1 2 3 4
Thread Rating:
  • 1 Vote(s) - 4 Average
  • 1
  • 2
  • 3
  • 4
  • 5
10983Reverse Engineering and Exploit Development
STAFF TEAM
#1
[InfiniteSkiils] Reverse Engineering and Exploit Development (video course)

was (not accessible anymore) -> www.infiniteskills.com/training/reverse-engineering-and-exploit-development.htm

In this project-based Reverse Engineering and Exploit Development video tutorial series, you'll quickly have relevant skills for real-world applications.

A quick grasp of even the most complex Reverse Engineering and Exploit Development subjects because they're broken into simple, easy to follow tutorial videos

Practical working files further enhance the learning process and provide a degree of retention that is unmatched by any other form of Reverse Engineering and Exploit Development tutorial, online or offline... so you'll know the exact steps for your own projects.


Content ->

01. Getting Started

Introduction To Reversing

About The Author

Ethical Considerations

Reversing Tools - Part 1

Reversing Tools - Part 2

Reversing Tools - Part 3

Reversing Tools - Part 4

Reversing Tools - Part 5

Reversing Tools - Part 6

0110 How To Access Your Working Files

02. Reversing Compiled Windows Applications

0201 Vulnerabilities - Part 1

0202 Vulnerabilities - Part 2

0203 Vulnerabilities - Part 3

0204 Using Fuzzing - Part 1

0205 Using Fuzzing - Part 2

0206 Using Fuzzing - Part 3

0207 Using Fuzzing - Part 4

0208 Just Enough Assembly - Part 1

0209 Just Enough Assembly - Part 2

0210 Just Enough Assembly - Part 3

0211 Stack Overflows - Part 1

0212 Stack Overflows - Part 2

0213 Stack Overflows - Part 3

0214 Heap Overflows - Part 1

0215 Heap Overflows - Part 2

0216 Heap Overflows - Part 3

0217 Heap Overflows - Part 4

0218 Format String Bugs - Part 1

0219 Format String Bugs - Part 2

0220 Format String Bugs - Part 3

0221 Format String Bugs - Part 4

0222 Section Overflows

0223 Windows Kernel Flaws

0224 Decompilers

0225 Automation - Part 1

0226 Automation - Part 2

03. Reversing Compiled OS X Applications

0301 Where Are The Vulnerabilities?

0302 Locating Stack Overflows

0303 Heap Overflows

04. Reversing Compiled Linux Applications

0401 Where Are The Vulnerabilities?

0402 Linux Stack Overflows - Part 1

0403 Linux Stack Overflows - Part 2

0404 Linux Stack Overflows - Part 3

0405 Linux Stack Overflows - Part 4

0406 Linux Stack Overflows - Part 5

0407 Linux Heap Overflows - Part 1

0408 Linux Heap Overflows - Part 2

0409 Linux Heap Overflows - Part 3

0410 Linux Heap Overflows - Part 4

0411 Linux Kernel Flaws - Part 1

0412 Linux Kernel Flaws - Part 2

05. Reversing Android Applications

0501 Introduction To Android And ARM

0502 Android Applications

06. Finding Other Vulnerabilities

0601 Web Site Vulnerabilities

0602 Database Vulnerabilities

07. Simple Exploits

0701 Going From Vulnerability To Exploit

0702 A Simple Exploit Script

0703 Creating A Metasploit Module For An Exploit - Part 1

0704 Creating A Metasploit Module For An Exploit - Part 2

0705 Creating A Metasploit Module For An Exploit - Part 3

08. Exploit Payloads

0801 Shellcode - Part 1

0802 Shellcode - Part 2

0803 Shellcode - Part 3

0804 Shellcode - Part 4

09. Making Exploits Harder To Detect

0901 Encoding Shellcode - Part 1

0902 Encoding Shellcode - Part 2

10. Web Exploitation

1001 Web Exploits In Metasploit

11. ARM Exploitation

1101 Android Exploits In Metasploit

12. Future Directions

1201 Wrap Up And Suggestions For Further Study


Download Link :
Hidden Content
You must register or login to view this content.
[-] The following 4 users Like Lucifer's post:
  • blackzorks, BTC, n4m3k, wardward
STAFF TEAM
#2
hmm right
Reply
STAFF TEAM
#3
i am starting to figure a lil out*
Reply
STAFF TEAM
#4
I wana Learn
Reply
STAFF TEAM
#5
nice good course
Reply
STAFF TEAM
#6
thanks dude you are the best
Reply
STAFF TEAM
#7
Cchhjnn h bbbh
Reply
STAFF TEAM
#8
I want to learn more. Thank.
Reply
STAFF TEAM
#9
So Cool thanks!!!
Reply
STAFF TEAM
#10
weoww ????????
Reply
1 2 3 4

Reply to this thread