Skip to content

Instantly share code, notes, and snippets.

@b1tg
Forked from rava-dosa/security.md
Created January 27, 2020 11:05
Show Gist options
  • Save b1tg/766d86eef9506899d90bd937beecbbec to your computer and use it in GitHub Desktop.
Save b1tg/766d86eef9506899d90bd937beecbbec to your computer and use it in GitHub Desktop.
01000011x10001000x000100000100x010000010010
ShellScript
https://www.shellscript.sh/
Acl
http://www.gsp.com/cgi-bin/mdroid.cgi?topic=extattrctl
http://www.onlamp.com/pub/a/bsd/2003/08/14/freebsd_acls.html
https://linux.die.net/man/1/setfacl
https://www.bing.com/search?q=ACLs+with+Samba+andWindows&src=IE-TopResult&FORM=IETR02&conversationid=
https://en.wikipedia.org/wiki/Chmod
See references https://en.wikipedia.org/wiki/Access_control_list
See see also https://en.wikipedia.org/wiki/Discretionary_access_control
https://security.stackexchange.com/questions/63518/mac-vs-dac-vs-rbac
Difference b/w mac and dac
With MAC, admins creates a set of levels and each user is linked with a specific access level. He can access all the resources that are not greater than his access level. In contrast, each resource in DAC has a list of users who can access it. DAC provides access by identity of the user and not by permission level.
Rbac
Canaries
http://antoniobarresi.com/security/exploitdev/2014/05/03/64bitexploitation/
https://stackoverflow.com/questions/24465014/gcc-generate-canary-or-not
Authentication and Access control in linux os
(Awesome)https://courses.cs.washington.edu/courses/cse484/11au/sections/section6.pdf
http://www.tenouk.com/linuxunixsecurityfeatures.html
https://link.springer.com/chapter/10.1007/978-3-642-23312-8_28
https://www.safaribooksonline.com/library/view/linux-server-hacks/0596100825/ch01.html
(Awesome)https://pdfs.semanticscholar.org/presentation/89f5/513e99544345cd86dfd7ef8ab386459cdd25.pdf
Book https://www.amazon.com/Foundations-Security-Every-Programmer-Experts/dp/1590597842
College
https://courses.cs.washington.edu/courses/cse484/17au/schedule.html
https://courses.cs.washington.edu/courses/cse484/11au/sections/
In above college in different year course is totally different.
Buffer-overflow
http://www.cse.scu.edu/~tschwarz/coen152_05/
Howard and LeBlanc: Writing Secure Code, 2nd edition
https://web.archive.org/web/20050325202927/http://www.nextgenss.com/papers/advanced_sql_injection.pdf
Dangling pointer
https://developers.slashdot.org/story/10/04/13/1951246/how-to-exploit-null-pointers
https://security.stackexchange.com/questions/61948/how-do-i-make-a-working-example-of-a-dangling-pointers-exploit-or-where-do-i
https://blogs.oracle.com/linux/much-ado-about-null%3a-exploiting-a-kernel-null-dereference-v2
Causes of dangling pointer
1.when global variable points the some variable in function or local block.
