diff --git a/README.md b/README.md index f932778..fb3c736 100644 --- a/README.md +++ b/README.md @@ -35,6 +35,31 @@ Read the full article here! http://www.pentest.guru/index.php/2016/01/28/best-bo * https://www.corelan.be/index.php/2009/08/12/exploit-writing-tutorials-part-4-from-exploit-to-metasploit-the-basics/ + + +Window exploit developnment + + +1.https://github.com/gungage53/windows-exploit-development +2.https://github.com/FULLSHADE/OSCE/blob/master/README.md +3.https://github.com/r3p3r/nixawk-awesome-windows-exploitation +4.https://github.com/castrated/Windows-Exploit-Development-practice +5.https://github.com/freddiebarrsmith/Advanced-Windows-Exploit-Development-Practice +6.https://github.com/mtomassoli/papers/blob/master/Modern%20Windows%20Exploit%20Development.pdf +7.https://github.com/naivenom/exploiting +8.https://github.com/WindowsExploits/Exploits +9.https://github.com/mgeeky/Exploit-Development-Tools +10.https://www.reddit.com/r/ExploitDev/comments/7zdrzc/exploit_development_learning_roadmap/ +11.https://blog.rapid7.com/2019/06/12/heap-overflow-exploitation-on-windows-10-explained/ -----> Heap Overflow +12.https://blog.rapid7.com/author/wei-chen/page/ +13.https://www.shogunlab.com/blog/ +14.https://github.com/takuzoo3868/ctf/blob/master/docs/DostoevskyLabs/chapter-6.md +15.https://www.corelan.be/index.php/articles/ +16.https://www.shogunlab.com/blog/2017/08/11/zdzg-windows-exploit-0.html +17.https://github.com/Billy-Ellis/Exploit-Challenges + + + * https://www.corelan.be/index.php/2009/09/05/exploit-writing-tutorial-part-5-how-debugger-modules-plugins-can-speed-up-basic-exploit-development/ * https://www.corelan.be/index.php/2009/09/21/exploit-writing-tutorial-part-6-bypassing-stack-cookies-safeseh-hw-dep-and-aslr/ @@ -174,4 +199,4 @@ Read the full article here! http://www.pentest.guru/index.php/2016/01/28/best-bo * http://iedb.ir -* http://www.macexploit.com \ No newline at end of file +* http://www.macexploit.com