Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 01000011x10001000x000100000100x010000010010
- ShellScript
- https://www.shellscript.sh/
- Acl
- http://www.gsp.com/cgi-bin/mdroid.cgi?topic=extattrctl
- http://www.onlamp.com/pub/a/bsd/2003/08/14/freebsd_acls.html
- https://linux.die.net/man/1/setfacl
- https://www.bing.com/search?q=ACLs+with+Samba+andWindows&src=IE-TopResult&FORM=IETR02&conversationid=
- https://en.wikipedia.org/wiki/Chmod
- See references https://en.wikipedia.org/wiki/Access_control_list
- See see also https://en.wikipedia.org/wiki/Discretionary_access_control
- https://security.stackexchange.com/questions/63518/mac-vs-dac-vs-rbac
- Difference b/w mac and dac
- With MAC, admins creates a set of levels and each user is linked with a specific access level. He can access all the resources that are not greater than his access level. In contrast, each resource in DAC has a list of users who can access it. DAC provides access by identity of the user and not by permission level.
- Rbac
- Canaries
- http://antoniobarresi.com/security/exploitdev/2014/05/03/64bitexploitation/
- https://stackoverflow.com/questions/24465014/gcc-generate-canary-or-not
- Authentication and Access control in linux os
- (Awesome)https://courses.cs.washington.edu/courses/cse484/11au/sections/section6.pdf
- http://www.tenouk.com/linuxunixsecurityfeatures.html
- https://link.springer.com/chapter/10.1007/978-3-642-23312-8_28
- https://www.safaribooksonline.com/library/view/linux-server-hacks/0596100825/ch01.html
- (Awesome)https://pdfs.semanticscholar.org/presentation/89f5/513e99544345cd86dfd7ef8ab386459cdd25.pdf
- Book https://www.amazon.com/Foundations-Security-Every-Programmer-Experts/dp/1590597842
- College
- https://courses.cs.washington.edu/courses/cse484/17au/schedule.html
- https://courses.cs.washington.edu/courses/cse484/11au/sections/
- In above college in different year course is totally different.
- Buffer-overflow
- http://www.cse.scu.edu/~tschwarz/coen152_05/
- Howard and LeBlanc: Writing Secure Code, 2nd edition
- https://web.archive.org/web/20050325202927/http://www.nextgenss.com/papers/advanced_sql_injection.pdf
- Dangling pointer
- https://developers.slashdot.org/story/10/04/13/1951246/how-to-exploit-null-pointers
- https://security.stackexchange.com/questions/61948/how-do-i-make-a-working-example-of-a-dangling-pointers-exploit-or-where-do-i
- https://blogs.oracle.com/linux/much-ado-about-null%3a-exploiting-a-kernel-null-dereference-v2
- Causes of dangling pointer
- 1.when global variable points the some variable in function or local block.
- 2.initialize ptr=NULL immediate after block completion
- Solution:
- After deallocation of memory, immediate initialize pointer to NULL
- http://codingstreet.com/what-is-dangling-pointer/
- (Awesome)http://www.cs.virginia.edu/~ww6r/CS4630/syllabus.html
- linux filesystem
- http://www.tldp.org/LDP/intro-linux/html/index.html
- Format String
- http://www.cs.virginia.edu/~ww6r/CS4630/
- tocttou
- https://www.cl.cam.ac.uk/~rja14/Papers/SE-06.pdf
- https://www.bing.com/search?q=tocttou&src=IE-TopResult&FORM=IETR02&conversationid=
- https://github.com/tocttou
- http://users.cis.fiu.edu/~weijp/Jinpeng_Homepage_files/toctou-fast05.pdf
- https://www.usenix.org/sites/default/files/conference/protected-files/michele_woot12_slides.pdf
- http://www.sis.pitt.edu/jjoshi/courses/IS2620/Fall17/Lectures.html
- http://www.sis.pitt.edu/jjoshi/courses/IS2620/Fall17/Lecture6.pdf
- Ropfttw
- http://shell-storm.org/talks/ROP_course_lecture_jonathan_salwan_2014.pdf
- https://www.youtube.com/watch?v=5FJxC59hMRY
- https://drive.google.com/file/d/0B3U0fxyeeTTdcDJhbm5DcU1OQU0/view
- https://drive.google.com/file/d/0B3U0fxyeeTTdaGdQWGFvUFg5czQ/view
- https://en.wikipedia.org/wiki/Address_space_layout_randomization
- Bypassing sehop
- https://repo.zenk-security.com/Reversing%20.%20cracking/Bypassing%20SEHOP.pdf
- Heap_spray
- https://en.wikipedia.org/wiki/Heap_spraying
- (Awesome)http://security.cs.rpi.edu/courses/binexp-spring2015/
- Integer overflow
- https://phoenhex.re/2017-06-02/arrayspread
- X86-architecture
- https://stackoverflow.com/questions/18417849/difference-between-flat-memory-model-and-protected-memory-model
- https://en.wikipedia.org/wiki/Flat_memory_model
- Linux uses flat memory model.
- http://www.cs.virginia.edu/~evans/cs216/guides/x86.html
- https://gotocon.com/dl/goto-chicago-2014/slides/MattGodbolt_X86InternalsForFunAndProfit.pdf
- http://asmtutor.com/#lesson1
- https://software.intel.com/en-us/articles/intel-sdm
- https://stackoverflow.com/questions/1023593/how-to-write-hello-world-in-assembler-under-windows#answer-20032763
- https://software.intel.com/sites/default/files/m/d/4/1/d/8/Introduction_to_x64_Assembly.pdf
- https://aaronbloomfield.github.io/pdr/book/x86-64bit-asm-chapter.pdf
- http://aaronbloomfield.github.io/pdr/book/x86-64bit-ccc-chapter.pdf
- http://asmtutor.com/#lesson1
- https://www.informatik.htw-dresden.de/~beck/ASM/syscall_list.html
- https://web.archive.org/web/20041010205615/http://docs.cs.up.ac.za/programming/asm/derick_tut#syscalls
- https://www.informatik.htw-dresden.de/~beck/ASM/syscall_list.html
- https://stackoverflow.com/questions/9601427/is-inline-assembly-language-slower-than-native-c-code
- http://www.agner.org/optimize/
- Elf format(Executable and linkable format)
- https://www.linuxjournal.com/article/1060
- Calling convention
- https://en.wikipedia.org/wiki/Calling_convention
- https://stackoverflow.com/questions/41231637/how-does-a-function-call-work
- https://eli.thegreenplace.net/2011/02/04/where-the-top-of-the-stack-is-on-x86/
- https://en.wikipedia.org/wiki/Executable_and_Linkable_Format#Specifications
- http://www.agner.org/optimize/
- Kernel and boot processes
- http://duartes.org/gustavo/blog/post/
- http://www.tldp.org/LDP/intro-linux/html/index.html
- http://www.science.unitn.it/~fiorella/guidelinux/tlk/node5.html
- http://en.wikipedia.org/wiki/Reset_vector
- https://www.cs.cmu.edu/~410-s07/p4/p4-boot.pdf
- Tmap,smap,smep, virtualisation and hypervisor
- For smep http://j00ru.vexillium.org/?p=783
- For smap https://en.wikipedia.org/wiki/Supervisor_Mode_Access_Prevention
- For tpm https://en.wikipedia.org/wiki/Trusted_Platform_Module
- https://en.wikipedia.org/wiki/Address_space_layout_randomization
- Side channel attack
- https://en.wikipedia.org/wiki/Side-channel_attack
- https://www.peerlyst.com/posts/a-collection-of-links-to-pdfs-of-papers-on-micro-architectural-side-channel-attacks-sorted-by-date-paul-harvey
- Cache attack
- https://en.wikipedia.org/wiki/CPU_cache
- https://www.youtube.com/watch?v=vpGI1ggKzC4
- https://www.youtube.com/channel/UCG1HuJcwjA0Cp7a2-iGfWug
- http://palms.ee.princeton.edu/system/files/SP_vfinal.pdf
- https://github.com/defuse/flush-reload-attacks
- https://gruss.cc/files/cache_and_rowhammer_ruhrsec.pdf
- https://www.blackhat.com/docs/us-16/materials/us-16-Hornby-Side-Channel-Attacks-On-Everyday-Applications.pdf
- https://www.youtube.com/watch?v=DkWqLDSqHm8&list=PLH15HpR5qRsWx4qw9ZlgmisHOcKG4ZcRS&index=18
- http://web.cse.ohio-state.edu/~zhang.834/slides/tutorial17.pdf
- https://conference.hitb.org/hitbsecconf2016ams/materials/D2T1%20-%20Anders%20Fogh%20-%20Cache%20Side%20Channel%20Attacks.pdf
- http://www.cryptofails.com/post/70097430253/crypto-noobs-2-side-channel-attacks
- Timing attack
- https://www.youtube.com/watch?v=3v5Von-oNUg
- https://jochen-hoenicke.de/trezor-power-analysis/
- Acoustic attack
- https://www.cs.tau.ac.il/~tromer/acoustic/
- Search for lev pachnov
- Daniel gruss
- iaik graz university of technology
- https://www.youtube.com/user/BlackHatOfficialYT/playlists?disable_polymer=1
- https://rd.springer.com/chapter/10.1007/978-1-4419-1530-6_8
- https://www.usenix.org/node/184416
- https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-yarom.pdf
- https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-gruss.pdf
- https://www.blackhat.com/docs/us-16/materials/us-16-Hornby-Side-Channel-Attacks-On-Everyday-Applications.pdf
- https://www.cs.unc.edu/~reiter/papers/2014/CCS1.pdf
- https://github.com/IAIK/rowhammerjs
- https://www.blackhat.com/presentations/bh-usa-07/De_Haas/Presentation/bh-usa-07-de_haas.pdf
- https://en.wikipedia.org/wiki/Shared_memory
- Evict and time
- https://www.youtube.com/watch?v=ewe3-mUku94
- https://eprint.iacr.org/2005/271.pdf
- RowHammer
- https://www.blackhat.com/docs/us-15/materials/us-15-Seaborn-Exploiting-The-DRAM-Rowhammer-Bug-To-Gain-Kernel-Privileges-wp.pdf
- https://www.youtube.com/watch?v=1iBpLhFN_OA
- https://www.blackhat.com/docs/us-15/materials/us-15-Seaborn-Exploiting-The-DRAM-Rowhammer-Bug-To-Gain-Kernel-Privileges.pdf
- https://www.blackhat.com/docs/eu-16/materials/eu-16-Lipp-ARMageddon-How-Your-Smartphone-CPU-Breaks-Software-Level-Security-And-Privacy-wp.pdf
- (Awesome) https://www.vusec.net/projects/glitch/
- Rowhammer on Armageddon
- https://github.com/iaik/armageddon
- https://mlq.me/
- Moritz lipp
- AES
- http://www.moserware.com/2009/09/stick-figure-guide-to-advanced.html
- https://en.wikipedia.org/wiki/Rijndael_S-box
- https://shanetully.com/2012/06/openssl-rsa-aes-and-c/
- https://googleprojectzero.blogspot.co.uk/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
- Javascript Internals spidermonkey
- http://www.phrack.org/issues/69/14.html#article
- Computer organization
- http://pages.cs.wisc.edu/~arch/www/books.html
- https://www.quora.com/What-is-a-good-book-to-learn-computer-architecture
- http://williams.comp.ncat.edu/comp375/CacheSim.pdf
- (Awesome )http://www.cs.uni.edu/~diesburg/courses/cs3430_sp14/sessions/s14/s14_caching_and_tlbs.pdf
- (Awesome cache and tlb)http://inst.eecs.berkeley.edu/~cs162/sp11/sections/cs162-sp11-section6-answers.pdf
- https://www.quora.com/What-is-the-difference-between-TLB-and-MMU-in-OS
- http://www.agner.org/optimize/
- Hardware reverse engineering
- http://security.cs.rpi.edu/courses/hwre-spring2014/
- Malware analysis
- http://security.cs.rpi.edu/courses/malware-spring2013/
- Misc
- https://medium.com/mozilla-tech/why-rust-is-the-most-loved-language-by-developers-666add782563
- https://hardwaresecurity.training/trainings/hardware-hacking-spring-2018/
- https://github.com/mit-racecar/hardware
- https://events.static.linuxfound.org/sites/events/files/slides/AFL%20filesystem%20fuzzing,%20Vault%202016_0.pdf
- (Awesome list of links in last) https://dyjak.me/wp-content/uploads/2018/05/WarCon-2017-Interpreters-Under-Pressure.pdf
- (Awesome)https://www.nds.rub.de/media/nds/arbeiten/2015/10/30/Tim_Guenther-EsPReSSO-BA.pdf
- (Awesome book)https://download-mirror.savannah.gnu.org/releases/pgubook/ProgrammingGroundUp-1-0-booksize.pdf
- https://archive.org/details/ToorconArchiveInfocon
- https://techbeacon.com/best-security-conferences-2018
- http://mirror.easyname.at/nongnu/pgubook/ProgrammingGroundUp-1-0-booksize.pdf
- http://www.agner.org/optimize/
- https://digteam.github.io/assets/tocttou.pdf (Don't know what that is)
- https://www.youtube.com/user/SourcefireInc/playlists?disable_polymer=1
- https://www.youtube.com/channel/UCSii2fuiLLlGqaR6sR_y0rA
- https://www.youtube.com/channel/UCDNzNvZlYK8jZLsUbdiGrsQ
- ●[1] http://cseweb.ucsd.edu/~hovav/talks/blackhat08.html
- ● [2] http://cseweb.ucsd.edu/~hovav/dist/sparc.pdf
- ● [3] https://github.com/0vercl0k/rp
- ● [4] http://ropshell.com/ropeme/
- ● [5] https://github.com/pakt/ropc
- ● [6] https://github.com/awailly/nrop
- ● [7] http://shell-storm.org/project/ROPgadget/
- ● [8] https://www.comp.nus.edu.sg/~liangzk/papers/asiaccs11.pdf
- ● [9] https://www.lst.inf.ethz.ch/research/publications/PPREW_2013/PPREW_2013.pdf
- ● [10] http://www.scs.stanford.edu/brop/bittau-brop.pdf
- ● [11] https://labs.portcullis.co.uk/blog/ohm-2013-review-of-returning-signals-for-fun-and-profit/
- ● [12] http://shell-storm.org/repo/Notepad/ROP-chain-generation-via-backtracking-and-state-machine.txt
- http://www.tenouk.com/cncplusplusbufferoverflow.html
- https://www.sei.cmu.edu/research-capabilities/all-work/display.cfm?customel_datapageid_4050=21274
- https://www.youtube.com/channel/UCkysTPyA_48174c80rcITmA
- https://www.youtube.com/channel/UCMNvAtT4ak2azKNk6UlB1QQ
- https://github.com/vitalysim/Awesome-Hacking-Resources#reverse-engineering-buffer-overflow-and-exploit-development
- https://software.intel.com/en-us/articles/intel-sdm#combined
- http://www.tenouk.com/Bufferoverflowc/stackbasedbufferoverflow.html
- https://www.sei.cmu.edu/research-capabilities/all-work/display.cfm?customel_datapageid_4050=21274
- https://www.youtube.com/channel/UCkysTPyA_48174c80rcITmA
- https://www.youtube.com/channel/UCMNvAtT4ak2azKNk6UlB1QQ
- https://github.com/vitalysim/Awesome-Hacking-Resources#reverse-engineering-buffer-overflow-and-exploit-development
- https://software.intel.com/en-us/articles/intel-sdm#combined
- http://www.tenouk.com/Bufferoverflowc/stackbasedbufferoverflow.html
- (Awesome )http://www.cs.virginia.edu/~evans/cs216/
- https://github.com/offensive-security
- https://www.corelan.be/index.php/2009/09/21/exploit-writing-tutorial-part-6-bypassing-stack-cookies-safeseh-hw-dep-and-aslr/
- (primary) http://security.cs.rpi.edu/courses/binexp-spring2015/lectures/1/01_lecture.pdf
- https://kitctf.de/writeups/0ctf2015/freenote/
- https://sploitfun.wordpress.com/2015/03/04/heap-overflowusing-malloc-maleficarum/
- http://acez.re/ctf-writeup-hitcon-ctf-2014-stkof-or-modernheap-overflow/
