Download link
File List
-
01 Getting Started/001 Important - Download These First - Working Files.html 373 B
01 Getting Started/002 Introduction To Reversing.mp4 6.51 MB
01 Getting Started/003 About The Author.mp4 4.73 MB
01 Getting Started/004 Ethical Considerations.mp4 2.84 MB
01 Getting Started/005 Reversing Tools - Part 1.mp4 14.83 MB
01 Getting Started/006 Reversing Tools - Part 2.mp4 18.4 MB
01 Getting Started/007 Reversing Tools - Part 3.mp4 14.84 MB
01 Getting Started/008 Reversing Tools - Part 4.mp4 11.73 MB
01 Getting Started/009 Reversing Tools - Part 5.mp4 14.69 MB
01 Getting Started/010 Reversing Tools - Part 6.mp4 13.59 MB
01 Getting Started/011 How To Access Your Working Files.mp4 14.7 MB
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files.zip 49.78 KB
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 1/No Work Files.rtf 346 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 10/No Work Files.rtf 346 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 11/No Work Files.rtf 346 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 12/No Work Files.rtf 346 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/BufferOverflow.exe 15.18 KB
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/check.sh 216 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/format-string.zip 5.02 KB
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/formatstring.c 258 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/fuzz.pl 421 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/fuzz.py 602 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/heap-overflows.zip 14.58 KB
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/heapbufferoverflow.c 212 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/stack-buffer-overflows.zip 5.25 KB
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/stackbufferoverflow.c 290 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 3/mac-heap.c 1016 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 3/mac-stack.c 157 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 4/linux-heap-not-vuln.c 169 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 4/linux-heap.c 335 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 4/linux-stack-fptr.c 365 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 4/linux-stack.c 210 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 4/simple.asm 753 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 4/simple32.asm 747 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 5/No Work Files.rtf 346 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 6/No Work Files.rtf 346 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 7/vulnserver.rb 2.02 KB
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 8/shellcode.zip 2.71 KB
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 9/enc.sh 398 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 9/sc.sh 512 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Working Files - README.txt 256 B
02 Reversing Compiled Windows Applications/012 Vulnerabilities - Part 1.mp4 9.04 MB
02 Reversing Compiled Windows Applications/013 Vulnerabilities - Part 2.mp4 9.39 MB
02 Reversing Compiled Windows Applications/014 Vulnerabilities - Part 3.mp4 8.11 MB
02 Reversing Compiled Windows Applications/015 Using Fuzzing - Part 1.mp4 11.84 MB
02 Reversing Compiled Windows Applications/016 Using Fuzzing - Part 2.mp4 9.15 MB
02 Reversing Compiled Windows Applications/017 Using Fuzzing - Part 3.mp4 75.39 MB
02 Reversing Compiled Windows Applications/018 Using Fuzzing - Part 4.mp4 15.24 MB
02 Reversing Compiled Windows Applications/019 Just Enough Assembly - Part 1.mp4 21.42 MB
02 Reversing Compiled Windows Applications/020 Just Enough Assembly - Part 2.mp4 32.32 MB
02 Reversing Compiled Windows Applications/021 Just Enough Assembly - Part 3.mp4 19.27 MB
02 Reversing Compiled Windows Applications/022 Stack Overflows - Part 1.mp4 6.17 MB
02 Reversing Compiled Windows Applications/023 Stack Overflows - Part 2.mp4 9.06 MB
