Reverse Engineering and Exploit Development
by Thurisaz97 - 13-11-25, 04:44 AM
#1
Hello guys,

This is Reverse Engineering and Exploit Development Udemy Course
Sharing this because other thread's link is dead.



Content:
Code:
Name                        
----                        
/01 Getting Started/001 Important - Download These First - Working Files.html              
/01 Getting Started/002 Introduction To Reversing.mp4                   
/01 Getting Started/003 About The Author.mp4                   
/01 Getting Started/004 Ethical Considerations.mp4                    
/01 Getting Started/005 Reversing Tools - Part 1.mp4                 
/01 Getting Started/006 Reversing Tools - Part 2.mp4                 
/01 Getting Started/007 Reversing Tools - Part 3.mp4                 
/01 Getting Started/008 Reversing Tools - Part 4.mp4                 
/01 Getting Started/009 Reversing Tools - Part 5.mp4                 
/01 Getting Started/010 Reversing Tools - Part 6.mp4                 
/01 Getting Started/011 How To Access Your Working Files.mp4                
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files.zip              
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 1/No Work Files.rtf    
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 10/No Work Files.rtf    
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 11/No Work Files.rtf    
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 12/No Work Files.rtf    
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/BufferOverflow.exe      
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/check.sh      
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/format-string.zip      
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/formatstring.c      
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/fuzz.pl      
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/fuzz.py      
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/heap-overflows.zip      
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/heapbufferoverflow.c      
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/stack-buffer-overflows.zip      
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/stackbufferoverflow.c      
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 3/mac-heap.c      
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 3/mac-stack.c      
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 4/linux-heap-not-vuln.c      
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 4/linux-heap.c      
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 4/linux-stack-fptr.c      
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 4/linux-stack.c      
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 4/simple.asm      
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 4/simple32.asm      
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 5/No Work Files.rtf    
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 6/No Work Files.rtf    
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 7/vulnserver.rb      
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 8/shellcode.zip      
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 9/enc.sh      
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 9/sc.sh      
/01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Working Files - README.txt    
/02 Reversing Compiled Windows Applications/012 Vulnerabilities - Part 1.mp4                
/02 Reversing Compiled Windows Applications/013 Vulnerabilities - Part 2.mp4                
/02 Reversing Compiled Windows Applications/014 Vulnerabilities - Part 3.mp4                
/02 Reversing Compiled Windows Applications/015 Using Fuzzing - Part 1.mp4               
/02 Reversing Compiled Windows Applications/016 Using Fuzzing - Part 2.mp4               
/02 Reversing Compiled Windows Applications/017 Using Fuzzing - Part 3.mp4               
/02 Reversing Compiled Windows Applications/018 Using Fuzzing - Part 4.mp4               
/02 Reversing Compiled Windows Applications/019 Just Enough Assembly - Part 1.mp4              
/02 Reversing Compiled Windows Applications/020 Just Enough Assembly - Part 2.mp4              
/02 Reversing Compiled Windows Applications/021 Just Enough Assembly - Part 3.mp4              
/02 Reversing Compiled Windows Applications/022 Stack Overflows - Part 1.mp4               
/02 Reversing Compiled Windows Applications/023 Stack Overflows - Part 2.mp4               