- http://wapiflapi.github.io/2014/11/17/hacklu-oreo-withret2dl-resolve/
- http://phrack.org/issues/66/10.html
- http://dl.packetstormsecurity.net/papers/attack/MallocMaleficarum.txt
- (Awesome)https://samsclass.info/127/127_F15.shtml
- (Awesome codes)pip install -r requirements.txt --no-index --find-links file:///tmp/packages
- Compiler intrinsics
- https://www.linuxjournal.com/content/introduction-gcc-compiler-intrinsics-vector-processing
- https://stackoverflow.com/questions/7156908/sse-intrinsic-functions-reference
- https://msdn.microsoft.com/en-us/library/hh977022.aspx
- (Awesome list of vulnerablilities) https://www.cvedetails.com/
- Misc2
- https://dzone.com/articles/how-to-check-linux-process-deeply-with-common-sens
- https://doc.lagout.org/programmation/
- (Triple awesome) https://renenyffenegger.ch/notes/development/languages/C-C-plus-plus/GCC/create-libraries/index
- https://gms.tf/ld_library_path-considered-harmful.html
- (Awesome book resources) https://www.linuxtopia.org/online_books/
- https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Rants%26Writeups/Hacking%20Team%20Writeup.md
- https://www.mwrinfosecurity.com/events/past-events/
- (Awesome)https://www.cs.bgu.ac.il/~mahlert/TCPIP_Implementation/TCPIP_Implementation.pdf
- (Awesome)https://www.wiley.com/en-gb/Efficient+Algorithms+for+MPEG+Video+Compression-p-9780471379423
- (Awesome Alternatives of exploit db)https://security.stackexchange.com/questions/2715/exploit-db-like-websites-where-people-can-search-for-security-bugs
- https://leotindall.com/tutorial/an-intro-to-x86_64-reverse-engineering/
- http://resources.infosecinstitute.com/x86-assembly-reverse-engineering-part-2/
- https://smtebooks.com/book/602/practical-reverse-engineering-x86-x64-pdf
- http://overthewire.org/wargames/bandit/bandit0.html
- https://github.com/RPISEC/MBE
- https://jochen-hoenicke.de/trezor-power-analysis/
- https://eprint.iacr.org/2017/1169.pdf
- http://media.ntu.edu.sg/NewsReleases/Pages/newsdetail.aspx?news=e57faffc-24ea-4034-9181-f5fea9850690
- https://github.com/mseaborn
- https://github.com/HackathonHackers/groups
- https://github.com/HackathonHackers/personal-sites
- https://blog.feedspot.com/hacker_blogs/
- https://github.com/FabioBaroni/awesome-chinese-infosec-websites
- https://github.com/spacehackersclub/awesome-spacehackers
- https://heimdalsecurity.com/blog/best-twitter-cybersec-accounts/#cybersec specialists
- (makefile)https://gist.github.com/hallettj/29b8e7815b264c88a0a0ee9dcddb6210
- (makefile awesome)http://www.cs.colby.edu/maxwell/courses/tutorials/maketutor/
- (MMDense LSTM)https://scirate.com/arxiv/1805.02410
- https://github.com/pettarin/awesome-python-audio-research
- https://github.com/ganny26/awesome-audioqr
- https://github.com/ybayle/awesome-deep-learning-music
- https://github.com/sbrugman/deep-learning-papers#visual
- https://sisec.inria.fr/
- http://www.brendangregg.com/perf.html
- https://github.com/RRZE-HPC/likwid
- (Awesome)https://sourceware.org/glibc/wiki/AgnerWishlist
- (Awesome)https://wiki.osdev.org/Books
- (Awesome os list)http://pages.cs.wisc.edu/~remzi/OSTEP/
- (Awesome Aweome)https://wiki.osdev.org/Expanded_Main_Page
- (Awesome Linux os)http://man7.org/tlpi/
- (Awesome linux)http://people.ds.cam.ac.uk/pmb39/Linux/
- https://totalhash.cymru.com/
- (Awesome)http://thestarman.pcministry.com/asm/
- http://thestarman.pcministry.com/asm/debug/Segments.html
- https://web.archive.org/web/20130511233621/http://www.asmcommunity.net:80/book/
- https://alicebob.cryptoland.net/understanding-the-montgomery-reduction-algorithm/
- (Awesome) https://doc.lagout.org/security/
- http://timetobleed.com/
- (Awesome Awesome lots and lots of kernel video)https://www.youtube.com/user/hupstream/playlists
- https://softwareengineering.stackexchange.com/questions/200214/cross-compile-arm-program-to-intel
- (Elf format)https://www.youtube.com/watch?v=t09LFtfy4JU
- OS security
- https://github.com/maxking/linux-security-papers
- http://namei.org/presentations/linux-kernel-security-kca09.pdf
- http://namei.org/presentations/
- http://kernsec.org/wiki/index.php/Main_Page
- https://medium.com/@XiaohanZeng/i-interviewed-at-five-top-companies-in-silicon-valley-in-five-days-and-luckily-got-five-job-offers-25178cf74e0f
- https://medium.com/@zainrehmani/how-i-got-interviews-and-job-offers-from-companies-like-facebook-google-microsoft-amazon-dd4080b218d4
- Arm Security
- https://github.com/IAIK
- https://www.blackhat.com/docs/eu-16/materials/eu-16-Lipp-ARMageddon-How-Your-Smartphone-CPU-Breaks-Software-Level-Security-And-Privacy-wp.pdf
- https://doc.lagout.org/security/XXXX_ARM_exploitation.pdf
- http://mazsola.iit.uni-miskolc.hu/~drdani/docs_arm/
- (Tells about gcc arm)http://thehackerworkshop.com/?p=391
- https://www.youtube.com/watch?v=eM6TKcIwqI4
- https://azeria-labs.com/
- ARM Bare Metal Programming
- (Awesome)http://www.bravegnu.org/gnu-eprog/index.html
- (Awesome Combining c and c++) https://stackoverflow.com/questions/3789340/combining-c-and-c-how-does-ifdef-cplusplus-work
- https://blahcat.github.io/2017/06/25/qemu-images-to-play-with/
- http://www.toves.org/books/arm/
- Shared Memory
- https://www.dfrws.org/sites/default/files/session-files/paper-monitoring_access_to_shared_memory-mapped_files.pdf
- Android
- https://www.dei.unipd.it/~fantozzi/esp1617/files/Android%20NDK.pdf
- https://blog.xamarin.com/preparing-for-native-library-linking-changes-in-android-n/
- https://link.springer.com/content/pdf/10.1007/978-1-4302-6131-5_7.pdf
- https://rathodpratik.wordpress.com/2013/03/24/build-cc-executables-for-android-using-ndk/
- https://groups.google.com/forum/#!topic/android-ndk/8oq_QcNtuOY
- http://www.ikerhurtado.com/android-ndk-build-system
- (Awesome) http://android.mk/
- http://technologeeks.com/course.jl?course=AIRE
- http://androiddoc.qiniudn.com/tools/help/shell.html
- http://newandroidbook.com/code/android-6.0.0_r1/ndk/docs/Programmers_Guide/html/md_1__concepts__concepts.html#nstl
- http://web.guohuiwang.com/technical-notes/nativelauncher
- https://biblioteka.awf.katowice.pl/docs/lfi0d3o.php?cesy=android-run-adb-in-code
- http://grokbase.com/t/gg/android-ndk/123tfxvqyb/how-can-i-run-c-binary-executable-file-in-android-from-android-shell
- http://gimite.net/en/index.php?Run%20native%20executable%20in%20Android%20App
- https://www.arc4dia.com/blog/building-and-debugging-command-line-programs-on-android/
- https://source.android.com/devices/architecture/hidl/
- https://developers.google.com/training/android/
- https://www.anysoftwaretools.com/best-android-development-resources/
- Best forums to discuss android
- https://android-developers.googleblog.com/2016/06/android-changes-for-ndk-developers.html
- https://www.all-things-android.com/content/understanding-android-file-hierarchy
- https://code.tutsplus.com/tutorials/advanced-android-getting-started-with-the-ndk--mobile-2152
- (Awesome)http://betelco.blogspot.co.uk/2010/01/buildingdebugging-android-native-c.html
- https://stackoverflow.com/questions/12995030/how-to-use-adb-pull-command
- https://stackoverflow.com/questions/8650407/how-to-copy-selected-files-from-android-with-adb-pull
- https://stackoverflow.com/questions/9868309/how-to-compile-c-into-an-executable-binary-file-and-run-it-in-android-from-andro
- https://www.quora.com/What-is-the-best-book-for-understanding-the-Android-operating-system
- https://stackoverflow.com/questions/48069141/android-shell-command-options-explained
- (Awesome and Simple)ftp://ftp.wayne.edu/ldp/en/Linux-Android-HOWTO/
- (Awesome)https://hub.packtpub.com/creating-compiling-and-deploying-native-projects-android-ndk/
- https://stackoverflow.com/questions/1636901/can-linux-apps-be-run-in-android
- http://wyatt8740.no-ip.org/android.html
- https://stackoverflow.com/questions/4703131/is-it-possible-to-run-a-native-arm-binary-on-a-non-rooted-android-phone
- https://www.slideshare.net/kost/android-porting-47896523
- Good books
- https://nostarch.com/tlpi
- https://lwn.net/Kernel/Index/
- TLB attacks
- https://www.ieee-security.org/TC/SP2013/papers/4977a191.pdf
- Cache
- https://www.linuxjournal.com/article/7105
- https://en.wikipedia.org/wiki/Cache_(computing)
- https://www.thomas-krenn.com/en/wiki/Linux_Page_Cache_Basics
- https://www.thegeekstuff.com/2012/02/linux-memory-swap-cache-shared-vm/
- https://www.google.co.uk/search?q=cache+management+in+linux&oq=cache+management+in+linux&aqs=chrome..69i57.7055j0j1&sourceid=chrome&ie=UTF-8
- https://www.youtube.com/channel/UCzf_XjIoKSf4Ve2fH7xn-3A
- https://www.youtube.com/watch?v=SfPlpvtZ53o
- http://www.informit.com/articles/article.aspx?p=29961&seqNum=4
- https://www.usenix.org/legacy/event/usenix01/freenix01/full_papers/riel/riel_html/
- http://www.infradead.org/~mchehab/kernel_docs/unsorted/cachetlb.html
- https://stackoverflow.com/questions/4812137/does-the-mmu-mediate-everything-between-the-operating-system-and-physical-memory
- (Awesome) https://pdfs.semanticscholar.org/presentation/afe5/e48e9a61a804dd39d3c2f69b834a4d14d9c3.pdf
- (Awesome)http://www.stillhq.com/pdfdb/000446/data.pdf
- https://www.tomshardware.com/reviews/Intel-i7-nehalem-cpu,2041-2.html
- http://cseweb.ucsd.edu/classes/su09/cse120/lectures/Lecture7.pdf
- (Awesome)https://www.youtube.com/user/NmeictEnggTechnology/playlists
- (Application binary inteface)https://www.youtube.com/watch?v=g8A0Wa7REZI
- (Awesome Awesome Awesome) https://stackoverflow.com/questions/2171177/what-is-an-application-binary-interface-abi
- https://www.everything2.com/index.pl?node=iBCS
- (cache Linux kernel awesome)https://www.kernel.org/doc/gorman/html/understand/understand006.html
- (Umass os)https://www.youtube.com/user/UMassOS/playlists
- http://www.rfwireless-world.com/Tutorials/ARM-tutorial.html
- https://www.youtube.com/watch?v=c9rQmBcJpfk
- http://events17.linuxfoundation.org/sites/events/files/slides/slides_10.pdf
- https://en.wikipedia.org/wiki/Cache_coherence
- (Awesome os notes)https://cseweb.ucsd.edu/classes/su09/cse120/schedule.html
- (Awesome cache notes)https://courses.cs.washington.edu/courses/cse378/09wi/lectures/lec15.pdf
- http://snir.cs.illinois.edu/PDF/Temporal%20and%20Spatial%20Locality.pdf
- https://cmaurice.fr/pdf/raid15_maurice.pdf
- (Awesome Cache) https://eprint.iacr.org/2015/905.pdf
- https://wiki.debian.org/Hugepages
- Linux system calls
- https://blog.packagecloud.io/eng/2016/04/05/the-definitive-guide-to-linux-system-calls/
- Arm asm
- http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.dui0205j/Cihccdja.html
- http://www.ic.unicamp.br/~celio/mc404-s2-2015/docs/ARM-GCC-Inline-Assembler-Cookbook.pdf
- (Most Awesome inline)http://www.ethernut.de/en/documents/arm-inline-asm.html
- http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.100748_0606_00_en/ddx1471430827125.html
- (Most Awesome)http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.dui0056d/BABIJCGF.html
- (Awesome arm commands reference)http://www.keil.com/support/man/docs/armasm/armasm_dom1361289850039.htm
- https://github.com/kevinhooke/learning-arm-asm
- http://alanclements.org/ARMgradedExamples.pdf
- https://github.com/Croydon/assembler-arm
- Arm cache architecture
- https://community.arm.com/processors/b/blog/posts/caches-and-self-modifying-code
- http://infocenter.arm.com/help/topic/com.arm.doc.ddi0201d/DDI0201D_arm946es_r1p1_trm.pdf
- http://events17.linuxfoundation.org/sites/events/files/slides/slides_10.pdf
- http://www.ee.ncu.edu.tw/~jfli/soc/lecture/ARM9.pdf
- https://www.nxp.com/files-static/training_pdf/WBT_27182_IMX31_CPU.pdf
- Inline assembly
- https://www.cs.virginia.edu/~clc5q/gcc-inline-asm.pdf
- https://gcc.gnu.org/onlinedocs/gcc-4.3.0/gcc/Extended-Asm.html#Extended-Asm
- https://sourceware.org/binutils/docs-2.18/as/index.html
- (Most Awesome best)http://www.ibiblio.org/gferg/ldp/GCC-Inline-Assembly-HOWTO.html
- (Short and concise, derived form other two)https://www.codeproject.com/Articles/15971/Using-Inline-Assembly-in-C-C
- (Something something)https://www.codeproject.com/Articles/5318/Extended-Inline-Assembly-in-GCC
- http://cholla.mmto.org/computers/gcc_inline.html
- https://locklessinc.com/articles/gcc_asm/
- https://forum.osdev.org/viewtopic.php?f=1&t=26751
- Security
- https://github.com/cryptax/confsec
- https://copperhead.co/blog/2015/05/11/aslr-android-zygote
- https://grsecurity.net/
- http://www.blackhat.com/presentations/bh-usa-07/Maynor_and_Graham/Whitepaper/bh-usa-07-maynor_and_graham-WP.pdf
- https://www.rapid7.com/db/search?utf8=%E2%9C%93&q=android&t=v
- https://www.cvedetails.com/
- http://www.securityfocus.com/bid/102976
- https://twitter.com/mingjian_zhou?lang=en
- http://c0reteam.org/2016/01/06/cve-20153865
- https://source.android.com/security/overview/acknowledgements
- https://www.youtube.com/user/mediacccde/playlists
- https://defuse.ca/
- Makefile
- https://news.ycombinator.com/item?id=15041986
- https://gist.github.com/isaacs/62a2d1825d04437c6f08
- Bash shell
- https://google.github.io/styleguide/shell.xml
- Cmake
- https://github.com/onqtam/awesome-cmake
- Finding size of cache
- https://stackoverflow.com/questions/794632/programmatically-get-the-cache-line-size
- https://community.arm.com/processors/f/discussions/5807/how-get-armv7-cache-size
- Android vulnerability
- https://github.com/vusec/drammer
- Searching in android vulnerability list, they give full twitter info of hacker then find them find their website find blogs etc.
