Pentest guru Navigation
  • About me
  • Free Course
  • Tools
  • Security Advisories
  • Projects
  • Publications
  • Books
  • About me
  • Free Course
  • Tools
  • Security Advisories
  • Projects
  • Publications
  • Books
Home Pentest guru securitysift

Tag Archive

Below you'll find a list of all posts that have been tagged as “securitysift”

Best books, tutorials and courses to learn about exploit development

The best resources for learning exploit development Exploit development is considered to be the climax in the learning path of an ethical hacker or security professional. It is strongly advisable to have mastered the basics before delving into this topic. Exploit development is hard and it’s not something you learn at school or university (usually), not something any of your …

Read More

0dayASLRassemblybofbuffer overflowC/C++corelanCPUdebugDEPdisassembleregg hunteregg huntingEIPethical hackingexploitexploit developmentexploit-dbexploit-exercisesfusionhackingheapheap sprayIDA ProiedbImmunity Debuggermac exploitmalware analysisMassimiliano Tomassolimetasploitmilw00rmMona.pymsvcr71.dllnopOffensive SecurityoffsetOllyDBGopensecuritytrainingpacketstormsecuritypenetration testingPentestingprotostarPythonrace conditionRAMretreverse engineeringROPSafeSEHSamsclassSANSSEC 760securityfocussecuritysiftsecuritytubesegmentation faultSEHshellcodeshellcodingstacktoolsUdemyUnicodeWinDBGwindows exploitsx86/64

Newsletter

Recent Posts

  • Nebula level02 – exploit exercises walkthrough
  • Nebula level01 – exploit exercises walkthrough
  • Nebula level00 – exploit exercises walkthrough
  • WAS – Automatic USB drive malware scanning tool for the security-minded person
  • Penetration testing course: 0x02.4.1 What is the best programming language for hacking?

Recent Comments

  • Janith on Nebula level00 – exploit exercises walkthrough
  • Pawan kumar on Best books, tutorials and courses to learn about exploit development
  • Mustafiz on New book: Beginner’s Guide to Information Security: Kickstart your security career with insight from InfoSec experts
  • Fabio Baroni on ZoomEye : the CyberSpace search engine you never heard of
  • Fabio Baroni on Best books, tutorials and courses to learn about exploit development

Archives

  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • April 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015

Categories

  • bookmarks
  • books
  • conference
  • course
  • exploit development
  • exploit exercises
  • forensics
  • pentesting
  • prerequisites
  • tools
  • web app pentesting

Tags

Chinese command injection conference course CTF ethical hacking exploit exploit-exercises forensics hacking hacking tools hardware IDA Pro IDS Infosec Kali Linux malware analysis methodology nebula network networking network layer OWASP packet payload penetration tester penetration testing pentest.guru Pentesting prerequisites privilege escalation programming programming language Python reverse engineering script kiddie sectools security Shodan software Software Development Security tools web app web application wifi
  • Assign a Menu

POWERED BY THE X THEME

Toggle the Widgetbar