Penetration Testing Blog

Linux Binary Exploitation

BinExp: Linux Binary Exploitation

Linux Binary Exploitation Topics Lecture 1. Memory Layout of the C program. ELF binaries. Overview of the stack during the function call. Assembly code for the function call and return. The concept of $ebp and $esp. Executable...


backHack: perform Android app analysis

backHack a tool to perform Android app analysis by backing up and extracting apps, allowing you to analyze and modify file system contents for apps. Download git clone Changelog v3.1: Download APK from device...