- https://www.slideshare.net/jiahongfang5/qualcomm2015-jfang-nforest
- https://www.blackhat.com/docs/us-15/materials/us-15-Xu-Ah-Universal-Android-Rooting-Is-Back-wp.pdf
- https://www.google.com/search?client=firefox-b-ab&ei=lc0PW4TXH4i4swG1zYZA&q=Find+your+own+Androidkernel+bug+pdf&oq=Find+your+own+Androidkernel+bug+pdf&gs_l=psy-ab.3...9041.12780.0.13195.8.7.1.0.0.0.358.1444.2-4j1.5.0....0...1c.1.64.psy-ab..3.1.264...33i160k1.0.sjMy_Nr7Qcw
- https://www.blackhat.com/docs/eu-17/materials/eu-17-Corina-Difuzzing-Android-Kernel-Drivers.pdf
- Mobile Application Penetration Testing
- http://cloak-and-dagger.org/
- http://events17.linuxfoundation.org/sites/events/files/slides/LSS%20-%20Treble%20%27n%27%20SELinux_0.pdf
- https://alephsecurity.com/
- https://github.com/dweinstein/android_notes/wiki/AndroidApplicationStartup
- https://census-labs.com/media/shadow-infiltrate-2017.pdf
- https://www.blackhat.com/docs/eu-16/materials/eu-16-Shen-Rooting-Every-Android-From-Extension-To-Exploitation.pdf
- (Awesome)https://github.com/jacobsoo/AndroidSlides, http://www.droidsec.org/wiki/#miscellaneous, https://github.com/SecWiki/android-kernel-exploits
- (Very Very awesome)https://www.sudo.ws/
- (Awesome) https://reverseengineering.stackexchange.com/questions/206/where-can-i-as-an-individual-get-malware-samples-to-analyze
- https://mobilesecuritywiki.com/
- https://github.com/xtiankisutsa/awesome-mobile-CTF
- https://github.com/ashishb/android-security-awesome
- https://abuse.ch/
- https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Exploit%20Development.md#expapers
- https://github.com/ele7enxxh/android_vuln_poc-exp
- https://ruxcon.org.au/
- https://ruxcon.org.au/assets/2017/slides/A_Whole_New_Efficient_Fuzzing_Strategy_for_Stagefright_Porting_and_Optimisations.pptx
- https://github.com/jiayy/android_vuln_poc-exp/
- https://www.youtube.com/watch?v=q_HibdrbIxo&index=8&list=PLtPrYlwXDImiO_hzK7npBi4eKQQBgygLD
- https://github.com/Screetsec/TheFatRat
- https://gist.github.com/MattKetmo/96d703bc23ce432d4591
- https://joshuawise.com/projects
- https://github.com/linkedin/qark
- https://blog.zimperium.com/the-latest-on-stagefright-cve-2015-1538-exploit-is-now-available-for-testing-purposes/
- https://security.stackexchange.com/questions/40012/writing-android-exploits
- http://www.xipiter.com/practical-android-exploitation.html
- https://github.com/xairy/linux-kernel-exploitation
- http://bits-please.blogspot.co.uk/2015/08/android-linux-kernel-privilege.html
- https://www.securityfocus.com/news/11189
- http://analysis.seclab.tuwien.ac.at/projects/vifuzz/docs/exploit.pdf
- (Awesome Step by step) https://ionize.com.au/android-exploit-development-android-open-source-project-toolchain/
- https://www.exploit-db.com/platform/?p=Android
- https://github.com/SecWiki/android-kernel-exploits
- http://analysis.seclab.tuwien.ac.at/projects/vifuzz/docs/exploit.pdf
- key Search term = Writing exploits for device drivers
- Key Search term = how to write exploit for android , Fuzzing drivers
- https://www.vulnhub.com/
- https://github.com/smeso/MTPwn
- https://mobile-security.zeef.com/oguzhan.topgul
- https://www.hackers-arise.com/single-post/2017/09/20/Exploiting-Nearly-Any-Windows-System-Using-CVE-2017-8759
- https://github.com/FabioBaroni/awesome-exploit-development
- writing security tools and exploits
- https://conference.hitb.org/hitbsecconf2018ams/materials/D1T2%20-%20Yong%20Wang%20&%20Yang%20Song%20-%20Rooting%20Android%208%20with%20a%20Kernel%20Space%20Mirroring%20Attack.pdf
- Android hacker's handbook
- learn pentesting on android
- Android internals jonathan Levin
- http://conference.hitb.org/hitbsecconf2017ams/materials/
- https://www.blackhat.com/docs/us-16/materials/us-16-Zhang-Dangerous-Hare-Hanging-Attribute-References-Hazards-Due-To-Vendor-Customization.pdf
- https://www.blackhat.com/us-17/briefings.html#avpass-leaking-and-bypassing-antivirus-detection-model-automatically
- https://www.blackhat.com/us-17/briefings.html#broadpwn-remotely-compromising-android-and-ios-via-a-bug-in-broadcoms-wi-fi-chipsets
- https://www.blackhat.com/us-17/briefings.html#cloak-and-dagger-from-two-permissions-to-complete-control-of-the-ui-feedback-loop
- https://www.blackhat.com/us-17/briefings.html#defeating-samsung-knox-with-zero-privilege
- https://www.blackhat.com/us-17/briefings.html#many-birds-one-stone-exploiting-a-single-sqlite-vulnerability-across-multiple-software
- https://www.blackhat.com/docs/us-17/thursday/us-17-Jung-AVPASS-Leaking-And-Bypassing-Anitvirus-Detection-Model-Automatically.pdf
- https://www.blackhat.com/docs/us-16/materials/us-16-Zhang-Dangerous-Hare-Hanging-Attribute-References-Hazards-Due-To-Vendor-Customization.pdf
- https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/liu
- https://www.rsaconference.com/writable/presentations/file_upload/mbs-f03-android-serialization-vulnerabilities-revisited.pdf
- https://www.rsaconference.com/writable/presentations/file_upload/hta-r10-hey-android-where-is-my-car.pdf
- https://www.rsaconference.com/writable/presentations/file_upload/mbs-r14-how-automated-vulnerability-analysis-discovered-hundreds-of-android-0-days.pdf
- https://www.rsaconference.com/writable/presentations/file_upload/mbs-r14-how-automated-vulnerability-analysis-discovered-hundreds-of-android-0-days.pdf
- https://www.ruhrsec.de/2018/#talks
- https://www.slideshare.net/CanSecWest/csw2017-geshevmiller-logic-bug-hunting-in-chrome-on-android
- (Awesome Might be on android as well) https://labs.mwrinfosecurity.com/assets/BlogFiles/apple-safari-wasm-section-vuln-write-up-2018-04-16.pdf
- (It might help awesome)https://www.blackhat.com/us-17/training/schedule/index.html#android-application-hacking----penetration-and-reversing-mobile-apps-5628
- https://github.com/hackedteam?tab=repositories
- Deepfakes
- https://github.com/goberoi/faceit
- https://github.com/alew3/faceit_live
- https://github.com/deepfakes/faceswap
- https://medium.com/huia/live-deep-fakes-you-can-now-change-your-face-to-someone-elses-in-real-time-video-applications-a4727e06612f
- Writing Cache friendly code
- (Awesome search term)Writing cache friendly code
- Linux MMu
- https://events.static.linuxfound.org/sites/events/files/slides/elc_2016_mem.pdf
- Chip
- https://en.wikichip.org/wiki/mediatek/helio/mt6755
- https://www.mediatek.com/products/smartphones/mt6755-helio-p10#
- Virtual memory
- https://blog.jeffli.me/blog/2014/11/08/pagemap-interface-of-linux-explained/
- https://www.kernel.org/doc/Documentation/vm/pagemap.txt
- https://www.youtube.com/watch?v=qcBIvnQt0Bw&list=PLiwt1iVUib9s2Uo5BeYmwkDFUh70fJPxX
- https://events.static.linuxfound.org/sites/events/files/slides/elc_2016_mem.pdf
- https://www.bottomupcs.com/virtual_addresses.xhtml
- https://stackoverflow.com/questions/44520047/what-is-the-page-size-for-32-and-64-bit-versions-of-windows-os
- https://stackoverflow.com/questions/33722205/how-many-page-tables-do-intel-x86-64-cpus-access-to-translate-virtual-memory
- (Awesome)http://www.cirosantilli.com/x86-paging/
- http://www.ic.unicamp.br/~celio/mc404-2013/arm-manuals/Paging%20Systems.pdf
- http://lackingrhoticity.blogspot.co.uk/2015/05/how-physical-addresses-map-to-rows-and-banks.html
- Awesome kali and exploit
- https://github.com/secfigo/Awesome-Fuzzing
- https://gist.github.com/natesubra/5117959c660296e12d3ac5df491da395
- http://www.fuzzysecurity.com/links.html
- https://github.com/FabioBaroni/awesome-exploit-development
- https://www.corelan.be/
- https://null-byte.wonderhowto.com/how-to/exploit-development-everything-you-need-know-0167801/
- https://www.hackers-arise.com/single-post/2017/06/21/Exploit-Development-Part-3-Finding-Vulnerabilities-by-Fuzzing-with-Spike
- https://uk.sans.org/course/advanced-exploit-development-penetration-testers
- https://en.wikipedia.org/wiki/Fravia
- http://www.ctyme.com/rbrown.htm
- https://news.ycombinator.com/item?id=4121062
- https://github.com/Hack-with-Github
- https://github.com/yeyintminthuhtut/Awesome-Study-Resources-for-Kernel-Hacking
- awesome exploit development
- https://github.com/apsdehal/awesome-ctf
- (Awesome)https://github.com/gregkh/kernel-development
- (Awesome)https://github.com/fffaraz/kernel
- https://github.com/aleksandar-todorovic/awesome-linux#learning-resources
- https://github.com/aleksandar-todorovic/awesome-linux#useful-websites
- A guide to kernel exploitation
- https://securityonline.info/awesome-hacking-collection-awesome-lists-hackers-pentesters-security-researchers/
- https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0ahUKEwi5qNeKqpbbAhVPC-wKHQz9APQQFggnMAA&url=http%3A%2F%2Fwww.piotrbania.com%2Fall%2Farticles%2Fewdd.pdf&usg=AOvVaw3g5NjK-ghejApSApADwa65
- https://www.blackhat.com/presentations/bh-usa-07/Bulygin/Presentation/bh-usa-07-bulygin.pdf
- Awesome hardware
- https://github.com/openmotics/hardware
- Search high speed circuit design
- vhdl
- https://blog.hackster.io/student-creates-first-homebrew-dual-differential-amplifier-ic-8535af115d7e?gi=4334ecb2fcdd
- https://blog.hackster.io/how-to-embed-nfc-chips-into-your-acrylic-fingernails-dor-unlocking-your-phone-and-much-more-51ea87d6a169
- https://en.wikipedia.org/wiki/List_of_open-source_hardware_projects
- https://en.wikipedia.org/wiki/Open-source_hardware
- https://en.wikipedia.org/wiki/Open-Source_Lab_(book)
- http://apt.cs.manchester.ac.uk/ftp/pub/apt/papers/LEMB_ToE09_O.pdf
- Search term : Design system on chip
- https://en.wikibooks.org/wiki/Chip_Design_Made_Easy
- http://users.ece.utexas.edu/~gerstl/publications/TR-02-28.tutorial.pdf
- http://www.cl.cam.ac.uk/teaching/1011/SysOnChip/socdam-notes1011.pdf
- https://www.quora.com/Which-is-the-best-online-ARM-processor-course
- https://github.com/monostable/awesome-electronics
- Android terminal
- ftp://ftp.wayne.edu/ldp/en/Linux-Android-HOWTO/Linux-Android-HOWTO-6.html
- Processor know how
- https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-823-computer-system-architecture-fall-2005/lecture-notes/
- Iot sec
- (Awesome)http://jcjc-dev.com/2016/06/08/reversing-huawei-4-dumping-flash/
- https://security.electronicsforu.com/wp-content/uploads/2017/06/RISC_IoT_101.pdf
- https://www.owasp.org/images/2/29/AppSecIL2016_HackingTheIoT-PenTestingRFDevices_ErezMetula.pdf
- https://s3.us-east-2.amazonaws.com/attify-iot-hosting/Hacking+IoT+for+Bug+Bounties.pdf
- https://sector.ca/wp-content/uploads/presentations17/Aditya-Gupta-Pwning-Smart-Homes-SecTor.pdf
- http://www.cs.bham.ac.uk/~tpc/Edu/Pentesting/files/penEdu.pdf
- Makefile
- https://eigenstate.org/notes/makefiles
- http://docs.yottabuild.org/tutorial/tutorial.html
- https://www3.ntu.edu.sg/home/ehchua/programming/cpp/gcc_make.html
- Managing large projects with make
- http://doc.cat-v.org/bell_labs/mk/
- https://github.com/oridb/mk
- https://eli.thegreenplace.net/2013/07/09/library-order-in-static-linking
- Good android books
- Embedded Android: Porting, Extending
- Android internals Jonathan Levin
- Learning pentesting for android
- http://www.opersys.com/training/embedded-android
- https://stackoverflow.com/questions/11262817/learn-about-android-internalsdive-deep-into-the-system
- Xda developers android hacker's toolkit
- Embedded Linux
- https://github.com/embedded-boston/awesome-embedded-systems
- https://github.com/ysh329/awesome-embedded-ai
- https://www.quora.com/What-are-the-best-lectures-for-learning-Embeded-systems-in-YouTube
- https://hackr.io/tutorials/learn-android-development
