Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Hands-on Fuzzing and Exploit Development (Advanced)

    Posted By: ELK1nG
    Hands-on Fuzzing and Exploit Development (Advanced)

    Hands-on Fuzzing and Exploit Development (Advanced)
    Genre: eLearning | MP4 | Video: h264, 1280x720 | Audio: aac, 44100 Hz
    Language: English | Size: 6.48 GB | Duration: 8h 38m hours

    Learn advanced techniques of creating exploits

    Learn advanced techniques of creating exploits

    What you'll learn
    Advanced techniques of creating exploits such as Egg Hunters, ASLR Bypass, Function reuse etc.
    Writing Unicode compatible exploits
    How to do long and short jumps in exploits
    How to do stack pivoting
    Fuzzing through Spike, Peach Fuzzer, FilFuzz and BooFuzz
    Creating Peach Pits, BooFuzz scripts and fuzzing scripts in Python
    How to tackle restrictive conditions such as limited buffer space or limited character set
    Create exploits from scratch for complicated file-formats such as ZIP
    Manually encoding shellcode

    Requirements
    Basic knowledge of x86 Assembly Language
    Basic knowledge of Kali Linux
    Basic knowledge of Python
    Basic knowledge of Metasploit
    Basic concepts of fuzzing
    Basic knowledge of Immunity Debugger
    Description
    Note: To know about offers on this course, check out our website yaksas-dot-io

    About this course

    This course builds upon my previous course, Hands-on Exploit Development on Udemy.

    It will teach you advanced techniques of exploiting a buffer overflow vulnerability. Egg hunters, ASLR bypass, Stack Pivoting, Function Reuse, Manual encoding are some of the techniques covered in this course.

    It follows the six stages of exploit development and gives a detailed walk-through of each. Each module starts by identifying the vulnerability via fuzzing. You'll learn, server fuzzing (using Spike) and file format fuzzing (using Peach Fuzzer). It then shows you how to create a PoC to trigger the vulnerability and convert that PoC into a working exploit.

    Through this course you will get introduced to various tools such as Immunity Debugger, Mona library for Immunity Debugger, Metasploit, msfvenom, Spike, Peach Fuzzer, BooFuzz and much more. This course is designed to be short and concise yet packed with practical knowledge.

    Each video includes learning resources (in video) and associated files (pdf slides, fuzzing scripts, peach pit python script etc.). You can just follow along and create a working exploit. It's that simple. Happy hacking!

    What our fellow students say about this course

    "I have been looking for resources to learn different techniques of exploit development. This course was a great find. It is very easy to follow along and understand the concepts." - Surbhi Goel

    "Great! More fuzzing tools are introduced." - Ying-Chen Chiou

    "pretty good basics,easy to follow buffer overflow" - Arun Mathew

    Who this course is for
    Students curious about building exploits
    Ethical Hackers
    Penetration Testers
    Cybersecurity Professionals
    People preparing for OSCP, OSCE etc.