13-11-25, 04:44 AM
Hello guys,
This is Reverse Engineering and Exploit Development Udemy Course
Sharing this because other thread's link is dead.
This is Reverse Engineering and Exploit Development Udemy Course
Sharing this because other thread's link is dead.
Content:
Code:
Name
----
/01 Getting Started/001 Important - Download These First - Working Files.html
/01 Getting Started/002 Introduction To Reversing.mp4
/01 Getting Started/003 About The Author.mp4
/01 Getting Started/004 Ethical Considerations.mp4
/01 Getting Started/005 Reversing Tools - Part 1.mp4
/01 Getting Started/006 Reversing Tools - Part 2.mp4
/01 Getting Started/007 Reversing Tools - Part 3.mp4
/01 Getting Started/008 Reversing Tools - Part 4.mp4
/01 Getting Started/009 Reversing Tools - Part 5.mp4
/01 Getting Started/010 Reversing Tools - Part 6.mp4
/01 Getting Started/011 How To Access Your Working Files.mp4
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files.zip
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 1/No Work Files.rtf
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 10/No Work Files.rtf
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 11/No Work Files.rtf
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 12/No Work Files.rtf
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/BufferOverflow.exe
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/check.sh
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/format-string.zip
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/formatstring.c
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/fuzz.pl
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/fuzz.py
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/heap-overflows.zip
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/heapbufferoverflow.c
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/stack-buffer-overflows.zip
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/stackbufferoverflow.c
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 3/mac-heap.c
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 3/mac-stack.c
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 4/linux-heap-not-vuln.c
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 4/linux-heap.c
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 4/linux-stack-fptr.c
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 4/linux-stack.c
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 4/simple.asm
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 4/simple32.asm
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 5/No Work Files.rtf
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 6/No Work Files.rtf
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 7/vulnserver.rb
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 8/shellcode.zip
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 9/enc.sh
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 9/sc.sh
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Working Files - README.txt
/02 Reversing Compiled Windows Applications/012 Vulnerabilities - Part 1.mp4
/02 Reversing Compiled Windows Applications/013 Vulnerabilities - Part 2.mp4
/02 Reversing Compiled Windows Applications/014 Vulnerabilities - Part 3.mp4
/02 Reversing Compiled Windows Applications/015 Using Fuzzing - Part 1.mp4
/02 Reversing Compiled Windows Applications/016 Using Fuzzing - Part 2.mp4
/02 Reversing Compiled Windows Applications/017 Using Fuzzing - Part 3.mp4
/02 Reversing Compiled Windows Applications/018 Using Fuzzing - Part 4.mp4
/02 Reversing Compiled Windows Applications/019 Just Enough Assembly - Part 1.mp4
/02 Reversing Compiled Windows Applications/020 Just Enough Assembly - Part 2.mp4
/02 Reversing Compiled Windows Applications/021 Just Enough Assembly - Part 3.mp4
/02 Reversing Compiled Windows Applications/022 Stack Overflows - Part 1.mp4
