A complete introduction to 0-day discovery for Windows targets, focusing on closed-source real-world software, including kernel modules and user code.
Who should take this course?
Anyone looking to get into Windows vulnerability research and fuzzing, although many of the concepts and...
About this course
This course builds upon my previous course, Hands-on Exploit Development on Udemy.
It will teach you advanced techniques of exploiting a buffer overflow vulnerability. Egg hunters, ASLR bypass, Stack Pivoting, Function Reuse, Manual encoding are some of the techniques...
What it does:
Fast directory/file brute forcing with wordlists.
Supports recursive scans and multi-threading.
Easy to script in automation & CI.
High-performance HTTP fuzzer for content discovery and endpoint fuzzing.
Link: https://3os.org/penetration-testing/cheatsheets/gobuster-cheatsheet/#dir-mode
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Link: https://otterhacker.github.io/Pentest/Tools/Wfuzz.html
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***