All Things about Exploit Development
https://github.com/connormcgarr/Presentations
- STL CyberCon 2019 "Hands Up! This Is a ROPpery!: Introduction to Defeating DEP with ROP"
- BSides Dayton 2020 "From JMP ESP to CET: The Current State of Exploit Development"
- BSides Kansas City 2021 "Exploit Development is Dead, Long Live Exploit Development!"
https://github.com/connormcgarr/Kernel-Exploits
https://github.com/connormcgarr/Exploit-Development
https://connormcgarr.github.io/type-confusion-part-1/
https://connormcgarr.github.io/type-confusion-part-2/
connormcgarr.github.io
https://github.com/connormcgarr/An-Intro-2-Win-ED
An Introduction to Windows Exploit Development
An Introduction to Windows Exploit Development is a free course I created for the students of Southeast Missouri State University- based on my exploit development background. Feel free to use this lab manual and follow along. I hope this course inspires you to want to know more. It is all about knowledge sharing :)
Topics include (over the span of multiple lab manuals):
- Fuzzing (basic concepts)
- Instruction pointer overwrites
- Structured exception handler (SEH) bypasses
- Bypassing restrictive space
- Manual and alphanumeric shellcoding
- Bypassing ASLR and DEP
- Kernel mode exploitaiton
https://github.com/Jb05s/Exploit-Dev-C
https://github.com/Jb05s/Exploit-Dev
https://github.com/Jb05s/WindowsKernelProgramming
https://github.com/Jb05s/Exploit-Dev
https://github.com/connormcgarr/Shellcode
Various Shellcodes
x64_pebWalk.asm: Locates the PEB for the current process and walks it until a specified DLL (KERNEL32.DLL as a placeholder) is located