- https://github.com/JStumpp/awesome-android#resources
- Compilers
- https://insights.dice.com/2015/12/04/developing-in-cc-consider-clang/
- https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=15&ved=0ahUKEwjZvOfP7ZjbAhXC2aQKHSjcCxoQFgiaATAO&url=https%3A%2F%2Fraw.githubusercontent.com%2Fnamin%2Finc%2Fmaster%2Fdocs%2Ftutorial.pdf&usg=AOvVaw05R_CrVMx8P0t7nmVmnLwa
- https://steveire.wordpress.com/
- http://webpages.charter.net/ppluzhnikov/linker.html
- Awesome Slam
- https://github.com/kanster/awesome-slam#courses-lectures-and-workshops
- https://github.com/liulinbo/slam
- https://blog.csdn.net/renye_lpl/article/details/79225423
- Gcc cross
- http://preshing.com/20141119/how-to-build-a-gcc-cross-compiler/
- https://github.com/landley/toybox
- http://web.guohuiwang.com/technical-notes/androidndk2
- http://www.linfo.org/main_index.html
- Linux kernel
- http://fxr.watson.org/
- Write an mp3 filter
- http://book.realworldhaskell.org/read/
- http://blog.bjrn.se/2008/10/lets-build-mp3-decoder.html
- https://multimedia.cx/eggs/learn-multimedia-with-jpeg/
- http://www.opennet.ru/docs/formats/jpeg.txt
- http://parsingintro.sourceforge.net/
- http://wiki.c2.com/?TipsForReadingCode
- Programme and their memory
- https://www.usna.edu/Users/cs/aviv/classes/ic221/s16/lec/11/lec.html
- https://stackoverflow.com/questions/15638105/accessing-specific-memory-locations-in-c
- https://www.kernel.org/doc/gorman/html/understand/understand007.html
- https://www.google.com/search?q=how+memory+address+is+assigned+to+process&ie=utf-8&oe=utf-8&client=firefox-b-ab
- http://www.informit.com/articles/article.aspx?p=29961&seqNum=2
- https://www.google.com/search?q=how+os+gives+address+to+user+spce+prograzmme&ie=utf-8&oe=utf-8&client=firefox-b-ab
- https://security.stackexchange.com/questions/18556/how-do-aslr-and-dep-work
- https://www.blackhat.com/docs/eu-16/materials/eu-16-Schwarz-How-Your-DRAM-Becomes-A-Security-Problem-wp.pdf
- dope links
- https://fail0verflow.com/blog/
- https://www.w3.org/TR/workers/
- http://www.hotchips.org/archives/2010s/hc29/
- http://linux-test-project.github.io/
- https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Embedded%20Device%20%26%20Hardware%20Hacking%20-.md
- https://www.google.com/search?client=firefox-b-ab&ei=1a4PW4z9FcaB6ATgy57oBw&q=awesome+hardware+hacking&oq=awesome+hardware+hacking&gs_l=psy-ab.3..33i160k1.5710.6089.0.6337.3.3.0.0.0.0.245.245.2-1.1.0....0...1c.1.64.psy-ab..2.1.244....0.OcRoyVos8Z0
- Black Hat: Top 20 hack-attack tools
- https://www.blackhat.com/us-17/training/applied-hardware-attacks-embedded-systems.html
- https://www.google.com/search?client=firefox-b&ei=HLcPW6wnyImbBd6ekoAF&q=Dumping+Firmware+from+Software+pdf&oq=Dumping+Firmware+from+Software+pdf&gs_l=psy-ab.3...1367.2806.0.2965.4.4.0.0.0.0.265.265.2-1.1.0....0...1c.1.64.psy-ab..3.1.264...33i160k1.0.WHT9xo50-gU
- https://www.google.com/search?client=firefox-b&ei=LrcPW6-GC8rN6QSAkpawBg&q=Manipulating+firmware+images+pdf&oq=Manipulating+firmware+images+pdf&gs_l=psy-ab.3..33i21k1.3130.4518.0.4688.4.4.0.0.0.0.262.508.2-2.2.0....0...1c.1.64.psy-ab..2.2.507...33i160k1.0.ZNykmY9pJT8
- https://www.google.com/search?client=firefox-b&ei=Q7cPW-rRBsOF6ASL0Z_wDQ&q=Finding+software+bugs+in+firmware+pdf&oq=Finding+software+bugs+in+firmware+pdf&gs_l=psy-ab.3...6317.8320.0.8453.6.6.0.0.0.0.279.765.2-3.3.0....0...1c.1.64.psy-ab..3.3.764...33i160k1j33i21k1.0.H5R8teKf0as
- http://hexblog.com/files/recon%202010%20Skochinsky.pdf
- https://reverseengineering.stackexchange.com/questions/3526/how-do-i-extract-a-copy-of-an-unknown-firmware-from-a-hardware-device
- https://reverseengineering.stackexchange.com/questions/2337/how-to-dump-flash-memory-with-spi
- http://chdk.wikia.com/wiki/Obtaining_a_firmware_dump
- https://www.blackhat.com/docs/us-16/materials/us-16-FitzPatrick-The-Tao-Of-Hardware-The-Te-Of-Implants.pdf
- https://www.blackhat.com/us-16/training/applied-physical-attacks-on-x86-systems.html
- http://www.nsaplayset.org/
- https://en.wikipedia.org/wiki/NSA_ANT_catalog
- https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=4&ved=0ahUKEwjO2Jrl0K_bAhWjQJoKHV9kBWkQFghDMAM&url=http%3A%2F%2Fwww.jsums.edu%2Fnmeghanathan%2Ffiles%2F2015%2F05%2FCSC437-Fall2013-Module-5-Buffer-Overflow-Attacks.pdf%3Fx61976&usg=AOvVaw2lP003SqchXxcuGyhb4vFZ
- https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=3&ved=0ahUKEwjO2Jrl0K_bAhWjQJoKHV9kBWkQFgg2MAI&url=http%3A%2F%2Fforristal.com%2Fmaterial%2FForristal_Hardware_Involved_Software_Attacks.pdf&usg=AOvVaw3fiH_8AIm8RnTgqhBcfnlm
- https://www.blackhat.com/presentations/bh-usa-04/bh-us-04-tsyrklevich.pdf
- https://www.blackhat.com/docs/asia-18/asia-18-Ding-New-Compat-Vulnerabilities-In-Linux-Device-Drivers.pdf
- https://security.stackexchange.com/questions/119712/methods-root-can-use-to-elevate-itself-to-kernel-mode
- https://www.giac.org/paper/gsec/2235/quest-root-hacker-techniques-unix-security/103808
- https://thehackernews.com/2017/05/linux-sudo-root-hack.html
- https://hackmag.com/security/reach-the-root/
- https://payatu.com/guide-linux-privilege-escalation/
- https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Privilege%20Escalation%20%26%20Post-Exploitation.md
- http://0x00sec.org/t/enumeration-for-linux-privilege-escalation/1959
- https://thehackernews.com/2017/06/linux-root-privilege-escalation.html
- https://resources.infosecinstitute.com/privilege-escalation-linux-live-examples/#gref
- https://uwnthesis.wordpress.com/2016/12/26/basics-of-making-a-rootkit-from-syscall-to-hook/
- http://se7so.blogspot.com/2012/07/hijacking-linux-system-calls-rootkit.html
- http://timetobleed.com/detailed-explanation-of-a-recent-privilege-escalation-bug-in-linux-cve-2010-3301/
- https://www.google.com/search?client=firefox-b-ab&biw=1468&bih=937&ei=BMYPW8iaM8yusAGcvYm4CQ&q=privelege+escalation+using+syscalls&oq=privelege+escalation+using+syscalls&gs_l=psy-ab.3..33i21k1.252575.260038.0.260160.36.26.0.0.0.0.466.3636.2-3j4j3.11.0....0...1c.1.64.psy-ab..25.11.3924.6..0j35i39k1j0i131k1j0i10k1j0i13k1j0i22i30k1.296.3ay4O3XzcSI
- http://bits-please.blogspot.com/2016/06/trustzone-kernel-privilege-escalation.html
- https://www.exploit-db.com/exploits/44205/
- https://perso.univ-st-etienne.fr/maf13892/Docs/Publications/JTAG.FIA.pdf
- https://perso.univ-st-etienne.fr/maf13892/Docs/Presentations/TRUDEVICE2015_JTAGCombinedAttacks.pdf
- https://hakin9.org/download/hacking-android-80-pages-of-experts-tutorials/
- (Awesome hardware concise)https://media.blackhat.com/us-13/US-13-Zaddach-Workshop-on-Embedded-Devices-Security-and-Firmware-Reverse-Engineering-WP.pdf
- https://www.google.com/search?client=firefox-b-ab&ei=O-YQW6OHJqKHmwXht5y4Bg&q=awesome+embeded+hacking+&oq=awesome+embeded+hacking+&gs_l=psy-ab.3...7740132.7748464.0.7748615.25.21.0.0.0.0.532.2820.3-4j2j1.8.0....0...1c.1.64.psy-ab..20.2.875.0..0j0i67k1.298.3F7kxDoweak
- (Awesome)https://www.kb.cert.org/vuls/id/649219
- https://en.wikipedia.org/wiki/DMA_attack
- https://github.com/ufrisk/pcileech
- https://www.blackhat.com/docs/us-17/wednesday/us-17-Trikalinou-Taking-DMA-Attacks-To-The-Next-Level-How-To-Do-Arbitrary-Memory-Reads-Writes-In-A-Live-And-Unmodified-System-Using-A-Rogue-Memory-Controller.pdf
- https://github.com/torvalds/linux/blob/master/Documentation/DMA-API-HOWTO.txt
- (Awesome resource hidden)https://cturt.github.io/ps4.html
- https://fail0verflow.com/blog/2017/ps4-crashdump-dump/
- https://www.psxhax.com/threads/dualshock-4-ds4-ps4-firmware-dump-reversing-tools-by-ds4user.1159/?utm_source=dlvr.it&utm_medium=facebook
- https://www.reddit.com/r/ps4homebrew/comments/8amgmz/the_nor_chip/
- https://www.3dbrew.org/wiki/Homebrew_Exploits
- https://github.com/Cryptogenic/Exploit-Writeups/blob/master/FreeBSD/PS4%204.55%20BPF%20Race%20Condition%20Kernel%20Exploit%20Writeup.md
- https://github.com/whnunlife/ps3publictools
- http://www2.lauterbach.com/pdf/debugger_arm.pdf
- https://news.ycombinator.com/item?id=7015082
- https://comma.ai/
- https://github.com/geohot/qira
- https://pure.tue.nl/ws/files/46956556/770549-1.pdf
- https://sharedmemorydump.net/building-a-mining-stack-of-raspberry-pis
- Awesome kernel
- https://resources.infosecinstitute.com/privilege-escalation-linux-live-examples/#gref
- http://www.vantagepoint.sg/blog/82-hooking-android-system-calls-for-pleasure-and-benefit
- https://jvns.ca/blog/2014/09/18/you-can-be-a-kernel-hacker/
- https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0ahUKEwjz2tf216_bAhVDkywKHVwHCvsQFggsMAA&url=http%3A%2F%2Fevents17.linuxfoundation.org%2Fsites%2Fevents%2Ffiles%2Fslides%2Fnakamura_20170831_1.pdf&usg=AOvVaw1_1D1ZF-BJIF89_233pECT
- Hacker playbook
- http://delta-course.org/docs/delta4/day2/D4T2L5.pdf
- http://www.cs.swan.ac.uk/~csmarkus/15_project/15_10_sample1_InitialDocument.pdf
- http://wpage.unina.it/roberto.natella/papers/natella_androidfuzzing_issre2017.pdf
- http://aitel.hist.no/fag/lan/lek02/dln02-en.pdf
- https://www.usenix.org/legacy/events/hotsec11/tech/final_files/Cai.pdf
- http://www.makelinux.net/kernel_map/#sd
- http://chdk.wikia.com/wiki/Obtaining_a_firmware_dump
- A guide to kernel exploitation
- https://raw.githubusercontent.com/liulinbo/slam/master/Linux%E5%B0%B1%E8%AF%A5%E8%BF%99%E4%B9%88%E5%AD%A6.pdf
- https://raw.githubusercontent.com/jacobsoo/AndroidSlides/master/%E5%8C%97%E4%BA%AC-GDG-Android-root-%E6%8A%80%E6%9C%AF%E6%B2%99%E9%BE%99-2014/Find%20your%20own%20Android%20kernel%20bug.pdf
- http://www.xml.com/ldd/chapter/book/ch13.html
- https://github.com/torvalds/linux/blob/master/Documentation/DMA-API-HOWTO.txt
- https://www.linuxjournal.com/article/4378
- Search for debug mode in processor
- http://www.msn.com/en-gb/money/companies/google-used-to-ask-these-interview-questions-but-theyre-so-tricky-they-were-banned/ss-AAy3kE0?ocid=ientp#image=6
- Fpga based security
- https://www.eetimes.com/document.asp?doc_id=1274593
- https://github.com/ufrisk/pcileech
- https://mirror.netcologne.de/CCC/congress/2017/slides-pdf/34c3-9111-public_fpga_based_dma_attacking.pdf
- https://github.com/matthiasbock/JTAG-Sniffer
- https://recon.cx/2013/trainingsynple.html
- https://www.eetimes.com/document.asp?doc_id=1274593
- PS#
- https://www2.cs.arizona.edu/~collberg/Teaching/466-566/2012/Resources/presentations/2012/topic1-final/report.pdf
- https://www2.cs.arizona.edu/~collberg/Teaching/466-566/2012/Resources/presentations/2012/topic1-final/slides.pdf
- https://www.riscure.com/uploads/2017/09/Controlling-PC-on-ARM-using-Fault-Injection.pdf
- https://events.ccc.de/congress/2010/Fahrplan/attachments/1780_27c3_console_hacking_2010.pdf
- https://rdist.root.org/2010/01/27/how-the-ps3-hypervisor-was-hacked/
- http://www.blackhat.com/docs/eu-15/materials/eu-15-Giller-Implementing-Electrical-Glitching-Attacks.pdf
- http://mastersicurezza.di.uniroma1.it/mastersicurezza/images/materiali/Convegni/cbepas2012.pdf
- http://ids.cs.columbia.edu/sites/default/files/ndss-2013.pdf
- https://web.archive.org/web/20100409023327/http://geohotps3.blogspot.com/
- https://web.archive.org/web/20100410060251/http://pastie.org:80/795944
- https://web.archive.org/web/20100704075741/http://hackmii.com:80/2009/01/25c3-presentation/
- https://web.archive.org/web/20100723083756/http://www.ibm.com:80/developerworks/power/library/pa-cellsecurity/
- https://news.ycombinator.com/item?id=1079251
- https://web.archive.org/web/20100404062009/http://rdist.root.org:80/2007/05/07/glitch-attacks-revealed/
