๐Ÿ“Œ
Pentest Notes
Ctrlk
  • NETWORK
    • Internal Networks
    • External Networks
    • Red Teaming
    • Wireless
    • Misc
  • Malware
    • Execution
    • Detection Avoidance
    • Other
  • Binary Exploitation
    • General
      • Methodology
      • Locating Bad Charecters
      • Useful Resources
    • SEH Overflow
    • Custom Shellcode
    • Reverse Engineering
    • Memory Protection
    • Format String Attacks
    • Example Exploits
    • Fuzzing
  • Mobile
    • Android
    • iOS
  • Game Hacking
    • Unity
    • Assembly Resources
    • Cheat Engine Tutorial
  • Misc
    • Windows Internals
    • Hardware
Powered by GitBook
On this page
  1. Binary Exploitation
  2. General

Useful Resources

Locating and Exploiting Vulnerabilities

LogoStarting to Fuzz with WinAFLMedium
LogoAll Your (d)Base Are Belong To Us, Part 1: Code Execution in Apache OpenOffice (CVE-2021โ€“33035)Medium
LogoAll Your (d)Base Are Belong To Us, Part 2: Code Execution in Microsoft Office (CVE-2021โ€“38646)Medium
PreviousLocating Bad CharectersNextSEH Overflow

Last updated 3 years ago

Was this helpful?

Was this helpful?