# Pwn / Binary Exploitation

Learning Resources

<table><thead><tr><th>Name</th><th valign="middle">Link</th><th>Topic</th></tr></thead><tbody><tr><td>OpenSecurityTraining2</td><td valign="middle"><a href="https://p.ost2.fyi/courses/course-v1:OpenSecurityTraining2+Arch1001_x86-64_Asm+2021_v1/about">https://p.ost2.fyi/courses/course-v1:OpenSecurityTraining2+Arch1001_x86-64_Asm+2021_v1/about</a></td><td>Assembly (x86-64)</td></tr><tr><td>Azeria Labs</td><td valign="middle"><a href="https://azeria-labs.com/writing-arm-assembly-part-1/">https://azeria-labs.com/writing-arm-assembly-part-1/</a></td><td>Assembly (ARM)</td></tr><tr><td>LiveOverflow</td><td valign="middle"><a href="https://www.youtube.com/@LiveOverflow">https://www.youtube.com/@LiveOverflow</a></td><td>General</td></tr><tr><td>Nightmare</td><td valign="middle"><a href="https://guyinatuxedo.github.io/index.html">https://guyinatuxedo.github.io/index.html</a></td><td>General</td></tr><tr><td>pwn.college</td><td valign="middle"><a href="https://pwn.college/">https://pwn.college/</a></td><td>General</td></tr><tr><td>Modern Binary Exploitation - CSCI 4968</td><td valign="middle"><a href="https://github.com/RPISEC/MBE">https://github.com/RPISEC/MBE</a></td><td>General</td></tr><tr><td>ROP Emporium</td><td valign="middle"><a href="https://ropemporium.com/?ref=dayzerosec.com">https://ropemporium.com/?ref=dayzerosec.com</a></td><td>ROP</td></tr><tr><td>Shogun</td><td valign="middle"><a href="https://github.com/guyinatuxedo/Shogun">https://github.com/guyinatuxedo/Shogun</a></td><td>Heap Exploitation</td></tr><tr><td>Educational Heap Exploitation</td><td valign="middle"><a href="https://github.com/shellphish/how2heap">https://github.com/shellphish/how2heap</a></td><td>Heap Exploitation</td></tr><tr><td>Linux Kernel Exploitation</td><td valign="middle"><a href="https://github.com/xairy/linux-kernel-exploitation">https://github.com/xairy/linux-kernel-exploitation</a></td><td>Kernel Exploitation</td></tr><tr><td>Andrey Konovalov</td><td valign="middle"><a href="https://xairy.io/projects/">https://xairy.io/projects/</a></td><td>Kernel Exploitation</td></tr><tr><td>Pawnyable</td><td valign="middle"><a href="https://pawnyable.cafe/linux-kernel/index.html">https://pawnyable.cafe/linux-kernel/index.html</a></td><td>Kernel Exploitation</td></tr></tbody></table>

References / Tools

| Name                                | Link                                                                  | Topic                        |
| ----------------------------------- | --------------------------------------------------------------------- | ---------------------------- |
| Shellcodes database for study cases | <https://shell-storm.org/shellcode/index.html>                        | Shellcode                    |
| Linux System Call Table for x86 64  | <https://blog.rchapman.org/posts/Linux_System_Call_Table_for_x86_64/> | x86 64 bit Sysall Reference  |
| Linux Syscall Reference (32 bit)    | <https://syscalls32.paolostivanin.com/>                               | x86 32 bit Syscall Reference |
