ravudavu

asdf

May 3rd, 2018
90
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 92.02 KB | None | 0 0
  1. 01000011x10001000x000100000100x010000010010
  2. ShellScript
  3. https://www.shellscript.sh/
  4.  
  5. Acl
  6. http://www.gsp.com/cgi-bin/mdroid.cgi?topic=extattrctl
  7. http://www.onlamp.com/pub/a/bsd/2003/08/14/freebsd_acls.html
  8. https://linux.die.net/man/1/setfacl
  9. https://www.bing.com/search?q=ACLs+with+Samba+andWindows&src=IE-TopResult&FORM=IETR02&conversationid=
  10. https://en.wikipedia.org/wiki/Chmod
  11. See references https://en.wikipedia.org/wiki/Access_control_list
  12. See see also https://en.wikipedia.org/wiki/Discretionary_access_control
  13. https://security.stackexchange.com/questions/63518/mac-vs-dac-vs-rbac
  14. Difference b/w mac and dac
  15. With MAC, admins creates a set of levels and each user is linked with a specific access level. He can access all the resources that are not greater than his access level. In contrast, each resource in DAC has a list of users who can access it. DAC provides access by identity of the user and not by permission level.
  16. Rbac
  17.  
  18. Canaries
  19. http://antoniobarresi.com/security/exploitdev/2014/05/03/64bitexploitation/
  20. https://stackoverflow.com/questions/24465014/gcc-generate-canary-or-not
  21.  
  22.  
  23. Authentication and Access control in linux os
  24. (Awesome)https://courses.cs.washington.edu/courses/cse484/11au/sections/section6.pdf
  25. http://www.tenouk.com/linuxunixsecurityfeatures.html
  26. https://link.springer.com/chapter/10.1007/978-3-642-23312-8_28
  27. https://www.safaribooksonline.com/library/view/linux-server-hacks/0596100825/ch01.html
  28. (Awesome)https://pdfs.semanticscholar.org/presentation/89f5/513e99544345cd86dfd7ef8ab386459cdd25.pdf
  29. Book https://www.amazon.com/Foundations-Security-Every-Programmer-Experts/dp/1590597842
  30. College
  31. https://courses.cs.washington.edu/courses/cse484/17au/schedule.html
  32. https://courses.cs.washington.edu/courses/cse484/11au/sections/
  33.  
  34. In above college in different year course is totally different.
  35.  
  36.  
  37. Buffer-overflow
  38. http://www.cse.scu.edu/~tschwarz/coen152_05/
  39. Howard and LeBlanc: Writing Secure Code, 2nd edition
  40. https://web.archive.org/web/20050325202927/http://www.nextgenss.com/papers/advanced_sql_injection.pdf
  41.  
  42. Dangling pointer
  43. https://developers.slashdot.org/story/10/04/13/1951246/how-to-exploit-null-pointers
  44. https://security.stackexchange.com/questions/61948/how-do-i-make-a-working-example-of-a-dangling-pointers-exploit-or-where-do-i
  45. https://blogs.oracle.com/linux/much-ado-about-null%3a-exploiting-a-kernel-null-dereference-v2
  46. Causes of dangling pointer
  47. 1.when global variable points the some variable in function or local block.
  48. 2.initialize ptr=NULL immediate after block completion
  49. Solution:
  50. After deallocation of memory, immediate initialize pointer to NULL
  51. http://codingstreet.com/what-is-dangling-pointer/
  52. (Awesome)http://www.cs.virginia.edu/~ww6r/CS4630/syllabus.html
  53.  
  54. linux filesystem
  55. http://www.tldp.org/LDP/intro-linux/html/index.html
  56.  
  57. Format String
  58. http://www.cs.virginia.edu/~ww6r/CS4630/
  59.  
  60. tocttou
  61. https://www.cl.cam.ac.uk/~rja14/Papers/SE-06.pdf
  62. https://www.bing.com/search?q=tocttou&src=IE-TopResult&FORM=IETR02&conversationid=
  63. https://github.com/tocttou
  64. http://users.cis.fiu.edu/~weijp/Jinpeng_Homepage_files/toctou-fast05.pdf
  65. https://www.usenix.org/sites/default/files/conference/protected-files/michele_woot12_slides.pdf
  66. http://www.sis.pitt.edu/jjoshi/courses/IS2620/Fall17/Lectures.html
  67. http://www.sis.pitt.edu/jjoshi/courses/IS2620/Fall17/Lecture6.pdf
  68. Ropfttw
  69. http://shell-storm.org/talks/ROP_course_lecture_jonathan_salwan_2014.pdf
  70. https://www.youtube.com/watch?v=5FJxC59hMRY
  71. https://drive.google.com/file/d/0B3U0fxyeeTTdcDJhbm5DcU1OQU0/view
  72. https://drive.google.com/file/d/0B3U0fxyeeTTdaGdQWGFvUFg5czQ/view
  73. https://en.wikipedia.org/wiki/Address_space_layout_randomization
  74.  
  75. Bypassing sehop
  76. https://repo.zenk-security.com/Reversing%20.%20cracking/Bypassing%20SEHOP.pdf
  77.  
  78. Heap_spray
  79. https://en.wikipedia.org/wiki/Heap_spraying
  80. (Awesome)http://security.cs.rpi.edu/courses/binexp-spring2015/
  81.  
  82. Integer overflow
  83. https://phoenhex.re/2017-06-02/arrayspread
  84.  
  85. X86-architecture
  86. https://stackoverflow.com/questions/18417849/difference-between-flat-memory-model-and-protected-memory-model
  87. https://en.wikipedia.org/wiki/Flat_memory_model
  88. Linux uses flat memory model.
  89. http://www.cs.virginia.edu/~evans/cs216/guides/x86.html
  90. https://gotocon.com/dl/goto-chicago-2014/slides/MattGodbolt_X86InternalsForFunAndProfit.pdf
  91. http://asmtutor.com/#lesson1
  92. https://software.intel.com/en-us/articles/intel-sdm
  93. https://stackoverflow.com/questions/1023593/how-to-write-hello-world-in-assembler-under-windows#answer-20032763
  94. https://software.intel.com/sites/default/files/m/d/4/1/d/8/Introduction_to_x64_Assembly.pdf
  95. https://aaronbloomfield.github.io/pdr/book/x86-64bit-asm-chapter.pdf
  96. http://aaronbloomfield.github.io/pdr/book/x86-64bit-ccc-chapter.pdf
  97. http://asmtutor.com/#lesson1
  98. https://www.informatik.htw-dresden.de/~beck/ASM/syscall_list.html
  99. https://web.archive.org/web/20041010205615/http://docs.cs.up.ac.za/programming/asm/derick_tut#syscalls
  100. https://www.informatik.htw-dresden.de/~beck/ASM/syscall_list.html
  101. https://stackoverflow.com/questions/9601427/is-inline-assembly-language-slower-than-native-c-code
  102. http://www.agner.org/optimize/
  103.  
  104. Elf format(Executable and linkable format)
  105. https://www.linuxjournal.com/article/1060
  106.  
  107. Calling convention
  108. https://en.wikipedia.org/wiki/Calling_convention
  109. https://stackoverflow.com/questions/41231637/how-does-a-function-call-work
  110. https://eli.thegreenplace.net/2011/02/04/where-the-top-of-the-stack-is-on-x86/
  111. https://en.wikipedia.org/wiki/Executable_and_Linkable_Format#Specifications
  112. http://www.agner.org/optimize/
  113. Kernel and boot processes
  114. http://duartes.org/gustavo/blog/post/
  115. http://www.tldp.org/LDP/intro-linux/html/index.html
  116. http://www.science.unitn.it/~fiorella/guidelinux/tlk/node5.html
  117. http://en.wikipedia.org/wiki/Reset_vector
  118. https://www.cs.cmu.edu/~410-s07/p4/p4-boot.pdf
  119.  
  120. Tmap,smap,smep, virtualisation and hypervisor
  121. For smep http://j00ru.vexillium.org/?p=783
  122. For smap https://en.wikipedia.org/wiki/Supervisor_Mode_Access_Prevention
  123. For tpm https://en.wikipedia.org/wiki/Trusted_Platform_Module
  124. https://en.wikipedia.org/wiki/Address_space_layout_randomization
  125.  
  126. Side channel attack
  127. https://en.wikipedia.org/wiki/Side-channel_attack
  128. https://www.peerlyst.com/posts/a-collection-of-links-to-pdfs-of-papers-on-micro-architectural-side-channel-attacks-sorted-by-date-paul-harvey
  129. Cache attack
  130. https://en.wikipedia.org/wiki/CPU_cache
  131. https://www.youtube.com/watch?v=vpGI1ggKzC4
  132. https://www.youtube.com/channel/UCG1HuJcwjA0Cp7a2-iGfWug
  133. http://palms.ee.princeton.edu/system/files/SP_vfinal.pdf
  134. https://github.com/defuse/flush-reload-attacks
  135. https://gruss.cc/files/cache_and_rowhammer_ruhrsec.pdf
  136. https://www.blackhat.com/docs/us-16/materials/us-16-Hornby-Side-Channel-Attacks-On-Everyday-Applications.pdf
  137. https://www.youtube.com/watch?v=DkWqLDSqHm8&list=PLH15HpR5qRsWx4qw9ZlgmisHOcKG4ZcRS&index=18
  138. http://web.cse.ohio-state.edu/~zhang.834/slides/tutorial17.pdf
  139. https://conference.hitb.org/hitbsecconf2016ams/materials/D2T1%20-%20Anders%20Fogh%20-%20Cache%20Side%20Channel%20Attacks.pdf
  140. http://www.cryptofails.com/post/70097430253/crypto-noobs-2-side-channel-attacks
  141. Timing attack
  142. https://www.youtube.com/watch?v=3v5Von-oNUg
  143. https://jochen-hoenicke.de/trezor-power-analysis/
  144. Acoustic attack
  145. https://www.cs.tau.ac.il/~tromer/acoustic/
  146. Search for lev pachnov
  147. Daniel gruss
  148. iaik graz university of technology
  149. https://www.youtube.com/user/BlackHatOfficialYT/playlists?disable_polymer=1
  150. https://rd.springer.com/chapter/10.1007/978-1-4419-1530-6_8
  151. https://www.usenix.org/node/184416
  152. https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-yarom.pdf
  153. https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-gruss.pdf
  154. https://www.blackhat.com/docs/us-16/materials/us-16-Hornby-Side-Channel-Attacks-On-Everyday-Applications.pdf
  155. https://www.cs.unc.edu/~reiter/papers/2014/CCS1.pdf
  156. https://github.com/IAIK/rowhammerjs
  157. https://www.blackhat.com/presentations/bh-usa-07/De_Haas/Presentation/bh-usa-07-de_haas.pdf
  158. https://en.wikipedia.org/wiki/Shared_memory
  159. Evict and time
  160. https://www.youtube.com/watch?v=ewe3-mUku94
  161. https://eprint.iacr.org/2005/271.pdf
  162. RowHammer
  163. https://www.blackhat.com/docs/us-15/materials/us-15-Seaborn-Exploiting-The-DRAM-Rowhammer-Bug-To-Gain-Kernel-Privileges-wp.pdf
  164. https://www.youtube.com/watch?v=1iBpLhFN_OA
  165. https://www.blackhat.com/docs/us-15/materials/us-15-Seaborn-Exploiting-The-DRAM-Rowhammer-Bug-To-Gain-Kernel-Privileges.pdf
  166. https://www.blackhat.com/docs/eu-16/materials/eu-16-Lipp-ARMageddon-How-Your-Smartphone-CPU-Breaks-Software-Level-Security-And-Privacy-wp.pdf
  167. (Awesome) https://www.vusec.net/projects/glitch/
  168. Rowhammer on Armageddon
  169. https://github.com/iaik/armageddon
  170. https://mlq.me/
  171. Moritz lipp
  172. AES
  173. http://www.moserware.com/2009/09/stick-figure-guide-to-advanced.html
  174. https://en.wikipedia.org/wiki/Rijndael_S-box
  175. https://shanetully.com/2012/06/openssl-rsa-aes-and-c/
  176. https://googleprojectzero.blogspot.co.uk/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
  177.  
  178. Javascript Internals spidermonkey
  179. http://www.phrack.org/issues/69/14.html#article
  180.  
  181. Computer organization
  182. http://pages.cs.wisc.edu/~arch/www/books.html
  183. https://www.quora.com/What-is-a-good-book-to-learn-computer-architecture
  184. http://williams.comp.ncat.edu/comp375/CacheSim.pdf
  185. (Awesome )http://www.cs.uni.edu/~diesburg/courses/cs3430_sp14/sessions/s14/s14_caching_and_tlbs.pdf
  186. (Awesome cache and tlb)http://inst.eecs.berkeley.edu/~cs162/sp11/sections/cs162-sp11-section6-answers.pdf
  187. https://www.quora.com/What-is-the-difference-between-TLB-and-MMU-in-OS
  188. http://www.agner.org/optimize/
  189.  
  190. Hardware reverse engineering
  191. http://security.cs.rpi.edu/courses/hwre-spring2014/
  192.  