2.initialize ptr=NULL immediate after block completion
Solution:
After deallocation of memory, immediate initialize pointer to NULL
http://codingstreet.com/what-is-dangling-pointer/
(Awesome)http://www.cs.virginia.edu/~ww6r/CS4630/syllabus.html
linux filesystem
http://www.tldp.org/LDP/intro-linux/html/index.html
Format String
http://www.cs.virginia.edu/~ww6r/CS4630/
tocttou
https://www.cl.cam.ac.uk/~rja14/Papers/SE-06.pdf
https://www.bing.com/search?q=tocttou&src=IE-TopResult&FORM=IETR02&conversationid=
https://github.com/tocttou
http://users.cis.fiu.edu/~weijp/Jinpeng_Homepage_files/toctou-fast05.pdf
https://www.usenix.org/sites/default/files/conference/protected-files/michele_woot12_slides.pdf
http://www.sis.pitt.edu/jjoshi/courses/IS2620/Fall17/Lectures.html
http://www.sis.pitt.edu/jjoshi/courses/IS2620/Fall17/Lecture6.pdf
Ropfttw
http://shell-storm.org/talks/ROP_course_lecture_jonathan_salwan_2014.pdf
https://www.youtube.com/watch?v=5FJxC59hMRY
https://drive.google.com/file/d/0B3U0fxyeeTTdcDJhbm5DcU1OQU0/view
https://drive.google.com/file/d/0B3U0fxyeeTTdaGdQWGFvUFg5czQ/view
https://en.wikipedia.org/wiki/Address_space_layout_randomization
Bypassing sehop
https://repo.zenk-security.com/Reversing%20.%20cracking/Bypassing%20SEHOP.pdf
Heap_spray
https://en.wikipedia.org/wiki/Heap_spraying
(Awesome)http://security.cs.rpi.edu/courses/binexp-spring2015/
Integer overflow
https://phoenhex.re/2017-06-02/arrayspread
X86-architecture
https://stackoverflow.com/questions/18417849/difference-between-flat-memory-model-and-protected-memory-model
https://en.wikipedia.org/wiki/Flat_memory_model
Linux uses flat memory model.
http://www.cs.virginia.edu/~evans/cs216/guides/x86.html
https://gotocon.com/dl/goto-chicago-2014/slides/MattGodbolt_X86InternalsForFunAndProfit.pdf
http://asmtutor.com/#lesson1
https://software.intel.com/en-us/articles/intel-sdm
https://stackoverflow.com/questions/1023593/how-to-write-hello-world-in-assembler-under-windows#answer-20032763
https://software.intel.com/sites/default/files/m/d/4/1/d/8/Introduction_to_x64_Assembly.pdf
https://aaronbloomfield.github.io/pdr/book/x86-64bit-asm-chapter.pdf
http://aaronbloomfield.github.io/pdr/book/x86-64bit-ccc-chapter.pdf
http://asmtutor.com/#lesson1
https://www.informatik.htw-dresden.de/~beck/ASM/syscall_list.html
https://web.archive.org/web/20041010205615/http://docs.cs.up.ac.za/programming/asm/derick_tut#syscalls
https://www.informatik.htw-dresden.de/~beck/ASM/syscall_list.html
https://stackoverflow.com/questions/9601427/is-inline-assembly-language-slower-than-native-c-code
http://www.agner.org/optimize/
Elf format(Executable and linkable format)
https://www.linuxjournal.com/article/1060
Calling convention
https://en.wikipedia.org/wiki/Calling_convention
https://stackoverflow.com/questions/41231637/how-does-a-function-call-work
https://eli.thegreenplace.net/2011/02/04/where-the-top-of-the-stack-is-on-x86/
https://en.wikipedia.org/wiki/Executable_and_Linkable_Format#Specifications
http://www.agner.org/optimize/
Kernel and boot processes
http://duartes.org/gustavo/blog/post/
http://www.tldp.org/LDP/intro-linux/html/index.html
http://www.science.unitn.it/~fiorella/guidelinux/tlk/node5.html
http://en.wikipedia.org/wiki/Reset_vector
https://www.cs.cmu.edu/~410-s07/p4/p4-boot.pdf
Tmap,smap,smep, virtualisation and hypervisor
For smep http://j00ru.vexillium.org/?p=783
