Mr.Łønewøłf‘s Hãckføliø
search
⌘Ctrlk
Mr.Łønewøłf‘s Hãckføliø
  • 🐺Mr.Lonewolf's Hackfolio 🧑🏻‍💻
  • 1. Recon
  • 2. Scanning
  • 3. Enumeration
  • 4. System Hacking
  • 5. Web Application VAPT
  • 6. Wireless Networks VAPT
  • 7. Mobile Application VAPT
  • 8. Reverse Engineering
    • 1. Binary Analysis on Linux
    • 2. Binary Analysis on a 64-bit Linux
    • 3. Binary Analysis Methodology
    • 4. Advanced Binary Analysis
    • 5. Buffer Overflow Attack on a 32-bit Machine
    • 6. Privilege Escalation via Buffer Overflow Attack
    • 7. Writing an Exploit Code on a 64-bit Machine
    • 8. ROP Fundamental Exploitation
    • 9. Exploiting Linux Kernel ROP and ROPgadget
    • 10. Reverse Engineering a Binary with Ghidra
    • 11. Reverse Engineering with Debuggers
    • 12. Fuzzing an Application with zzuf
    • 12. Identifying and Debugging Stack Buffer Overflows Using Address Sanitizer
    • 14. Fuzzing an Application with American Fuzzy Lop (AFL)
    • 15. Fuzzing an Application with American Fuzzy Lop (AFL) and Capstone Framework
    • 16. Additional Capabilities of Address Sanitizer
    • 17. Fuzzing an Application with Peach Framework
  • 9. Red Team
  • 10. Blue Team
  • 11. eCPPT
gitbookPowered by GitBook
block-quoteOn this pagechevron-down

8. Reverse Engineering

1. Binary Analysis on Linuxchevron-right2. Binary Analysis on a 64-bit Linuxchevron-right3. Binary Analysis Methodologychevron-right4. Advanced Binary Analysischevron-right5. Buffer Overflow Attack on a 32-bit Machinechevron-right6. Privilege Escalation via Buffer Overflow Attackchevron-right7. Writing an Exploit Code on a 64-bit Machinechevron-right8. ROP Fundamental Exploitationchevron-right9. Exploiting Linux Kernel ROP and ROPgadgetchevron-right10. Reverse Engineering a Binary with Ghidrachevron-right11. Reverse Engineering with Debuggerschevron-right12. Fuzzing an Application with zzufchevron-right12. Identifying and Debugging Stack Buffer Overflows Using Address Sanitizerchevron-right14. Fuzzing an Application with American Fuzzy Lop (AFL)chevron-right15. Fuzzing an Application with American Fuzzy Lop (AFL) and Capstone Frameworkchevron-right16. Additional Capabilities of Address Sanitizerchevron-right17. Fuzzing an Application with Peach Frameworkchevron-right
Previous2. Account Takeover IOSchevron-leftNext1. Binary Analysis on Linuxchevron-right