FileMood

Download reverse-engineering-and-exploit-development

Reverse engineering and exploit development

Name

reverse-engineering-and-exploit-development

 DOWNLOAD Copy Link

Total Size

1.2 GB

Total Files

100

Last Seen

2024-11-17 23:38

Hash

6B7CD78E86B45FAFA6CB2FC49BB630A2C5E777D8

/01 Getting Started/

001 Important - Download These First - Working Files.html

0.4 KB

002 Introduction To Reversing.mp4

6.8 MB

003 About The Author.mp4

5.0 MB

004 Ethical Considerations.mp4

3.0 MB

005 Reversing Tools - Part 1.mp4

15.5 MB

006 Reversing Tools - Part 2.mp4

19.3 MB

007 Reversing Tools - Part 3.mp4

15.6 MB

008 Reversing Tools - Part 4.mp4

12.3 MB

009 Reversing Tools - Part 5.mp4

15.4 MB

010 Reversing Tools - Part 6.mp4

14.3 MB

011 How To Access Your Working Files.mp4

15.4 MB

/.../001 Important - Download These First - Working Files/

Reverse-Engineering-And-Exploit-Development-Working-Files.zip

51.0 KB

/.../Reverse Engineering and Exploit Development - Working Files/Chapter 1/

No Work Files.rtf

0.3 KB

/.../Reverse Engineering and Exploit Development - Working Files/Chapter 10/

No Work Files.rtf

0.3 KB

/.../Reverse Engineering and Exploit Development - Working Files/Chapter 11/

No Work Files.rtf

0.3 KB

/.../Reverse Engineering and Exploit Development - Working Files/Chapter 12/

No Work Files.rtf

0.3 KB

/.../Reverse Engineering and Exploit Development - Working Files/Chapter 2/

BufferOverflow.exe

15.5 KB

check.sh

0.2 KB

format-string.zip

5.1 KB

formatstring.c

0.3 KB

fuzz.pl

0.4 KB

fuzz.py

0.6 KB

heap-overflows.zip

14.9 KB

heapbufferoverflow.c

0.2 KB

stack-buffer-overflows.zip

5.4 KB

stackbufferoverflow.c

0.3 KB

/.../Reverse Engineering and Exploit Development - Working Files/Chapter 3/

mac-heap.c

1.0 KB

mac-stack.c

0.2 KB

/.../Reverse Engineering and Exploit Development - Working Files/Chapter 4/

linux-heap-not-vuln.c

0.2 KB

linux-heap.c

0.3 KB

linux-stack-fptr.c

0.4 KB

linux-stack.c

0.2 KB

simple.asm

0.8 KB

simple32.asm

0.7 KB

/.../Reverse Engineering and Exploit Development - Working Files/Chapter 5/

No Work Files.rtf

0.3 KB

/.../Reverse Engineering and Exploit Development - Working Files/Chapter 6/

No Work Files.rtf

0.3 KB

/.../Reverse Engineering and Exploit Development - Working Files/Chapter 7/

vulnserver.rb

2.1 KB

/.../Reverse Engineering and Exploit Development - Working Files/Chapter 8/

shellcode.zip

2.8 KB

/.../Reverse Engineering and Exploit Development - Working Files/Chapter 9/

enc.sh

0.4 KB

sc.sh

0.5 KB

/.../Reverse Engineering and Exploit Development - Working Files/

Working Files - README.txt

0.3 KB

/02 Reversing Compiled Windows Applications/

012 Vulnerabilities - Part 1.mp4

9.5 MB

013 Vulnerabilities - Part 2.mp4

9.8 MB

014 Vulnerabilities - Part 3.mp4

8.5 MB

015 Using Fuzzing - Part 1.mp4