For smap https://en.wikipedia.org/wiki/Supervisor_Mode_Access_Prevention
For tpm https://en.wikipedia.org/wiki/Trusted_Platform_Module
https://en.wikipedia.org/wiki/Address_space_layout_randomization
Side channel attack
https://en.wikipedia.org/wiki/Side-channel_attack
https://www.peerlyst.com/posts/a-collection-of-links-to-pdfs-of-papers-on-micro-architectural-side-channel-attacks-sorted-by-date-paul-harvey
Cache attack
https://en.wikipedia.org/wiki/CPU_cache
https://www.youtube.com/watch?v=vpGI1ggKzC4
https://www.youtube.com/channel/UCG1HuJcwjA0Cp7a2-iGfWug
http://palms.ee.princeton.edu/system/files/SP_vfinal.pdf
https://github.com/defuse/flush-reload-attacks
https://gruss.cc/files/cache_and_rowhammer_ruhrsec.pdf
https://www.blackhat.com/docs/us-16/materials/us-16-Hornby-Side-Channel-Attacks-On-Everyday-Applications.pdf
https://www.youtube.com/watch?v=DkWqLDSqHm8&list=PLH15HpR5qRsWx4qw9ZlgmisHOcKG4ZcRS&index=18
http://web.cse.ohio-state.edu/~zhang.834/slides/tutorial17.pdf
https://conference.hitb.org/hitbsecconf2016ams/materials/D2T1%20-%20Anders%20Fogh%20-%20Cache%20Side%20Channel%20Attacks.pdf
http://www.cryptofails.com/post/70097430253/crypto-noobs-2-side-channel-attacks
Timing attack
https://www.youtube.com/watch?v=3v5Von-oNUg
https://jochen-hoenicke.de/trezor-power-analysis/
Acoustic attack
https://www.cs.tau.ac.il/~tromer/acoustic/
Search for lev pachnov
Daniel gruss
iaik graz university of technology
https://www.youtube.com/user/BlackHatOfficialYT/playlists?disable_polymer=1
https://rd.springer.com/chapter/10.1007/978-1-4419-1530-6_8
https://www.usenix.org/node/184416
https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-yarom.pdf
https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-gruss.pdf
https://www.blackhat.com/docs/us-16/materials/us-16-Hornby-Side-Channel-Attacks-On-Everyday-Applications.pdf
https://www.cs.unc.edu/~reiter/papers/2014/CCS1.pdf
https://github.com/IAIK/rowhammerjs
https://www.blackhat.com/presentations/bh-usa-07/De_Haas/Presentation/bh-usa-07-de_haas.pdf
https://en.wikipedia.org/wiki/Shared_memory
Evict and time
https://www.youtube.com/watch?v=ewe3-mUku94
https://eprint.iacr.org/2005/271.pdf
RowHammer
https://www.blackhat.com/docs/us-15/materials/us-15-Seaborn-Exploiting-The-DRAM-Rowhammer-Bug-To-Gain-Kernel-Privileges-wp.pdf
https://www.youtube.com/watch?v=1iBpLhFN_OA
https://www.blackhat.com/docs/us-15/materials/us-15-Seaborn-Exploiting-The-DRAM-Rowhammer-Bug-To-Gain-Kernel-Privileges.pdf
https://www.blackhat.com/docs/eu-16/materials/eu-16-Lipp-ARMageddon-How-Your-Smartphone-CPU-Breaks-Software-Level-Security-And-Privacy-wp.pdf
(Awesome) https://www.vusec.net/projects/glitch/
Rowhammer on Armageddon
https://github.com/iaik/armageddon
https://mlq.me/
Moritz lipp
AES
http://www.moserware.com/2009/09/stick-figure-guide-to-advanced.html
https://en.wikipedia.org/wiki/Rijndael_S-box
https://shanetully.com/2012/06/openssl-rsa-aes-and-c/
https://googleprojectzero.blogspot.co.uk/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
Javascript Internals spidermonkey
http://www.phrack.org/issues/69/14.html#article
Computer organization
http://pages.cs.wisc.edu/~arch/www/books.html
https://www.quora.com/What-is-a-good-book-to-learn-computer-architecture
http://williams.comp.ncat.edu/comp375/CacheSim.pdf
(Awesome )http://www.cs.uni.edu/~diesburg/courses/cs3430_sp14/sessions/s14/s14_caching_and_tlbs.pdf