  193. Malware analysis
  194. http://security.cs.rpi.edu/courses/malware-spring2013/
  195. Misc
  196. https://medium.com/mozilla-tech/why-rust-is-the-most-loved-language-by-developers-666add782563
  197. https://hardwaresecurity.training/trainings/hardware-hacking-spring-2018/
  198. https://github.com/mit-racecar/hardware
  199. https://events.static.linuxfound.org/sites/events/files/slides/AFL%20filesystem%20fuzzing,%20Vault%202016_0.pdf
  200. (Awesome list of links in last) https://dyjak.me/wp-content/uploads/2018/05/WarCon-2017-Interpreters-Under-Pressure.pdf
  201. (Awesome)https://www.nds.rub.de/media/nds/arbeiten/2015/10/30/Tim_Guenther-EsPReSSO-BA.pdf
  202. (Awesome book)https://download-mirror.savannah.gnu.org/releases/pgubook/ProgrammingGroundUp-1-0-booksize.pdf
  203. https://archive.org/details/ToorconArchiveInfocon
  204. https://techbeacon.com/best-security-conferences-2018
  205. http://mirror.easyname.at/nongnu/pgubook/ProgrammingGroundUp-1-0-booksize.pdf
  206. http://www.agner.org/optimize/
  207. https://digteam.github.io/assets/tocttou.pdf (Don't know what that is)
  208. https://www.youtube.com/user/SourcefireInc/playlists?disable_polymer=1
  209. https://www.youtube.com/channel/UCSii2fuiLLlGqaR6sR_y0rA
  210. https://www.youtube.com/channel/UCDNzNvZlYK8jZLsUbdiGrsQ
  211. ●[1] http://cseweb.ucsd.edu/~hovav/talks/blackhat08.html
  212. ● [2] http://cseweb.ucsd.edu/~hovav/dist/sparc.pdf
  213. ● [3] https://github.com/0vercl0k/rp
  214. ● [4] http://ropshell.com/ropeme/
  215. ● [5] https://github.com/pakt/ropc
  216. ● [6] https://github.com/awailly/nrop
  217. ● [7] http://shell-storm.org/project/ROPgadget/
  218. ● [8] https://www.comp.nus.edu.sg/~liangzk/papers/asiaccs11.pdf
  219. ● [9] https://www.lst.inf.ethz.ch/research/publications/PPREW_2013/PPREW_2013.pdf
  220. ● [10] http://www.scs.stanford.edu/brop/bittau-brop.pdf
  221. ● [11] https://labs.portcullis.co.uk/blog/ohm-2013-review-of-returning-signals-for-fun-and-profit/
  222. ● [12] http://shell-storm.org/repo/Notepad/ROP-chain-generation-via-backtracking-and-state-machine.txt
  223. http://www.tenouk.com/cncplusplusbufferoverflow.html
  224. https://www.sei.cmu.edu/research-capabilities/all-work/display.cfm?customel_datapageid_4050=21274
  225. https://www.youtube.com/channel/UCkysTPyA_48174c80rcITmA
  226. https://www.youtube.com/channel/UCMNvAtT4ak2azKNk6UlB1QQ
  227. https://github.com/vitalysim/Awesome-Hacking-Resources#reverse-engineering-buffer-overflow-and-exploit-development
  228. https://software.intel.com/en-us/articles/intel-sdm#combined
  229. http://www.tenouk.com/Bufferoverflowc/stackbasedbufferoverflow.html
  230. https://www.sei.cmu.edu/research-capabilities/all-work/display.cfm?customel_datapageid_4050=21274
  231. https://www.youtube.com/channel/UCkysTPyA_48174c80rcITmA
  232. https://www.youtube.com/channel/UCMNvAtT4ak2azKNk6UlB1QQ
  233. https://github.com/vitalysim/Awesome-Hacking-Resources#reverse-engineering-buffer-overflow-and-exploit-development
  234. https://software.intel.com/en-us/articles/intel-sdm#combined
  235. http://www.tenouk.com/Bufferoverflowc/stackbasedbufferoverflow.html
  236. (Awesome )http://www.cs.virginia.edu/~evans/cs216/
  237. https://github.com/offensive-security
  238. https://www.corelan.be/index.php/2009/09/21/exploit-writing-tutorial-part-6-bypassing-stack-cookies-safeseh-hw-dep-and-aslr/
  239. (primary) http://security.cs.rpi.edu/courses/binexp-spring2015/lectures/1/01_lecture.pdf
  240. https://kitctf.de/writeups/0ctf2015/freenote/
  241. https://sploitfun.wordpress.com/2015/03/04/heap-overflowusing-malloc-maleficarum/
  242. http://acez.re/ctf-writeup-hitcon-ctf-2014-stkof-or-modernheap-overflow/
  243. http://wapiflapi.github.io/2014/11/17/hacklu-oreo-withret2dl-resolve/
  244. http://phrack.org/issues/66/10.html
  245. http://dl.packetstormsecurity.net/papers/attack/MallocMaleficarum.txt
  246. (Awesome)https://samsclass.info/127/127_F15.shtml
  247. (Awesome codes)pip install -r requirements.txt --no-index --find-links file:///tmp/packages
  248. Compiler intrinsics
  249. https://www.linuxjournal.com/content/introduction-gcc-compiler-intrinsics-vector-processing
  250. https://stackoverflow.com/questions/7156908/sse-intrinsic-functions-reference
  251. https://msdn.microsoft.com/en-us/library/hh977022.aspx
  252. (Awesome list of vulnerablilities) https://www.cvedetails.com/
  253. Misc2
  254. https://dzone.com/articles/how-to-check-linux-process-deeply-with-common-sens
  255. https://doc.lagout.org/programmation/
  256. (Triple awesome) https://renenyffenegger.ch/notes/development/languages/C-C-plus-plus/GCC/create-libraries/index
  257. https://gms.tf/ld_library_path-considered-harmful.html
  258. (Awesome book resources) https://www.linuxtopia.org/online_books/
  259. https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Rants%26Writeups/Hacking%20Team%20Writeup.md
  260. https://www.mwrinfosecurity.com/events/past-events/
  261. (Awesome)https://www.cs.bgu.ac.il/~mahlert/TCPIP_Implementation/TCPIP_Implementation.pdf
  262. (Awesome)https://www.wiley.com/en-gb/Efficient+Algorithms+for+MPEG+Video+Compression-p-9780471379423
  263. (Awesome Alternatives of exploit db)https://security.stackexchange.com/questions/2715/exploit-db-like-websites-where-people-can-search-for-security-bugs
  264. https://leotindall.com/tutorial/an-intro-to-x86_64-reverse-engineering/
  265. http://resources.infosecinstitute.com/x86-assembly-reverse-engineering-part-2/
  266. https://smtebooks.com/book/602/practical-reverse-engineering-x86-x64-pdf
  267. http://overthewire.org/wargames/bandit/bandit0.html
  268. https://github.com/RPISEC/MBE
  269. https://jochen-hoenicke.de/trezor-power-analysis/
  270. https://eprint.iacr.org/2017/1169.pdf
  271. http://media.ntu.edu.sg/NewsReleases/Pages/newsdetail.aspx?news=e57faffc-24ea-4034-9181-f5fea9850690
  272. https://github.com/mseaborn
  273. https://github.com/HackathonHackers/groups
  274. https://github.com/HackathonHackers/personal-sites
  275. https://blog.feedspot.com/hacker_blogs/
  276. https://github.com/FabioBaroni/awesome-chinese-infosec-websites
  277. https://github.com/spacehackersclub/awesome-spacehackers
  278. https://heimdalsecurity.com/blog/best-twitter-cybersec-accounts/#cybersec specialists
  279. (makefile)https://gist.github.com/hallettj/29b8e7815b264c88a0a0ee9dcddb6210
  280. (makefile awesome)http://www.cs.colby.edu/maxwell/courses/tutorials/maketutor/
  281. (MMDense LSTM)https://scirate.com/arxiv/1805.02410
  282. https://github.com/pettarin/awesome-python-audio-research
  283. https://github.com/ganny26/awesome-audioqr
  284. https://github.com/ybayle/awesome-deep-learning-music
  285. https://github.com/sbrugman/deep-learning-papers#visual
  286. https://sisec.inria.fr/
  287. http://www.brendangregg.com/perf.html
  288. https://github.com/RRZE-HPC/likwid
  289. (Awesome)https://sourceware.org/glibc/wiki/AgnerWishlist
  290. (Awesome)https://wiki.osdev.org/Books
  291. (Awesome os list)http://pages.cs.wisc.edu/~remzi/OSTEP/
  292. (Awesome Aweome)https://wiki.osdev.org/Expanded_Main_Page
  293. (Awesome Linux os)http://man7.org/tlpi/
  294. (Awesome linux)http://people.ds.cam.ac.uk/pmb39/Linux/
  295. https://totalhash.cymru.com/
  296. (Awesome)http://thestarman.pcministry.com/asm/
  297. http://thestarman.pcministry.com/asm/debug/Segments.html
  298. https://web.archive.org/web/20130511233621/http://www.asmcommunity.net:80/book/
  299. https://alicebob.cryptoland.net/understanding-the-montgomery-reduction-algorithm/
  300. (Awesome) https://doc.lagout.org/security/
  301. http://timetobleed.com/
  302. (Awesome Awesome lots and lots of kernel video)https://www.youtube.com/user/hupstream/playlists
  303. https://softwareengineering.stackexchange.com/questions/200214/cross-compile-arm-program-to-intel
  304. (Elf format)https://www.youtube.com/watch?v=t09LFtfy4JU
  305. OS security
  306. https://github.com/maxking/linux-security-papers
  307. http://namei.org/presentations/linux-kernel-security-kca09.pdf
  308. http://namei.org/presentations/
  309. http://kernsec.org/wiki/index.php/Main_Page
  310. https://medium.com/@XiaohanZeng/i-interviewed-at-five-top-companies-in-silicon-valley-in-five-days-and-luckily-got-five-job-offers-25178cf74e0f
  311. https://medium.com/@zainrehmani/how-i-got-interviews-and-job-offers-from-companies-like-facebook-google-microsoft-amazon-dd4080b218d4
  312. Arm Security
  313. https://github.com/IAIK
  314. https://www.blackhat.com/docs/eu-16/materials/eu-16-Lipp-ARMageddon-How-Your-Smartphone-CPU-Breaks-Software-Level-Security-And-Privacy-wp.pdf
  315. https://doc.lagout.org/security/XXXX_ARM_exploitation.pdf
  316. http://mazsola.iit.uni-miskolc.hu/~drdani/docs_arm/
  317. (Tells about gcc arm)http://thehackerworkshop.com/?p=391
  318. https://www.youtube.com/watch?v=eM6TKcIwqI4
  319. https://azeria-labs.com/
  320. ARM Bare Metal Programming
  321. (Awesome)http://www.bravegnu.org/gnu-eprog/index.html
  322. (Awesome Combining c and c++) https://stackoverflow.com/questions/3789340/combining-c-and-c-how-does-ifdef-cplusplus-work
  323. https://blahcat.github.io/2017/06/25/qemu-images-to-play-with/
  324. http://www.toves.org/books/arm/
  325. Shared Memory
  326. https://www.dfrws.org/sites/default/files/session-files/paper-monitoring_access_to_shared_memory-mapped_files.pdf
  327.  
  328. Android
  329. https://www.dei.unipd.it/~fantozzi/esp1617/files/Android%20NDK.pdf
  330. https://blog.xamarin.com/preparing-for-native-library-linking-changes-in-android-n/
  331. https://link.springer.com/content/pdf/10.1007/978-1-4302-6131-5_7.pdf
  332. https://rathodpratik.wordpress.com/2013/03/24/build-cc-executables-for-android-using-ndk/
  333. https://groups.google.com/forum/#!topic/android-ndk/8oq_QcNtuOY
  334. http://www.ikerhurtado.com/android-ndk-build-system
  335. (Awesome) http://android.mk/
  336. http://technologeeks.com/course.jl?course=AIRE
  337. http://androiddoc.qiniudn.com/tools/help/shell.html
  338. http://newandroidbook.com/code/android-6.0.0_r1/ndk/docs/Programmers_Guide/html/md_1__concepts__concepts.html#nstl
  339. http://web.guohuiwang.com/technical-notes/nativelauncher
  340. https://biblioteka.awf.katowice.pl/docs/lfi0d3o.php?cesy=android-run-adb-in-code
  341. http://grokbase.com/t/gg/android-ndk/123tfxvqyb/how-can-i-run-c-binary-executable-file-in-android-from-android-shell
  342. http://gimite.net/en/index.php?Run%20native%20executable%20in%20Android%20App
  343. https://www.arc4dia.com/blog/building-and-debugging-command-line-programs-on-android/
  344. https://source.android.com/devices/architecture/hidl/
  345. https://developers.google.com/training/android/
  346. https://www.anysoftwaretools.com/best-android-development-resources/
  347. Best forums to discuss android
  348. https://android-developers.googleblog.com/2016/06/android-changes-for-ndk-developers.html
  349. https://www.all-things-android.com/content/understanding-android-file-hierarchy
  350. https://code.tutsplus.com/tutorials/advanced-android-getting-started-with-the-ndk--mobile-2152
  351. (Awesome)http://betelco.blogspot.co.uk/2010/01/buildingdebugging-android-native-c.html
  352. https://stackoverflow.com/questions/12995030/how-to-use-adb-pull-command
  353. https://stackoverflow.com/questions/8650407/how-to-copy-selected-files-from-android-with-adb-pull
  354. https://stackoverflow.com/questions/9868309/how-to-compile-c-into-an-executable-binary-file-and-run-it-in-android-from-andro
  355. https://www.quora.com/What-is-the-best-book-for-understanding-the-Android-operating-system
  356. https://stackoverflow.com/questions/48069141/android-shell-command-options-explained
  357. (Awesome and Simple)ftp://ftp.wayne.edu/ldp/en/Linux-Android-HOWTO/
  358. (Awesome)https://hub.packtpub.com/creating-compiling-and-deploying-native-projects-android-ndk/
  359. https://stackoverflow.com/questions/1636901/can-linux-apps-be-run-in-android
  360. http://wyatt8740.no-ip.org/android.html
  361. https://stackoverflow.com/questions/4703131/is-it-possible-to-run-a-native-arm-binary-on-a-non-rooted-android-phone
  362. https://www.slideshare.net/kost/android-porting-47896523
  363. Good books
  364. https://nostarch.com/tlpi
  365. https://lwn.net/Kernel/Index/
  366.  
  367. TLB attacks
  368. https://www.ieee-security.org/TC/SP2013/papers/4977a191.pdf
  369.  
  370. Cache
  371. https://www.linuxjournal.com/article/7105
  372. https://en.wikipedia.org/wiki/Cache_(computing)
  373. https://www.thomas-krenn.com/en/wiki/Linux_Page_Cache_Basics
  374. https://www.thegeekstuff.com/2012/02/linux-memory-swap-cache-shared-vm/
  375. https://www.google.co.uk/search?q=cache+management+in+linux&oq=cache+management+in+linux&aqs=chrome..69i57.7055j0j1&sourceid=chrome&ie=UTF-8
  376. https://www.youtube.com/channel/UCzf_XjIoKSf4Ve2fH7xn-3A
  377. https://www.youtube.com/watch?v=SfPlpvtZ53o
  378. http://www.informit.com/articles/article.aspx?p=29961&seqNum=4
  379. https://www.usenix.org/legacy/event/usenix01/freenix01/full_papers/riel/riel_html/
  380. http://www.infradead.org/~mchehab/kernel_docs/unsorted/cachetlb.html
  381. https://stackoverflow.com/questions/4812137/does-the-mmu-mediate-everything-between-the-operating-system-and-physical-memory
  382. (Awesome) https://pdfs.semanticscholar.org/presentation/afe5/e48e9a61a804dd39d3c2f69b834a4d14d9c3.pdf
  383. (Awesome)http://www.stillhq.com/pdfdb/000446/data.pdf
  384. https://www.tomshardware.com/reviews/Intel-i7-nehalem-cpu,2041-2.html
  385. http://cseweb.ucsd.edu/classes/su09/cse120/lectures/Lecture7.pdf
  386. (Awesome)https://www.youtube.com/user/NmeictEnggTechnology/playlists
  387. (Application binary inteface)https://www.youtube.com/watch?v=g8A0Wa7REZI
  388. (Awesome Awesome Awesome) https://stackoverflow.com/questions/2171177/what-is-an-application-binary-interface-abi
  389. https://www.everything2.com/index.pl?node=iBCS
  390. (cache Linux kernel awesome)https://www.kernel.org/doc/gorman/html/understand/understand006.html
  391. (Umass os)https://www.youtube.com/user/UMassOS/playlists
  392. http://www.rfwireless-world.com/Tutorials/ARM-tutorial.html
  393. https://www.youtube.com/watch?v=c9rQmBcJpfk
  394. http://events17.linuxfoundation.org/sites/events/files/slides/slides_10.pdf
  395. https://en.wikipedia.org/wiki/Cache_coherence
  396. (Awesome os notes)https://cseweb.ucsd.edu/classes/su09/cse120/schedule.html
  397. (Awesome cache notes)https://courses.cs.washington.edu/courses/cse378/09wi/lectures/lec15.pdf
  398. http://snir.cs.illinois.edu/PDF/Temporal%20and%20Spatial%20Locality.pdf
  399. https://cmaurice.fr/pdf/raid15_maurice.pdf
  400. (Awesome Cache) https://eprint.iacr.org/2015/905.pdf
  401. https://wiki.debian.org/Hugepages
  402.  
  403. Linux system calls
  404. https://blog.packagecloud.io/eng/2016/04/05/the-definitive-guide-to-linux-system-calls/
  405.  
  406. Arm asm
  407. http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.dui0205j/Cihccdja.html
  408. http://www.ic.unicamp.br/~celio/mc404-s2-2015/docs/ARM-GCC-Inline-Assembler-Cookbook.pdf
  409. (Most Awesome inline)http://www.ethernut.de/en/documents/arm-inline-asm.html
  410. http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.100748_0606_00_en/ddx1471430827125.html
  411. (Most Awesome)http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.dui0056d/BABIJCGF.html
  412. (Awesome arm commands reference)http://www.keil.com/support/man/docs/armasm/armasm_dom1361289850039.htm
  413. https://github.com/kevinhooke/learning-arm-asm
  414. http://alanclements.org/ARMgradedExamples.pdf
  415. https://github.com/Croydon/assembler-arm
  416.  
