Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings

Some notes + exercises that I've done during my study for the Offensive Security Exploit Developer.

Notifications You must be signed in to change notification settings

mrtouch93/OSED-Notes

Open more actions menu

Repository files navigation

OSED Notes + Exercise

Containing some notes + exercises that I've done during my study for the Offensive Security Exploit Developer.

Every exercise has been done on Windows 10 x86.

Contents

Mona Cheat Sheets

  1. https://www.corelan.be/index.php/2011/07/14/mona-py-the-manual/
  2. https://www.slideshare.net/CeSeNA/mona-cheatsheet-8833245

WinDBG Cheat Sheets

  1. https://sites.google.com/site/taesaza0/etc/windbgcheatsheet?overridemobile=true
  2. https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/getting-started-with-windbg
  3. http://windbg.info/doc/1-common-cmds.html
  4. http://etutorials.org/Programming/programming+microsoft+visual+c+sharp+2005/Part+IV+Debugging/Chapter+13+Advanced+Debugging/WinDbg/
  5. https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/windows-debugging-exploiting-part-2-windbg-101/
  6. https://web.archive.org/web/20160506031348/https://mtaulty.com/2004/08/03/m_4656/

Additional Resources

  1. https://github.com/epi052/osed-scripts
  2. https://github.com/nop-tech/OSED
  3. https://github.com/sradley/osed
  4. https://github.com/ommadawn46/win-x86-shellcoder
  5. https://www.fuzzysecurity.com/tutorials.html (Windows Exploit Development Tutorial Series)
  6. https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/ (Follow every guides)
  7. https://www.shogunlab.com/blog/2017/08/11/zdzg-windows-exploit-0.html
  8. https://sec4us.com.br/cheatsheet/bufferoverflow-egghunting
  9. https://mikeczumak.com/blog/windows-exploit-development-part-1-basics/
  10. https://epi052.gitlab.io/notes-to-self/blog/2020-05-22-osce-exam-practice-part-seven/
  11. https://web.archive.org/web/20190218144432/https://vellosec.net/2018/08/carving-shellcode-using-restrictive-character-sets/

Additional Exercises

  1. https://github.com/Nero22k/Exploit_Development
  2. https://github.com/CyberSecurityUP/Buffer-Overflow-Labs
  3. https://www.purpl3f0xsecur1ty.tech/2021/05/26/trun_re.html
  4. https://github.com/anvbis/windows.x86.expl
  5. https://gitlab.csc.tntech.edu/CIG/CIG-Infrastructure/-/blob/script-fixes/ExploitDBApps/Windows.vuln.apps
  6. https://github.com/VoidSec/Exploit-Development/tree/master/windows/x86
  7. https://github.com/connormcgarr/Exploit-Development/
  8. https://github.com/xct/vulnbins
  9. https://github.com/bmdyy/signatus

About

Some notes + exercises that I've done during my study for the Offensive Security Exploit Developer.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

Morty Proxy This is a proxified and sanitized view of the page, visit original site.