Public Resources

Top resources

00 - Defensive Security | Introduction M
4.75 star(s) 20 ratings
Updated
00 - OWASP_TOP10 | Introduction Ahmed.Attia
5.00 star(s) 12 ratings
Updated
00 - x86 Shellcoding | Introduction M
  • Featured
Quick tutorial on how to write shellcode for exploits
4.93 star(s) 29 ratings
Updated
01 - Defensive Security | Email Security Part 1 M
4.62 star(s) 13 ratings
Updated
01 - OWASP_TOP10 | Injection Part 1 Ahmed.Attia
5.00 star(s) 5 ratings
Updated
01 - x86 Shellcoding | Linux Shellcode Part 1 M
4.93 star(s) 15 ratings
Updated
02 - x86 Shellcoding | Linux Shellcode Part 2 M
5.00 star(s) 3 ratings
Updated
02- Defensive Security | Email Security Part 2 M
4.88 star(s) 8 ratings
Updated
03 - Defensive Security | Email Security Part 3 M
5.00 star(s) 10 ratings
Updated
04 - SEH Based Exploits M
  • Featured
Exploitation Using Exception Handlers
5.00 star(s) 3 ratings
Updated
05 - Egg Hunters M
5.00 star(s) 9 ratings
Updated
Arwin.exe M
Arwin.exe 2017-12-20
Windows tool to determine API memory addresses.
0.00 star(s) 0 ratings
Downloads
44
Updated
Brute Logic - XSS Cheat Sheet Nakerah-bot
5.00 star(s) 1 ratings
Downloads
59
Updated
Buffer Overflow 0x07 | Lab Files M
5.00 star(s) 6 ratings
Downloads
131
Updated
Corelan Cheat Sheet M
Corelan Cheat Sheet 2017-11-14
Exploit Development Cheat Sheet
5.00 star(s) 2 ratings
Downloads
35
Updated
Exploit Dev Cheat Sheet M
5.00 star(s) 5 ratings
Updated
5.00 star(s) 1 ratings
Downloads
42
Updated
Intel 64 and IA-32 Architectures Manual M
Intel 64 and IA-32 Architectures Software Developer’s Manual
4.33 star(s) 6 ratings
Downloads
54
Updated
Nakerah CTF 0x04 Write-up Younes.Hassanin
5.00 star(s) 7 ratings
Updated
Top