  417. Arm cache architecture
  418. https://community.arm.com/processors/b/blog/posts/caches-and-self-modifying-code
  419. http://infocenter.arm.com/help/topic/com.arm.doc.ddi0201d/DDI0201D_arm946es_r1p1_trm.pdf
  420. http://events17.linuxfoundation.org/sites/events/files/slides/slides_10.pdf
  421. http://www.ee.ncu.edu.tw/~jfli/soc/lecture/ARM9.pdf
  422. https://www.nxp.com/files-static/training_pdf/WBT_27182_IMX31_CPU.pdf
  423.  
  424. Inline assembly
  425. https://www.cs.virginia.edu/~clc5q/gcc-inline-asm.pdf
  426. https://gcc.gnu.org/onlinedocs/gcc-4.3.0/gcc/Extended-Asm.html#Extended-Asm
  427. https://sourceware.org/binutils/docs-2.18/as/index.html
  428. (Most Awesome best)http://www.ibiblio.org/gferg/ldp/GCC-Inline-Assembly-HOWTO.html
  429. (Short and concise, derived form other two)https://www.codeproject.com/Articles/15971/Using-Inline-Assembly-in-C-C
  430. (Something something)https://www.codeproject.com/Articles/5318/Extended-Inline-Assembly-in-GCC
  431. http://cholla.mmto.org/computers/gcc_inline.html
  432. https://locklessinc.com/articles/gcc_asm/
  433. https://forum.osdev.org/viewtopic.php?f=1&t=26751
  434.  
  435. Security
  436. https://github.com/cryptax/confsec
  437. https://copperhead.co/blog/2015/05/11/aslr-android-zygote
  438. https://grsecurity.net/
  439. http://www.blackhat.com/presentations/bh-usa-07/Maynor_and_Graham/Whitepaper/bh-usa-07-maynor_and_graham-WP.pdf
  440. https://www.rapid7.com/db/search?utf8=%E2%9C%93&q=android&t=v
  441. https://www.cvedetails.com/
  442. http://www.securityfocus.com/bid/102976
  443. https://twitter.com/mingjian_zhou?lang=en
  444. http://c0reteam.org/2016/01/06/cve-20153865
  445. https://source.android.com/security/overview/acknowledgements
  446. https://www.youtube.com/user/mediacccde/playlists
  447. https://defuse.ca/
  448.  
  449. Makefile
  450. https://news.ycombinator.com/item?id=15041986
  451. https://gist.github.com/isaacs/62a2d1825d04437c6f08
  452.  
  453. Bash shell
  454. https://google.github.io/styleguide/shell.xml
  455.  
  456. Cmake
  457. https://github.com/onqtam/awesome-cmake
  458.  
  459. Finding size of cache
  460. https://stackoverflow.com/questions/794632/programmatically-get-the-cache-line-size
  461. https://community.arm.com/processors/f/discussions/5807/how-get-armv7-cache-size
  462.  
  463. Android vulnerability
  464. https://github.com/vusec/drammer
  465. Searching in android vulnerability list, they give full twitter info of hacker then find them find their website find blogs etc.
  466. https://www.slideshare.net/jiahongfang5/qualcomm2015-jfang-nforest
  467. https://www.blackhat.com/docs/us-15/materials/us-15-Xu-Ah-Universal-Android-Rooting-Is-Back-wp.pdf
  468. https://www.google.com/search?client=firefox-b-ab&ei=lc0PW4TXH4i4swG1zYZA&q=Find+your+own+Androidkernel+bug+pdf&oq=Find+your+own+Androidkernel+bug+pdf&gs_l=psy-ab.3...9041.12780.0.13195.8.7.1.0.0.0.358.1444.2-4j1.5.0....0...1c.1.64.psy-ab..3.1.264...33i160k1.0.sjMy_Nr7Qcw
  469. https://www.blackhat.com/docs/eu-17/materials/eu-17-Corina-Difuzzing-Android-Kernel-Drivers.pdf
  470. Mobile Application Penetration Testing
  471. http://cloak-and-dagger.org/
  472. http://events17.linuxfoundation.org/sites/events/files/slides/LSS%20-%20Treble%20%27n%27%20SELinux_0.pdf
  473. https://alephsecurity.com/
  474. https://github.com/dweinstein/android_notes/wiki/AndroidApplicationStartup
  475. https://census-labs.com/media/shadow-infiltrate-2017.pdf
  476. https://www.blackhat.com/docs/eu-16/materials/eu-16-Shen-Rooting-Every-Android-From-Extension-To-Exploitation.pdf
  477. (Awesome)https://github.com/jacobsoo/AndroidSlides, http://www.droidsec.org/wiki/#miscellaneous, https://github.com/SecWiki/android-kernel-exploits
  478. (Very Very awesome)https://www.sudo.ws/
  479. (Awesome) https://reverseengineering.stackexchange.com/questions/206/where-can-i-as-an-individual-get-malware-samples-to-analyze
  480. https://mobilesecuritywiki.com/
  481. https://github.com/xtiankisutsa/awesome-mobile-CTF
  482. https://github.com/ashishb/android-security-awesome
  483. https://abuse.ch/
  484. https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Exploit%20Development.md#expapers
  485. https://github.com/ele7enxxh/android_vuln_poc-exp
  486. https://ruxcon.org.au/
  487. https://ruxcon.org.au/assets/2017/slides/A_Whole_New_Efficient_Fuzzing_Strategy_for_Stagefright_Porting_and_Optimisations.pptx
  488. https://github.com/jiayy/android_vuln_poc-exp/
  489. https://www.youtube.com/watch?v=q_HibdrbIxo&index=8&list=PLtPrYlwXDImiO_hzK7npBi4eKQQBgygLD
  490. https://github.com/Screetsec/TheFatRat
  491. https://gist.github.com/MattKetmo/96d703bc23ce432d4591
  492. https://joshuawise.com/projects
  493. https://github.com/linkedin/qark
  494. https://blog.zimperium.com/the-latest-on-stagefright-cve-2015-1538-exploit-is-now-available-for-testing-purposes/
  495. https://security.stackexchange.com/questions/40012/writing-android-exploits
  496. http://www.xipiter.com/practical-android-exploitation.html
  497. https://github.com/xairy/linux-kernel-exploitation
  498. http://bits-please.blogspot.co.uk/2015/08/android-linux-kernel-privilege.html
  499. https://www.securityfocus.com/news/11189
  500. http://analysis.seclab.tuwien.ac.at/projects/vifuzz/docs/exploit.pdf
  501. (Awesome Step by step) https://ionize.com.au/android-exploit-development-android-open-source-project-toolchain/
  502. https://www.exploit-db.com/platform/?p=Android
  503. https://github.com/SecWiki/android-kernel-exploits
  504. http://analysis.seclab.tuwien.ac.at/projects/vifuzz/docs/exploit.pdf
  505. key Search term = Writing exploits for device drivers
  506. Key Search term = how to write exploit for android , Fuzzing drivers
  507. https://www.vulnhub.com/
  508. https://github.com/smeso/MTPwn
  509. https://mobile-security.zeef.com/oguzhan.topgul
  510. https://www.hackers-arise.com/single-post/2017/09/20/Exploiting-Nearly-Any-Windows-System-Using-CVE-2017-8759
  511. https://github.com/FabioBaroni/awesome-exploit-development
  512. writing security tools and exploits
  513. https://conference.hitb.org/hitbsecconf2018ams/materials/D1T2%20-%20Yong%20Wang%20&%20Yang%20Song%20-%20Rooting%20Android%208%20with%20a%20Kernel%20Space%20Mirroring%20Attack.pdf
  514. Android hacker's handbook
  515. learn pentesting on android
  516. Android internals jonathan Levin
  517. http://conference.hitb.org/hitbsecconf2017ams/materials/
  518. https://www.blackhat.com/docs/us-16/materials/us-16-Zhang-Dangerous-Hare-Hanging-Attribute-References-Hazards-Due-To-Vendor-Customization.pdf
  519. https://www.blackhat.com/us-17/briefings.html#avpass-leaking-and-bypassing-antivirus-detection-model-automatically
  520. https://www.blackhat.com/us-17/briefings.html#broadpwn-remotely-compromising-android-and-ios-via-a-bug-in-broadcoms-wi-fi-chipsets
  521. https://www.blackhat.com/us-17/briefings.html#cloak-and-dagger-from-two-permissions-to-complete-control-of-the-ui-feedback-loop
  522. https://www.blackhat.com/us-17/briefings.html#defeating-samsung-knox-with-zero-privilege
  523. https://www.blackhat.com/us-17/briefings.html#many-birds-one-stone-exploiting-a-single-sqlite-vulnerability-across-multiple-software
  524. https://www.blackhat.com/docs/us-17/thursday/us-17-Jung-AVPASS-Leaking-And-Bypassing-Anitvirus-Detection-Model-Automatically.pdf
  525. https://www.blackhat.com/docs/us-16/materials/us-16-Zhang-Dangerous-Hare-Hanging-Attribute-References-Hazards-Due-To-Vendor-Customization.pdf
  526. https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/liu
  527. https://www.rsaconference.com/writable/presentations/file_upload/mbs-f03-android-serialization-vulnerabilities-revisited.pdf
  528. https://www.rsaconference.com/writable/presentations/file_upload/hta-r10-hey-android-where-is-my-car.pdf
  529. https://www.rsaconference.com/writable/presentations/file_upload/mbs-r14-how-automated-vulnerability-analysis-discovered-hundreds-of-android-0-days.pdf
  530. https://www.rsaconference.com/writable/presentations/file_upload/mbs-r14-how-automated-vulnerability-analysis-discovered-hundreds-of-android-0-days.pdf
  531. https://www.ruhrsec.de/2018/#talks
  532. https://www.slideshare.net/CanSecWest/csw2017-geshevmiller-logic-bug-hunting-in-chrome-on-android
  533. (Awesome Might be on android as well) https://labs.mwrinfosecurity.com/assets/BlogFiles/apple-safari-wasm-section-vuln-write-up-2018-04-16.pdf
  534. (It might help awesome)https://www.blackhat.com/us-17/training/schedule/index.html#android-application-hacking----penetration-and-reversing-mobile-apps-5628
  535. https://github.com/hackedteam?tab=repositories
  536.  
  537. Deepfakes
  538. https://github.com/goberoi/faceit
  539. https://github.com/alew3/faceit_live
  540. https://github.com/deepfakes/faceswap
  541. https://medium.com/huia/live-deep-fakes-you-can-now-change-your-face-to-someone-elses-in-real-time-video-applications-a4727e06612f
  542.  
  543. Writing Cache friendly code
  544. (Awesome search term)Writing cache friendly code
  545.  
  546. Linux MMu
  547. https://events.static.linuxfound.org/sites/events/files/slides/elc_2016_mem.pdf
  548.  
  549. Chip
  550. https://en.wikichip.org/wiki/mediatek/helio/mt6755
  551. https://www.mediatek.com/products/smartphones/mt6755-helio-p10#
  552.  
  553. Virtual memory
  554. https://blog.jeffli.me/blog/2014/11/08/pagemap-interface-of-linux-explained/
  555. https://www.kernel.org/doc/Documentation/vm/pagemap.txt
  556. https://www.youtube.com/watch?v=qcBIvnQt0Bw&list=PLiwt1iVUib9s2Uo5BeYmwkDFUh70fJPxX
  557. https://events.static.linuxfound.org/sites/events/files/slides/elc_2016_mem.pdf
  558. https://www.bottomupcs.com/virtual_addresses.xhtml
  559. https://stackoverflow.com/questions/44520047/what-is-the-page-size-for-32-and-64-bit-versions-of-windows-os
  560. https://stackoverflow.com/questions/33722205/how-many-page-tables-do-intel-x86-64-cpus-access-to-translate-virtual-memory
  561. (Awesome)http://www.cirosantilli.com/x86-paging/
  562. http://www.ic.unicamp.br/~celio/mc404-2013/arm-manuals/Paging%20Systems.pdf
  563. http://lackingrhoticity.blogspot.co.uk/2015/05/how-physical-addresses-map-to-rows-and-banks.html
  564.  
  565. Awesome kali and exploit
  566. https://github.com/secfigo/Awesome-Fuzzing
  567. https://gist.github.com/natesubra/5117959c660296e12d3ac5df491da395
  568. http://www.fuzzysecurity.com/links.html
  569. https://github.com/FabioBaroni/awesome-exploit-development
  570. https://www.corelan.be/
  571. https://null-byte.wonderhowto.com/how-to/exploit-development-everything-you-need-know-0167801/
  572. https://www.hackers-arise.com/single-post/2017/06/21/Exploit-Development-Part-3-Finding-Vulnerabilities-by-Fuzzing-with-Spike
  573. https://uk.sans.org/course/advanced-exploit-development-penetration-testers
  574. https://en.wikipedia.org/wiki/Fravia
  575. http://www.ctyme.com/rbrown.htm
  576. https://news.ycombinator.com/item?id=4121062
  577. https://github.com/Hack-with-Github
  578. https://github.com/yeyintminthuhtut/Awesome-Study-Resources-for-Kernel-Hacking
  579. awesome exploit development
  580. https://github.com/apsdehal/awesome-ctf
  581. (Awesome)https://github.com/gregkh/kernel-development
  582. (Awesome)https://github.com/fffaraz/kernel
  583. https://github.com/aleksandar-todorovic/awesome-linux#learning-resources
  584. https://github.com/aleksandar-todorovic/awesome-linux#useful-websites
  585. A guide to kernel exploitation
  586. https://securityonline.info/awesome-hacking-collection-awesome-lists-hackers-pentesters-security-researchers/
  587. https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0ahUKEwi5qNeKqpbbAhVPC-wKHQz9APQQFggnMAA&url=http%3A%2F%2Fwww.piotrbania.com%2Fall%2Farticles%2Fewdd.pdf&usg=AOvVaw3g5NjK-ghejApSApADwa65
  588. https://www.blackhat.com/presentations/bh-usa-07/Bulygin/Presentation/bh-usa-07-bulygin.pdf
  589.  
  590. Awesome hardware
  591. https://github.com/openmotics/hardware
  592. Search high speed circuit design
  593. vhdl
  594. https://blog.hackster.io/student-creates-first-homebrew-dual-differential-amplifier-ic-8535af115d7e?gi=4334ecb2fcdd
  595. https://blog.hackster.io/how-to-embed-nfc-chips-into-your-acrylic-fingernails-dor-unlocking-your-phone-and-much-more-51ea87d6a169
  596. https://en.wikipedia.org/wiki/List_of_open-source_hardware_projects
  597. https://en.wikipedia.org/wiki/Open-source_hardware
  598. https://en.wikipedia.org/wiki/Open-Source_Lab_(book)
  599. http://apt.cs.manchester.ac.uk/ftp/pub/apt/papers/LEMB_ToE09_O.pdf
  600. Search term : Design system on chip
  601. https://en.wikibooks.org/wiki/Chip_Design_Made_Easy
  602. http://users.ece.utexas.edu/~gerstl/publications/TR-02-28.tutorial.pdf
  603. http://www.cl.cam.ac.uk/teaching/1011/SysOnChip/socdam-notes1011.pdf
  604. https://www.quora.com/Which-is-the-best-online-ARM-processor-course
  605. https://github.com/monostable/awesome-electronics
  606.  
  607. Android terminal
  608. ftp://ftp.wayne.edu/ldp/en/Linux-Android-HOWTO/Linux-Android-HOWTO-6.html
  609.  
  610. Processor know how
  611. https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-823-computer-system-architecture-fall-2005/lecture-notes/
  612.  
  613. Iot sec
  614. (Awesome)http://jcjc-dev.com/2016/06/08/reversing-huawei-4-dumping-flash/
  615. https://security.electronicsforu.com/wp-content/uploads/2017/06/RISC_IoT_101.pdf
  616. https://www.owasp.org/images/2/29/AppSecIL2016_HackingTheIoT-PenTestingRFDevices_ErezMetula.pdf
  617. https://s3.us-east-2.amazonaws.com/attify-iot-hosting/Hacking+IoT+for+Bug+Bounties.pdf
  618. https://sector.ca/wp-content/uploads/presentations17/Aditya-Gupta-Pwning-Smart-Homes-SecTor.pdf
  619. http://www.cs.bham.ac.uk/~tpc/Edu/Pentesting/files/penEdu.pdf
  620.  
