This is a sticky post. Below you can find links to all of my write-ups.
Return Oriented Programming Series
- Introduction
- Setup
- CTF and Wargames
- Real-World Exploits
Web Exploitation
Binary Exploitation
- Narnia – Over The Wire
- Behemoth – Over the Wire
- Microcorruption
- Toddler’s Bottle – Pwnable.kr
- Rookiss – Pwnable.kr
- Pwnable.tw
Reverse Engineering
- Reversing.kr
- Reverse Engineering Firmware: Linksys WRT1900AC
- Softbank Pepper: A short robot overview
Capture the Flags
General Network Exploitation
Offensive Security Certified Professional (OSCP) Journey
- OSCP: Preparation for the OSCP & My Experience So Far
- OSCP: 80% Done with the PWK Course
- OSCP: Done with the course, Unto the Labs
- OSCP: Nine Days In, 21 Machines Rooted
- OSCP: Officially OSCP Certified
Programs:
- Tuoni Web Attacking Program
- Cryptan Cryptography Suite
- PreEx Intelligence Gathering Program
- CVE_Compare Windows Vulnerability Scanning Tool
I will keep updating this post, adding more links as I add more write-ups.