Main page

 

OWASP Uncrackable

Android Level1
Android Level2
Android Level3

Mobile pentest

Certificate pinning
How to install Appmon and Frida
How to debug an iOS application with Appmon and Frida
Androguard usage

Offensive IoT Exploitation

Serial port of Netgear WNR1000 v4
Serial port of TP-Link WR841n v11
Backdooring a firmware
WPS on TP-Link WR841n v11
Format string exploits on ARM architecture
Examine mydlink web camera firmware with binwalk
Dynamic analysis of a mydlink web camera
Analysis of the Android app of the mylink web camera
Sniffing BLE traffic with Adafruit
Replay attack with HackRF
Determine JTAG pinout with Arduino
JTAG on MIPS Creator Ci40
Remote debugging with MIPS Creator Ci40

Fusion

Level00
Level01

Protostar

Stack0
Stack1
Stack2
Stack3
Stack4
Stack5
Stack6 – Duplicate shellcode
Stack6 – ret2libc
Stack7

Format0
Format1
Format2
Format3
Format4

Heap0
Heap1
Heap2
Heap3

Net0
Net1
Net2

Final0
Final1
Final2

Network

Subnetting and wildcard calculation quickly

Windows Shellcode

Windows Reverse Shell Shellcode I.

Exploit development

VulnServer – Fuzzing with Spike
VulnServer – TRUN command buffer overflow exploit
Vulnserver – GMON command SEH based overflow exploit
Vulnserver – HTER command buffer overflow exploit
Vulnserver – KSTET command exploit with egghunter
VulnServer – Fuzzing with Peach

SecurityTube Linux Assembly Expert 32-bit

Assignment #1 – Shell_Bind_TCP
Assignment #2 – Shell_Reverse_TCP
Assignment #3 – Egghunter
Assignment #4 – Custom encoder
Assignment #5 – Analysis of 3 Msfpayload
Assignment #6 – Polymorphic shellcodes
Assignment #7 – Custom crypter
Bonus1 – Download file shellcode