  621. Makefile
  622. https://eigenstate.org/notes/makefiles
  623. http://docs.yottabuild.org/tutorial/tutorial.html
  624. https://www3.ntu.edu.sg/home/ehchua/programming/cpp/gcc_make.html
  625. Managing large projects with make
  626. http://doc.cat-v.org/bell_labs/mk/
  627. https://github.com/oridb/mk
  628. https://eli.thegreenplace.net/2013/07/09/library-order-in-static-linking
  629.  
  630. Good android books
  631. Embedded Android: Porting, Extending
  632. Android internals Jonathan Levin
  633. Learning pentesting for android
  634. http://www.opersys.com/training/embedded-android
  635. https://stackoverflow.com/questions/11262817/learn-about-android-internalsdive-deep-into-the-system
  636. Xda developers android hacker's toolkit
  637.  
  638. Embedded Linux
  639. https://github.com/embedded-boston/awesome-embedded-systems
  640. https://github.com/ysh329/awesome-embedded-ai
  641. https://www.quora.com/What-are-the-best-lectures-for-learning-Embeded-systems-in-YouTube
  642. https://hackr.io/tutorials/learn-android-development
  643. https://github.com/JStumpp/awesome-android#resources
  644.  
  645. Compilers
  646. https://insights.dice.com/2015/12/04/developing-in-cc-consider-clang/
  647. https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=15&ved=0ahUKEwjZvOfP7ZjbAhXC2aQKHSjcCxoQFgiaATAO&url=https%3A%2F%2Fraw.githubusercontent.com%2Fnamin%2Finc%2Fmaster%2Fdocs%2Ftutorial.pdf&usg=AOvVaw05R_CrVMx8P0t7nmVmnLwa
  648. https://steveire.wordpress.com/
  649. http://webpages.charter.net/ppluzhnikov/linker.html
  650.  
  651. Awesome Slam
  652. https://github.com/kanster/awesome-slam#courses-lectures-and-workshops
  653. https://github.com/liulinbo/slam
  654. https://blog.csdn.net/renye_lpl/article/details/79225423
  655.  
  656. Gcc cross
  657. http://preshing.com/20141119/how-to-build-a-gcc-cross-compiler/
  658. https://github.com/landley/toybox
  659. http://web.guohuiwang.com/technical-notes/androidndk2
  660. http://www.linfo.org/main_index.html
  661.  
  662. Linux kernel
  663. http://fxr.watson.org/
  664.  
  665. Write an mp3 filter
  666. http://book.realworldhaskell.org/read/
  667. http://blog.bjrn.se/2008/10/lets-build-mp3-decoder.html
  668. https://multimedia.cx/eggs/learn-multimedia-with-jpeg/
  669. http://www.opennet.ru/docs/formats/jpeg.txt
  670. http://parsingintro.sourceforge.net/
  671. http://wiki.c2.com/?TipsForReadingCode
  672.  
  673. Programme and their memory
  674. https://www.usna.edu/Users/cs/aviv/classes/ic221/s16/lec/11/lec.html
  675. https://stackoverflow.com/questions/15638105/accessing-specific-memory-locations-in-c
  676. https://www.kernel.org/doc/gorman/html/understand/understand007.html
  677. https://www.google.com/search?q=how+memory+address+is+assigned+to+process&ie=utf-8&oe=utf-8&client=firefox-b-ab
  678. http://www.informit.com/articles/article.aspx?p=29961&seqNum=2
  679. https://www.google.com/search?q=how+os+gives+address+to+user+spce+prograzmme&ie=utf-8&oe=utf-8&client=firefox-b-ab
  680. https://security.stackexchange.com/questions/18556/how-do-aslr-and-dep-work
  681. https://www.blackhat.com/docs/eu-16/materials/eu-16-Schwarz-How-Your-DRAM-Becomes-A-Security-Problem-wp.pdf
  682.  
  683. dope links
  684. https://fail0verflow.com/blog/
  685. https://www.w3.org/TR/workers/
  686. http://www.hotchips.org/archives/2010s/hc29/
  687. http://linux-test-project.github.io/
  688. https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Embedded%20Device%20%26%20Hardware%20Hacking%20-.md
  689. https://www.google.com/search?client=firefox-b-ab&ei=1a4PW4z9FcaB6ATgy57oBw&q=awesome+hardware+hacking&oq=awesome+hardware+hacking&gs_l=psy-ab.3..33i160k1.5710.6089.0.6337.3.3.0.0.0.0.245.245.2-1.1.0....0...1c.1.64.psy-ab..2.1.244....0.OcRoyVos8Z0
  690. Black Hat: Top 20 hack-attack tools
  691. https://www.blackhat.com/us-17/training/applied-hardware-attacks-embedded-systems.html
  692. https://www.google.com/search?client=firefox-b&ei=HLcPW6wnyImbBd6ekoAF&q=Dumping+Firmware+from+Software+pdf&oq=Dumping+Firmware+from+Software+pdf&gs_l=psy-ab.3...1367.2806.0.2965.4.4.0.0.0.0.265.265.2-1.1.0....0...1c.1.64.psy-ab..3.1.264...33i160k1.0.WHT9xo50-gU
  693. https://www.google.com/search?client=firefox-b&ei=LrcPW6-GC8rN6QSAkpawBg&q=Manipulating+firmware+images+pdf&oq=Manipulating+firmware+images+pdf&gs_l=psy-ab.3..33i21k1.3130.4518.0.4688.4.4.0.0.0.0.262.508.2-2.2.0....0...1c.1.64.psy-ab..2.2.507...33i160k1.0.ZNykmY9pJT8
  694. https://www.google.com/search?client=firefox-b&ei=Q7cPW-rRBsOF6ASL0Z_wDQ&q=Finding+software+bugs+in+firmware+pdf&oq=Finding+software+bugs+in+firmware+pdf&gs_l=psy-ab.3...6317.8320.0.8453.6.6.0.0.0.0.279.765.2-3.3.0....0...1c.1.64.psy-ab..3.3.764...33i160k1j33i21k1.0.H5R8teKf0as
  695. http://hexblog.com/files/recon%202010%20Skochinsky.pdf
  696. https://reverseengineering.stackexchange.com/questions/3526/how-do-i-extract-a-copy-of-an-unknown-firmware-from-a-hardware-device
  697. https://reverseengineering.stackexchange.com/questions/2337/how-to-dump-flash-memory-with-spi
  698. http://chdk.wikia.com/wiki/Obtaining_a_firmware_dump
  699. https://www.blackhat.com/docs/us-16/materials/us-16-FitzPatrick-The-Tao-Of-Hardware-The-Te-Of-Implants.pdf
  700. https://www.blackhat.com/us-16/training/applied-physical-attacks-on-x86-systems.html
  701. http://www.nsaplayset.org/
  702. https://en.wikipedia.org/wiki/NSA_ANT_catalog
  703. https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=4&ved=0ahUKEwjO2Jrl0K_bAhWjQJoKHV9kBWkQFghDMAM&url=http%3A%2F%2Fwww.jsums.edu%2Fnmeghanathan%2Ffiles%2F2015%2F05%2FCSC437-Fall2013-Module-5-Buffer-Overflow-Attacks.pdf%3Fx61976&usg=AOvVaw2lP003SqchXxcuGyhb4vFZ
  704. https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=3&ved=0ahUKEwjO2Jrl0K_bAhWjQJoKHV9kBWkQFgg2MAI&url=http%3A%2F%2Fforristal.com%2Fmaterial%2FForristal_Hardware_Involved_Software_Attacks.pdf&usg=AOvVaw3fiH_8AIm8RnTgqhBcfnlm
  705. https://www.blackhat.com/presentations/bh-usa-04/bh-us-04-tsyrklevich.pdf
  706. https://www.blackhat.com/docs/asia-18/asia-18-Ding-New-Compat-Vulnerabilities-In-Linux-Device-Drivers.pdf
  707. https://security.stackexchange.com/questions/119712/methods-root-can-use-to-elevate-itself-to-kernel-mode
  708. https://www.giac.org/paper/gsec/2235/quest-root-hacker-techniques-unix-security/103808
  709. https://thehackernews.com/2017/05/linux-sudo-root-hack.html
  710. https://hackmag.com/security/reach-the-root/
  711. https://payatu.com/guide-linux-privilege-escalation/
  712. https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Privilege%20Escalation%20%26%20Post-Exploitation.md
  713. http://0x00sec.org/t/enumeration-for-linux-privilege-escalation/1959
  714. https://thehackernews.com/2017/06/linux-root-privilege-escalation.html
  715. https://resources.infosecinstitute.com/privilege-escalation-linux-live-examples/#gref
  716. https://uwnthesis.wordpress.com/2016/12/26/basics-of-making-a-rootkit-from-syscall-to-hook/
  717. http://se7so.blogspot.com/2012/07/hijacking-linux-system-calls-rootkit.html
  718. http://timetobleed.com/detailed-explanation-of-a-recent-privilege-escalation-bug-in-linux-cve-2010-3301/
  719. https://www.google.com/search?client=firefox-b-ab&biw=1468&bih=937&ei=BMYPW8iaM8yusAGcvYm4CQ&q=privelege+escalation+using+syscalls&oq=privelege+escalation+using+syscalls&gs_l=psy-ab.3..33i21k1.252575.260038.0.260160.36.26.0.0.0.0.466.3636.2-3j4j3.11.0....0...1c.1.64.psy-ab..25.11.3924.6..0j35i39k1j0i131k1j0i10k1j0i13k1j0i22i30k1.296.3ay4O3XzcSI
  720. http://bits-please.blogspot.com/2016/06/trustzone-kernel-privilege-escalation.html
  721. https://www.exploit-db.com/exploits/44205/
  722. https://perso.univ-st-etienne.fr/maf13892/Docs/Publications/JTAG.FIA.pdf
  723. https://perso.univ-st-etienne.fr/maf13892/Docs/Presentations/TRUDEVICE2015_JTAGCombinedAttacks.pdf
  724. https://hakin9.org/download/hacking-android-80-pages-of-experts-tutorials/
  725. (Awesome hardware concise)https://media.blackhat.com/us-13/US-13-Zaddach-Workshop-on-Embedded-Devices-Security-and-Firmware-Reverse-Engineering-WP.pdf
  726. https://www.google.com/search?client=firefox-b-ab&ei=O-YQW6OHJqKHmwXht5y4Bg&q=awesome+embeded+hacking+&oq=awesome+embeded+hacking+&gs_l=psy-ab.3...7740132.7748464.0.7748615.25.21.0.0.0.0.532.2820.3-4j2j1.8.0....0...1c.1.64.psy-ab..20.2.875.0..0j0i67k1.298.3F7kxDoweak
  727. (Awesome)https://www.kb.cert.org/vuls/id/649219
  728. https://en.wikipedia.org/wiki/DMA_attack
  729. https://github.com/ufrisk/pcileech
  730. https://www.blackhat.com/docs/us-17/wednesday/us-17-Trikalinou-Taking-DMA-Attacks-To-The-Next-Level-How-To-Do-Arbitrary-Memory-Reads-Writes-In-A-Live-And-Unmodified-System-Using-A-Rogue-Memory-Controller.pdf
  731. https://github.com/torvalds/linux/blob/master/Documentation/DMA-API-HOWTO.txt
  732. (Awesome resource hidden)https://cturt.github.io/ps4.html
  733. https://fail0verflow.com/blog/2017/ps4-crashdump-dump/
  734. https://www.psxhax.com/threads/dualshock-4-ds4-ps4-firmware-dump-reversing-tools-by-ds4user.1159/?utm_source=dlvr.it&utm_medium=facebook
  735. https://www.reddit.com/r/ps4homebrew/comments/8amgmz/the_nor_chip/
  736. https://www.3dbrew.org/wiki/Homebrew_Exploits
  737. https://github.com/Cryptogenic/Exploit-Writeups/blob/master/FreeBSD/PS4%204.55%20BPF%20Race%20Condition%20Kernel%20Exploit%20Writeup.md
  738. https://github.com/whnunlife/ps3publictools
  739. http://www2.lauterbach.com/pdf/debugger_arm.pdf
  740. https://news.ycombinator.com/item?id=7015082
  741. https://comma.ai/
  742. https://github.com/geohot/qira
  743. https://pure.tue.nl/ws/files/46956556/770549-1.pdf
  744. https://sharedmemorydump.net/building-a-mining-stack-of-raspberry-pis
  745.  
  746.  
  747.  
  748.  
  749. Awesome kernel
  750. https://resources.infosecinstitute.com/privilege-escalation-linux-live-examples/#gref
  751. http://www.vantagepoint.sg/blog/82-hooking-android-system-calls-for-pleasure-and-benefit
  752. https://jvns.ca/blog/2014/09/18/you-can-be-a-kernel-hacker/
  753. https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0ahUKEwjz2tf216_bAhVDkywKHVwHCvsQFggsMAA&url=http%3A%2F%2Fevents17.linuxfoundation.org%2Fsites%2Fevents%2Ffiles%2Fslides%2Fnakamura_20170831_1.pdf&usg=AOvVaw1_1D1ZF-BJIF89_233pECT
  754. Hacker playbook
  755. http://delta-course.org/docs/delta4/day2/D4T2L5.pdf
  756. http://www.cs.swan.ac.uk/~csmarkus/15_project/15_10_sample1_InitialDocument.pdf
  757. http://wpage.unina.it/roberto.natella/papers/natella_androidfuzzing_issre2017.pdf
  758. http://aitel.hist.no/fag/lan/lek02/dln02-en.pdf
  759. https://www.usenix.org/legacy/events/hotsec11/tech/final_files/Cai.pdf
  760. http://www.makelinux.net/kernel_map/#sd
  761. http://chdk.wikia.com/wiki/Obtaining_a_firmware_dump
  762. A guide to kernel exploitation
  763. https://raw.githubusercontent.com/liulinbo/slam/master/Linux%E5%B0%B1%E8%AF%A5%E8%BF%99%E4%B9%88%E5%AD%A6.pdf
  764. https://raw.githubusercontent.com/jacobsoo/AndroidSlides/master/%E5%8C%97%E4%BA%AC-GDG-Android-root-%E6%8A%80%E6%9C%AF%E6%B2%99%E9%BE%99-2014/Find%20your%20own%20Android%20kernel%20bug.pdf
  765. http://www.xml.com/ldd/chapter/book/ch13.html
  766. https://github.com/torvalds/linux/blob/master/Documentation/DMA-API-HOWTO.txt
  767. https://www.linuxjournal.com/article/4378
  768.  
  769. Search for debug mode in processor
  770. http://www.msn.com/en-gb/money/companies/google-used-to-ask-these-interview-questions-but-theyre-so-tricky-they-were-banned/ss-AAy3kE0?ocid=ientp#image=6
  771.  
  772. Fpga based security
  773. https://www.eetimes.com/document.asp?doc_id=1274593
  774. https://github.com/ufrisk/pcileech
  775. https://mirror.netcologne.de/CCC/congress/2017/slides-pdf/34c3-9111-public_fpga_based_dma_attacking.pdf
  776. https://github.com/matthiasbock/JTAG-Sniffer
  777. https://recon.cx/2013/trainingsynple.html
  778. https://www.eetimes.com/document.asp?doc_id=1274593
  779.  
