πŸ“Œ
Pentest Notes
search
⌘Ctrlk
πŸ“Œ
Pentest Notes
  • NETWORK
    • Internal Networks
    • External Networks
    • Red Teaming
    • Wireless
    • Misc
  • Malware
    • Execution
    • Detection Avoidance
    • Other
  • Binary Exploitation
    • General
      • Methodology
      • Locating Bad Charecters
      • Useful Resources
    • SEH Overflow
    • Custom Shellcode
    • Reverse Engineering
    • Memory Protection
    • Format String Attacks
    • Example Exploits
    • Fuzzing
  • Mobile
    • Android
    • iOS
  • Game Hacking
    • Unity
    • Assembly Resources
    • Cheat Engine Tutorial
  • Misc
    • Windows Internals
    • Hardware
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Binary Exploitationchevron-right
  2. General

Useful Resources

hashtag
Locating and Exploiting Vulnerabilities

LogoStarting to Fuzz with WinAFLMediumchevron-right
LogoAll Your (d)Base Are Belong To Us, Part 1: Code Execution in Apache OpenOffice (CVE-2021–33035)Mediumchevron-right
LogoAll Your (d)Base Are Belong To Us, Part 2: Code Execution in Microsoft Office (CVE-2021–38646)Mediumchevron-right
PreviousLocating Bad Charecterschevron-leftNextSEH Overflowchevron-right

Last updated 4 years ago