(Awesome cache and tlb)http://inst.eecs.berkeley.edu/~cs162/sp11/sections/cs162-sp11-section6-answers.pdf
https://www.quora.com/What-is-the-difference-between-TLB-and-MMU-in-OS
http://www.agner.org/optimize/
Hardware reverse engineering
http://security.cs.rpi.edu/courses/hwre-spring2014/
Malware analysis
http://security.cs.rpi.edu/courses/malware-spring2013/
Misc
https://events.static.linuxfound.org/sites/events/files/slides/AFL%20filesystem%20fuzzing,%20Vault%202016_0.pdf
(Awesome list of links in last) https://dyjak.me/wp-content/uploads/2018/05/WarCon-2017-Interpreters-Under-Pressure.pdf
(Awesome)https://www.nds.rub.de/media/nds/arbeiten/2015/10/30/Tim_Guenther-EsPReSSO-BA.pdf
(Awesome book)https://download-mirror.savannah.gnu.org/releases/pgubook/ProgrammingGroundUp-1-0-booksize.pdf
https://archive.org/details/ToorconArchiveInfocon
https://techbeacon.com/best-security-conferences-2018
http://mirror.easyname.at/nongnu/pgubook/ProgrammingGroundUp-1-0-booksize.pdf
http://www.agner.org/optimize/
https://digteam.github.io/assets/tocttou.pdf (Don't know what that is)
https://www.youtube.com/user/SourcefireInc/playlists?disable_polymer=1
https://www.youtube.com/channel/UCSii2fuiLLlGqaR6sR_y0rA
https://www.youtube.com/channel/UCDNzNvZlYK8jZLsUbdiGrsQ
●[1] http://cseweb.ucsd.edu/~hovav/talks/blackhat08.html
● [2] http://cseweb.ucsd.edu/~hovav/dist/sparc.pdf
● [3] https://github.com/0vercl0k/rp
● [4] http://ropshell.com/ropeme/
● [5] https://github.com/pakt/ropc
● [6] https://github.com/awailly/nrop
● [7] http://shell-storm.org/project/ROPgadget/
● [8] https://www.comp.nus.edu.sg/~liangzk/papers/asiaccs11.pdf
● [9] https://www.lst.inf.ethz.ch/research/publications/PPREW_2013/PPREW_2013.pdf
● [10] http://www.scs.stanford.edu/brop/bittau-brop.pdf
● [11] https://labs.portcullis.co.uk/blog/ohm-2013-review-of-returning-signals-for-fun-and-profit/
● [12] http://shell-storm.org/repo/Notepad/ROP-chain-generation-via-backtracking-and-state-machine.txt
http://www.tenouk.com/cncplusplusbufferoverflow.html
https://www.sei.cmu.edu/research-capabilities/all-work/display.cfm?customel_datapageid_4050=21274
https://www.youtube.com/channel/UCkysTPyA_48174c80rcITmA
https://www.youtube.com/channel/UCMNvAtT4ak2azKNk6UlB1QQ
https://github.com/vitalysim/Awesome-Hacking-Resources#reverse-engineering-buffer-overflow-and-exploit-development
https://software.intel.com/en-us/articles/intel-sdm#combined
http://www.tenouk.com/Bufferoverflowc/stackbasedbufferoverflow.html
https://www.sei.cmu.edu/research-capabilities/all-work/display.cfm?customel_datapageid_4050=21274
https://www.youtube.com/channel/UCkysTPyA_48174c80rcITmA
https://www.youtube.com/channel/UCMNvAtT4ak2azKNk6UlB1QQ
https://github.com/vitalysim/Awesome-Hacking-Resources#reverse-engineering-buffer-overflow-and-exploit-development
https://software.intel.com/en-us/articles/intel-sdm#combined
http://www.tenouk.com/Bufferoverflowc/stackbasedbufferoverflow.html
(Awesome )http://www.cs.virginia.edu/~evans/cs216/
https://github.com/offensive-security
https://www.corelan.be/index.php/2009/09/21/exploit-writing-tutorial-part-6-bypassing-stack-cookies-safeseh-hw-dep-and-aslr/
(primary) http://security.cs.rpi.edu/courses/binexp-spring2015/lectures/1/01_lecture.pdf
https://kitctf.de/writeups/0ctf2015/freenote/
https://sploitfun.wordpress.com/2015/03/04/heap-overflowusing-malloc-maleficarum/
