NO-MERCY Posted March 12, 2014 Report Posted March 12, 2014 Hello RST ... This is New series of posts on Windows Exploit Development Written by: Mike Czumak Security Sift | Sifting through the world of Information Security, one bit at a timeSpecial Thanks Mike I Appreciate That Great Work Table of Contents : Windows Exploit Development – Part 1: The Basics Windows Exploit Development – Part 2: Intro to Stack Based Overflows Windows Exploit Development – Part 3: Changing Offset and Rebased Modules Windows Exploit Development – Part 4: Locating Shellcode with Jumps Windows Exploit Development – Part 5: Locating Shellcode with EgghuntingI'll Prepare it as PDF's (sooon Best RegradsNO-MERCY 1 Quote
neox Posted March 12, 2014 Report Posted March 12, 2014 yes best explained tutorial that I saw .Corelan and Security Sift are great Quote
NO-MERCY Posted March 13, 2014 Author Report Posted March 13, 2014 yes best explained tutorial that I saw .Corelan and Security Sift are great your Tutorials NEOX Its the best and iam at rst because that ...if you think about translate it in En after Finished it It will vs Corelan Tuts & all sites will talking about that i know it hard work & its take long time .. Appreciate Thatview Days ago im find Great Paper but in spainish about "Software Exploitation"I workining to translate it .. its realy good sorry 4 weak en "bad :(" Quote
neox Posted March 13, 2014 Report Posted March 13, 2014 is this "Software Exploitation" what you mean?http://www.exploit-db.com/wp-content/themes/exploit/docs/22740.pdf Quote
NO-MERCY Posted March 13, 2014 Author Report Posted March 13, 2014 is this "Software Exploitation" what you mean?http://www.exploit-db.com/wp-content/themes/exploit/docs/22740.pdfExactly .... Quote
NO-MERCY Posted April 1, 2014 Author Report Posted April 1, 2014 I'll Prepare it as PDF's (sooon Hello RST : Today i'm finished pdf's with new "part 6 : seh exploits" permission from author Mike CzumakMarch 16, 2014 at 11:00 pmSure, as long as you maintain original author attribution you’re welcome to make these pdfs. Thanks. – MikeWindows Exploit Development – Part 1: The BasicsMD5: 395261B0EDFA0FFE9CE9A9DE6BF683FFWindows Exploit Development – Part 2: Intro to Stack Based OverflowsMD5: AA492D49F1557DCCCE12BE20991044C4Windows Exploit Development – Part 3: Changing Offset and Rebased ModulesMD5: 545B999CB769FCA63827A2B0509D759EWindows Exploit Development – Part 4: Locating Shellcode with JumpsMD5: E2C5B9330A634464A0D2F42104787639Windows Exploit Development – Part 5: Locating Shellcode with EgghuntingMD5: B6CDF4BA11E5185CAF188FFDECD400F0Windows Exploit Development – Part 6: SEH ExploitsMD5: 62C712F00E601B38AA83394E5AC95DBENote : if you like any PART of tuts pls go to original links at first post and say thanks 4 mike he did agreat jobNext pdf's :Exploit Development - FuzzysecurityProject shellcode (AIO) Book The Grey Corner #------ Best Regrads ------##------ NO-MERCY ------# Quote
NO-MERCY Posted December 2, 2014 Author Report Posted December 2, 2014 Hello RST : pdf For Part 7 By : NO-MERCYWindows Exploit Development – Part 7: Unicode Buffer OverflowsPart7_ Unicode Buffer Overflows - Download - 4shared - NO-MERCY AT4RECRC32: 0E78627CMD5: 08AD6EB5017A2DE7F32AEB4920D32757SHA-1: DDFCBE534FBD1C3D59FF68EEDE75BABD3AB3311EBest Regards NO-MERCY 1 Quote
pslickz Posted December 8, 2014 Report Posted December 8, 2014 Hello,Please I need good exploit that is compatible with NetWire V1.5b, anyone can help?? Quote