12.4 MB

016 Using Fuzzing - Part 2.mp4

9.6 MB

017 Using Fuzzing - Part 3.mp4

79.1 MB

018 Using Fuzzing - Part 4.mp4

16.0 MB

019 Just Enough Assembly - Part 1.mp4

22.5 MB

020 Just Enough Assembly - Part 2.mp4

33.9 MB

021 Just Enough Assembly - Part 3.mp4

20.2 MB

022 Stack Overflows - Part 1.mp4

6.5 MB

023 Stack Overflows - Part 2.mp4

9.5 MB

024 Stack Overflows - Part 3.mp4

35.5 MB

025 Heap Overflows - Part 1.mp4

7.2 MB

026 Heap Overflows - Part 2.mp4

33.1 MB

027 Heap Overflows - Part 3.mp4

7.3 MB

028 Heap Overflows - Part 4.mp4

41.4 MB

029 Format String Bugs - Part 1.mp4

16.9 MB

030 Format String Bugs - Part 2.mp4

47.2 MB

031 Format String Bugs - Part 3.mp4

50.8 MB

032 Format String Bugs - Part 4.mp4

7.4 MB

033 Section Overflows.mp4

37.9 MB

034 Windows Kernel Flaws.mp4

5.2 MB

035 Decompilers.mp4

18.9 MB

036 Automation - Part 1.mp4

12.9 MB

037 Automation - Part 2.mp4

10.4 MB

/03 Reversing Compiled OS X Applications/

038 Where Are The Vulnerabilities.mp4

2.0 MB

039 Locating Stack Overflows.mp4

3.8 MB

040 Heap Overflows.mp4

15.5 MB

/04 Reversing Compiled Linux Applications/

041 Where Are The Vulnerabilities.mp4

4.8 MB

042 Linux Stack Overflows - Part 1.mp4

6.9 MB

043 Linux Stack Overflows - Part 2.mp4

22.3 MB

044 Linux Stack Overflows - Part 3.mp4

28.1 MB

045 Linux Stack Overflows - Part 4.mp4

28.9 MB

046 Linux Stack Overflows - Part 5.mp4

27.1 MB

047 Linux Heap Overflows - Part 1.mp4

28.9 MB

048 Linux Heap Overflows - Part 2.mp4

26.8 MB

049 Linux Heap Overflows - Part 3.mp4

37.2 MB

050 Linux Heap Overflows - Part 4.mp4

26.5 MB

051 Linux Kernel Flaws - Part 1.mp4

10.6 MB

052 Linux Kernel Flaws - Part 2.mp4

5.3 MB

/05 Reversing Android Applications/

053 Introduction To Android And ARM.mp4

6.5 MB

054 Android Applications.mp4

8.7 MB

/06 Finding Other Vulnerabilities/

055 Web Site Vulnerabilities.mp4

8.0 MB

056 Database Vulnerabilities.mp4

14.1 MB

/07 Simple Exploits/

057 Going From Vulnerability To Exploit.mp4

7.3 MB

058 A Simple Exploit Script.mp4

22.8 MB

059 Creating A Metasploit Module For An Exploit - Part 1.mp4

13.9 MB

060 Creating A Metasploit Module For An Exploit - Part 2.mp4

19.3 MB

061 Creating A Metasploit Module For An Exploit - Part 3.mp4

28.8 MB

/08 Exploit Payloads/

062 Shellcode - Part 1.mp4

10.3 MB

063 Shellcode - Part 2.mp4

11.4 MB

064 Shellcode - Part 3.mp4

15.2 MB

065 Shellcode - Part 4.mp4

12.9 MB

/09 Making Exploits Harder To Detect/

066 Encoding Shellcode - Part 1.mp4

17.1 MB

067 Encoding Shellcode - Part 2.mp4

19.2 MB

/10 Web Exploitation/

068 Web Exploits In Metasploit.mp4

17.6 MB

/11 ARM Exploitation/

069 Android Exploits In Metasploit.mp4

13.5 MB

/12 Future Directions/

070 Wrap Up And Suggestions For Further Study.mp4

6.4 MB

 

Total files 100


Copyright © 2024 FileMood.com