http://acez.re/ctf-writeup-hitcon-ctf-2014-stkof-or-modernheap-overflow/
http://wapiflapi.github.io/2014/11/17/hacklu-oreo-withret2dl-resolve/
http://phrack.org/issues/66/10.html
http://dl.packetstormsecurity.net/papers/attack/MallocMaleficarum.txt
(Awesome)https://samsclass.info/127/127_F15.shtml
(Awesome codes)pip install -r requirements.txt --no-index --find-links file:///tmp/packages
Compiler intrinsics
https://www.linuxjournal.com/content/introduction-gcc-compiler-intrinsics-vector-processing
https://stackoverflow.com/questions/7156908/sse-intrinsic-functions-reference
https://msdn.microsoft.com/en-us/library/hh977022.aspx
(Awesome list of vulnerablilities) https://www.cvedetails.com/
Misc2
https://dzone.com/articles/how-to-check-linux-process-deeply-with-common-sens
https://doc.lagout.org/programmation/
(Triple awesome) https://renenyffenegger.ch/notes/development/languages/C-C-plus-plus/GCC/create-libraries/index
https://gms.tf/ld_library_path-considered-harmful.html
(Awesome book resources) https://www.linuxtopia.org/online_books/
https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Rants%26Writeups/Hacking%20Team%20Writeup.md
https://www.mwrinfosecurity.com/events/past-events/
(Awesome)https://www.cs.bgu.ac.il/~mahlert/TCPIP_Implementation/TCPIP_Implementation.pdf
(Awesome)https://www.wiley.com/en-gb/Efficient+Algorithms+for+MPEG+Video+Compression-p-9780471379423
(Awesome Alternatives of exploit db)https://security.stackexchange.com/questions/2715/exploit-db-like-websites-where-people-can-search-for-security-bugs
https://leotindall.com/tutorial/an-intro-to-x86_64-reverse-engineering/
http://resources.infosecinstitute.com/x86-assembly-reverse-engineering-part-2/
https://smtebooks.com/book/602/practical-reverse-engineering-x86-x64-pdf
http://overthewire.org/wargames/bandit/bandit0.html
https://github.com/RPISEC/MBE
https://jochen-hoenicke.de/trezor-power-analysis/
https://eprint.iacr.org/2017/1169.pdf
http://media.ntu.edu.sg/NewsReleases/Pages/newsdetail.aspx?news=e57faffc-24ea-4034-9181-f5fea9850690
https://github.com/mseaborn
https://github.com/HackathonHackers/groups
https://github.com/HackathonHackers/personal-sites
https://blog.feedspot.com/hacker_blogs/
https://github.com/FabioBaroni/awesome-chinese-infosec-websites
https://github.com/spacehackersclub/awesome-spacehackers
https://heimdalsecurity.com/blog/best-twitter-cybersec-accounts/#cybersec specialists
(makefile)https://gist.github.com/hallettj/29b8e7815b264c88a0a0ee9dcddb6210
(makefile awesome)http://www.cs.colby.edu/maxwell/courses/tutorials/maketutor/
(MMDense LSTM)https://scirate.com/arxiv/1805.02410
https://github.com/pettarin/awesome-python-audio-research
https://github.com/ganny26/awesome-audioqr
https://github.com/ybayle/awesome-deep-learning-music
https://github.com/sbrugman/deep-learning-papers#visual
https://sisec.inria.fr/
http://www.brendangregg.com/perf.html
https://github.com/RRZE-HPC/likwid
(Awesome)https://sourceware.org/glibc/wiki/AgnerWishlist
(Awesome)https://wiki.osdev.org/Books
(Awesome os list)http://pages.cs.wisc.edu/~remzi/OSTEP/
(Awesome Aweome)https://wiki.osdev.org/Expanded_Main_Page
(Awesome Linux os)http://man7.org/tlpi/
(Awesome linux)http://people.ds.cam.ac.uk/pmb39/Linux/
https://totalhash.cymru.com/
(Awesome)http://thestarman.pcministry.com/asm/
http://thestarman.pcministry.com/asm/debug/Segments.html
