This page has been machine-translated from the original page.
This article is visible to authenticated users only due to security concerns.
Index
- Attack Technique
- Malware
- Reversing
- Environments
- WEB Application Exploits
- Windows Privilege Escalation
- Linux Privilege Escalation
- Database Privilege Escalation
- Internal writeup
- HEVD Note
Cheat Sheet
- CTF Cheat Sheet
- Pwn Cheat Sheet
- WinDbg Cheat Sheet
- Malware Analysis Cheat Sheet
- Malware Development Techniques
- Ghidra Script Cheat Sheet
- angr Cheat Sheet
Reversing
- WinDbg Cheat Sheet
- Tips to Know Before Analyzing PE Files
- Analyzing Windows Memory with Volatility3 and Identifying Command History from a WSL bash Process
- Binary Ninja Python API Cheat Sheet
- Ghidra Script Cheat Sheet
- angr Cheat Sheet
- Self-Restoring Binary Deobfuscation with Unicorn and Capstone
- Notes on GFlags Settings Useful for Troubleshooting Windows Environments
- Learning AES Implementation and Decrypting Ciphertext with a Custom SBox
- 5 Techniques I Learned to Not Lose on Android App Analysis Problems
- Android Native Library Function Analysis and RC4 / AES Decryption 【WMCTF 2023】
Pwn
- Getting Started with Linux Kernel Exploitation via sec4b-2023’s driver4b
- A Beginner CTFer’s Notes on Understanding Heap Completely
- A Beginner CTFer’s Pwn Crash Course 1 - FSB Basics and ROP Techniques
- A Beginner CTFer’s Pwn Crash Course 2 - seccomp Bypass and Shell Code Basics
Environments
Attack Technique
- CTF Cheat Sheet
- Machine Hacking Cheat Sheet
- Privilege Escalation in Active Directory Environments
- Exploits Useful for Attacking Windows Environments
- Commonly Used Linux Local Privilege Escalation Exploits
- Web Application Exploit Tips
- Metasploit Tips
Malware
- Malware Analysis Cheat Sheet
- Malware Implementation
- Common Techniques Used by Malware
- Malware Analysis Report List (2023)
WEB Application Exploits
Windows Privilege Escalation
- Exploits Useful for Attacking Windows Environments
- Knowledge on Windows Privileges That Can Be Abused for Attacks
- Gaining SYSTEM Privileges by Tampering with Service Configurations on Windows XP SP2 and Earlier
- Verification of Client-Side Attacks against Windows Endpoints
- Privilege Escalation Techniques Using Potato and PrintSpoofer
- Privilege Escalation Techniques via Primary Access Token Manipulation
- Windows Privilege Escalation via Named Pipe Impersonation
Linux Privilege Escalation
- Commonly Used Linux Local Privilege Escalation Exploits
- Linux Kernel < 4.13.9 (Ubuntu 16.04 / Fedora 27) - Local Privilege Escalation (CVE-2017-16995)
- CVE-2021-3156: Heap-Based Buffer Overflow in Sudo (Baron Samedit)