/02 Reversing Compiled Windows Applications/024 Stack Overflows - Part 3.mp4               
/02 Reversing Compiled Windows Applications/025 Heap Overflows - Part 1.mp4               
/02 Reversing Compiled Windows Applications/026 Heap Overflows - Part 2.mp4               
/02 Reversing Compiled Windows Applications/027 Heap Overflows - Part 3.mp4               
/02 Reversing Compiled Windows Applications/028 Heap Overflows - Part 4.mp4               
/02 Reversing Compiled Windows Applications/029 Format String Bugs - Part 1.mp4              
/02 Reversing Compiled Windows Applications/030 Format String Bugs - Part 2.mp4              
/02 Reversing Compiled Windows Applications/031 Format String Bugs - Part 3.mp4              
/02 Reversing Compiled Windows Applications/032 Format String Bugs - Part 4.mp4              
/02 Reversing Compiled Windows Applications/033 Section Overflows.mp4                  
/02 Reversing Compiled Windows Applications/034 Windows Kernel Flaws.mp4                 
/02 Reversing Compiled Windows Applications/035 Decompilers.mp4                   
/02 Reversing Compiled Windows Applications/036 Automation - Part 1.mp4                
/02 Reversing Compiled Windows Applications/037 Automation - Part 2.mp4                
/03 Reversing Compiled OS X Applications/038 Where Are The Vulnerabilities.mp4               
/03 Reversing Compiled OS X Applications/039 Locating Stack Overflows.mp4                
/03 Reversing Compiled OS X Applications/040 Heap Overflows.mp4                 
/04 Reversing Compiled Linux Applications/041 Where Are The Vulnerabilities.mp4                
/04 Reversing Compiled Linux Applications/042 Linux Stack Overflows - Part 1.mp4              
/04 Reversing Compiled Linux Applications/043 Linux Stack Overflows - Part 2.mp4              
/04 Reversing Compiled Linux Applications/044 Linux Stack Overflows - Part 3.mp4              
/04 Reversing Compiled Linux Applications/045 Linux Stack Overflows - Part 4.mp4              
/04 Reversing Compiled Linux Applications/046 Linux Stack Overflows - Part 5.mp4              
/04 Reversing Compiled Linux Applications/047 Linux Heap Overflows - Part 1.mp4              
/04 Reversing Compiled Linux Applications/048 Linux Heap Overflows - Part 2.mp4              
/04 Reversing Compiled Linux Applications/049 Linux Heap Overflows - Part 3.mp4              
/04 Reversing Compiled Linux Applications/050 Linux Heap Overflows - Part 4.mp4              
/04 Reversing Compiled Linux Applications/051 Linux Kernel Flaws - Part 1.mp4              
/04 Reversing Compiled Linux Applications/052 Linux Kernel Flaws - Part 2.mp4              
/05 Reversing Android Applications/053 Introduction To Android And ARM.mp4                
/05 Reversing Android Applications/054 Android Applications.mp4                   
/06 Finding Other Vulnerabilities/055 Web Site Vulnerabilities.mp4                  
/06 Finding Other Vulnerabilities/056 Database Vulnerabilities.mp4                   
/07 Simple Exploits/057 Going From Vulnerability To Exploit.mp4                 
/07 Simple Exploits/058 A Simple Exploit Script.mp4                  
/07 Simple Exploits/059 Creating A Metasploit Module For An Exploit - Part 1.mp4            
/07 Simple Exploits/060 Creating A Metasploit Module For An Exploit - Part 2.mp4            
/07 Simple Exploits/061 Creating A Metasploit Module For An Exploit - Part 3.mp4            
/08 Exploit Payloads/062 Shellcode - Part 1.mp4                  
/08 Exploit Payloads/063 Shellcode - Part 2.mp4                  
/08 Exploit Payloads/064 Shellcode - Part 3.mp4                  
/08 Exploit Payloads/065 Shellcode - Part 4.mp4                  
/09 Making Exploits Harder To Detect/066 Encoding Shellcode - Part 1.mp4              
/09 Making Exploits Harder To Detect/067 Encoding Shellcode - Part 2.mp4              
/10 Web Exploitation/068 Web Exploits In Metasploit.mp4                  
/11 ARM Exploitation/069 Android Exploits In Metasploit.mp4                  
/12 Future Directions/070 Wrap Up And Suggestions For Further Study.mp4               

Download Link:
https://mega.nz/file/fQU0RRqB#399C_EMbC68fMh84srVtONhGduTd-P081TDCTgJmdIk

356ae52c5c560f72c0e1ce5b817796955ca73b77a486fc865a4223ed112d30c1(SHA256)  Reverse_engineering_and_exploit_development.zip


Hope you find it useful :)
Reply


Forum Jump:


 Users browsing this thread: 1 Guest(s)