小玄子 发表于 2024-5-1 11:37:21

二进制安全系列教程



课程目录:
├──0x01 经典栈溢出(上)
└──经典栈溢出(上).mp4 158.26M
├──0x02 经典栈溢出(下)
└──经典栈溢出(下).mp4 123.79M
├──0x03 经典栈溢出实例之EasyRM2MP3
└──经典栈溢出实例之EasyRM2MP3.mp4 190.30M
├──0x04 经典栈溢出实例之DNSTracer
└──经典栈溢出实例之DNSTracer.mp4 181.30M
├──0x05 探索stack cookie
└──探索stack cookie.mp4 78.60M
├──0x06 另辟蹊径之覆盖SEH
└──另辟蹊径之覆盖SEH.mp4 118.05M
├──0x07 一次失败的栈溢出(SEH)之GetGo Download Manager
└──一次失败的栈溢出(SEH)之GetGo Download Manager.mp4 75.85M
├──0x08 DEP与ASLR简述
└──DEP与ASLR简述.mp4 85.96M
├──0x09 Linux环境下的ROP(上)
└──Linux环境下的ROP(上).mp4 144.65M
├──0x0A Linux环境下的ROP(下)
└──Linux环境下的ROP(下).mp4 144.01M
├──0x0B Linux下ROP练习之r0pbaby
└──Linux下ROP练习之r0pbaby.mp4 109.20M
├──0x0C Windows环境下的ROP(上)
└──Windows环境下的ROP(上).mp4 169.42M
├──0x0D Windows环境下的ROP(下)
└──Windows环境下的ROP(下).mp4 151.40M
├──0x0E 探索上古Windows用户堆
└──探索上古Windows用户堆.mp4 191.84M
├──0x0F 【特别篇】Windows上古-近代堆详述
└──【特别篇】Windows上古-近代堆详述.mp4 210.56M
├──0x10 近代Windows用户堆的利用基础
└──近代Windows用户堆的利用基础.mp4 210.32M
├──0x11 【特别篇】深入理解LFH
└──【特别篇】深入理解LFH.mp4 230.58M
├──0x12 浅析Linux堆内存管理
└──浅析Linux堆内存管理.mp4 194.17M
├──slides
├──DEP & ASLR简述.pptx 1.84M
├──Linux环境下的ROP.pptx 2.78M
├──Windows环境下的ROP.pptx 1.12M
├──近代Windows用户堆的利用基础.pptx 1.01M
├──经典栈溢出.pptx 1.64M
├──另辟蹊径之覆盖SEH.pptx 1.01M
├──浅析Linux堆内存管理.pptx 1.61M
├──探索Stack Cookie.pptx 996.17kb
└──探索上古Windows用户堆.pptx 997.81kb
└──二进制安全(国外)
└──Binary_Hacking_Course
├──A simple Format String exploit example – bin 0x11-0WvrSfcdq1I.mkv 45.40M
├──Adapting the 32bit exploit to 64bit for format4 – bin 0x27-_lO_rwaK_pY.mkv 25.51M
├──Bruteforce 32bit Stack Cookie. stack0 – part 3 – bin 0x23-KGzHcqJV-QM.mkv 52.31M
├──Buffer Overflows can Redirect Program Execution – bin 0x0D-8QzOC8HfOqU.mkv 25.53M
├──Developing an intuition for binary exploitation – bin 0x20-akCce7vSSfw.mkv 22.59M
├──Doing ret2libc with a Buffer Overflow because of restricted return pointer – bin 0x0F-m17mV24TgwY.mkv 101.51M
├──Explaining Dirty COW local root exploit – CVE-2016-5195-kEsshExn7aE.mkv 46.09M
├──First Exploit! Buffer Overflow with Shellcode – bin 0x0E-HSlhY4Uy8SA.mkv 49.50M
├──First remote root exploit – bin 0x1D-HAN8Qun26cQ.mkv 32.94M
├──First Stack Buffer Overflow to modify Variable – bin 0x0C-T03idxny9jE.mkv 37.03M
├──Format String Exploit and overwrite the Global Offset Table – bin 0x13-t1LH9D5cuK4.mkv 39.60M
├──Global Offset Table (GOT) and Procedure Linkage Table (PLT) – bin 0x12-kUk5pw4w0h4.mkv 68.54M
├──How a CPU works and Introduction to Assembler – bin 0x04-6jSKldt7Eqs.mkv 72.90M