  780. PS#
  781. https://www2.cs.arizona.edu/~collberg/Teaching/466-566/2012/Resources/presentations/2012/topic1-final/report.pdf
  782. https://www2.cs.arizona.edu/~collberg/Teaching/466-566/2012/Resources/presentations/2012/topic1-final/slides.pdf
  783. https://www.riscure.com/uploads/2017/09/Controlling-PC-on-ARM-using-Fault-Injection.pdf
  784. https://events.ccc.de/congress/2010/Fahrplan/attachments/1780_27c3_console_hacking_2010.pdf
  785. https://rdist.root.org/2010/01/27/how-the-ps3-hypervisor-was-hacked/
  786. http://www.blackhat.com/docs/eu-15/materials/eu-15-Giller-Implementing-Electrical-Glitching-Attacks.pdf
  787. http://mastersicurezza.di.uniroma1.it/mastersicurezza/images/materiali/Convegni/cbepas2012.pdf
  788. http://ids.cs.columbia.edu/sites/default/files/ndss-2013.pdf
  789. https://web.archive.org/web/20100409023327/http://geohotps3.blogspot.com/
  790. https://web.archive.org/web/20100410060251/http://pastie.org:80/795944
  791. https://web.archive.org/web/20100704075741/http://hackmii.com:80/2009/01/25c3-presentation/
  792. https://web.archive.org/web/20100723083756/http://www.ibm.com:80/developerworks/power/library/pa-cellsecurity/
  793. https://news.ycombinator.com/item?id=1079251
  794. https://web.archive.org/web/20100404062009/http://rdist.root.org:80/2007/05/07/glitch-attacks-revealed/
  795. https://web.archive.org/web/20100412055807/http://xorloser.com:80/?p=162#more-162
  796. https://web.archive.org/web/20100220214115/http://ps3hvdoc.wikispaces.com:80/Hypervisor+RE
  797. https://web.archive.org/web/20100410060005/http://pastie.org:80/795371
  798. http://www.edepot.com/playstation3.html#PS3_Security
  799. https://web.archive.org/web/20110110121139/http://wiki.ps2dev.org/
  800.  
  801. Ram dump
  802. https://resources.infosecinstitute.com/obtaining-information-dumping-memory/#gref
  803. https://rc2014.co.uk/modules/sd-memory-dump/
  804. http://jcjc-dev.com/2016/12/14/reversing-huawei-5-reversing-firmware/
  805. https://madiba.encs.concordia.ca/~x_decarn/papers/verifiable-build-acsac2014.pdf
  806. Methods of capturing a memory dump
  807. Mobile forensics
  808. Capturing a live ram
  809. https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=5&ved=0ahUKEwibyLjXrLLbAhXID8AKHbqCBjYQFghKMAQ&url=http%3A%2F%2Fwww.indjst.org%2Findex.php%2Findjst%2Farticle%2Fdownload%2F105851%2F77226&usg=AOvVaw1xksKEcSYyOXuHFbx_qeuw
  810. https://www.sans.org/reading-room/whitepapers/forensics/techniques-tools-recovering-analyzing-data-volatile-memory-33049
  811. Kernel panic
  812. https://www.blackhat.com/presentations/bh-usa-06/BH-US-06-Burdach.pdf
  813. https://www.forensicswiki.org/wiki/Memory_Imaging
  814. (aWESOME)http://eh2008.koeln.ccc.de/fahrplan/attachments/1067_SEAT1394-svn-r432-paper.pdf
  815. https://eprint.iacr.org/2011/221.pdf
  816. http://www.stoned-vienna.com
  817. https://privatecore.com/resources-overview/physical-memory-attacks/index.html
  818. Attacks on physical memory
  819. https://www.defcon.org/html/links/dc-archives/dc-20-archive.html
  820. DIY electric car
  821. File dump attack
  822. Access ramd irectly
  823. https://www.youtube.com/watch?v=Zp8dVq5ZvKY
  824. (Awesome)https://cturt.github.io/ps4.html
  825. https://opensourceforu.com/2011/02/debug-kernel-panics-with-crash/
  826. https://cryptome.org/0003/RAMisKey.pdf
  827.  
  828.  
  829.  
  830. Security Awesome
  831. https://www.sec.in.tum.de/i20/teaching
  832.  
  833.  
  834. https://fail0verflow.com/blog/2017/ps4-crashdump-dump/
  835. https://github.com/meirwah/awesome-incident-response
  836. https://github.com/dweinstein/awesome-frida
  837. https://iotsecuritywiki.com/
  838. https://www.reddit.com/r/netsec/
  839. https://media.readthedocs.org/pdf/pwntools/stable/pwntools.pdf
  840. http://grugq.github.io/presentations/
  841.  
  842.  
  843.  
  844. DMA
  845. (Awesome)https://www.kb.cert.org/vuls/id/649219
  846. https://en.wikipedia.org/wiki/DMA_attack
  847. https://github.com/ufrisk/pcileech
  848. https://www.blackhat.com/docs/us-17/wednesday/us-17-Trikalinou-Taking-DMA-Attacks-To-The-Next-Level-How-To-Do-Arbitrary-Memory-Reads-Writes-In-A-Live-And-Unmodified-System-Using-A-Rogue-Memory-Controller.pdf
  849. https://github.com/torvalds/linux/blob/master/Documentation/DMA-API-HOWTO.txt
  850. https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&uact=8&ved=0ahUKEwjD6pCgibzbAhUKtBQKHclnBOAQFggpMAA&url=https%3A%2F%2Fmedia.blackhat.com%2Fus-13%2FUS-13-Sevinsky-Funderbolt-Adventures-in-Thunderbolt-DMA-Attacks-Slides.pdf&usg=AOvVaw0orMdwj60Y71ocVJOTWQf6
  851. https://www.youtube.com/watch?v=z4-N2HyQMVU
  852. https://www.usenix.org/conference/enigma2016#signup
  853. https://firmwaresecurity.com/
  854. https://github.com/PreOS-Security/awesome-firmware-security
  855. https://github.com/advanced-threat-research/firmware-security-training
  856. https://github.com/onlurking/awesome-infosec
  857. https://github.com/mhtsai1010/seclinks/tree/master/course
  858. https://github.com/puppycodes/Malware-2
  859. https://gbhackers.com/hacking-tools-list/
  860. http://www.syssec-project.eu/m/page-media/23/syssec2011-s1.4-sang.pdf
  861. http://www.cs.toronto.edu/~sahil/suneja-asplos15.pdf
  862. https://invisiblethingslab.com/resources/misc09/Another%20TXT%20Attack.pdf
  863. http://ids.cs.columbia.edu/sites/default/files/ndss-2013.pdf
  864. https://www.trust-hub.org/publications/P13.pdf
  865. https://pdfs.semanticscholar.org/bb6a/7dd4164d933b50c16d3541e50f39cb955de8.pdf
  866. https://media.blackhat.com/bh-dc-11/Grand/BlackHat_DC_2011_Grand-Workshop.pdf
  867. https://www.emsec.rub.de/media/crypto/veroeffentlichungen/2018/03/23/main.pdf
  868. http://grandideastudio.com/wp-content/uploads/current_state_of_hh_slides.pdf
  869. https://www.youtube.com/watch?v=o77GTR8RovM
  870. (Awesome)http://reverseengineering.libsyn.com/rss
  871. https://libreplanet.org/wiki/Group:Hardware/ReverseEngineering
  872. https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Reverse%20Engineering.md#hre
  873. https://pdfs.semanticscholar.org/88ad/913424405ac32657a8557f74003b22e9be3c.pdf
  874. https://www.youtube.com/watch?v=tOqtI2v2xC0
  875. http://www.grandideastudio.com/wp-content/uploads/
  876. http://www.grandideastudio.com/wp-content/uploads/book_hackproof_ch14.pdf
  877. https://www.defcon.org/images/defcon-15/dc15-presentations/dc-15-gustin_and_ab3nd.pdf
  878. https://www.defcon.org/images/defcon-18/dc-18-presentations/King/DEFCON-18-King-Hardware-For-Software-Guys.pdf
  879. https://www.usenix.org/legacy/event/lisa05/make/grand.pdf
  880. https://www.rsaconference.com/writable/presentations/file_upload/hta-w04-tools-of-the-hardware-hacking-trade_final.pdf
  881. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.473.1555&rep=rep1&type=pdf
  882. https://www.youtube.com/watch?v=76VTTvBWjSA
  883. https://media.blackhat.com/us-13/US-13-Zaddach-Workshop-on-Embedded-Devices-Security-and-Firmware-Reverse-Engineering-WP.pdf
  884. https://www.trust-hub.org/publications/P13.pdf
  885. http://ids.cs.columbia.edu/sites/default/files/ndss-2013.pdf
  886. https://www.blackhat.com/docs/us-14/materials/us-14-Oh-Reverse-Engineering-Flash-Memory-For-Fun-And-Benefit-WP.pdf
  887. http://www.dfrws.org/sites/default/files/session-files/paper-acquisition_and_analysis_of_compromised_firmware_using_memory_forensics.pdf
  888. https://www.nccgroup.trust/globalassets/our-research/uk/whitepapers/bh-vegas-07-heasman.pdf
  889. https://pdfs.semanticscholar.org/078e/bf9f4c7916e59db4711e726ee94e2e802d54.pdf
  890. https://www.researchgate.net/profile/Andrei_Costin/publication/259642928_Embedded_Devices_Security_and_Firmware_Reverse_Engineering/links/0deec52d05c795b2b3000000/Embedded-Devices-Security-and-Firmware-Reverse-Engineering.pdf?origin=publication_detail
  891. https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-costin.pdf
  892. https://media.blackhat.com/us-13/US-13-Zaddach-Workshop-on-Embedded-Devices-Security-and-Firmware-Reverse-Engineering-Slides.pdf
  893. awesome dumping firmware pdf
  894. http://is-ra.org/c0c0n/2014/Presentations/Track2/Making_and_breaking_security_in_embedded_devices.pdf
  895. https://recon.cx/2010/slides/goodspeed_recon10.pdf
  896. http://leat.unice.fr/JDD2016/files/JDD2016_AurelienFrancillon.pdf
  897. http://www.malwaretech.com/2015/04/hard-disk-firmware-hacking-part-1.html
  898. http://www.psdevwiki.com/ps4/Working_Exploits
  899. https://www.psxhax.com/threads/ps4-4-05-kernel-dumper-with-full-debug-settings-by-vvildcard777.3359/
  900. memory dump attack pdf
  901. https://www.ieee-security.org/TC/SP2015/papers-archived/6949a003.pdf
  902. http://www.cs.toronto.edu/~sahil/suneja-asplos15.pdf
  903. https://arxiv.org/ftp/arxiv/papers/1408/1408.0725.pdf
  904. http://www.sharcs-project.eu/m/documents/papers/a10-huber.pdf
  905. http://www.blackhat.com/presentations/bh-usa-08/McGregor/BH_US_08_McGregor_Cold_Boot_Attacks.pdf
  906. https://web.eecs.umich.edu/~taustin/papers/HPCA17-coldboot.pdf
  907. https://www.recred.eu/sites/default/files/fases2016_uprc.pdf
  908. http://grugq.github.io/presentations/
  909. https://extreme-modding.de/PS4/PS4_DEV/dump.html
  910. https://www.blackhat.com/docs/us-16/materials/us-16-Beery-The-Remote-Malicious-Butler-Did-It-wp.pdf
  911. https://security.stackexchange.com/questions/119269/mitigating-forensic-memory-acquisition-when-an-attacker-has-physical-access-to-a
  912. https://payatu.com/6tools4hwsecurity/
  913. https://www.blackhat.com/docs/webcast/04232014-tools-of-the-hardware-hacking-trade.pdf
  914. https://blog.securityevaluators.com/the-introductory-iot-hardware-hacking-tool-box-389c4605329f
  915. hardware hacking tools
  916. http://www.cs.toronto.edu/~sahil/suneja-asplos15.pdf
  917. http://d3s.mff.cuni.cz/teaching/crash_dump_analysis/slides/08-linux.pdf
  918. https://askubuntu.com/questions/35722/what-is-kernel-panic
  919. https://www.dedoimedo.com/computers/www.dedoimedo.com-crash-book.pdf
  920. https://net.cs.uni-bonn.de/fileadmin/ag/martini/Staff/barabosch_quincy_dimva2017.pdf
  921. https://www.blackhatsessions.com/presentaties/2017/BHS%20-%20Weaponizing%20the%20Raspberry%20Pi%20Zero.pdf
  922. https://www.blackhat.com/docs/us-17/wednesday/us-17-Bazhaniuk-BluePill-For-Your-Phone.pdf
  923. http://www.becil.com/uploads/tender/nullcon---Mobile-App-Attackpdf-3f74c838357a30a50730bb97ff54d21a.pdf
  924. https://www.bunniestudios.com/blog/?page_id=40
  925. https://cqureacademy.com/blog/forensics/memory-dump-analysis
  926. https://reverseengineering.stackexchange.com/questions/6716/dumping-a-file-loaded-into-memory
  927. https://github.com/volatilityfoundation/volatility
  928. https://unix.stackexchange.com/questions/119762/how-to-dump-memory-image-from-linux-system
  929. http://www.ucd.ie/cci/cync/Acquisition%20and%20Analysis%20of%20Android%20Memory.pdf
  930. https://www.youtube.com/user/kingpinempire/playlists
  931. https://www.chipdesignmag.com/blyler/2008/11/07/so-you-want-to-be-a-chip-designer/
  932. http://www.cl.cam.ac.uk/teaching/1011/SysOnChip/socdam-notes1011.pdf
  933. http://www.caida.org/research/security/
  934.  
  935.  