- https://web.archive.org/web/20100412055807/http://xorloser.com:80/?p=162#more-162
- https://web.archive.org/web/20100220214115/http://ps3hvdoc.wikispaces.com:80/Hypervisor+RE
- https://web.archive.org/web/20100410060005/http://pastie.org:80/795371
- http://www.edepot.com/playstation3.html#PS3_Security
- https://web.archive.org/web/20110110121139/http://wiki.ps2dev.org/
- Ram dump
- https://resources.infosecinstitute.com/obtaining-information-dumping-memory/#gref
- https://rc2014.co.uk/modules/sd-memory-dump/
- http://jcjc-dev.com/2016/12/14/reversing-huawei-5-reversing-firmware/
- https://madiba.encs.concordia.ca/~x_decarn/papers/verifiable-build-acsac2014.pdf
- Methods of capturing a memory dump
- Mobile forensics
- Capturing a live ram
- https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=5&ved=0ahUKEwibyLjXrLLbAhXID8AKHbqCBjYQFghKMAQ&url=http%3A%2F%2Fwww.indjst.org%2Findex.php%2Findjst%2Farticle%2Fdownload%2F105851%2F77226&usg=AOvVaw1xksKEcSYyOXuHFbx_qeuw
- https://www.sans.org/reading-room/whitepapers/forensics/techniques-tools-recovering-analyzing-data-volatile-memory-33049
- Kernel panic
- https://www.blackhat.com/presentations/bh-usa-06/BH-US-06-Burdach.pdf
- https://www.forensicswiki.org/wiki/Memory_Imaging
- (aWESOME)http://eh2008.koeln.ccc.de/fahrplan/attachments/1067_SEAT1394-svn-r432-paper.pdf
- https://eprint.iacr.org/2011/221.pdf
- http://www.stoned-vienna.com
- https://privatecore.com/resources-overview/physical-memory-attacks/index.html
- Attacks on physical memory
- https://www.defcon.org/html/links/dc-archives/dc-20-archive.html
- DIY electric car
- File dump attack
- Access ramd irectly
- https://www.youtube.com/watch?v=Zp8dVq5ZvKY
- (Awesome)https://cturt.github.io/ps4.html
- https://opensourceforu.com/2011/02/debug-kernel-panics-with-crash/
- https://cryptome.org/0003/RAMisKey.pdf
- Security Awesome
- https://www.sec.in.tum.de/i20/teaching
- https://fail0verflow.com/blog/2017/ps4-crashdump-dump/
- https://github.com/meirwah/awesome-incident-response
- https://github.com/dweinstein/awesome-frida
- https://iotsecuritywiki.com/
- https://www.reddit.com/r/netsec/
- https://media.readthedocs.org/pdf/pwntools/stable/pwntools.pdf
- http://grugq.github.io/presentations/
- DMA
- (Awesome)https://www.kb.cert.org/vuls/id/649219
- https://en.wikipedia.org/wiki/DMA_attack
- https://github.com/ufrisk/pcileech
- https://www.blackhat.com/docs/us-17/wednesday/us-17-Trikalinou-Taking-DMA-Attacks-To-The-Next-Level-How-To-Do-Arbitrary-Memory-Reads-Writes-In-A-Live-And-Unmodified-System-Using-A-Rogue-Memory-Controller.pdf
- https://github.com/torvalds/linux/blob/master/Documentation/DMA-API-HOWTO.txt
- https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&uact=8&ved=0ahUKEwjD6pCgibzbAhUKtBQKHclnBOAQFggpMAA&url=https%3A%2F%2Fmedia.blackhat.com%2Fus-13%2FUS-13-Sevinsky-Funderbolt-Adventures-in-Thunderbolt-DMA-Attacks-Slides.pdf&usg=AOvVaw0orMdwj60Y71ocVJOTWQf6
- https://www.youtube.com/watch?v=z4-N2HyQMVU
- https://www.usenix.org/conference/enigma2016#signup
- https://firmwaresecurity.com/
- https://github.com/PreOS-Security/awesome-firmware-security
- https://github.com/advanced-threat-research/firmware-security-training
- https://github.com/onlurking/awesome-infosec
- https://github.com/mhtsai1010/seclinks/tree/master/course
- https://github.com/puppycodes/Malware-2
- https://gbhackers.com/hacking-tools-list/
- http://www.syssec-project.eu/m/page-media/23/syssec2011-s1.4-sang.pdf
- http://www.cs.toronto.edu/~sahil/suneja-asplos15.pdf
- https://invisiblethingslab.com/resources/misc09/Another%20TXT%20Attack.pdf
- http://ids.cs.columbia.edu/sites/default/files/ndss-2013.pdf
- https://www.trust-hub.org/publications/P13.pdf
- https://pdfs.semanticscholar.org/bb6a/7dd4164d933b50c16d3541e50f39cb955de8.pdf
- https://media.blackhat.com/bh-dc-11/Grand/BlackHat_DC_2011_Grand-Workshop.pdf
- https://www.emsec.rub.de/media/crypto/veroeffentlichungen/2018/03/23/main.pdf
- http://grandideastudio.com/wp-content/uploads/current_state_of_hh_slides.pdf
- https://www.youtube.com/watch?v=o77GTR8RovM
- (Awesome)http://reverseengineering.libsyn.com/rss
- https://libreplanet.org/wiki/Group:Hardware/ReverseEngineering
- https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Reverse%20Engineering.md#hre
- https://pdfs.semanticscholar.org/88ad/913424405ac32657a8557f74003b22e9be3c.pdf
- https://www.youtube.com/watch?v=tOqtI2v2xC0
- http://www.grandideastudio.com/wp-content/uploads/
- http://www.grandideastudio.com/wp-content/uploads/book_hackproof_ch14.pdf
- https://www.defcon.org/images/defcon-15/dc15-presentations/dc-15-gustin_and_ab3nd.pdf
- https://www.defcon.org/images/defcon-18/dc-18-presentations/King/DEFCON-18-King-Hardware-For-Software-Guys.pdf
- https://www.usenix.org/legacy/event/lisa05/make/grand.pdf
- https://www.rsaconference.com/writable/presentations/file_upload/hta-w04-tools-of-the-hardware-hacking-trade_final.pdf
- http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.473.1555&rep=rep1&type=pdf
- https://www.youtube.com/watch?v=76VTTvBWjSA
- https://media.blackhat.com/us-13/US-13-Zaddach-Workshop-on-Embedded-Devices-Security-and-Firmware-Reverse-Engineering-WP.pdf
- https://www.trust-hub.org/publications/P13.pdf
- http://ids.cs.columbia.edu/sites/default/files/ndss-2013.pdf
- https://www.blackhat.com/docs/us-14/materials/us-14-Oh-Reverse-Engineering-Flash-Memory-For-Fun-And-Benefit-WP.pdf
- http://www.dfrws.org/sites/default/files/session-files/paper-acquisition_and_analysis_of_compromised_firmware_using_memory_forensics.pdf
- https://www.nccgroup.trust/globalassets/our-research/uk/whitepapers/bh-vegas-07-heasman.pdf
- https://pdfs.semanticscholar.org/078e/bf9f4c7916e59db4711e726ee94e2e802d54.pdf
- https://www.researchgate.net/profile/Andrei_Costin/publication/259642928_Embedded_Devices_Security_and_Firmware_Reverse_Engineering/links/0deec52d05c795b2b3000000/Embedded-Devices-Security-and-Firmware-Reverse-Engineering.pdf?origin=publication_detail
- https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-costin.pdf
- https://media.blackhat.com/us-13/US-13-Zaddach-Workshop-on-Embedded-Devices-Security-and-Firmware-Reverse-Engineering-Slides.pdf
- awesome dumping firmware pdf
- http://is-ra.org/c0c0n/2014/Presentations/Track2/Making_and_breaking_security_in_embedded_devices.pdf
- https://recon.cx/2010/slides/goodspeed_recon10.pdf
- http://leat.unice.fr/JDD2016/files/JDD2016_AurelienFrancillon.pdf
- http://www.malwaretech.com/2015/04/hard-disk-firmware-hacking-part-1.html
- http://www.psdevwiki.com/ps4/Working_Exploits
- https://www.psxhax.com/threads/ps4-4-05-kernel-dumper-with-full-debug-settings-by-vvildcard777.3359/
- memory dump attack pdf
- https://www.ieee-security.org/TC/SP2015/papers-archived/6949a003.pdf
- http://www.cs.toronto.edu/~sahil/suneja-asplos15.pdf
- https://arxiv.org/ftp/arxiv/papers/1408/1408.0725.pdf
- http://www.sharcs-project.eu/m/documents/papers/a10-huber.pdf
- http://www.blackhat.com/presentations/bh-usa-08/McGregor/BH_US_08_McGregor_Cold_Boot_Attacks.pdf
- https://web.eecs.umich.edu/~taustin/papers/HPCA17-coldboot.pdf
- https://www.recred.eu/sites/default/files/fases2016_uprc.pdf
- http://grugq.github.io/presentations/
- https://extreme-modding.de/PS4/PS4_DEV/dump.html
- https://www.blackhat.com/docs/us-16/materials/us-16-Beery-The-Remote-Malicious-Butler-Did-It-wp.pdf
- https://security.stackexchange.com/questions/119269/mitigating-forensic-memory-acquisition-when-an-attacker-has-physical-access-to-a
- https://payatu.com/6tools4hwsecurity/
- https://www.blackhat.com/docs/webcast/04232014-tools-of-the-hardware-hacking-trade.pdf
- https://blog.securityevaluators.com/the-introductory-iot-hardware-hacking-tool-box-389c4605329f
- hardware hacking tools
- http://www.cs.toronto.edu/~sahil/suneja-asplos15.pdf
- http://d3s.mff.cuni.cz/teaching/crash_dump_analysis/slides/08-linux.pdf
- https://askubuntu.com/questions/35722/what-is-kernel-panic
- https://www.dedoimedo.com/computers/www.dedoimedo.com-crash-book.pdf
- https://net.cs.uni-bonn.de/fileadmin/ag/martini/Staff/barabosch_quincy_dimva2017.pdf
- https://www.blackhatsessions.com/presentaties/2017/BHS%20-%20Weaponizing%20the%20Raspberry%20Pi%20Zero.pdf
- https://www.blackhat.com/docs/us-17/wednesday/us-17-Bazhaniuk-BluePill-For-Your-Phone.pdf
- http://www.becil.com/uploads/tender/nullcon---Mobile-App-Attackpdf-3f74c838357a30a50730bb97ff54d21a.pdf
- https://www.bunniestudios.com/blog/?page_id=40
- https://cqureacademy.com/blog/forensics/memory-dump-analysis
- https://reverseengineering.stackexchange.com/questions/6716/dumping-a-file-loaded-into-memory
- https://github.com/volatilityfoundation/volatility
- https://unix.stackexchange.com/questions/119762/how-to-dump-memory-image-from-linux-system
- http://www.ucd.ie/cci/cync/Acquisition%20and%20Analysis%20of%20Android%20Memory.pdf
- https://www.youtube.com/user/kingpinempire/playlists
- https://www.chipdesignmag.com/blyler/2008/11/07/so-you-want-to-be-a-chip-designer/
- http://www.cl.cam.ac.uk/teaching/1011/SysOnChip/socdam-notes1011.pdf
- http://www.caida.org/research/security/
- Linux cross reference
- https://elixir.bootlin.com/linux/latest/source/Documentation
- https://www.linuxvoice.com/issues/003/LV3opencore.pdf
- http://www.eng.auburn.edu/~nelson/courses/elec5260_6260/Systems%20on%20Chip%20(SoC).pdf
- https://www.ele.uva.es/~jesman/BigSeti/ftp/Microcontroladores/ARM/Arm%20System-On-Chip%20Architecture.pdf
- https://www.cs.ccu.edu.tw/~chen/arch/SOC-design.pdf
- https://opencores.org/projects
- https://github.com/embecosm/chiphack/wiki
- http://www.artist-embedded.org/docs/Events/2006/ChinaSchool/1_ESIntroduction.pdf
- producing a System on chip pdf
- https://www.sintef.no/globalassets/upload/ikt/9031/microsyst-technol---ramm.pdf
- fabricating a System on chip pdf
- (Awesome Linux drivers) https://www.eecs.umich.edu/courses/eecs473/Labs/Lab4.pdf
- http://intestinate.com/pilfs/beyond.html
- (Awesome)http://exploringrpi.com/chapter16/
- http://split-code.com/external_blogs.html
- http://www.devttys0.com/2012/11/reverse-engineering-serial-ports/
- https://www.xjtag.com/about-jtag/jtag-a-technical-overview/
- http://www.sheffieldhardwarehackers.org.uk/wordpress/2015/12/the-hunt-for-j5/
- https://pinout.xyz/pinout/pin12_gpio18#
- http://www.cs.cmu.edu/~cjc/course/15740-report.htm
- http://www.au-kbc.org/comm/Docs/papers/Vipin_Analysis_of_open_source_WLAN_driver_paper.pdf
- http://www.grandideastudio.com/wp-content/uploads/avrsimon_manual.pdf
- http://www.grandideastudio.com/wp-content/uploads/dc17_bdg_slides.pdf
- https://www.reddit.com/r/Defcon/comments/4x6b6k/learning_enough_ee_to_design_a_badge/
- http://www.ganssle.com/startinges.htm
- https://dontstuffbeansupyournose.com/2014/03/22/why-writing-firmware-is-kinda-like-software-exploitation/
- https://github.com/REhints/BlackHat_2017/blob/master/Betraying%20the%20BIOS.pdf
- http://blog.asset-intertech.com/test_data_out/2017/08/book-review-rootkits-and-bootkits-reversing-modern-malware-and-next-generation-threats.html
- https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=7&cad=rja&uact=8&ved=0ahUKEwjrw4_ZmL_bAhVCvBQKHacpCV8QFghSMAY&url=http%3A%2F%2Fwww.blackhat.com%2Fpresentations%2Fbh-usa-09%2FKLEISSNER%2FBHUSA09-Kleissner-StonedBootkit-SLIDES.pdf&usg=AOvVaw3iyt-xxQ-gRbOvL9aQXg6y
- http://www.alex-ionescu.com/publications/OffensiveCon/offensive2018.pdf
