Hacknetics
search
⌘Ctrlk
Hacknetics
  • Hacknetics
  • Active Directory Management
  • Active Directory AD Attacks
  • buffer-overflows
  • c2-frameworks
  • covering-tracks
  • Data Exfiltration
  • Exploit Development
    • ROP Finding the vulnerable function
    • Useful Tools for Exploit Dev
    • ropeme
    • Obtaining MSFT Patches for Analysis
    • Mutiny Fuzzer
    • GDB
  • file-transfers
  • lateral-movement
  • lin-priv-esc
  • Things I have Pwn'd before
  • persistence
  • recon-enumeration
  • resources
  • shells
  • tool-guides
  • Web Path
  • Wifi/Bluetooth/ZigBee/SDR/SmartCards
  • Windows
  • firewalls
  • Malware Analysis
  • Infrastructure Development
  • EDR
  • Host Forensics
  • Cloud
  • OSINT
  • Phishing
  • Random
  • Linux
  • Windows Malware Development
  • Golang
  • Mikrotik
  • Firmware Reversing
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
githubEdit

Exploit Development

ROP Finding the vulnerable functionchevron-rightUseful Tools for Exploit Devchevron-rightropemechevron-rightObtaining MSFT Patches for Analysischevron-rightMutiny Fuzzerchevron-rightGDBchevron-right
PreviousData Exfiltrationchevron-leftNextROP Finding the vulnerable functionchevron-right