ctfnote.com
House of WrituepCryptoBook
Search…
/home/ret2basic
Programming
Python
JavaScript
C
C++
C#
Java
PHP
MySQL
Red Teaming
Linux Command Line
Enumeration
Exploitation
Buffer Overflow
Privilege Escalation
Post Exploitation
Active Directory (AD)
Pivoting
Command & Control (C2)
Offensive C#
Malware Development
AV Evasion
C2 Development
Game Hacking
Cube 2: sauerbraten
Web
Frameworks
File Upload
SQL Injection (SQLi)
Cross-Site Scripting (XSS)
CSRF and SSRF
XML External Entities (XXE)
Insecure Deserialization
HTTP Request Smuggling
Other Attacks
Bug Bounty Report Writing
Crypto
Hash Functions
MAC
AES
Diffie-Hellman
RSA
ECC
Digital Signature
JWT
PRNG
SSL/TLS
Research
Computer Science
Algorithms
The Linux Programming Interface
Computer Systems
Distributed Systems
Practical Packet Analysis
Static Analysis
Pwn
Linux Exploitation
Windows Exploitation
Classic
SEH
Egghunting
Unicode
Shellcoding
ROP
Appendix: Tools
Fuzzing
Reverse
Bytecode
angr
Misc
Forensics
Steganography
Powered By GitBook
Windows Exploitation
Plan:
  • Classic
  • SEH
  • Egghunting
  • Unicode
  • Shellcoding
  • ROP
  • Appendix: Tools
    • ImmunityDbg
    • Mona.py
Previous
OneGadget
Next
Classic
Last modified 4mo ago
Copy link