  936. Linux cross reference
  937. https://elixir.bootlin.com/linux/latest/source/Documentation
  938. https://www.linuxvoice.com/issues/003/LV3opencore.pdf
  939. http://www.eng.auburn.edu/~nelson/courses/elec5260_6260/Systems%20on%20Chip%20(SoC).pdf
  940. https://www.ele.uva.es/~jesman/BigSeti/ftp/Microcontroladores/ARM/Arm%20System-On-Chip%20Architecture.pdf
  941. https://www.cs.ccu.edu.tw/~chen/arch/SOC-design.pdf
  942. https://opencores.org/projects
  943. https://github.com/embecosm/chiphack/wiki
  944. http://www.artist-embedded.org/docs/Events/2006/ChinaSchool/1_ESIntroduction.pdf
  945. producing a System on chip pdf
  946. https://www.sintef.no/globalassets/upload/ikt/9031/microsyst-technol---ramm.pdf
  947. fabricating a System on chip pdf
  948. (Awesome Linux drivers) https://www.eecs.umich.edu/courses/eecs473/Labs/Lab4.pdf
  949. http://intestinate.com/pilfs/beyond.html
  950. (Awesome)http://exploringrpi.com/chapter16/
  951. http://split-code.com/external_blogs.html
  952. http://www.devttys0.com/2012/11/reverse-engineering-serial-ports/
  953. https://www.xjtag.com/about-jtag/jtag-a-technical-overview/
  954. http://www.sheffieldhardwarehackers.org.uk/wordpress/2015/12/the-hunt-for-j5/
  955. https://pinout.xyz/pinout/pin12_gpio18#
  956. http://www.cs.cmu.edu/~cjc/course/15740-report.htm
  957. http://www.au-kbc.org/comm/Docs/papers/Vipin_Analysis_of_open_source_WLAN_driver_paper.pdf
  958. http://www.grandideastudio.com/wp-content/uploads/avrsimon_manual.pdf
  959. http://www.grandideastudio.com/wp-content/uploads/dc17_bdg_slides.pdf
  960. https://www.reddit.com/r/Defcon/comments/4x6b6k/learning_enough_ee_to_design_a_badge/
  961. http://www.ganssle.com/startinges.htm
  962. https://dontstuffbeansupyournose.com/2014/03/22/why-writing-firmware-is-kinda-like-software-exploitation/
  963. https://github.com/REhints/BlackHat_2017/blob/master/Betraying%20the%20BIOS.pdf
  964. http://blog.asset-intertech.com/test_data_out/2017/08/book-review-rootkits-and-bootkits-reversing-modern-malware-and-next-generation-threats.html
  965. https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=7&cad=rja&uact=8&ved=0ahUKEwjrw4_ZmL_bAhVCvBQKHacpCV8QFghSMAY&url=http%3A%2F%2Fwww.blackhat.com%2Fpresentations%2Fbh-usa-09%2FKLEISSNER%2FBHUSA09-Kleissner-StonedBootkit-SLIDES.pdf&usg=AOvVaw3iyt-xxQ-gRbOvL9aQXg6y
  966. http://www.alex-ionescu.com/publications/OffensiveCon/offensive2018.pdf
  967. https://res.cloudinary.com/peerlyst/image/upload/v1506079671/post-attachments/bsidesams_2017-i-boot-when-u-boot_aiwjmo.pdf
  968. writing bootkits rsa con
  969. past year
  970. http://esec-lab.sogeti.com/static/publications/14-hitbamsterdam-reboot.pdf
  971. https://pdfs.semanticscholar.org/88ad/913424405ac32657a8557f74003b22e9be3c.pdf
  972. https://www.youtube.com/results?search_query=DMA+attack
  973. https://translate.google.com/translate?sl=es&tl=en&js=y&prev=_t&hl=en&ie=UTF-8&u=http%3A%2F%2Fjaicrab.org%2F%3F%26a%3DPs4%2FTools%2FUART&edit-text=
  974. https://github.com/raspberrypi/firmware/tree/master/boot/overlays
  975. https://github.com/hzeller/rpi-gpio-dma-demo
  976. https://github.com/tkmru/awesome-linux-rootkits
  977. https://int3.cc/products/the-shikra
  978. https://www.cs.sfu.ca/CourseCentral/433/bfraser/other/DriverCreationGuide.pdf
  979. https://github.com/hermanhermitage/videocoreiv/
  980. https://github.com/raspberrypi/firmware/wiki
  981. https://github.com/christinaa/rpi-open-firmware
  982. https://www.theseus.fi/bitstream/handle/10024/74679/Nguyen_Vu.pdf
  983. https://geidav.wordpress.com/2014/04/27/an-overview-of-direct-memory-access/
  984. DMA attack
  985. https://www.youtube.com/watch?v=Of6DemoMLaA
  986. https://www.blackhat.com/docs/us-14/materials/us-14-Weis-Protecting-Data-In-Use-From-Firmware-And-Physical-Attacks.pdf
  987. https://www.reddit.com/r/AskNetsec/comments/2dlgpu/dma_attacks_from_microcomputers/
  988. raspberry pi security issue
  989. DMA attack on raspberry pi
  990. https://www.blackhat.com/docs/us-17/wednesday/us-17-Trikalinou-Taking-DMA-Attacks-To-The-Next-Level-How-To-Do-Arbitrary-Memory-Reads-Writes-In-A-Live-And-Unmodified-System-Using-A-Rogue-Memory-Controller.pdf
  991. https://media.ccc.de/
  992. https://media.ccc.de/v/34c3-9111-public_fpga_based_dma_attacking
  993. https://github.com/ufrisk/pcileech
  994. https://github.com/ufrisk/pcileech-fpga
  995. https://www.cs.uic.edu/~s/papers/rundma2015/rundma2015.pdf
  996. https://www.cl.cam.ac.uk/projects/raspberrypi/tutorials/os/index.html
  997. https://www.embedded.com/design/mcus-processors-and-socs/4007119/Building-Bare-Metal-ARM-Systems-with-GNU-Part-1--Getting-Started
  998. https://stackoverflow.com/questions/29837892/how-to-run-a-c-program-with-no-os-on-the-raspberry-pi
  999. https://www.raspberrypi.org/forums/viewtopic.php?t=193286
  1000. https://www.raspberrypi.org/forums/viewtopic.php?f=72&t=10850
  1001. https://www.raspberrypi.org/forums/viewtopic.php?f=72&t=10167
  1002. https://www.raspberrypi.org/forums/viewtopic.php?f=72&t=11966
  1003. https://www.raspberrypi.org/forums/viewforum.php?f=72
  1004. https://hackaday.com/2018/01/01/34c3-roll-your-own-network-driver-in-four-simple-steps/#more-287597
  1005. https://www.youtube.com/watch?v=IKd4qTzkGfk
  1006. https://www.google.com/search?q=SGX+protected+memory&ie=utf-8&oe=utf-8&client=firefox-b-ab
  1007. https://www.google.com/search?client=firefox-b-ab&biw=1468&bih=937&ei=eNoYW-e5NsG8sAG2_rmgDA&q=memory+interposers+and+taps+to+read+memory&oq=memory+interposers+and+taps+to+read+memory&gs_l=psy-ab.3..33i21k1l2.2591.9539.0.9667.30.18.0.0.0.0.306.1846.2-5j2.7.0....0...1c.1.64.psy-ab..23.7.1841...33i160k1.0.lNygrHXlrNI
  1008. https://www.amazon.co.uk/Art-Designing-Embedded-Systems/dp/0750686448
  1009. designing embedded system
  1010. Eben Upton, Jeffrey Duntemann - Learning Computer Architecture with Raspberry Pi (2016, Wiley)
  1011. https://www.macs.hw.ac.uk/~hwloidl/Courses/F28HS/slides_RPi_arch.pdf
  1012. Architecture of raspberry pi
  1013. https://www.zdnet.com/article/build-your-own-supercomputer-out-of-raspberry-pi-boards/
  1014. https://dqydj.com/raspberry-pi-hadoop-cluster-apache-spark-yarn/
  1015. http://slackbook.org/html/book.html#SHELL
  1016. https://cs107e.github.io/guides/gcc/
  1017. iommu
  1018. http://www.c7zero.info/stuff/DEFCON22-BIOSAttacks.pdf
  1019. https://elinux.org/images/4/49/20140429-dma.pdf
  1020. https://www.kernel.org/doc/html/v4.16/driver-api/dmaengine/client.html
  1021. https://www.youtube.com/watch?v=FSw8Ff1SFLM
  1022. http://www.cs.dartmouth.edu/~sergey/cs108/2014/TorreyGuestLecture-Hypervors.pdf
  1023. https://www.blackhat.com/docs/us-14/materials/us-14-Torrey-MoRE-Shadow-Walker-The-Progression-Of-TLB-Splitting-On-x86-WP.pdf
  1024. http://archive.hack.lu/2016/hacklu2016-jacob-torrey.pdf
  1025. http://archive.hack.lu/2016/hacklu2016-jacob-torrey.pdf
  1026. (Awesome important)https://www.youtube.com/watch?v=3LVeEjsn8Ts
  1027. https://ieeexplore.ieee.org/document/762536/
  1028. (Awesome)https://blog.invisiblethings.org/papers/
  1029. https://www.blackhat.com/docs/us-17/thursday/us-17-Domas-Breaking-The-x86-Instruction-Set-wp.pdf
  1030. https://www.linux-mips.org/wiki/JTAG
  1031. https://www.youtube.com/channel/UC53CXO46H92Hz5eWKejlDow
  1032. https://www.youtube.com/watch?v=oGuZNmBZbjk
  1033. https://securinghardware.com/articles/BlackHat-Hardware-Training-Roadmap/
  1034. https://www.blackhat.com/docs/us-15/materials/us-15-Thomas-Advanced-IC-Reverse-Engineering-Techniques-In-Depth-Analysis-Of-A-Modern-Smart-Card.pdf
  1035. IC Reverse Engineering
  1036. http://siliconzoo.org/tutorial.html
  1037. https://www.iacr.org/archive/ches2009/57470361/57470361.pdf
  1038. https://electronics.stackexchange.com/questions/13472/is-it-possible-to-reverse-engineer-a-chip-design
  1039. http://web.archive.org/web/20120228232431/http://www.flylogic.net/blog/
  1040. https://reverseengineering.stackexchange.com/questions/5878/reverse-engineering-modern-intel-cpus
  1041. (DMA)https://www.linuxjournal.com/article/7104
  1042. https://w3.cs.jmu.edu/kirkpams/550-f12/papers/linux_rootkit.pdf
  1043. https://www.xml.com/ldd/chapter/book/ch13.html
  1044. rootkits for linux pdf
  1045. (Awesome)https://busybox.net/BusyBox.html
  1046. https://stackoverflow.com/questions/12040303/how-to-access-physical-addresses-from-user-space-in-linux
  1047. (Awesome) https://volatility-labs.blogspot.com/
  1048. Awesome https://samsclass.info/121/121_S15.shtml
  1049. https://www.blackhat.com/docs/us-16/materials/us-16-Leibowitz-Horse-Pill-A-New-Type-Of-Linux-Rootkit.pdf
  1050. https://eldorado.tu-dortmund.de/bitstream/2003/22796/1/BuntenSlides.pdf
  1051. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.592.3150&rep=rep1&type=pdf
  1052. https://www.first.org/resources/papers/conference2004/c17.pdf
  1053. https://github.com/m0nad/Diamorphine
  1054. https://www.kernel.org/doc/html/v4.13/kernel-hacking/hacking.html
  1055. http://www.tldp.org/LDP/lkmpg/2.4/html/index.html
  1056. https://stackoverflow.com/questions/21144994/writing-lkm-for-a-device
  1057. (Awesome)http://phrack.org/issues/58/7.html
  1058. https://opensource.com/life/16/8/almost-open-bios-and-firmware-update-tips-linux-users
  1059. https://gist.github.com/mittman/6170722
  1060. https://stackoverflow.com/questions/46148905/how-are-ramdumps-generated-on-a-system-crash
  1061. https://lists.kernelnewbies.org/pipermail/kernelnewbies/2011-July/002676.html
  1062. https://github.com/raspberrypi/firmware/tree/master/boot/overlays
  1063. http://www.au-kbc.org/comm/Docs/papers/Vipin_Analysis_of_open_source_WLAN_driver_paper.pdf
  1064. http://jaicrab.org/?&a=Ps4/Tools/UART
  1065. (Awesome)https://www.cl.cam.ac.uk/~sps32/ECRYPT2011_1.pdf
  1066. (Awesome)https://www.blackhat.com/docs/us-17/thursday/us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-Languages.pdf
  1067. https://eprint.iacr.org/2015/147.pdf
  1068. https://github.com/hardenedlinux/firmware-anatomy/blob/master/hack_ME/firmware_security.md
  1069. https://github.com/abazhaniuk/Publications
  1070. https://github.com/Cyb3rWard0g/Invoke-ATTACKAPI
  1071. https://github.com/fvicente/bios-hack
  1072. https://github.com/DonnchaC/coldboot-attacks
  1073. https://github.com/robguti/firmware_security_docs/tree/master/bios
  1074. https://github.com/jovanbulck/sgx-step
  1075. https://github.com/ucsb-seclab/BootStomp
  1076. https://github.com/NicoHood/SecureLoader#1-bootloader-overview
  1077. https://www.blackhat.com/docs/asia-18/asia-18-Yang-UbootKit-A-Worm-Attack-for-the-Bootloader-of-IoT-Devices-wp.pdf
  1078. (Awesome bootloader)https://github.com/tranvansang/iboot
  1079. https://elinux.org/Bootloader_Security_Resources
  1080. (Awesome bootloader step by step)https://www.youtube.com/watch?v=nyRWKe8jDbg
  1081. (Awesome bootloader) https://firmwaresecurity.files.wordpress.com/2017/10/srcsea17.pdf
  1082. https://securelist.com/absolute-computrace-revisited/58278/
  1083. https://arstechnica.com/information-technology/2015/02/how-omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-at-last/
  1084. https://security.stackexchange.com/questions/94493/rootkits-bootkits-detection-and-protection-and-firmware-alteration
  1085. https://github.com/Cr4sh/ThinkPwn
  1086. (Most awesome wifi hack)https://www.blackhat.com/docs/us-17/thursday/us-17-Artenstein-Broadpwn-Remotely-Compromising-Android-And-iOS-Via-A-Bug-In-Broadcoms-Wifi-Chipsets.pdf
  1087. https://comsecuris.com/slides/recon2016-breaking_band.pdf
  1088. https://www.coresecurity.com/system/files/publications/2016/05/corelabs-BlancoEissler_2012-paper.pdf
  1089. https://en.wikipedia.org/wiki/I%C2%B2C
  1090. https://www.virusbulletin.com/uploads/pdf/conference/vb2014/VB2014-RodionovMatrosov.pdf
  1091. https://www.defcon.org/images/defcon-22/dc-22-presentations/Bulygin-Bazhaniul-Furtak-Loucaides/DEFCON-22-Bulygin-Bazhaniul-Furtak-Loucaides-Summary-of-attacks-against-BIOS.pdf
  1092. https://alexandreborgesbrazil.files.wordpress.com/2014/04/malware_attack_bios.pdf
  1093. https://www.youtube.com/watch?v=d6VCri6sPnY
  1094. https://wikileaks.org/ciav7p1/cms/index.html
  1095. https://www.youtube.com/watch?v=1cgtr7VW7gY
  1096. https://www.defcon.org/images/defcon-20/dc-20-presentations/Brossard/DEFCON-20-Brossard-Hardware-Backdooring-is-Practical.pdf
  1097. http://endrazine.com/
  1098. https://media.blackhat.com/bh-us-12/Briefings/Brossard/BH_US_12_Brossard_Backdoor_Hacking_Slides.pdf
  1099. https://security.stackexchange.com/questions/94576/questions-regarding-rakshasa
  1100. http://www.ravagesecurity.com/
  1101. https://www.schneier.com/blog/archives/2015/03/bios_hacking.html
  1102. https://codeengn.com/file/conference/11/2014_CodeEngn_Conference_11_Android_Bootkit_Analysis_En_[%EA%B9%80%ED%98%B8%EB%B9%88].pdf
  1103. https://www.syscan360.org/slides/2014_EN_AdvancedBootkitTechniquesOnAndroid_ChenZhangqiShendi.pdf
  1104. Android bootkit
  1105. https://www.youtube.com/watch?v=vDBwFSTucl8
  1106. (Awesome bootkit)https://github.com/retme7/My-Slides
  1107. https://security.stackexchange.com/questions/172556/can-an-android-malware-persist-even-after-uninstalling-it
  1108. https://www.rsaconference.com/writable/presentations/file_upload/hta-t07a-anti-stealth-techniques-heuristically-detecting-x64-bootkits.pdf
  1109. http://www.ntu.edu.sg/home/yangliu/publications/xiaohaothesis.pdf
  1110. https://researcher.watson.ibm.com/researcher/files/us-ajvega/FastPath_Owen_Talk.pdf
  1111. https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-redini.pdf
  1112. (Awesome)https://trmm.net/LinuxBoot_34c3
  1113. (Awesome)https://papers.put.as/firmware/firmware/
  1114. https://www.google.com/search?q=Android+live+forensics&ie=utf-8&oe=utf-8&client=firefox-b-ab
  1115. (Awesome)https://wiki.aalto.fi/download/attachments/84747235/presentation.pdf?version=1&modificationDate=1386936615719&api=v2
  1116. https://github.com/RuntimeTools/gencore
  1117. https://www1.cs.fau.de/filepool/gruhn/thesis_waechter.pdf
  1118. https://eklitzke.org/ptrace
  1119. https://www.udemy.com/how-to-implement-your-first-vhdl-design-on-fpga/
  1120. https://en.cppreference.com/w/cpp/language/direct_initialization
  1121. (Awesome)http://cradpdf.drdc-rddc.gc.ca/PDFS/unc160/p800486_A1b.pdf
  1122. https://www.exploit-db.com/papers/41915/
  1123. https://www.exploit-db.com/papers/42883/
  1124. https://www.exploit-db.com/docs/english/44592-linux-restricted-shell-bypass-guide.pdf
  1125. https://www.exploit-db.com/docs/english/42061-introduction-to-manual-backdooring.pdf
  1126. https://www.abatchy.com/2017/05/introduction-to-manual-backdooring_24.html
  1127. (Awesome) https://aaltodoc.aalto.fi/bitstream/handle/123456789/27914/master_Borek_Martin_2017.pdf?sequence=1&isAllowed=y
  1128. (Awesome) http://opensecuritytraining.info/Rootkits.html
  1129. (Awesome)https://blogs.technet.microsoft.com/markrussinovich/page/12/
  1130. http://www.blackhat.com/presentations/bh-europe-06/bh-eu-06-Heasman.pdf
  1131. https://www.htbridge.com/publication/inline_hooking_in_windows.pdf
  1132. https://www.htbridge.com/whitepaper/Userland%20Hooking%20in%20Windows.pdf
  1133. Red team book
  1134. Blue team book
  1135. https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Joshua-Smith-High-Def-Fuzzing-Exploitation-Over-HDMI-CEC-UPDATED.pdf
  1136. https://media.blackhat.com/bh-eu-12/Davis/bh-eu-12-Davis-HDMI-Slides.pdf
  1137. https://media.blackhat.com/bh-eu-12/Davis/bh-eu-12-Davis-HDMI-WP.pdf
  1138. http://www.psdevwiki.com/ps3/Hypervisor_Reverse_Engineering
  1139. Building isomorphic javascript app
  1140. http://www.eecs.harvard.edu/~dbrooks/cs246-fall2004/google.pdf
  1141. https://github.com/nccgroup/CECster
  1142. (Awesome)http://xanthium.in/Serial-Port-Programming-on-Linux
  1143. https://www.cyberciti.biz/hardware/5-linux-unix-commands-for-connecting-to-the-serial-console/
  1144. http://www.blackhat.com/presentations/bh-dc-08/Krawetz/Whitepaper/bh-dc-08-krawetz-WP.pdf
  1145. (Awesome)http://ubertooth.blogspot.com/2012/10/discovering-bluetooth-devices.html
  1146. https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_fawaz.pdf
  1147. (Awesome)https://github.com/pvachon/shmoocon_2018_talk/blob/master/shmoocon_slides.pdf
  1148. https://www.youtube.com/watch?v=7awwG9aaR4c
  1149. https://dzone.com/articles/cheap-software-defined-radio
  1150. https://stackoverflow.com/questions/24057409/radio-frequency-triangulation-positioning
  1151. (Awesome)https://www.youtube.com/watch?v=xneBjc8z0DE
  1152. (Awesome)https://github.com/cn0xroot/RFSec-ToolKit
  1153. https://penturalabs.wordpress.com/2013/09/01/ubertooth-open-source-bluetooth-sniffing/
  1154. (Most awesome very very)http://travisgoodspeed.blogspot.com/
  1155. https://www.youtube.com/watch?v=WqkmGG0biXc
  1156. https://github.com/0xdevalias/devalias.net/blob/master/_posts/2018-05-13-usb-reverse-engineering-down-the-rabbit-hole.md
  1157. https://electronics.stackexchange.com/questions/267/id-like-to-learn-how-to-make-my-own-usb-gadgets
  1158. https://www.electronicshub.org/microcontroller-based-mini-projects-ideas/
  1159. https://www.intel.co.uk/content/www/uk/en/history/museum-making-silicon.html
  1160. https://www.google.com/search?client=firefox-b-ab&ei=RzwiW6rsIKKZgAa-94aABA&q=integrated+chip+projects&oq=integrated+chip+projects&gs_l=psy-ab.3..33i160k1l2.12875.14700.0.14866.9.8.0.0.0.0.411.897.2-2j0j1.3.0....0...1c.1.64.psy-ab..6.3.893...0i22i30k1.0.NOxNFa4R43I
  1161. https://www.google.com/search?q=programmable+chip&ie=utf-8&oe=utf-8&client=firefox-b-ab
  1162. https://www.bharathuniv.ac.in/colleges1/downloads/courseware_ece/notes/BEI605-%20Embedded-System.pdf
  1163. https://www.electronicshub.org/vlsi-projects-for-engineering-students/
  1164. (Awesome)http://antipastohw.blogspot.com/2009/08/introducing-illuminato-x-machina.html
  1165. (Awesome)https://github.com/snyk/zip-slip-vulnerability
  1166. http://www.lupinesystems.com/calc/
  1167. https://www.digikey.co.uk/en/articles/techzone/2014/feb/using-nand-flash-for-run-time-code
  1168. https://www.bigmessowires.com/bmow1/
  1169. https://en.wikipedia.org/wiki/PIC_microcontroller
  1170. https://electronics.stackexchange.com/questions/188314/how-to-make-1-bit-permanent-memory-circuit
  1171. https://media.ccc.de/v/29c3-5327-en-writing_a_thumbdrive_from_scratch_h264
  1172. https://github.com/YehudaShapira/xv6-explained/blob/master/Explanations.md
  1173.  