- https://res.cloudinary.com/peerlyst/image/upload/v1506079671/post-attachments/bsidesams_2017-i-boot-when-u-boot_aiwjmo.pdf
- writing bootkits rsa con
- past year
- http://esec-lab.sogeti.com/static/publications/14-hitbamsterdam-reboot.pdf
- https://pdfs.semanticscholar.org/88ad/913424405ac32657a8557f74003b22e9be3c.pdf
- https://www.youtube.com/results?search_query=DMA+attack
- https://translate.google.com/translate?sl=es&tl=en&js=y&prev=_t&hl=en&ie=UTF-8&u=http%3A%2F%2Fjaicrab.org%2F%3F%26a%3DPs4%2FTools%2FUART&edit-text=
- https://github.com/raspberrypi/firmware/tree/master/boot/overlays
- https://github.com/hzeller/rpi-gpio-dma-demo
- https://github.com/tkmru/awesome-linux-rootkits
- https://int3.cc/products/the-shikra
- https://www.cs.sfu.ca/CourseCentral/433/bfraser/other/DriverCreationGuide.pdf
- https://github.com/hermanhermitage/videocoreiv/
- https://github.com/raspberrypi/firmware/wiki
- https://github.com/christinaa/rpi-open-firmware
- https://www.theseus.fi/bitstream/handle/10024/74679/Nguyen_Vu.pdf
- https://geidav.wordpress.com/2014/04/27/an-overview-of-direct-memory-access/
- DMA attack
- https://www.youtube.com/watch?v=Of6DemoMLaA
- https://www.blackhat.com/docs/us-14/materials/us-14-Weis-Protecting-Data-In-Use-From-Firmware-And-Physical-Attacks.pdf
- https://www.reddit.com/r/AskNetsec/comments/2dlgpu/dma_attacks_from_microcomputers/
- raspberry pi security issue
- DMA attack on raspberry pi
- https://www.blackhat.com/docs/us-17/wednesday/us-17-Trikalinou-Taking-DMA-Attacks-To-The-Next-Level-How-To-Do-Arbitrary-Memory-Reads-Writes-In-A-Live-And-Unmodified-System-Using-A-Rogue-Memory-Controller.pdf
- https://media.ccc.de/
- https://media.ccc.de/v/34c3-9111-public_fpga_based_dma_attacking
- https://github.com/ufrisk/pcileech
- https://github.com/ufrisk/pcileech-fpga
- https://www.cs.uic.edu/~s/papers/rundma2015/rundma2015.pdf
- https://www.cl.cam.ac.uk/projects/raspberrypi/tutorials/os/index.html
- https://www.embedded.com/design/mcus-processors-and-socs/4007119/Building-Bare-Metal-ARM-Systems-with-GNU-Part-1--Getting-Started
- https://stackoverflow.com/questions/29837892/how-to-run-a-c-program-with-no-os-on-the-raspberry-pi
- https://www.raspberrypi.org/forums/viewtopic.php?t=193286
- https://www.raspberrypi.org/forums/viewtopic.php?f=72&t=10850
- https://www.raspberrypi.org/forums/viewtopic.php?f=72&t=10167
- https://www.raspberrypi.org/forums/viewtopic.php?f=72&t=11966
- https://www.raspberrypi.org/forums/viewforum.php?f=72
- https://hackaday.com/2018/01/01/34c3-roll-your-own-network-driver-in-four-simple-steps/#more-287597
- https://www.youtube.com/watch?v=IKd4qTzkGfk
- https://www.google.com/search?q=SGX+protected+memory&ie=utf-8&oe=utf-8&client=firefox-b-ab
- https://www.google.com/search?client=firefox-b-ab&biw=1468&bih=937&ei=eNoYW-e5NsG8sAG2_rmgDA&q=memory+interposers+and+taps+to+read+memory&oq=memory+interposers+and+taps+to+read+memory&gs_l=psy-ab.3..33i21k1l2.2591.9539.0.9667.30.18.0.0.0.0.306.1846.2-5j2.7.0....0...1c.1.64.psy-ab..23.7.1841...33i160k1.0.lNygrHXlrNI
- https://www.amazon.co.uk/Art-Designing-Embedded-Systems/dp/0750686448
- designing embedded system
- Eben Upton, Jeffrey Duntemann - Learning Computer Architecture with Raspberry Pi (2016, Wiley)
- https://www.macs.hw.ac.uk/~hwloidl/Courses/F28HS/slides_RPi_arch.pdf
- Architecture of raspberry pi
- https://www.zdnet.com/article/build-your-own-supercomputer-out-of-raspberry-pi-boards/
- https://dqydj.com/raspberry-pi-hadoop-cluster-apache-spark-yarn/
- http://slackbook.org/html/book.html#SHELL
- https://cs107e.github.io/guides/gcc/
- iommu
- http://www.c7zero.info/stuff/DEFCON22-BIOSAttacks.pdf
- https://elinux.org/images/4/49/20140429-dma.pdf
- https://www.kernel.org/doc/html/v4.16/driver-api/dmaengine/client.html
- https://www.youtube.com/watch?v=FSw8Ff1SFLM
- http://www.cs.dartmouth.edu/~sergey/cs108/2014/TorreyGuestLecture-Hypervors.pdf
- https://www.blackhat.com/docs/us-14/materials/us-14-Torrey-MoRE-Shadow-Walker-The-Progression-Of-TLB-Splitting-On-x86-WP.pdf
- http://archive.hack.lu/2016/hacklu2016-jacob-torrey.pdf
- http://archive.hack.lu/2016/hacklu2016-jacob-torrey.pdf
- (Awesome important)https://www.youtube.com/watch?v=3LVeEjsn8Ts
- https://ieeexplore.ieee.org/document/762536/
- (Awesome)https://blog.invisiblethings.org/papers/
- https://www.blackhat.com/docs/us-17/thursday/us-17-Domas-Breaking-The-x86-Instruction-Set-wp.pdf
- https://www.linux-mips.org/wiki/JTAG
- https://www.youtube.com/channel/UC53CXO46H92Hz5eWKejlDow
- https://www.youtube.com/watch?v=oGuZNmBZbjk
- https://securinghardware.com/articles/BlackHat-Hardware-Training-Roadmap/
- https://www.blackhat.com/docs/us-15/materials/us-15-Thomas-Advanced-IC-Reverse-Engineering-Techniques-In-Depth-Analysis-Of-A-Modern-Smart-Card.pdf
- IC Reverse Engineering
- http://siliconzoo.org/tutorial.html
- https://www.iacr.org/archive/ches2009/57470361/57470361.pdf
- https://electronics.stackexchange.com/questions/13472/is-it-possible-to-reverse-engineer-a-chip-design
- http://web.archive.org/web/20120228232431/http://www.flylogic.net/blog/
- https://reverseengineering.stackexchange.com/questions/5878/reverse-engineering-modern-intel-cpus
- (DMA)https://www.linuxjournal.com/article/7104
- https://w3.cs.jmu.edu/kirkpams/550-f12/papers/linux_rootkit.pdf
- https://www.xml.com/ldd/chapter/book/ch13.html
- rootkits for linux pdf
- (Awesome)https://busybox.net/BusyBox.html
- https://stackoverflow.com/questions/12040303/how-to-access-physical-addresses-from-user-space-in-linux
- (Awesome) https://volatility-labs.blogspot.com/
- Awesome https://samsclass.info/121/121_S15.shtml
- https://www.blackhat.com/docs/us-16/materials/us-16-Leibowitz-Horse-Pill-A-New-Type-Of-Linux-Rootkit.pdf
- https://eldorado.tu-dortmund.de/bitstream/2003/22796/1/BuntenSlides.pdf
- http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.592.3150&rep=rep1&type=pdf
- https://www.first.org/resources/papers/conference2004/c17.pdf
- https://github.com/m0nad/Diamorphine
- https://www.kernel.org/doc/html/v4.13/kernel-hacking/hacking.html
- http://www.tldp.org/LDP/lkmpg/2.4/html/index.html
- https://stackoverflow.com/questions/21144994/writing-lkm-for-a-device
- (Awesome)http://phrack.org/issues/58/7.html
- https://opensource.com/life/16/8/almost-open-bios-and-firmware-update-tips-linux-users
- https://gist.github.com/mittman/6170722
- https://stackoverflow.com/questions/46148905/how-are-ramdumps-generated-on-a-system-crash
- https://lists.kernelnewbies.org/pipermail/kernelnewbies/2011-July/002676.html
- https://github.com/raspberrypi/firmware/tree/master/boot/overlays
- http://www.au-kbc.org/comm/Docs/papers/Vipin_Analysis_of_open_source_WLAN_driver_paper.pdf
- http://jaicrab.org/?&a=Ps4/Tools/UART
- (Awesome)https://www.cl.cam.ac.uk/~sps32/ECRYPT2011_1.pdf
- (Awesome)https://www.blackhat.com/docs/us-17/thursday/us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-Languages.pdf
- https://eprint.iacr.org/2015/147.pdf
- https://github.com/hardenedlinux/firmware-anatomy/blob/master/hack_ME/firmware_security.md
- https://github.com/abazhaniuk/Publications
- https://github.com/Cyb3rWard0g/Invoke-ATTACKAPI
- https://github.com/fvicente/bios-hack
- https://github.com/DonnchaC/coldboot-attacks
- https://github.com/robguti/firmware_security_docs/tree/master/bios
- https://github.com/jovanbulck/sgx-step
- https://github.com/ucsb-seclab/BootStomp
- https://github.com/NicoHood/SecureLoader#1-bootloader-overview
- https://www.blackhat.com/docs/asia-18/asia-18-Yang-UbootKit-A-Worm-Attack-for-the-Bootloader-of-IoT-Devices-wp.pdf
- (Awesome bootloader)https://github.com/tranvansang/iboot
- https://elinux.org/Bootloader_Security_Resources
- (Awesome bootloader step by step)https://www.youtube.com/watch?v=nyRWKe8jDbg
- (Awesome bootloader) https://firmwaresecurity.files.wordpress.com/2017/10/srcsea17.pdf
- https://securelist.com/absolute-computrace-revisited/58278/
- https://arstechnica.com/information-technology/2015/02/how-omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-at-last/
- https://security.stackexchange.com/questions/94493/rootkits-bootkits-detection-and-protection-and-firmware-alteration
- https://github.com/Cr4sh/ThinkPwn
- (Most awesome wifi hack)https://www.blackhat.com/docs/us-17/thursday/us-17-Artenstein-Broadpwn-Remotely-Compromising-Android-And-iOS-Via-A-Bug-In-Broadcoms-Wifi-Chipsets.pdf
- https://comsecuris.com/slides/recon2016-breaking_band.pdf
- https://www.coresecurity.com/system/files/publications/2016/05/corelabs-BlancoEissler_2012-paper.pdf
- https://en.wikipedia.org/wiki/I%C2%B2C
- https://www.virusbulletin.com/uploads/pdf/conference/vb2014/VB2014-RodionovMatrosov.pdf
- https://www.defcon.org/images/defcon-22/dc-22-presentations/Bulygin-Bazhaniul-Furtak-Loucaides/DEFCON-22-Bulygin-Bazhaniul-Furtak-Loucaides-Summary-of-attacks-against-BIOS.pdf
- https://alexandreborgesbrazil.files.wordpress.com/2014/04/malware_attack_bios.pdf
- https://www.youtube.com/watch?v=d6VCri6sPnY
- https://wikileaks.org/ciav7p1/cms/index.html
- https://www.youtube.com/watch?v=1cgtr7VW7gY
- https://www.defcon.org/images/defcon-20/dc-20-presentations/Brossard/DEFCON-20-Brossard-Hardware-Backdooring-is-Practical.pdf
- http://endrazine.com/
- https://media.blackhat.com/bh-us-12/Briefings/Brossard/BH_US_12_Brossard_Backdoor_Hacking_Slides.pdf
- https://security.stackexchange.com/questions/94576/questions-regarding-rakshasa
- http://www.ravagesecurity.com/
- https://www.schneier.com/blog/archives/2015/03/bios_hacking.html
- https://codeengn.com/file/conference/11/2014_CodeEngn_Conference_11_Android_Bootkit_Analysis_En_[%EA%B9%80%ED%98%B8%EB%B9%88].pdf
- https://www.syscan360.org/slides/2014_EN_AdvancedBootkitTechniquesOnAndroid_ChenZhangqiShendi.pdf
- Android bootkit
- https://www.youtube.com/watch?v=vDBwFSTucl8
- (Awesome bootkit)https://github.com/retme7/My-Slides
- https://security.stackexchange.com/questions/172556/can-an-android-malware-persist-even-after-uninstalling-it
- https://www.rsaconference.com/writable/presentations/file_upload/hta-t07a-anti-stealth-techniques-heuristically-detecting-x64-bootkits.pdf
- http://www.ntu.edu.sg/home/yangliu/publications/xiaohaothesis.pdf
- https://researcher.watson.ibm.com/researcher/files/us-ajvega/FastPath_Owen_Talk.pdf
- https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-redini.pdf
- (Awesome)https://trmm.net/LinuxBoot_34c3
- (Awesome)https://papers.put.as/firmware/firmware/
- https://www.google.com/search?q=Android+live+forensics&ie=utf-8&oe=utf-8&client=firefox-b-ab
- (Awesome)https://wiki.aalto.fi/download/attachments/84747235/presentation.pdf?version=1&modificationDate=1386936615719&api=v2
- https://github.com/RuntimeTools/gencore
- https://www1.cs.fau.de/filepool/gruhn/thesis_waechter.pdf
- https://eklitzke.org/ptrace
- https://www.udemy.com/how-to-implement-your-first-vhdl-design-on-fpga/
- https://en.cppreference.com/w/cpp/language/direct_initialization
- (Awesome)http://cradpdf.drdc-rddc.gc.ca/PDFS/unc160/p800486_A1b.pdf
- https://www.exploit-db.com/papers/41915/
- https://www.exploit-db.com/papers/42883/
- https://www.exploit-db.com/docs/english/44592-linux-restricted-shell-bypass-guide.pdf
- https://www.exploit-db.com/docs/english/42061-introduction-to-manual-backdooring.pdf
- https://www.abatchy.com/2017/05/introduction-to-manual-backdooring_24.html
- (Awesome) https://aaltodoc.aalto.fi/bitstream/handle/123456789/27914/master_Borek_Martin_2017.pdf?sequence=1&isAllowed=y