https://web.archive.org/web/20130511233621/http://www.asmcommunity.net:80/book/
https://alicebob.cryptoland.net/understanding-the-montgomery-reduction-algorithm/
(Awesome) https://doc.lagout.org/security/
http://timetobleed.com/
(Awesome Awesome lots and lots of kernel video)https://www.youtube.com/user/hupstream/playlists
https://softwareengineering.stackexchange.com/questions/200214/cross-compile-arm-program-to-intel
(Elf format)https://www.youtube.com/watch?v=t09LFtfy4JU
OS security
https://github.com/maxking/linux-security-papers
http://namei.org/presentations/linux-kernel-security-kca09.pdf
http://namei.org/presentations/
http://kernsec.org/wiki/index.php/Main_Page
https://medium.com/@XiaohanZeng/i-interviewed-at-five-top-companies-in-silicon-valley-in-five-days-and-luckily-got-five-job-offers-25178cf74e0f
https://medium.com/@zainrehmani/how-i-got-interviews-and-job-offers-from-companies-like-facebook-google-microsoft-amazon-dd4080b218d4
Arm Security
https://github.com/IAIK
https://www.blackhat.com/docs/eu-16/materials/eu-16-Lipp-ARMageddon-How-Your-Smartphone-CPU-Breaks-Software-Level-Security-And-Privacy-wp.pdf
https://doc.lagout.org/security/XXXX_ARM_exploitation.pdf
http://mazsola.iit.uni-miskolc.hu/~drdani/docs_arm/
(Tells about gcc arm)http://thehackerworkshop.com/?p=391
https://www.youtube.com/watch?v=eM6TKcIwqI4
https://azeria-labs.com/
(Awesome Combining c and c++) https://stackoverflow.com/questions/3789340/combining-c-and-c-how-does-ifdef-cplusplus-work
https://blahcat.github.io/2017/06/25/qemu-images-to-play-with/
http://www.toves.org/books/arm/
Shared Memory
https://www.dfrws.org/sites/default/files/session-files/paper-monitoring_access_to_shared_memory-mapped_files.pdf
Android
https://www.dei.unipd.it/~fantozzi/esp1617/files/Android%20NDK.pdf
https://blog.xamarin.com/preparing-for-native-library-linking-changes-in-android-n/
https://link.springer.com/content/pdf/10.1007/978-1-4302-6131-5_7.pdf
https://rathodpratik.wordpress.com/2013/03/24/build-cc-executables-for-android-using-ndk/
https://groups.google.com/forum/#!topic/android-ndk/8oq_QcNtuOY
http://www.ikerhurtado.com/android-ndk-build-system
(Awesome) http://android.mk/
http://technologeeks.com/course.jl?course=AIRE
http://androiddoc.qiniudn.com/tools/help/shell.html
http://newandroidbook.com/code/android-6.0.0_r1/ndk/docs/Programmers_Guide/html/md_1__concepts__concepts.html#nstl
http://web.guohuiwang.com/technical-notes/nativelauncher
https://biblioteka.awf.katowice.pl/docs/lfi0d3o.php?cesy=android-run-adb-in-code
http://grokbase.com/t/gg/android-ndk/123tfxvqyb/how-can-i-run-c-binary-executable-file-in-android-from-android-shell
http://gimite.net/en/index.php?Run%20native%20executable%20in%20Android%20App
https://www.arc4dia.com/blog/building-and-debugging-command-line-programs-on-android/
https://source.android.com/devices/architecture/hidl/
https://developers.google.com/training/android/
https://www.anysoftwaretools.com/best-android-development-resources/
Best forums to discuss android
https://android-developers.googleblog.com/2016/06/android-changes-for-ndk-developers.html
https://www.all-things-android.com/content/understanding-android-file-hierarchy
https://code.tutsplus.com/tutorials/advanced-android-getting-started-with-the-ndk--mobile-2152
(Awesome)http://betelco.blogspot.co.uk/2010/01/buildingdebugging-android-native-c.html