  1174. Server related stuff
  1175. Server for hacker
  1176. Raspberry pi book
  1177. Exploiting raspberry pi
  1178. Hadoop with raspberry pi
  1179. https://www.zdnet.com/article/build-your-own-supercomputer-out-of-raspberry-pi-boards/
  1180. https://dqydj.com/raspberry-pi-hadoop-cluster-apache-spark-yarn/
  1181. https://www.networkworld.com/article/3156748/computers/10-amazing-raspberry-pi-clusters.html#slide3
  1182. https://www.youtube.com/watch?v=HdobynnfKQE&list=RDHdobynnfKQE&index=1
  1183. https://www.gharchive.org/
  1184. https://www.slideshare.net/tarun4568/uart-project-reprt-by-tarun-khaneja
  1185. https://www.google.com/search?q=UART+based+project&ie=utf-8&oe=utf-8&client=firefox-b
  1186. https://makezine.com/2014/02/25/how-to-choose-the-right-platform-raspberry-pi-or-beaglebone-black/
  1187. https://github.com/everclear72216/meta-mb
  1188. https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=13&ved=0ahUKEwi15vvYntDbAhWEbMAKHchSC-wQFgiBATAM&url=http%3A%2F%2Fjkridner.s3.amazonaws.com%2Fesc%2FESC-341_Dompe.pdf&usg=AOvVaw0aNHN2U6eHH4Xg3KAzSOBN
  1189. https://www.crazypi.com/index.php?route=checkout/checkout
  1190. https://elinux.org/BeagleBone_Community
  1191. https://surface.syr.edu/cgi/viewcontent.cgi?article=1304&context=eecs_etd
  1192. https://github.com/marmelab/awesome-rest
  1193. http://stackabuse.com/single-page-apps-with-vue-js-and-flask-restful-api-with-flask/
  1194. http://www.restapitutorial.com/lessons/whatisrest.html
  1195. https://medium.com/@robince885/how-to-do-twitter-authentication-with-react-and-restful-api-e525f30c62bb
  1196. https://github.com/rishmanisation/mini-twitter
  1197. http://highscalability.com/blog/2013/7/8/the-architecture-twitter-uses-to-deal-with-150m-active-users.html
  1198. https://stackoverflow.com/questions/319530/restful-authentication
  1199. https://github.com/kasuken/fakerestapi
  1200. https://fakerestapi.azurewebsites.net/
  1201. https://stackoverflow.com/questions/37328684/should-i-use-get-or-post-when-requesting-sensitive-data
  1202. https://assertible.com/blog/7-http-methods-every-web-developer-should-know-and-how-to-test-them
  1203. https://stackoverflow.com/questions/2938502/sending-post-data-in-android
  1204. https://www.j-michel.org/blog/2014/05/27/from-nand-chip-to-files
  1205.  
  1206.  
  1207. hypervisor
  1208. http://xhypervisor.org/
  1209. https://en.wikipedia.org/wiki/L4_microkernel_family
  1210. http://www3.cs.stonybrook.edu/~porter/hoss/
  1211. http://standa-note.blogspot.com/2015/08/writing-hypervisor-for-kernel-mode-code.html
  1212.  
  1213.  
  1214. Android app
  1215. https://medium.com/@avigezerit/bluetooth-low-energy-on-android-22bc7310387a
  1216. https://stackoverflow.com/questions/39698069/how-to-save-secret-key-securely-in-android/39749717
  1217. https://www.androidauthority.com/how-to-hide-your-api-key-in-android-600583/
  1218. https://medium.com/mindorks/writing-a-modular-project-on-android-304f3b09cb37
  1219. https://reqres.in/
  1220. https://www.javatpoint.com/java-reflection
  1221. http://www.vogella.com/tutorials/AndroidLibraryProjects/article.html
  1222. https://medium.com/@mydogtom/modularization-part-1-application-structure-overview-9e465909a9bc
  1223. https://medium.com/google-developers/building-a-video-player-app-in-android-part-1-5-d95770ef762d
  1224.  
  1225.  
  1226.  
  1227.  
  1228.  
  1229. (Awesome in itself)
  1230. Peter norvig
  1231. paulgraham
  1232. http://www.algorithmist.com/index.php/Dynamic_Programming
  1233. https://nostarch.com/ghpython.htm
  1234. https://en.wikipedia.org/wiki/Remote_procedure_call
  1235. https://www.youtube.com/watch?v=5Bf1i89hF38
  1236. https://info.lookout.com/rs/051-ESQ-475/images/pegasus-exploits-technical-details.pdf
  1237. https://stackoverflow.com/questions/2913618/how-is-integer-overflow-exploitable
  1238. https://security.stackexchange.com/questions/68442/escalating-from-apache-shell-to-root/68482#68482
  1239. https://security.stackexchange.com/questions/76845/how-to-gain-root-privilege-after-injecting-code-using-a-buffer-overflow-vulnerab
  1240. https://sce.party/?page=timeline
  1241. https://fail0verflow.com/blog/2016/console-hacking-2016-postscript/
  1242. (Awesome fuzzing)http://lcamtuf.coredump.cx/
  1243. (Awesome)https://www.slideshare.net/AkbarRomadhoni/detecting-and-exploiting-integer-overflows
  1244. http://phrack.org/issues/60/10.html
  1245. https://gbmaster.wordpress.com/2015/08/13/x86-exploitation-101-integer-overflow-adding-one-more-aaaaaaaaaaand-its-gone/
  1246. http://www.utdallas.edu/~zhiqiang.lin/file/cs4393/lec03.pdf
  1247. https://crypto.stanford.edu/cs155old/cs155-spring11/lectures/03-ctrl-hijack.pdf
  1248. http://insidetrust.blogspot.com/2011/02/assessing-buffer-overflows-with-windbg.html
  1249. https://web.archive.org/web/20061110115723/https://www.owasp.org/index.php/Integer_overflow
  1250. http://cse.iitd.ernet.in/~cs5090248/sil765/p1/
  1251. https://sploitfun.wordpress.com/2015/06/23/integer-overflow/
  1252. https://pdfs.semanticscholar.org/presentation/1d3f/bb4428082cc993d8987f7d97015dc1f73984.pdf
  1253. https://www.blackhat.com/docs/us-15/materials/us-15-Gong-Fuzzing-Android-System-Services-By-Binder-Call-To-Escalate-Privilege-wp.pdf
  1254. http://www.cis.syr.edu/~wedu/seed/Labs_12.04/Vulnerability/Buffer_Overflow/
  1255. PFLA (Page Fault Liberation Army)
  1256. https://www.quora.com/Why-is-it-taking-so-long-for-someone-to-develop-a-Playstation-4-jailbreak
  1257. http://www.eurasia.nu/modules.php?name=News&file=print&sid=3251
  1258. http://crack.bargains/02r0.pdf
  1259. https://github.com/hwroot/Presentations/blob/master/Mess%20with%20the%20best%20die%20like%20the%20rest%20mode%20by%20Volodymyr%20Pikhur%20-%20REcon%20Brussels%202018.pdf
  1260.  
  1261. Browser security(Awesome)
  1262. https://www.dfrws.org/sites/default/files/session-files/paper-forensic_analysis_of_a_sony_playstation_4_-_a_first_look.pdf
  1263. http://wololo.net/2015/07/15/ps4-jailbreak-brazilian-method-how-to-dump-the-ps4-nor-video/
  1264. (Awesome)https://www.corelan.be/index.php/2014/05/30/hitb2014ams-day-2-exploring-and-exploiting-ios-web-browsers/
  1265. https://improsec.com/blog/exploit-development-environment
  1266. https://dev.to/brpaz/my-linux-development-environment-of-2018-ch7
  1267. https://www.learnenough.com/dev-environment-tutorial
  1268. https://www.anitian.com/blog/a-study-in-exploit-development-part-1-setup-and-proof-of-concept/
  1269. https://security.stackexchange.com/questions/24391/updated-version-of-browser-security-handbook
  1270. https://www.offensivecon.org/trainings/2018/web-browser-exploitation-samuel-gross.html
  1271. https://softwareengineering.stackexchange.com/questions/117786/high-level-design-of-a-browser-layout-engine
  1272. https://crypto.stanford.edu/cs155/
  1273. https://www.syscan.org/slides/2014_EN_BrowserFuzzing_RosarioValotta.pdf
  1274. http://www.cs.tut.fi/tapahtumat/testaus12/kalvot/Wieser_20120606radamsa-coverage.pdf
  1275. https://deepsec.net/docs/Slides/2012/DeepSec_2012_Rosario_Valotta_-_Taking_Browsers_Fuzzing_to_the_next_(DOM)_Level.pdf
  1276. https://sec-consult.com/wp-content/uploads/files/vulnlab/the_art_of_fuzzing_slides.pdf
  1277. http://2015.zeronights.org/assets/files/16-Brown.pdf
  1278. https://hitcon.org/2014/downloads/P1_06_Chen%20Zhang%20-%20Smashing%20The%20Browser%20-%20From%20Vulnerability%20Discovery%20To%20Exploit.pdf
  1279. http://cdn.ttgtmedia.com/rms/pdf/SearchSecurity.in_EXP_writing_tutorial.01.pdf
  1280. https://archive.org/details/ARMArchitectureReferenceManual?q=webkit
  1281. https://conference.hitb.org/hitbsecconf2014kul/materials/D2T2%20-%20Rosario%20Valotta%20-%20Browser%20Fuzzing%20in%202014.pdf
  1282. https://web.archive.org/web/20090825035354/http://www.abysssec.com/blog/2009/08/how-to-write-browser-fuzzer/
  1283. https://www.vdalabs.com/tools/
  1284. https://fuzzing-project.org/tutorial2.html
  1285. (Awesome)https://www.youtube.com/watch?v=BWFdxAG_TGk
  1286. https://github.com/xairy/linux-kernel-exploitation
  1287. (Most awesome and updated)https://www.thezdi.com/blog/2018/6/21/analyzing-an-integer-overflow-in-bitdefender-av-part-2-the-exploit
  1288. https://4hou.win/wordpress/?p=20446
  1289. https://labs.mwrinfosecurity.com/assets/BlogFiles/huawei-mate9pro-pwn2own-write-up-final-2018-04-26.pdf
  1290. https://movaxbx.ru/2018/04/18/
  1291. http://acez.re/author/acez/
  1292. conventional dehazing
  1293. https://www.cs.ru.nl/E.Poll/hacking/slides/hic3_stack.pdf
  1294. https://www.youtube.com/watch?v=PrDsGldP1Q0
  1295. https://samsclass.info/127/127_S17.shtml
  1296. https://sweetness.hmmz.org/2018-01-01-the-mysterious-case-of-the-linux-page-table.html
  1297. https://www.thegeekstuff.com/2010/11/50-linux-commands/
  1298. https://resources.infosecinstitute.com/hacking-a-wordpress-site/#gref
  1299. snoopsnitch
  1300. http://www.textfiles.com/magazines/
  1301. http://www.godevtool.com/GoasmHelp/usstack1.htm
  1302. http://phrack.org/issues/59/11.html
  1303. http://www.cs.virginia.edu/~ww6r/CS4630/lectures/Off-by-one-error.pdf
  1304. https://sploitfun.wordpress.com/2015/06/07/off-by-one-vulnerability-stack-based-2/
  1305.  