- (Awesome) http://opensecuritytraining.info/Rootkits.html
- (Awesome)https://blogs.technet.microsoft.com/markrussinovich/page/12/
- http://www.blackhat.com/presentations/bh-europe-06/bh-eu-06-Heasman.pdf
- https://www.htbridge.com/publication/inline_hooking_in_windows.pdf
- https://www.htbridge.com/whitepaper/Userland%20Hooking%20in%20Windows.pdf
- Red team book
- Blue team book
- https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Joshua-Smith-High-Def-Fuzzing-Exploitation-Over-HDMI-CEC-UPDATED.pdf
- https://media.blackhat.com/bh-eu-12/Davis/bh-eu-12-Davis-HDMI-Slides.pdf
- https://media.blackhat.com/bh-eu-12/Davis/bh-eu-12-Davis-HDMI-WP.pdf
- http://www.psdevwiki.com/ps3/Hypervisor_Reverse_Engineering
- Building isomorphic javascript app
- http://www.eecs.harvard.edu/~dbrooks/cs246-fall2004/google.pdf
- https://github.com/nccgroup/CECster
- (Awesome)http://xanthium.in/Serial-Port-Programming-on-Linux
- https://www.cyberciti.biz/hardware/5-linux-unix-commands-for-connecting-to-the-serial-console/
- http://www.blackhat.com/presentations/bh-dc-08/Krawetz/Whitepaper/bh-dc-08-krawetz-WP.pdf
- (Awesome)http://ubertooth.blogspot.com/2012/10/discovering-bluetooth-devices.html
- https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_fawaz.pdf
- (Awesome)https://github.com/pvachon/shmoocon_2018_talk/blob/master/shmoocon_slides.pdf
- https://www.youtube.com/watch?v=7awwG9aaR4c
- https://dzone.com/articles/cheap-software-defined-radio
- https://stackoverflow.com/questions/24057409/radio-frequency-triangulation-positioning
- (Awesome)https://www.youtube.com/watch?v=xneBjc8z0DE
- (Awesome)https://github.com/cn0xroot/RFSec-ToolKit
- https://penturalabs.wordpress.com/2013/09/01/ubertooth-open-source-bluetooth-sniffing/
- (Most awesome very very)http://travisgoodspeed.blogspot.com/
- https://www.youtube.com/watch?v=WqkmGG0biXc
- https://github.com/0xdevalias/devalias.net/blob/master/_posts/2018-05-13-usb-reverse-engineering-down-the-rabbit-hole.md
- https://electronics.stackexchange.com/questions/267/id-like-to-learn-how-to-make-my-own-usb-gadgets
- https://www.electronicshub.org/microcontroller-based-mini-projects-ideas/
- https://www.intel.co.uk/content/www/uk/en/history/museum-making-silicon.html
- https://www.google.com/search?client=firefox-b-ab&ei=RzwiW6rsIKKZgAa-94aABA&q=integrated+chip+projects&oq=integrated+chip+projects&gs_l=psy-ab.3..33i160k1l2.12875.14700.0.14866.9.8.0.0.0.0.411.897.2-2j0j1.3.0....0...1c.1.64.psy-ab..6.3.893...0i22i30k1.0.NOxNFa4R43I
- https://www.google.com/search?q=programmable+chip&ie=utf-8&oe=utf-8&client=firefox-b-ab
- https://www.bharathuniv.ac.in/colleges1/downloads/courseware_ece/notes/BEI605-%20Embedded-System.pdf
- https://www.electronicshub.org/vlsi-projects-for-engineering-students/
- (Awesome)http://antipastohw.blogspot.com/2009/08/introducing-illuminato-x-machina.html
- (Awesome)https://github.com/snyk/zip-slip-vulnerability
- http://www.lupinesystems.com/calc/
- https://www.digikey.co.uk/en/articles/techzone/2014/feb/using-nand-flash-for-run-time-code
- https://www.bigmessowires.com/bmow1/
- https://en.wikipedia.org/wiki/PIC_microcontroller
- https://electronics.stackexchange.com/questions/188314/how-to-make-1-bit-permanent-memory-circuit
- https://media.ccc.de/v/29c3-5327-en-writing_a_thumbdrive_from_scratch_h264
- https://github.com/YehudaShapira/xv6-explained/blob/master/Explanations.md
- Server related stuff
- Server for hacker
- Raspberry pi book
- Exploiting raspberry pi
- Hadoop with raspberry pi
- https://www.zdnet.com/article/build-your-own-supercomputer-out-of-raspberry-pi-boards/
- https://dqydj.com/raspberry-pi-hadoop-cluster-apache-spark-yarn/
- https://www.networkworld.com/article/3156748/computers/10-amazing-raspberry-pi-clusters.html#slide3
- https://www.youtube.com/watch?v=HdobynnfKQE&list=RDHdobynnfKQE&index=1
- https://www.gharchive.org/
- https://www.slideshare.net/tarun4568/uart-project-reprt-by-tarun-khaneja
- https://www.google.com/search?q=UART+based+project&ie=utf-8&oe=utf-8&client=firefox-b
- https://makezine.com/2014/02/25/how-to-choose-the-right-platform-raspberry-pi-or-beaglebone-black/
- https://github.com/everclear72216/meta-mb
- https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=13&ved=0ahUKEwi15vvYntDbAhWEbMAKHchSC-wQFgiBATAM&url=http%3A%2F%2Fjkridner.s3.amazonaws.com%2Fesc%2FESC-341_Dompe.pdf&usg=AOvVaw0aNHN2U6eHH4Xg3KAzSOBN
- https://www.crazypi.com/index.php?route=checkout/checkout
- https://elinux.org/BeagleBone_Community
- https://surface.syr.edu/cgi/viewcontent.cgi?article=1304&context=eecs_etd
- https://github.com/marmelab/awesome-rest
- http://stackabuse.com/single-page-apps-with-vue-js-and-flask-restful-api-with-flask/
- http://www.restapitutorial.com/lessons/whatisrest.html
- https://medium.com/@robince885/how-to-do-twitter-authentication-with-react-and-restful-api-e525f30c62bb
- https://github.com/rishmanisation/mini-twitter
- http://highscalability.com/blog/2013/7/8/the-architecture-twitter-uses-to-deal-with-150m-active-users.html
- https://stackoverflow.com/questions/319530/restful-authentication
- https://github.com/kasuken/fakerestapi
- https://fakerestapi.azurewebsites.net/
- https://stackoverflow.com/questions/37328684/should-i-use-get-or-post-when-requesting-sensitive-data
- https://assertible.com/blog/7-http-methods-every-web-developer-should-know-and-how-to-test-them
- https://stackoverflow.com/questions/2938502/sending-post-data-in-android
- https://www.j-michel.org/blog/2014/05/27/from-nand-chip-to-files
- hypervisor
- http://xhypervisor.org/
- https://en.wikipedia.org/wiki/L4_microkernel_family
- http://www3.cs.stonybrook.edu/~porter/hoss/
- http://standa-note.blogspot.com/2015/08/writing-hypervisor-for-kernel-mode-code.html
- Android app
- https://medium.com/@avigezerit/bluetooth-low-energy-on-android-22bc7310387a
- https://stackoverflow.com/questions/39698069/how-to-save-secret-key-securely-in-android/39749717
- https://www.androidauthority.com/how-to-hide-your-api-key-in-android-600583/
- https://medium.com/mindorks/writing-a-modular-project-on-android-304f3b09cb37
- https://reqres.in/
- https://www.javatpoint.com/java-reflection
- http://www.vogella.com/tutorials/AndroidLibraryProjects/article.html
- https://medium.com/@mydogtom/modularization-part-1-application-structure-overview-9e465909a9bc
- https://medium.com/google-developers/building-a-video-player-app-in-android-part-1-5-d95770ef762d
- (Awesome in itself)
- Peter norvig
- paulgraham
- http://www.algorithmist.com/index.php/Dynamic_Programming
- https://nostarch.com/ghpython.htm
- https://en.wikipedia.org/wiki/Remote_procedure_call
- https://www.youtube.com/watch?v=5Bf1i89hF38
- https://info.lookout.com/rs/051-ESQ-475/images/pegasus-exploits-technical-details.pdf
- https://stackoverflow.com/questions/2913618/how-is-integer-overflow-exploitable
- https://security.stackexchange.com/questions/68442/escalating-from-apache-shell-to-root/68482#68482
- https://security.stackexchange.com/questions/76845/how-to-gain-root-privilege-after-injecting-code-using-a-buffer-overflow-vulnerab
- https://sce.party/?page=timeline
- https://fail0verflow.com/blog/2016/console-hacking-2016-postscript/
- (Awesome fuzzing)http://lcamtuf.coredump.cx/
- (Awesome)https://www.slideshare.net/AkbarRomadhoni/detecting-and-exploiting-integer-overflows
- http://phrack.org/issues/60/10.html
- https://gbmaster.wordpress.com/2015/08/13/x86-exploitation-101-integer-overflow-adding-one-more-aaaaaaaaaaand-its-gone/
- http://www.utdallas.edu/~zhiqiang.lin/file/cs4393/lec03.pdf
- https://crypto.stanford.edu/cs155old/cs155-spring11/lectures/03-ctrl-hijack.pdf
- http://insidetrust.blogspot.com/2011/02/assessing-buffer-overflows-with-windbg.html
- https://web.archive.org/web/20061110115723/https://www.owasp.org/index.php/Integer_overflow
- http://cse.iitd.ernet.in/~cs5090248/sil765/p1/
- https://sploitfun.wordpress.com/2015/06/23/integer-overflow/
- https://pdfs.semanticscholar.org/presentation/1d3f/bb4428082cc993d8987f7d97015dc1f73984.pdf
- https://www.blackhat.com/docs/us-15/materials/us-15-Gong-Fuzzing-Android-System-Services-By-Binder-Call-To-Escalate-Privilege-wp.pdf
- http://www.cis.syr.edu/~wedu/seed/Labs_12.04/Vulnerability/Buffer_Overflow/
- PFLA (Page Fault Liberation Army)
- https://www.quora.com/Why-is-it-taking-so-long-for-someone-to-develop-a-Playstation-4-jailbreak
- http://www.eurasia.nu/modules.php?name=News&file=print&sid=3251
- http://crack.bargains/02r0.pdf
- https://github.com/hwroot/Presentations/blob/master/Mess%20with%20the%20best%20die%20like%20the%20rest%20mode%20by%20Volodymyr%20Pikhur%20-%20REcon%20Brussels%202018.pdf
- Browser security(Awesome)
- https://www.dfrws.org/sites/default/files/session-files/paper-forensic_analysis_of_a_sony_playstation_4_-_a_first_look.pdf
- http://wololo.net/2015/07/15/ps4-jailbreak-brazilian-method-how-to-dump-the-ps4-nor-video/
- (Awesome)https://www.corelan.be/index.php/2014/05/30/hitb2014ams-day-2-exploring-and-exploiting-ios-web-browsers/
- https://improsec.com/blog/exploit-development-environment
- https://dev.to/brpaz/my-linux-development-environment-of-2018-ch7
- https://www.learnenough.com/dev-environment-tutorial
- https://www.anitian.com/blog/a-study-in-exploit-development-part-1-setup-and-proof-of-concept/
- https://security.stackexchange.com/questions/24391/updated-version-of-browser-security-handbook
- https://www.offensivecon.org/trainings/2018/web-browser-exploitation-samuel-gross.html
- https://softwareengineering.stackexchange.com/questions/117786/high-level-design-of-a-browser-layout-engine
- https://crypto.stanford.edu/cs155/
- https://www.syscan.org/slides/2014_EN_BrowserFuzzing_RosarioValotta.pdf
- http://www.cs.tut.fi/tapahtumat/testaus12/kalvot/Wieser_20120606radamsa-coverage.pdf
- https://deepsec.net/docs/Slides/2012/DeepSec_2012_Rosario_Valotta_-_Taking_Browsers_Fuzzing_to_the_next_(DOM)_Level.pdf
- https://sec-consult.com/wp-content/uploads/files/vulnlab/the_art_of_fuzzing_slides.pdf
- http://2015.zeronights.org/assets/files/16-Brown.pdf
- https://hitcon.org/2014/downloads/P1_06_Chen%20Zhang%20-%20Smashing%20The%20Browser%20-%20From%20Vulnerability%20Discovery%20To%20Exploit.pdf
- http://cdn.ttgtmedia.com/rms/pdf/SearchSecurity.in_EXP_writing_tutorial.01.pdf
- https://archive.org/details/ARMArchitectureReferenceManual?q=webkit
- https://conference.hitb.org/hitbsecconf2014kul/materials/D2T2%20-%20Rosario%20Valotta%20-%20Browser%20Fuzzing%20in%202014.pdf
- https://web.archive.org/web/20090825035354/http://www.abysssec.com/blog/2009/08/how-to-write-browser-fuzzer/
- https://www.vdalabs.com/tools/
- https://fuzzing-project.org/tutorial2.html
- (Awesome)https://www.youtube.com/watch?v=BWFdxAG_TGk
- https://github.com/xairy/linux-kernel-exploitation
- (Most awesome and updated)https://www.thezdi.com/blog/2018/6/21/analyzing-an-integer-overflow-in-bitdefender-av-part-2-the-exploit
- https://4hou.win/wordpress/?p=20446
- https://labs.mwrinfosecurity.com/assets/BlogFiles/huawei-mate9pro-pwn2own-write-up-final-2018-04-26.pdf
- https://movaxbx.ru/2018/04/18/
- http://acez.re/author/acez/
- conventional dehazing
- https://www.cs.ru.nl/E.Poll/hacking/slides/hic3_stack.pdf
- https://www.youtube.com/watch?v=PrDsGldP1Q0
- https://samsclass.info/127/127_S17.shtml
- https://sweetness.hmmz.org/2018-01-01-the-mysterious-case-of-the-linux-page-table.html
- https://www.thegeekstuff.com/2010/11/50-linux-commands/
