This repo is apart of the lessons of Rutgers Cyber Knights (R) . All challenges that are apart
of the first topic ( Binary Exploitation) will be uploaded here. This will cover Overflows, Shellcode, and much more.
#This Repo Contains
- [X] part 1 uploaded: Stack-based buffer overflow
- [X] part 2 uploaded: Heap-based buffer overflow and Integer overflow
- [X] part 3 uploaded: Introduction to Injecting Shellcode
- [X] part 4 uploaded: Constructing Shellcode: part1-assembly
- [ ] part 5 next-week: Constructing Shellcode: part2-shells
#Interesting Resources
- [Windows Exploits(we will cover these)](https://www.fuzzysecurity.com/)
- [InfoSec StackExchange(fantastic)](http://securiaty.stackexchange.com/)
- [Resource for all things Security: OWASP](https://www.owasp.org/index.php/Main_Page)
- [Signup for Security Videos by Rapid7](https://www.rapid7.com/)
- [Google stuff](https://www.google.com/)
#Interesting Programs
- [Javascript Zombie controller](https://github.com/oneTimePad/JSZombie)
- [BEEF](https://github.com/beefproject/beef)
- [Metasploit Project](https://github.com/rapid7/metasploit-framework)