├──Introduction to Linux – Installation and the Terminal – bin 0x01-navuBR4aJSs.mkv 46.18M
├──Linux signals and core dumps – bin 0x1C-_shKdU7mGxs.mkv 42.39M
├──LiveOverflow Channel Introduction and Backstory – bin 0x00-iyAyN3GFM7A.mkv 27.54M
├──Playing around with a Format String vulnerability and ASLR. format0 – bin 0x24-CyazDp-Kkr0.mkv 86.84M
├──Remote format string exploit in syslog() – bin 0x1E-MBz5C9Wa6KM.mkv 75.34M
├──Reverse engineering C programs – bin 0x10-vXWHmucgZW0.mkv 53.65M
├──Reversing and Cracking first simple Program – bin 0x05-VroEiMOJPm8.mkv 98.56M
├──Simple Tools and Techniques for Reversing a binary – bin 0x06-3NTXFUxcKPc.mkv 61.86M
├──Smashing the Stack for Fun and Profit – setuid, ssh and exploit.education – bin 0x0B-Y-4WHf0of6Y.mkv 44.38M
├──Socket programming in python and Integer Overflow – bin 0x1B-d6BU8DWxb3c.mp4 47.54M
├──Stack grooming and 100% reliable exploit for format0 – bin 0x25-AahpiYxKR2c.mkv 26.13M
├──Syscalls, Kernel vs. User Mode and Linux Kernel Source Code – bin 0x09-fLS99zJDHOc.mkv 63.75M
├──TCP Protocol introduction – bin 0x1A-0EHo0HsTKJw.mkv 71.77M
├──The deal with numbers – hexadecimal, binary and decimals – bin 0x0A-mT1V7IL2FHY.mkv 32.37M
├──The Heap – dlmalloc unlink() exploit – bin 0x18-HWhzH–89UQ.mkv 35.64M
├──The Heap – How do use-after-free exploits work – bin 0x16-ZHghwsTRyzQ.mp4 48.57M
├──The Heap – How to exploit a Heap Overflow – bin 0x15-TfJrU95q1J4.mp4 75.50M
├──The Heap – Once upon a free() – bin 0x17-gL45bjQvZSU.mp4 96.48M
├──The Heap – what does malloc() do – bin 0x14-HPDBOhiKaD8.mkv 31.38M
├──Uncrackable Program Finding a Parser Differential in loading ELF – Part 2_2 – bin 0x08-OZvc-c1OLnM.mkv 34.86M
├──Uncrackable Programs Key validation with Algorithm and creating a Keygen – Part 1_2 – bin 0x07-qS4VWL5R_OM.mkv 37.82M
├──Writing a simple Program in C – bin 0x02-JGoUaCmMNpE.mkv 34.05M
└──Writing a simple Program in Python – bin 0x03-ajy1PHWYeyQ.mkv 37.66M


下载地址:
**** Hidden Message *****

xianyi 发表于 2024-5-1 12:44:30

啥也不说了,感谢楼主分享哇!

mythjinbo 发表于 2024-5-1 12:57:22

啥也不说了,感谢楼主分享哇!

asd 发表于 2024-5-1 13:17:45

回的人少,我来小顶一下

csa 发表于 2024-5-1 13:22:20

啥也不说了,感谢楼主分享哇!

3193305742 发表于 2024-5-1 15:23:53

啥也不说了,感谢楼主分享哇!

长风风 发表于 2024-5-1 16:44:50

确实是难得好帖啊,顶先

wu8726 发表于 2024-5-1 17:35:32

啥也不说了,感谢楼主分享哇!

kingdee 发表于 2024-5-1 19:16:05

啥也不说了,感谢楼主分享哇!

ljhljh 发表于 2024-5-1 19:46:06

啥也不说了,感谢楼主分享哇!
页: [1] 2 3
查看完整版本: 二进制安全系列教程