GreySec Forums

Full Version: Whitepapers: Exploits, Kernel exploitation and more... (Resources)
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Whitepapers: Exploits, Kernel exploitation and more... (Resources)

Credits: Rootkit and many other authors.
Resources curated from packetstormsecurity.

Whitepapers
Windows Kernel Exploitation Tutorial Part 8: Use After Free: https://packetstormsecurity.com/files/do...t8-uaf.pdf
Windows Kernel Exploitation Tutorial Part 7: Uninitialized Heap Variable: https://dl.packetstormsecurity.net/paper...riable.pdf
Kernel Exploitation 6: NULL pointer dereference: https://dl.packetstormsecurity.net/paper...erence.pdf
Zero Day Zen Garden: Windows Exploit Development-Part5 [Return Oriented Programming Chains]: https://dl.packetstormsecurity.net/paper...garden.pdf
Windows Kernel Exploitation Tutorial Part 5: NULL Pointer Dereference: https://dl.packetstormsecurity.net/paper...lpart5.pdf
Kernel Exploitation 5: Integer Overflow: https://dl.packetstormsecurity.net/paper...erflow.pdf
Kernel Exploitation 4: Stack Buffer Overflow (SMEP Bypass): https://dl.packetstormsecurity.net/paper...erflow.pdf
Deep Dive Into ROP Payload Analysis: https://packetstormsecurity.com/files/do...epdive.pdf
64 Bits Linux Stack Based Buffer Overflow: https://dl.packetstormsecurity.net/paper...erflow.pdf
Windows Heap Overflow Exploitation: https://dl.packetstormsecurity.net/paper...tation.pdf
Bypassing A Null Byte POP/POP/RET Sequence: https://packetstormsecurity.com/files/do...llbyte.pdf
Buffer Overflows, C Programming, And More: https://dl.packetstormsecurity.net/paper...d_more.pdf

More good info at:
https://rootkits.xyz/blog/
Corelan
packetstormsecurity
etc