teaming
Linux Command Line
Enumeration
Exploitation
Buffer Overflow
Privilege Escalation
Post Exploitation
🚇
Pivoting
🪟
Active Directory (AD)
🦹♂
Command & Control (C2)
🧛♂
Malware Development
Web
Background Knowledge
File Upload
SQL Injection (SQLi)
Cross-Site Scripting (XSS)
CSRF and SSRF
XML External Entities (XXE)
Insecure Deserialization
HTTP Request Smuggling
Other Attacks
Bug Bounty Report Writing
Pwn
Linux Exploitation
Windows Exploitation
Classic
SEH
Egghunting
Unicode
Shellcoding
ROP
Appendix: Tools
Fuzzing
Reverse
Bytecode
angr
Powered By GitBook

Windows Exploitation

Plan:
  • Classic
  • SEH
  • Egghunting
  • Unicode
  • Shellcoding
  • ROP
  • Appendix: Tools
    • ImmunityDbg
    • Mona.py
Previous
OneGadget
Next
Classic
Last modified 11mo ago
Copy link