- https://github.com/1u4nx/Exploit-Exercises-Nebula
- c内存管理:http://www.inf.udec.cl/~leo/teoX.pdf
- 用Windbg和Python进行堆跟踪:http://www.freebuf.com/articles/system/103816.html
- Python和cdb结合案例(Python编写调试器):http://www.freebuf.com/sectool/89001.html
- 绕过security cookie的栈利用:https://www.zerodayinitiative.com/blog/2017/8/9/the-blue-frost-security-challenge-an-exploitation-journey-for-fun-and-free-drinks
- https://www.zerodayinitiative.com/blog/2017/8/1/pythonizing-the-vmware-backdoor
- Debugee in QEMU:http://bobao.360.cn/learning/detail/4265.html
- Digtool: A Virtualization-Based Framework for Detecting Kernel Vulnerabilities:https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-pan.pdf:结合虚拟化技术实现客户机系统调用/线程调度/内存访问监控,可以发现Unprobe/OOB/UAF/TOCTTOU漏洞。
- Qemu安全分析,360 in hitb:https://gsec.hitb.org/materials/sg2017/D1%20-%20Ashley%20Shen%20and%20Moonbeom%20Park%20-%20A%20Deep%20Dive%20into%20the%20Digital%20Weapons%20of%20the%20North%20Korean%20Cyber%20Army.pdf
- https://comsecuris.com/blog/posts/vmware_vgpu_shader_vulnerabilities/
工具
https://www.ctftools.com/down/
Fuzzing Apache httpd server with American Fuzzy Lop + persistent mode
https://sensepost.com/blog/2017/fuzzing-apache-httpd-server-with-american-fuzzy-lop-+-persistent-mode/
vulscan - Vulnerability Scanning with Nmap:https://github.com/scipag/vulscan
Bytecode Viewer - A Java 8 Jar & Android Apk Reverse Engineering Suite (Decompiler, Editor, Debugger & More):http://www.kitploit.com/2017/08/bytecode-viewer-java-8-jar-android-apk.html?m=1
MTuner is a C/C++ memory profiler and memory leak finder for Windows:https://github.com/milostosic/MTuner
【推荐】还在用 ECharts 开发大屏?试试这款永久免费的开源 BI 工具!
【推荐】国内首个AI IDE,深度理解中文开发场景,立即下载体验Trae
【推荐】编程新体验,更懂你的AI,立即体验豆包MarsCode编程助手
【推荐】轻量又高性能的 SSH 工具 IShell:AI 加持,快人一步