02 Reversing Compiled Windows Applications/024 Stack Overflows - Part 3.mp4 33.81 MB
02 Reversing Compiled Windows Applications/025 Heap Overflows - Part 1.mp4 6.9 MB
02 Reversing Compiled Windows Applications/026 Heap Overflows - Part 2.mp4 31.58 MB
02 Reversing Compiled Windows Applications/027 Heap Overflows - Part 3.mp4 6.94 MB
02 Reversing Compiled Windows Applications/028 Heap Overflows - Part 4.mp4 39.53 MB
02 Reversing Compiled Windows Applications/029 Format String Bugs - Part 1.mp4 16.1 MB
02 Reversing Compiled Windows Applications/030 Format String Bugs - Part 2.mp4 45.05 MB
02 Reversing Compiled Windows Applications/031 Format String Bugs - Part 3.mp4 48.46 MB
02 Reversing Compiled Windows Applications/032 Format String Bugs - Part 4.mp4 7.09 MB
02 Reversing Compiled Windows Applications/033 Section Overflows.mp4 36.15 MB
02 Reversing Compiled Windows Applications/034 Windows Kernel Flaws.mp4 4.93 MB
02 Reversing Compiled Windows Applications/035 Decompilers.mp4 18 MB
02 Reversing Compiled Windows Applications/036 Automation - Part 1.mp4 12.26 MB
02 Reversing Compiled Windows Applications/037 Automation - Part 2.mp4 9.91 MB
03 Reversing Compiled OS X Applications/038 Where Are The Vulnerabilities.mp4 1.89 MB
03 Reversing Compiled OS X Applications/039 Locating Stack Overflows.mp4 3.6 MB
03 Reversing Compiled OS X Applications/040 Heap Overflows.mp4 14.83 MB
04 Reversing Compiled Linux Applications/041 Where Are The Vulnerabilities.mp4 4.61 MB
04 Reversing Compiled Linux Applications/042 Linux Stack Overflows - Part 1.mp4 6.58 MB
04 Reversing Compiled Linux Applications/043 Linux Stack Overflows - Part 2.mp4 21.3 MB
04 Reversing Compiled Linux Applications/044 Linux Stack Overflows - Part 3.mp4 26.79 MB
04 Reversing Compiled Linux Applications/045 Linux Stack Overflows - Part 4.mp4 27.54 MB
04 Reversing Compiled Linux Applications/046 Linux Stack Overflows - Part 5.mp4 25.83 MB
04 Reversing Compiled Linux Applications/047 Linux Heap Overflows - Part 1.mp4 27.57 MB
04 Reversing Compiled Linux Applications/048 Linux Heap Overflows - Part 2.mp4 25.53 MB
04 Reversing Compiled Linux Applications/049 Linux Heap Overflows - Part 3.mp4 35.49 MB
04 Reversing Compiled Linux Applications/050 Linux Heap Overflows - Part 4.mp4 25.31 MB
04 Reversing Compiled Linux Applications/051 Linux Kernel Flaws - Part 1.mp4 10.09 MB
04 Reversing Compiled Linux Applications/052 Linux Kernel Flaws - Part 2.mp4 5.1 MB
05 Reversing Android Applications/053 Introduction To Android And ARM.mp4 6.24 MB
05 Reversing Android Applications/054 Android Applications.mp4 8.33 MB
06 Finding Other Vulnerabilities/055 Web Site Vulnerabilities.mp4 7.65 MB
06 Finding Other Vulnerabilities/056 Database Vulnerabilities.mp4 13.46 MB
07 Simple Exploits/057 Going From Vulnerability To Exploit.mp4 6.97 MB
07 Simple Exploits/058 A Simple Exploit Script.mp4 21.71 MB
07 Simple Exploits/059 Creating A Metasploit Module For An Exploit - Part 1.mp4 13.25 MB
07 Simple Exploits/060 Creating A Metasploit Module For An Exploit - Part 2.mp4 18.36 MB
07 Simple Exploits/061 Creating A Metasploit Module For An Exploit - Part 3.mp4 27.46 MB
08 Exploit Payloads/062 Shellcode - Part 1.mp4 9.78 MB
08 Exploit Payloads/063 Shellcode - Part 2.mp4 10.83 MB
08 Exploit Payloads/064 Shellcode - Part 3.mp4 14.51 MB
08 Exploit Payloads/065 Shellcode - Part 4.mp4 12.26 MB
09 Making Exploits Harder To Detect/066 Encoding Shellcode - Part 1.mp4 16.35 MB
09 Making Exploits Harder To Detect/067 Encoding Shellcode - Part 2.mp4 18.28 MB
10 Web Exploitation/068 Web Exploits In Metasploit.mp4 16.75 MB
11 ARM Exploitation/069 Android Exploits In Metasploit.mp4 12.84 MB
12 Future Directions/070 Wrap Up And Suggestions For Further Study.mp4 6.09 MB
Download Info
-
Tips
“reverse-engineering-and-exploit-development” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.
-
DMCA Notice and Takedown Procedure
If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.