/02 Reversing Compiled Windows Applications/023 Stack Overflows - Part 2.mp4
/02 Reversing Compiled Windows Applications/024 Stack Overflows - Part 3.mp4
/02 Reversing Compiled Windows Applications/025 Heap Overflows - Part 1.mp4
/02 Reversing Compiled Windows Applications/026 Heap Overflows - Part 2.mp4
/02 Reversing Compiled Windows Applications/027 Heap Overflows - Part 3.mp4
/02 Reversing Compiled Windows Applications/028 Heap Overflows - Part 4.mp4
/02 Reversing Compiled Windows Applications/029 Format String Bugs - Part 1.mp4
/02 Reversing Compiled Windows Applications/030 Format String Bugs - Part 2.mp4
/02 Reversing Compiled Windows Applications/031 Format String Bugs - Part 3.mp4
/02 Reversing Compiled Windows Applications/032 Format String Bugs - Part 4.mp4
/02 Reversing Compiled Windows Applications/033 Section Overflows.mp4
/02 Reversing Compiled Windows Applications/034 Windows Kernel Flaws.mp4
/02 Reversing Compiled Windows Applications/035 Decompilers.mp4
/02 Reversing Compiled Windows Applications/036 Automation - Part 1.mp4
/02 Reversing Compiled Windows Applications/037 Automation - Part 2.mp4
/03 Reversing Compiled OS X Applications/038 Where Are The Vulnerabilities.mp4
/03 Reversing Compiled OS X Applications/039 Locating Stack Overflows.mp4
/03 Reversing Compiled OS X Applications/040 Heap Overflows.mp4
/04 Reversing Compiled Linux Applications/041 Where Are The Vulnerabilities.mp4
/04 Reversing Compiled Linux Applications/042 Linux Stack Overflows - Part 1.mp4
/04 Reversing Compiled Linux Applications/043 Linux Stack Overflows - Part 2.mp4
/04 Reversing Compiled Linux Applications/044 Linux Stack Overflows - Part 3.mp4
/04 Reversing Compiled Linux Applications/045 Linux Stack Overflows - Part 4.mp4
/04 Reversing Compiled Linux Applications/046 Linux Stack Overflows - Part 5.mp4
/04 Reversing Compiled Linux Applications/047 Linux Heap Overflows - Part 1.mp4
/04 Reversing Compiled Linux Applications/048 Linux Heap Overflows - Part 2.mp4
/04 Reversing Compiled Linux Applications/049 Linux Heap Overflows - Part 3.mp4
/04 Reversing Compiled Linux Applications/050 Linux Heap Overflows - Part 4.mp4
/04 Reversing Compiled Linux Applications/051 Linux Kernel Flaws - Part 1.mp4
/04 Reversing Compiled Linux Applications/052 Linux Kernel Flaws - Part 2.mp4
/05 Reversing Android Applications/053 Introduction To Android And ARM.mp4
/05 Reversing Android Applications/054 Android Applications.mp4
/06 Finding Other Vulnerabilities/055 Web Site Vulnerabilities.mp4
/06 Finding Other Vulnerabilities/056 Database Vulnerabilities.mp4
/07 Simple Exploits/057 Going From Vulnerability To Exploit.mp4
/07 Simple Exploits/058 A Simple Exploit Script.mp4
/07 Simple Exploits/059 Creating A Metasploit Module For An Exploit - Part 1.mp4
/07 Simple Exploits/060 Creating A Metasploit Module For An Exploit - Part 2.mp4
/07 Simple Exploits/061 Creating A Metasploit Module For An Exploit - Part 3.mp4
/08 Exploit Payloads/062 Shellcode - Part 1.mp4
/08 Exploit Payloads/063 Shellcode - Part 2.mp4
/08 Exploit Payloads/064 Shellcode - Part 3.mp4
/08 Exploit Payloads/065 Shellcode - Part 4.mp4
/09 Making Exploits Harder To Detect/066 Encoding Shellcode - Part 1.mp4
/09 Making Exploits Harder To Detect/067 Encoding Shellcode - Part 2.mp4
/10 Web Exploitation/068 Web Exploits In Metasploit.mp4
/11 ARM Exploitation/069 Android Exploits In Metasploit.mp4
/12 Future Directions/070 Wrap Up And Suggestions For Further Study.mp4 Download Link:
https://mega.nz/file/fQU0RRqB#399C_EMbC68fMh84srVtONhGduTd-P081TDCTgJmdIk
356ae52c5c560f72c0e1ce5b817796955ca73b77a486fc865a4223ed112d30c1(SHA256) Reverse_engineering_and_exploit_development.zip
Hope you find it useful :)
356ae52c5c560f72c0e1ce5b817796955ca73b77a486fc865a4223ed112d30c1(SHA256) Reverse_engineering_and_exploit_development.zip
Hope you find it useful :)
