Monday, November 14, 2011

Reversing, exploits, malware analysis and other stuff

A mix of everything

Sticky:
InfoSec  conferences calendar: http://www.google.com/calendar/embed?src=pe2ikdbe6b841od6e26ato0asc%40group.calendar.google.com

Crackmes
http://www.woodmann.com/RCE-CD-SITES/Quantico/crackme%27.htm
http://f0dder.reteam.org/crackmes.htm
http://www.reversing.be/index.php?topic=crackmes
https://malwarereversing.wordpress.com/2011/05/13/crackmes-de-mirror/
http://my.opera.com/taviso/blog/show.dml/241047
http://forum.cheatengine.org/viewforum.php?f=39
http://lkubaski.free.fr/reverse/reverse.html
CrackMe Practices: http://www.reteam.org/ID-RIP/crackmes.htm

Defcon mystery challenge
http://1o57.wikispaces.com/

Emulator
http://www.dosbox.com/download.php?main=1


Exploit dev
https://gdtr.wordpress.com
https://www.corelan.be/index.php/category/security/exploit-writing-tutorials/
http://lcamtuf.coredump.cx/cross_fuzz/
http://abazhanyuk.com/?p=220
http://www.vulnerability-lab.com/upcoming.php
http://www.exploit-db.com/
http://community.core-sdi.com/~gera/InsecureProgramming/
http://sickness.tor.hu/
Heap overflows for humans - https://net-ninja.net/blog/?p=674
http://auntitled.blogspot.com/2011/09/rop-with-common-functions-in.html
From 0x90 to 0x4c454554, a journey into exploitation. http://myne-us.blogspot.com/2010/08/from-0x90-to-0x4c454554-journey-into.html
metasploit exploit creation step by step: http://www.enclaveforensics.com/Blog/files/e6fb7327cb615688f90fc07656a3880d-28.html
A bug hunter's diary companion website: http://www.trapkit.de/books/bhd/en.html
ROP gadget search: http://ropshell.com/about
http://mcdermottcybersecurity.com/articles/x64-kernel-privilege-escalation

Hacking/wargames simulation
http://www.enigmagroup.org/
http://www.hellboundhackers.org/
http://www.hackthissite.org/
http://www.overthewire.org/wargames/
http://hackquest.com/
http://www.mod-x.co.uk/main.php
http://smashthestack.org/
http://intruded.net/ic/index.html#intro

malware analysis
http://zeltser.com/remnux/
http://mnin.blogspot.com/2011/06/examining-stuxnets-footprint-in-memory.html
https://noppa.aalto.fi/noppa/kurssi/t-110.6220/etusivu
https://code.google.com/p/malwarecookbook/
https://code.google.com/p/yara-project/
https://code.google.com/p/distorm/
http://moyix.blogspot.com/
http://hooked-on-mnemonics.blogspot.com/
malware analysis search: https://www.google.com/cse/home?cx=011750002002865445766:pc60zx1rliu
http://malc0de.com/database/
http://minotauranalysis.com/
http://zeltser.com/combating-malicious-software/index.html
http://mwanalysis.org/
https://www.norman.com/security_center/security_tools/
http://www.malwaredomainlist.com/mdl.php
http://interestingmalware.blogspot.com/
Anti rootkit: http://blogs.paretologic.com/malwarediaries/
http://blogs.paretologic.com/malwarediaries/
http://www.malwaretracker.com/index.php
http://www.novirusthanks.org/product/writeprocessmemory-monitor/

OllyDbg plugins
http://www.openrce.org/downloads/browse/OllyDbg_Plugins
http://tuts4you.com/download.php?list.9
http://reversengineering.wordpress.com/category/tools/ollys-plugins/

Reversing
http://www.ntcore.com/exsuite.php
http://www.woodmann.com/collaborative/tools/index.php/ImpREC
https://code.google.com/p/smiasm/
http://www.hiew.ru/
http://lcamtuf.coredump.cx/fenris/debug-tools.html
http://www.woodmann.com/forum/forum.php
http://www.binary-auditing.com/
http://reversemode.com/
http://www.openrce.org/
http://technologyinsanity.com/coding/welcome-to-reversing-preschool/
Lenas reversing for newbies: http://tuts4you.com/download.php?list.17
CrackZ's Reverse Engineering Page (1997-2010)- http://www.woodmann.com/crackz/
https://www.hacking-lab.com/caselist/7205-disassemble-net-clients-landing.html
https://malwarereversing.wordpress.com/
TiGa's Video Tutorial Series on IDA Pro: http://www.woodmann.com/TiGa/idaseries.html
http://windbg.info/doc/1-common-cmds.html
http://stacksmash.org/2009/06/gray-hat-python-by-justin-seitz-errata/#more-44
Android Reverse Engineering VM: http://www.honeynet.org/node/783
http://code.google.com/p/corkami/
ARTeam: http://www.accessroot.com/arteam/site/news.php
http://www.reteam.org
http://mukki.org/0day/zynamics-binnavi-v4-0-4-19-14393-incl-keyfilemaker-emb-140594

