CTP-OSCE:Web开发,后门PE,绕过AV,漏洞利用开发,网络攻击

时间:2024-05-03 20:46:08
【文件属性】:

文件名称:CTP-OSCE:Web开发,后门PE,绕过AV,漏洞利用开发,网络攻击

文件大小:541KB

文件格式:ZIP

更新时间:2024-05-03 20:46:08

Python

CTP-OSCE Web开发,后门PE,绕过AV,漏洞利用开发,网络攻击 我保证,一旦完成,这将被清除。


【文件预览】:
CTP-OSCE-master
----Shellcode-To-LittleEndian(117B)
----x86_short_jump_cheat_sheet.pdf(415KB)
----Fuzz()
--------Boo-Fuzz()
----msfvenom-cheatsheet(1KB)
----Hex-To-Raw-ONELINER(85B)
----seh-exploit-methods(252B)
----Jumping-to-Shellcode(5KB)
----Exploiting-Cisco-Routers()
--------SNMP-ConfigurationAttack-With-A-GRE-Tunnel(10KB)
--------MAC-Bypassing-ACL(2KB)
--------Part-1(9KB)
--------TCP Session Hijacking(4KB)
----Change-Offset-Rebased-Modules(2KB)
----x86()
--------Instructions, Mnemonics, Operands, Opcodes(1KB)
--------DataTypes(222B)
--------Windows-API-Index(73B)
--------SystemCallTable(44B)
--------simulator(302B)
----mona-cheat-sheet(3KB)
----Sub-Encoding(2KB)
----Shellcoding()
--------What-Is-A-Socket(599B)
--------Null-Free Byte Shellcode common instructions(1KB)
--------API-Refresher(2KB)
--------venetian shellcode(312B)
----obfuscating-NOPsled(342B)
----Zero-Out-EAX(143B)
----Jump-Back-512 Bytes(530B)
----Bypass-AntiVirus()
--------av-detection-techniques(95B)
--------Bypass-Kaspersky-2017-XOR-Stub(2KB)
--------Questions-To-Ask(1KB)
--------Methods(640B)
--------Tools(113B)
--------Problem-WaitForSingleObject(925B)
--------SLAE-Custom Encoder–7(3KB)
--------SimpleCustomEncoderDecoder(1KB)
--------Polymorphic-Shellcode(241B)
--------XOR-Math-XOR(914B)
--------XOR-Encoding-Double-CodeCave(1KB)
----Egghunter()
--------Win32-Egghunter(6KB)
--------Encoding-Egghunter-Using-MSF(368B)
--------Egghunter-AccessViolation(3KB)
----Offset-Reminder(298B)
----Tools(877B)
----2liner-badchars(45B)
----BufferRegister-Option-MSFvenom(874B)
----EIP-ESP-TooClose(664B)
----Worst-Case-Scenario(617B)
----SmallReverseShell(8KB)
----Metasploit-EXITFUNC(1KB)
----Transfer-Files-Using-RDesktop(261B)
----SLAE Assignment 3–Egg Hunter(3KB)
----ASLR()
--------Buffer-Overflow(3KB)
--------HowToBypass ASLR Corelean.be(3KB)
--------Backdoor-PE(413B)
----WaitForSingleObject-MSFVENOM(74B)
----README.md(146B)
----HTTP-Store-Shell-In-Different-Fields(964B)
----backdoorPE()
--------User-Interaction+Codecaves(2KB)
--------ASLR-Enabled Binaries(1KB)
--------Extreme-Backdoor-PE(4KB)
--------ALR-Bypass Backdoor PE(9KB)
--------Basic-New-Section-Method(3KB)
----WebExploitation()
--------LFI()
--------Xss-To-CSRF(3KB)
--------WordPress5.1-XSS+CSRF+RCE(5KB)
--------XSS-LFI(804B)
--------XSS to Cookie Stealing to RCE, Chart.png(86KB)
----socketReuse()
--------Socket-Reuse-Overview(493B)
--------recv(4KB)
----Useful-Links(2KB)

网友评论