- https://resources.infosecinstitute.com/hacking-a-wordpress-site/#gref
- snoopsnitch
- http://www.textfiles.com/magazines/
- http://www.godevtool.com/GoasmHelp/usstack1.htm
- http://phrack.org/issues/59/11.html
- http://www.cs.virginia.edu/~ww6r/CS4630/lectures/Off-by-one-error.pdf
- https://sploitfun.wordpress.com/2015/06/07/off-by-one-vulnerability-stack-based-2/
- (Awesome)
- Unicode exploit
- https://www.corelan.be/index.php/2009/11/06/exploit-writing-tutorial-part-7-unicode-from-0x00410041-to-calc/
- https://www.securitysift.com/windows-exploit-development-part-7-unicode-buffer-overflows/
- https://www.giac.org/paper/gcih/115/iis-unicode-exploit/101163
- https://stackoverflow.com/questions/13024977/the-art-of-compiler-on-buffer-overflow
- (Awesome bypassing all protection)https://security.stackexchange.com/questions/20497/stack-overflows-defeating-canaries-aslr-dep-nx
- http://www.semantiscope.com/research/BHDC2010/BHDC-2010-Slides-v2.pdf
- https://softwareengineering.stackexchange.com/questions/195385/understanding-stack-frame-of-function-call-in-c-c
- https://fullyoptimized.files.wordpress.com/2011/10/fullyoptimizedconceptualpresentation-4.pptx
- https://hacks.mozilla.org/2017/09/firefox-quantum-developer-edition-fastest-firefox-ever/
- https://medium.com/mozilla-tech/the-search-for-the-goldilocks-browser-and-why-firefox-may-be-just-right-for-you-1f520506aa35
- http://sangbui.com/sb-files/BrowserArchitecture_ClientSide.pdf
- https://www.blackhat.com/docs/us-16/materials/us-16-Molinyawe-Shell-On-Earth-From-Browser-To-System-Compromise-wp.pdf
- https://www.exploit-db.com/exploits/44822/
- http://security.cs.rpi.edu/courses/binexp-spring2015/lectures/13/08_lecture.pdf
- https://www.evonide.com/side-channel-attacking-browsers-through-css3-features/
- https://blog.rapid7.com/2011/12/28/more-fun-with-bsd-derived-telnet-daemons/
- http://www.handgrep.se/repository/cheatsheets/postexploitation/LinuxUnixBSDPost-Exploitation.pdf
- https://www.blackhat.com/presentations/bh-usa-07/Ortega/Whitepaper/bh-usa-07-ortega-WP.pdf
- https://census-labs.com/media/bheu-2010-slides.pdf
- https://books.google.co.uk/books?id=XE-ddYF6uhYC&pg=PT470&lpg=PT470&dq=exploiting+bsd&source=bl&ots=GhGTjuWYJ-&sig=j-pxKD7tzbzZiEiBcUCPhjSKKNA&hl=en&sa=X&ved=0ahUKEwjb-8zhufDbAhXDCuwKHZtRCso4ChDoAQhFMAU#v=onepage&q=exploiting%20bsd&f=false
- https://books.google.co.uk/books?id=aidqstv38G8C&pg=PA405&lpg=PA405&dq=exploiting+bsd&source=bl&ots=9TpOhB5iyN&sig=DwIKKQ3dLOmxVucIvtWU2KIwYIQ&hl=en&sa=X&ved=0ahUKEwjb-8zhufDbAhXDCuwKHZtRCso4ChDoAQg6MAM#v=onepage&q=exploiting%20bsd&f=false
- https://books.google.co.uk/books?id=ZNI5dvBSfZoC&pg=PA440&lpg=PA440&dq=exploiting+bsd&source=bl&ots=YsBUNyygkv&sig=SrYbr2INnFmkgRBxokdixT3oApE&hl=en&sa=X&ved=0ahUKEwjb-8zhufDbAhXDCuwKHZtRCso4ChDoAQhXMAk#v=onepage&q=exploiting%20bsd&f=false
- http://insecure.org/sploits_bsd.html
- https://thenewstack.io/linux-bsd-solaris-servers-risk-compromise-stack-clash-flaw/
- https://www.exploit-db.com/platform/?p=FreeBSD
- ##############h##t$$t%%p^^s&&:**/((/))w!!i@@k##i$$l%%e^^a&&k**s((.))o!!r@@g##/$$c%%i^^a&&v**7((p))1!!/@@
- https://books.google.co.uk/books?id=G6Zeh_XSOqUC&pg=PA200&lpg=PA200&dq=exploiting+bsd&source=bl&ots=0z31_OwirK&sig=Q4n9v5XgXXXTFho3iZqaP7U7WtI&hl=en&sa=X&ved=0ahUKEwi1rK_vufDbAhUK_aQKHYHvDPE4FBDoAQhNMAg#v=onepage&q=exploiting%20bsd&f=false
- https://www.exploit-db.com/docs/english/24541-abusing,-exploiting-and-pwning-with-firefox-add-ons.pdf
- https://pen-testing.sans.org/resources/papers/gcih/0x333hatec-samba-remote-root-exploit-102967
- http://taligarsiel.com/Projects/howbrowserswork1.htm#The_browsers_we_will_talk_about
- https://grosskurth.ca/papers/browser-refarch.pdf
- https://www.crazyengineers.com/threads/how-internet-browsers-work-how-to-develop-a-browser.50353/
- https://web.archive.org/web/20081217140037/http://webkit.org:80/blog/
- http://weblogs.mozillazine.org:80/hyatt/archives/cat_safari.html
- https://weblogs.mozillazine.org/hyatt/archives/
- https://webkit.org/blog/66/the-fouc-problem/
- https://webkit.org/blog/114/
- http://www.swag.uwaterloo.ca/qldx/
- https://twitter.com/projectzerobugs?lang=en
- http://j00ru.vexillium.org/papers/2018/bochspwn_reloaded.pdf
- https://www.blackhat.com/docs/asia-16/materials/asia-16-Baloch-Bypassing-Browser-Security-Policies-For-Fun-And-Profit.pdf
- https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0ahUKEwj6kdyF1vDbAhUkuaQKHeAYD80QFggpMAA&url=https%3A%2F%2Fstorage.googleapis.com%2Fgoogle-code-attachments%2Fbrowsersec%2Fissue-8%2Fcomment-8%2FGoogle%2520Browser%2520Security%2520Handbook.pdf&usg=AOvVaw0NFVlOkfVvwqltygPxDqVk
- https://www.slideshare.net/HackIT-ukraine/15-technique-to-exploit-file-upload-pages-ebrahim-hegazy
- https://medium.com/bugbountywriteup/how-i-pwned-a-million-dollar-company-9fa5bfd234dd
- https://hackernoon.com/how-i-hacked-40-websites-in-7-minutes-5b4c28bc8824
- https://0day.work/hacking-with-latex/
- https://pentest-tools.com/website-vulnerability-scanning/discover-hidden-directories-and-files
- https://ucaat.etsi.org/2015/presentations/HTB_HODOVAN.pdf
- https://www.safaribooksonline.com/library/view/fuzzing-brute-force/9780321446114/ch18.html
- https://conference.hitb.org/hitbsecconf2017ams/materials/D2T2%20-%20Yu%20Hong%20-%20Attack%20Surface%20Extended%20by%20URL%20Schemes.pdf
- https://www.blackhat.com/docs/us-16/materials/us-16-Pearce-HTTP2-&-QUIC-Teaching-Good-Protocols-To-Do-Bad-Things.pdf
- https://www.giac.org/paper/gcih/361/port-80-apache-http-daemon-exploit/103818
- https://www.acunetix.com/blog/docs/http-fuzzer/
- https://deadliestwebattacks.com/tag/javascript/
- https://skillsmatter.com/skillscasts/11037-exploiting-rust-for-fun-and-profit
- https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=3&ved=0ahUKEwj4u-j97PDbAhXF2aQKHd1BBMwQFghIMAI&url=https%3A%2F%2Fwww.nccgroup.trust%2Fglobalassets%2Fresources%2Fus%2Fpresentations%2Fdocuments%2Fattacking_clientside_jit_compilers_paper.pdf&usg=AOvVaw0plrOjA82KZaetnWv3Ilul
- https://rh0dev.github.io/blog/2017/the-return-of-the-jit/
- https://web.stanford.edu/~mlfbrown/browsers.pdf
- https://github.com/PLSysSec/bindings
- https://phoenhex.re/2017-06-21/firefox-structuredclone-refleak
- https://www.usenix.org/legacy/event/woot08/tech/full_papers/daniel/daniel_html/index.html
- https://snyk.io/blog/exploiting-buffer/
- https://saelo.github.io/posts/firefox-script-loader-overflow.html
- https://cansecwest.com/slides/2015/Liang_CanSecWest2015.pdf
- https://react-etc.net/entry/web-security-exploits-c-to-javascript-webassembly
- https://www.blackhat.com/presentations/bh-usa-07/Sotirov/Whitepaper/bh-usa-07-sotirov-WP.pdf
- http://blog.exploitlab.net/
- https://www.blackhat.com/docs/us-15/materials/us-15-Yason-Understanding-The-Attack-Surface-And-Attack-Resilience-Of-Project-Spartans-New-EdgeHTML-Rendering-Engine-wp.pdf
- https://sec.jetlib.com/
- https://www.defcon.org/images/defcon-15/dc15-presentations/dc-15-west.pdf
- https://blog.hboeck.de/archives/868-How-Heartbleed-couldve-been-found.html
- https://blog.regehr.org/archives/1238
- https://shubs.io/cves-and-open-source-security-efforts/
- https://github.com/moloch--/cve-2016-1764
- Static analysis
- awesome Static analysis
- http://blog.vivekhaldar.com/post/22307062036/bug-finding-and-static-analysis-in-the-real-world
- https://github.com/mre/awesome-static-analysis
- https://www.defcon.org/images/defcon-15/dc15-presentations/dc-15-west.pdf
- https://ai.google/research/pubs/pub34339
- https://people.umass.edu/bijohnson/docs/icse2013.pdf
- https://github.com/open-source-parsers/jsoncpp/issues/390
- https://www.giac.org/paper/gcih/466/ipc-share-exploit-methodology-chinese-attackers/103860
- https://www.blackhat.com/docs/us-15/materials/us-15-Shen-Attacking-Your-Trusted-Core-Exploiting-Trustzone-On-Android.pdf
- https://www.amazon.co.uk/Exploiting-Software-Break-Addison-Wesley-Security/dp/0201786958
- Black hat python
- https://security.stackexchange.com/questions/134676/how-can-buffer-overflows-be-harmful-in-android
- https://www.blackhat.com/docs/eu-16/materials/eu-16-Jurczyk-Effective-File-Format-Fuzzing-Thoughts-Techniques-And-Results.pdf
- https://lcamtuf.blogspot.com/2014/11/pulling-jpegs-out-of-thin-air.html
- http://web.eecs.utk.edu/~mrjantz/papers/pgo.pdf
- https://www.slideshare.net/codeblue_jp/the-art-of-exploiting-unconventional-useafterfree-bugs-in-android-kernel-by-di-shen
- https://go.armis.com/hubfs/ExploitingBlueBorneLinuxBasedIoTDevices.pdf?t=1526581004434
- https://labs.mwrinfosecurity.com/publications/
- https://cansecwest.com/slides/2018/Attacks%20and%20Analysis%20of%20the%20Samsung%20S8%20from%20Mobile%20PWN2OWN%20-%20Guang%20Gong%20and%20Jianjun%20Dai,%20Qihoo%20360.pdf
- https://labs.mwrinfosecurity.com/assets/BlogFiles/G.-Geshev-and-Rob-Miller-Chainspotting.pdf
- https://stackoverflow.com/questions/18717016/what-are-ring-0-and-ring-3-in-the-context-of-operating-systems
- https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/
- https://mrh4sh.github.io/fristileaks-solution
- (Awesome)https://www.contextis.com/blog/linux-privilege-escalation-via-dynamically-linked-shared-object-library
- https://pdfs.semanticscholar.org/70d7/d873c72d0db9968650ad359c6ef915ffbb42.pdf
- https://hackmag.com/security/reach-the-root/
- https://sploitfun.wordpress.com/2015/05/08/bypassing-nx-bit-using-return-to-libc/
- https://j00ru.vexillium.org/papers/2018/bochspwn_reloaded.pdf
- https://stackoverflow.com/questions/47885043/proper-method-to-acquire-root-access-on-linux-for-qt-applications
- https://thehackernews.com/2016/11/hacking-linux-system.html
- https://tinyurl.com/yb3hmx6o
- https://www.giac.org/paper/gcih/146/vixie-crontab-exploit/100894
- https://www.blackhat.com/docs/eu-16/materials/eu-16-Shen-Rooting-Every-Android-From-Extension-To-Exploitation-wp.pdf
- https://www.google.com/search?q=js+fool&ie=utf-8&oe=utf-8&client=firefox-b-ab
- https://www.brookcourtsolutions.com/wp-content/uploads/2017/11/dark-web.pdf
- https://www.sacon.io/
- (Awesome)https://tc.gtisc.gatech.edu/bss/2014/r/kernel-exploits.pdf
- https://www.blackhat.com/presentations/bh-europe-07/Eriksson-Janmar/Presentation/bh-eu-07-eriksson.pdf
- (Awesome)http://analysis.seclab.tuwien.ac.at/projects/vifuzz/docs/exploit.pdf
- (Awesome)https://security.stackexchange.com/questions/85801/is-it-possible-for-malware-to-be-in-the-bios-or-in-hardware
- https://cansecwest.com/slides/2013/PrivateCore%20CSW%202013.pdf
- https://www.youtube.com/watch?v=Uz6G_YAQb2U
- https://en.wikipedia.org/wiki/Memory_controller
- http://pepijndevos.nl/2016/08/24/x86-instruction-distribution.html
- https://pdfs.semanticscholar.org/presentation/f753/1569fe893b0621bbf31f974a7269168513d0.pdf
- https://securinghardware.com/training/x86/
- https://recon.cx/2018/brussels/resources/slides/RECON-BRX-2018-Mess-with-the-best-die-like-the-rest_(mode).pdf
- https://www.iotsecurityfoundation.org/best-practice-guidelines/
- https://www.blackhat.com/docs/eu-16/materials/eu-16-Shen-Rooting-Every-Android-From-Extension-To-Exploitation-wp.pdf
- http://blog.frizk.net/
- https://www.slideshare.net/codeblue_jp/igor-skochinsky-enpub
- https://archive.fosdem.org/2017/schedule/event/valgrind_angr/attachments/slides/1797/export/events/attachments/valgrind_angr/slides/1797/slides.pdf
- http://samoa.incubator.apache.org/
- http://hack2learn.blogspot.com/
Advertisement
Add Comment
Please, Sign In to add comment