sysadmin stuff
http://www.freebsdonline.com/index.php
http://www.cyberciti.biz/tips/top-linux-monitoring-tools.html
http://linuxcommand.org/learning_the_shell.php
https://wiki.mozilla.org/WebAppSec/Secure_Coding_Guidelines
http://www.nsa.gov/ia/guidance/security_configuration_guides/
http://www.linuxfromscratch.org

Talks, cons and papers
https://spreadsheets.google.com/spreadsheet/ccc?key=0At1wE3TY3jzTdHpNZHg4T2p4elY3RHpTT25aSDlTT0E&hl=en_US#gid=0
http://it.toolbox.com/blogs/securitymonkey/defcon-19-presentations-pdf-downloads-47788
https://good.net/dl/k4r3lj/DEFCON19/
https://www.sans.org/reading_room/
Anti debugging: http://www.symantec.com/connect/articles/windows-anti-debug-reference
https://www.blackhat.com/html/bh-us-11/bh-us-11-archives.html
http://secdocs.lonerunners.net/
ftp://ftp.man.szczecin.pl/pub/security/info/textfiles/system-failure/

Other
http://gynvael.coldwind.pl/
http://www.shell-storm.org/papers/index.php?lg=english
http://esec-lab.sogeti.com/post/Analysis-of-the-jailbreakme-v3-font-exploit
http://www.rs-labs.com/papers/
http://sectooladdict.blogspot.com/2011/08/commercial-web-application-scanner.html
http://esploit.blogspot.com/
https://code.google.com/p/ospy/
http://ivanlef0u.fr/
https://code.google.com/p/wfuzz/
http://www.websecurify.com/overview
http://samy.pl/pwnat/
http://dean.edwards.name/packer/
http://zeltser.com/
PKZip Plaintext Attack Using Pkcrack (Step by Step): http://www.securiteam.com/tools/5NP0C009PU.html
Scripting: http://hyperpolyglot.org/scripting
ftp://ftp.halifax.rwth-aachen.de/
http://kssd.pediy.com/
http://opensecuritytraining.info/Training.html
http://www.cryptool-online.org/
http://www.myinfosecjob.com/
http://www.abysssec.com
http://vnhacker.blogspot.com/
http://stackoverflow.com/questions/2793150/how-to-use-java-net-urlconnection-to-fire-and-handle-http-requests
https://code.google.com/p/browsersec/wiki/Main
http://www.blackhatacademy.org/security101/index.php?title=Main_Page
http://www.the-playground.dk/
http://www.wilderssecurity.com/
http://rogunix.com/
http://bbs.pediy.com/
http://forum.exetools.com/index.php?s=c178bd8a551c0a54d482a3480645f04f
http://cryptoanarchist.nl/nt/
http://www.opensc.ws/forum.php




1 comment:


  1. Regarding hacking related issues; Contact WIZARDCYPRUSHACKER via:

    Email: WIZARDCYPRUSHACKER@GMAIL.COM Whatsapp: +1 (424) 209-7204

    For the following:

    Bitcoin hack & Recovery* Facebook hack* Snapchat hack* Instagram hack* Email accounts hack* Email interception hack* Grade Changes hack* Website crashed hack* Website and blogs hack* Cyber Tracking* Retrieval of deleted text messages* Word Press Blogs hack* Retrieval of lost file/documents* Erase criminal records hack* Databases hack* Sales of Dumps cards of all kinds* Untraceable Ip* Bank accounts hack* Individual computers hack* Websites hack* Control devices remotely hack* Burner Numbers hack* Verified Paypal Account* Erase leaked sex tape and lots more

    Do you want to hack into someone else's account or phone to monitor or track their calls and messages, why not get a professional hacker to help monitor, track and hack into their daily messages and activities.

    And if you are wondering how it’s will be done, why don't you leave that to us You just have to sit back and relax and within some hours, you will have full unnoticed access to the account you want to hack. Believe me.

    We come across what will answer millions of questions we have been asking ourselves all this while and once we have our questions answered, we are forever free.

    We have a 24-hour refund policy if you find the service unsatisfactory and you don't like what you see.

    Why don't you free your thoughts and clear your doubts today and get a professional hacker to help you with your hacks. Contact:

    EMAIL: WIZARDCYPRUSHACKER@GMAIL.COM Whatsapp: +1 (424) 209-7204

    ReplyDelete