  1306.  
  1307. (Awesome)
  1308. Unicode exploit
  1309. https://www.corelan.be/index.php/2009/11/06/exploit-writing-tutorial-part-7-unicode-from-0x00410041-to-calc/
  1310. https://www.securitysift.com/windows-exploit-development-part-7-unicode-buffer-overflows/
  1311. https://www.giac.org/paper/gcih/115/iis-unicode-exploit/101163
  1312.  
  1313. https://stackoverflow.com/questions/13024977/the-art-of-compiler-on-buffer-overflow
  1314. (Awesome bypassing all protection)https://security.stackexchange.com/questions/20497/stack-overflows-defeating-canaries-aslr-dep-nx
  1315. http://www.semantiscope.com/research/BHDC2010/BHDC-2010-Slides-v2.pdf
  1316. https://softwareengineering.stackexchange.com/questions/195385/understanding-stack-frame-of-function-call-in-c-c
  1317.  
  1318.  
  1319. https://fullyoptimized.files.wordpress.com/2011/10/fullyoptimizedconceptualpresentation-4.pptx
  1320. https://hacks.mozilla.org/2017/09/firefox-quantum-developer-edition-fastest-firefox-ever/
  1321. https://medium.com/mozilla-tech/the-search-for-the-goldilocks-browser-and-why-firefox-may-be-just-right-for-you-1f520506aa35
  1322. http://sangbui.com/sb-files/BrowserArchitecture_ClientSide.pdf
  1323. https://www.blackhat.com/docs/us-16/materials/us-16-Molinyawe-Shell-On-Earth-From-Browser-To-System-Compromise-wp.pdf
  1324. https://www.exploit-db.com/exploits/44822/
  1325. http://security.cs.rpi.edu/courses/binexp-spring2015/lectures/13/08_lecture.pdf
  1326.  
  1327. https://www.evonide.com/side-channel-attacking-browsers-through-css3-features/
  1328. https://blog.rapid7.com/2011/12/28/more-fun-with-bsd-derived-telnet-daemons/
  1329. http://www.handgrep.se/repository/cheatsheets/postexploitation/LinuxUnixBSDPost-Exploitation.pdf
  1330. https://www.blackhat.com/presentations/bh-usa-07/Ortega/Whitepaper/bh-usa-07-ortega-WP.pdf
  1331. https://census-labs.com/media/bheu-2010-slides.pdf
  1332. https://books.google.co.uk/books?id=XE-ddYF6uhYC&pg=PT470&lpg=PT470&dq=exploiting+bsd&source=bl&ots=GhGTjuWYJ-&sig=j-pxKD7tzbzZiEiBcUCPhjSKKNA&hl=en&sa=X&ved=0ahUKEwjb-8zhufDbAhXDCuwKHZtRCso4ChDoAQhFMAU#v=onepage&q=exploiting%20bsd&f=false
  1333. https://books.google.co.uk/books?id=aidqstv38G8C&pg=PA405&lpg=PA405&dq=exploiting+bsd&source=bl&ots=9TpOhB5iyN&sig=DwIKKQ3dLOmxVucIvtWU2KIwYIQ&hl=en&sa=X&ved=0ahUKEwjb-8zhufDbAhXDCuwKHZtRCso4ChDoAQg6MAM#v=onepage&q=exploiting%20bsd&f=false
  1334. https://books.google.co.uk/books?id=ZNI5dvBSfZoC&pg=PA440&lpg=PA440&dq=exploiting+bsd&source=bl&ots=YsBUNyygkv&sig=SrYbr2INnFmkgRBxokdixT3oApE&hl=en&sa=X&ved=0ahUKEwjb-8zhufDbAhXDCuwKHZtRCso4ChDoAQhXMAk#v=onepage&q=exploiting%20bsd&f=false
  1335. http://insecure.org/sploits_bsd.html
  1336. https://thenewstack.io/linux-bsd-solaris-servers-risk-compromise-stack-clash-flaw/
  1337. https://www.exploit-db.com/platform/?p=FreeBSD
  1338. ##############h##t$$t%%p^^s&&:**/((/))w!!i@@k##i$$l%%e^^a&&k**s((.))o!!r@@g##/$$c%%i^^a&&v**7((p))1!!/@@
  1339. https://books.google.co.uk/books?id=G6Zeh_XSOqUC&pg=PA200&lpg=PA200&dq=exploiting+bsd&source=bl&ots=0z31_OwirK&sig=Q4n9v5XgXXXTFho3iZqaP7U7WtI&hl=en&sa=X&ved=0ahUKEwi1rK_vufDbAhUK_aQKHYHvDPE4FBDoAQhNMAg#v=onepage&q=exploiting%20bsd&f=false
  1340. https://www.exploit-db.com/docs/english/24541-abusing,-exploiting-and-pwning-with-firefox-add-ons.pdf
  1341. https://pen-testing.sans.org/resources/papers/gcih/0x333hatec-samba-remote-root-exploit-102967
  1342. http://taligarsiel.com/Projects/howbrowserswork1.htm#The_browsers_we_will_talk_about
  1343. https://grosskurth.ca/papers/browser-refarch.pdf
  1344. https://www.crazyengineers.com/threads/how-internet-browsers-work-how-to-develop-a-browser.50353/
  1345. https://web.archive.org/web/20081217140037/http://webkit.org:80/blog/
  1346. http://weblogs.mozillazine.org:80/hyatt/archives/cat_safari.html
  1347. https://weblogs.mozillazine.org/hyatt/archives/
  1348. https://webkit.org/blog/66/the-fouc-problem/
  1349. https://webkit.org/blog/114/
  1350. http://www.swag.uwaterloo.ca/qldx/
  1351. https://twitter.com/projectzerobugs?lang=en
  1352. http://j00ru.vexillium.org/papers/2018/bochspwn_reloaded.pdf
  1353. https://www.blackhat.com/docs/asia-16/materials/asia-16-Baloch-Bypassing-Browser-Security-Policies-For-Fun-And-Profit.pdf
  1354. https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0ahUKEwj6kdyF1vDbAhUkuaQKHeAYD80QFggpMAA&url=https%3A%2F%2Fstorage.googleapis.com%2Fgoogle-code-attachments%2Fbrowsersec%2Fissue-8%2Fcomment-8%2FGoogle%2520Browser%2520Security%2520Handbook.pdf&usg=AOvVaw0NFVlOkfVvwqltygPxDqVk
  1355.  
  1356.  
  1357. https://www.slideshare.net/HackIT-ukraine/15-technique-to-exploit-file-upload-pages-ebrahim-hegazy
  1358. https://medium.com/bugbountywriteup/how-i-pwned-a-million-dollar-company-9fa5bfd234dd
  1359. https://hackernoon.com/how-i-hacked-40-websites-in-7-minutes-5b4c28bc8824
  1360. https://0day.work/hacking-with-latex/
  1361. https://pentest-tools.com/website-vulnerability-scanning/discover-hidden-directories-and-files
  1362. https://ucaat.etsi.org/2015/presentations/HTB_HODOVAN.pdf
  1363. https://www.safaribooksonline.com/library/view/fuzzing-brute-force/9780321446114/ch18.html
  1364. https://conference.hitb.org/hitbsecconf2017ams/materials/D2T2%20-%20Yu%20Hong%20-%20Attack%20Surface%20Extended%20by%20URL%20Schemes.pdf
  1365. https://www.blackhat.com/docs/us-16/materials/us-16-Pearce-HTTP2-&-QUIC-Teaching-Good-Protocols-To-Do-Bad-Things.pdf
  1366. https://www.giac.org/paper/gcih/361/port-80-apache-http-daemon-exploit/103818
  1367. https://www.acunetix.com/blog/docs/http-fuzzer/
  1368. https://deadliestwebattacks.com/tag/javascript/
  1369. https://skillsmatter.com/skillscasts/11037-exploiting-rust-for-fun-and-profit
  1370. https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=3&ved=0ahUKEwj4u-j97PDbAhXF2aQKHd1BBMwQFghIMAI&url=https%3A%2F%2Fwww.nccgroup.trust%2Fglobalassets%2Fresources%2Fus%2Fpresentations%2Fdocuments%2Fattacking_clientside_jit_compilers_paper.pdf&usg=AOvVaw0plrOjA82KZaetnWv3Ilul
  1371. https://rh0dev.github.io/blog/2017/the-return-of-the-jit/
  1372. https://web.stanford.edu/~mlfbrown/browsers.pdf
  1373. https://github.com/PLSysSec/bindings
  1374. https://phoenhex.re/2017-06-21/firefox-structuredclone-refleak
  1375.  
  1376. https://www.usenix.org/legacy/event/woot08/tech/full_papers/daniel/daniel_html/index.html
  1377. https://snyk.io/blog/exploiting-buffer/
  1378. https://saelo.github.io/posts/firefox-script-loader-overflow.html
  1379. https://cansecwest.com/slides/2015/Liang_CanSecWest2015.pdf
  1380. https://react-etc.net/entry/web-security-exploits-c-to-javascript-webassembly
  1381. https://www.blackhat.com/presentations/bh-usa-07/Sotirov/Whitepaper/bh-usa-07-sotirov-WP.pdf
  1382. http://blog.exploitlab.net/
  1383. https://www.blackhat.com/docs/us-15/materials/us-15-Yason-Understanding-The-Attack-Surface-And-Attack-Resilience-Of-Project-Spartans-New-EdgeHTML-Rendering-Engine-wp.pdf
  1384. https://sec.jetlib.com/
  1385. https://www.defcon.org/images/defcon-15/dc15-presentations/dc-15-west.pdf
  1386. https://blog.hboeck.de/archives/868-How-Heartbleed-couldve-been-found.html
  1387. https://blog.regehr.org/archives/1238
  1388. https://shubs.io/cves-and-open-source-security-efforts/
  1389. https://github.com/moloch--/cve-2016-1764
  1390.  
  1391.  
  1392.  
  1393. Static analysis
  1394. awesome Static analysis
  1395. http://blog.vivekhaldar.com/post/22307062036/bug-finding-and-static-analysis-in-the-real-world
  1396. https://github.com/mre/awesome-static-analysis
  1397. https://www.defcon.org/images/defcon-15/dc15-presentations/dc-15-west.pdf
  1398. https://ai.google/research/pubs/pub34339
  1399. https://people.umass.edu/bijohnson/docs/icse2013.pdf
  1400. https://github.com/open-source-parsers/jsoncpp/issues/390
  1401.  
  1402.  
  1403. https://www.giac.org/paper/gcih/466/ipc-share-exploit-methodology-chinese-attackers/103860
  1404. https://www.blackhat.com/docs/us-15/materials/us-15-Shen-Attacking-Your-Trusted-Core-Exploiting-Trustzone-On-Android.pdf
  1405. https://www.amazon.co.uk/Exploiting-Software-Break-Addison-Wesley-Security/dp/0201786958
  1406. Black hat python
  1407. https://security.stackexchange.com/questions/134676/how-can-buffer-overflows-be-harmful-in-android
  1408. https://www.blackhat.com/docs/eu-16/materials/eu-16-Jurczyk-Effective-File-Format-Fuzzing-Thoughts-Techniques-And-Results.pdf
  1409. https://lcamtuf.blogspot.com/2014/11/pulling-jpegs-out-of-thin-air.html
  1410. http://web.eecs.utk.edu/~mrjantz/papers/pgo.pdf
  1411. https://www.slideshare.net/codeblue_jp/the-art-of-exploiting-unconventional-useafterfree-bugs-in-android-kernel-by-di-shen
  1412. https://go.armis.com/hubfs/ExploitingBlueBorneLinuxBasedIoTDevices.pdf?t=1526581004434
  1413.  
  1414.  
  1415. https://labs.mwrinfosecurity.com/publications/
  1416. https://cansecwest.com/slides/2018/Attacks%20and%20Analysis%20of%20the%20Samsung%20S8%20from%20Mobile%20PWN2OWN%20-%20Guang%20Gong%20and%20Jianjun%20Dai,%20Qihoo%20360.pdf
  1417.  
  1418.  
  1419. https://labs.mwrinfosecurity.com/assets/BlogFiles/G.-Geshev-and-Rob-Miller-Chainspotting.pdf
  1420. https://stackoverflow.com/questions/18717016/what-are-ring-0-and-ring-3-in-the-context-of-operating-systems
  1421. https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/
  1422.  
  1423. https://mrh4sh.github.io/fristileaks-solution
  1424. (Awesome)https://www.contextis.com/blog/linux-privilege-escalation-via-dynamically-linked-shared-object-library
  1425. https://pdfs.semanticscholar.org/70d7/d873c72d0db9968650ad359c6ef915ffbb42.pdf
  1426.  
  1427. https://hackmag.com/security/reach-the-root/
  1428.  
  1429. https://sploitfun.wordpress.com/2015/05/08/bypassing-nx-bit-using-return-to-libc/
  1430. https://j00ru.vexillium.org/papers/2018/bochspwn_reloaded.pdf
  1431. https://stackoverflow.com/questions/47885043/proper-method-to-acquire-root-access-on-linux-for-qt-applications
  1432.  
  1433. https://thehackernews.com/2016/11/hacking-linux-system.html
  1434. https://tinyurl.com/yb3hmx6o
  1435. https://www.giac.org/paper/gcih/146/vixie-crontab-exploit/100894
  1436. https://www.blackhat.com/docs/eu-16/materials/eu-16-Shen-Rooting-Every-Android-From-Extension-To-Exploitation-wp.pdf
  1437. https://www.google.com/search?q=js+fool&ie=utf-8&oe=utf-8&client=firefox-b-ab
  1438.  
  1439. https://www.brookcourtsolutions.com/wp-content/uploads/2017/11/dark-web.pdf
  1440. https://www.sacon.io/
  1441.  
  1442. (Awesome)https://tc.gtisc.gatech.edu/bss/2014/r/kernel-exploits.pdf
  1443. https://www.blackhat.com/presentations/bh-europe-07/Eriksson-Janmar/Presentation/bh-eu-07-eriksson.pdf
  1444. (Awesome)http://analysis.seclab.tuwien.ac.at/projects/vifuzz/docs/exploit.pdf
  1445.  
  1446. (Awesome)https://security.stackexchange.com/questions/85801/is-it-possible-for-malware-to-be-in-the-bios-or-in-hardware
  1447.  
  1448. https://cansecwest.com/slides/2013/PrivateCore%20CSW%202013.pdf
  1449. https://www.youtube.com/watch?v=Uz6G_YAQb2U
  1450.  
  1451. https://en.wikipedia.org/wiki/Memory_controller
  1452.  
  1453. http://pepijndevos.nl/2016/08/24/x86-instruction-distribution.html
  1454. https://pdfs.semanticscholar.org/presentation/f753/1569fe893b0621bbf31f974a7269168513d0.pdf
  1455. https://securinghardware.com/training/x86/
  1456.  
  1457.  
  1458. https://recon.cx/2018/brussels/resources/slides/RECON-BRX-2018-Mess-with-the-best-die-like-the-rest_(mode).pdf
  1459. https://www.iotsecurityfoundation.org/best-practice-guidelines/
  1460. https://www.blackhat.com/docs/eu-16/materials/eu-16-Shen-Rooting-Every-Android-From-Extension-To-Exploitation-wp.pdf
  1461.  
  1462. http://blog.frizk.net/
  1463.  
  1464. https://www.slideshare.net/codeblue_jp/igor-skochinsky-enpub
  1465.  
  1466. https://archive.fosdem.org/2017/schedule/event/valgrind_angr/attachments/slides/1797/export/events/attachments/valgrind_angr/slides/1797/slides.pdf
  1467.  
  1468. http://samoa.incubator.apache.org/
  1469.  
  1470.  
  1471. http://hack2learn.blogspot.com/
Advertisement
Add Comment
Please, Sign In to add comment