Concept & Theory
- Steganography Least Significant Bit
- International Morse Translator
- Stack Canaries
- Shellcode database
- De Bruijn Sequence For Padding Finding
- Malicious Input How Hackers Use Shellcode
- Caesar cipher
- Loop According to ECX Counter
- Verify Email Address
- Find the Person Behind an Email
- How To Find More IDORs
- Linux Privilege Escalation Checklist
- CTF PWN Tips
- CSE351 L15 Buffer Overflow
- Stack Frames: A Look From Inside
- Heap Overflow And Double-Free Attacks
- Exploiting The Heap
- how2heap
- libc database search
- Introduction to return oriented programming (ROP)
- SQL injection cheat sheet
- Introduction to exploiting Part 4 – ret2libc – Stack6 (Protostar)
- ROP - Leaking LIBC address
- PLT and GOT - the key to code sharing and dynamic libraries
- Server Side Request Forgery (SSRF)
- Hack Tricks
- Understanding Stack Based Buffer Overflow
- Heap Attacks
- Hijacking Library Functions and Injecting Code Using the Dynamic Linker
- Safe Linking
- Cryptography 101 RSA Algorithm
- Crack Randomness LCGS
- One Gadgets And Malloc Hook
- Basic ROP Techniques And Tricks
- Magic Hashes
- Exploiting Format String Vulnerabilities
- Using the CRT with RSA
- MD5 Collision Demo
- Elliptic Curve Cryptography(ECC)
- List of Known Mersenne Prime Numbers
Tools
- Skullsecurity Passwords
- Caesar cipher decryption tool
- Vigenère Cipher Codebreaker
- Steganography - A list of useful tools and resources
- Chepy module
- Online x86 / x64 Assembler and Disassembler
- SubtitutionBreaker
- Online subtitution solver
- Relocation Read-Only(RELRO)
- Linux Syscall Reference
- Understand The Heap By Breaking It
- JWT Debugger
- Angr
- Baksmali, Assembler/Disassembler For Android’s Java VM Implementation
- Z3 Prover
- hashcat, fast and advanced password recovery utility
- FactorDB
- Bacon’s Cipher Encoder/Decoder
- MD5 Reverse Website With Millions of Entries
- CyberChef
- Playfair Cipher Online Tool
- CryptoTools
- JWT RS256 To HS256
- Discrete logarithm calculator
- Online ECC calculator
- Online Java Compiler
Community
- Researcher Resources Bounty Bug Write Ups
- Researcher Resources - How to become a Bug Bounty Hunter
- Heap Overflow Write Up
- The Bug Hunber’s Methodology
- PlaidCTF 2021/Plaidflix/Writeup
- Twitter Secrets/Recover RSA Private Key/Writeup
- ICHSA CTF 2021 Epic Game Writeup
- RealworldCTF Cracking Chinese Proxy Writeup
- CCC2021 Sockcamp Writeup