https://stackoverflow.com/questions/12995030/how-to-use-adb-pull-command
https://stackoverflow.com/questions/8650407/how-to-copy-selected-files-from-android-with-adb-pull
https://stackoverflow.com/questions/9868309/how-to-compile-c-into-an-executable-binary-file-and-run-it-in-android-from-andro
https://www.quora.com/What-is-the-best-book-for-understanding-the-Android-operating-system
https://stackoverflow.com/questions/48069141/android-shell-command-options-explained
(Awesome and Simple)ftp://ftp.wayne.edu/ldp/en/Linux-Android-HOWTO/
(Awesome)https://hub.packtpub.com/creating-compiling-and-deploying-native-projects-android-ndk/
https://stackoverflow.com/questions/1636901/can-linux-apps-be-run-in-android
http://wyatt8740.no-ip.org/android.html
https://stackoverflow.com/questions/4703131/is-it-possible-to-run-a-native-arm-binary-on-a-non-rooted-android-phone
https://www.slideshare.net/kost/android-porting-47896523
Good books
https://nostarch.com/tlpi
https://lwn.net/Kernel/Index/
TLB attacks
https://www.ieee-security.org/TC/SP2013/papers/4977a191.pdf
Cache
https://www.linuxjournal.com/article/7105
https://en.wikipedia.org/wiki/Cache_(computing)
https://www.thomas-krenn.com/en/wiki/Linux_Page_Cache_Basics
https://www.thegeekstuff.com/2012/02/linux-memory-swap-cache-shared-vm/
https://www.google.co.uk/search?q=cache+management+in+linux&oq=cache+management+in+linux&aqs=chrome..69i57.7055j0j1&sourceid=chrome&ie=UTF-8
https://www.youtube.com/channel/UCzf_XjIoKSf4Ve2fH7xn-3A
https://www.youtube.com/watch?v=SfPlpvtZ53o
http://www.informit.com/articles/article.aspx?p=29961&seqNum=4
https://www.usenix.org/legacy/event/usenix01/freenix01/full_papers/riel/riel_html/
http://www.infradead.org/~mchehab/kernel_docs/unsorted/cachetlb.html
https://stackoverflow.com/questions/4812137/does-the-mmu-mediate-everything-between-the-operating-system-and-physical-memory
(Awesome) https://pdfs.semanticscholar.org/presentation/afe5/e48e9a61a804dd39d3c2f69b834a4d14d9c3.pdf
(Awesome)http://www.stillhq.com/pdfdb/000446/data.pdf
https://www.tomshardware.com/reviews/Intel-i7-nehalem-cpu,2041-2.html
http://cseweb.ucsd.edu/classes/su09/cse120/lectures/Lecture7.pdf
(Awesome)https://www.youtube.com/user/NmeictEnggTechnology/playlists
(Application binary inteface)https://www.youtube.com/watch?v=g8A0Wa7REZI
(Awesome Awesome Awesome) https://stackoverflow.com/questions/2171177/what-is-an-application-binary-interface-abi
https://www.everything2.com/index.pl?node=iBCS
(cache Linux kernel awesome)https://www.kernel.org/doc/gorman/html/understand/understand006.html
(Umass os)https://www.youtube.com/user/UMassOS/playlists
http://www.rfwireless-world.com/Tutorials/ARM-tutorial.html
https://www.youtube.com/watch?v=c9rQmBcJpfk
http://events17.linuxfoundation.org/sites/events/files/slides/slides_10.pdf
https://en.wikipedia.org/wiki/Cache_coherence
(Awesome os notes)https://cseweb.ucsd.edu/classes/su09/cse120/schedule.html
(Awesome cache notes)https://courses.cs.washington.edu/courses/cse378/09wi/lectures/lec15.pdf
http://snir.cs.illinois.edu/PDF/Temporal%20and%20Spatial%20Locality.pdf
https://cmaurice.fr/pdf/raid15_maurice.pdf
(Awesome Cache) https://eprint.iacr.org/2015/905.pdf
https://wiki.debian.org/Hugepages
Linux system calls
https://blog.packagecloud.io/eng/2016/04/05/the-definitive-guide-to-linux-system-calls/
Arm asm
http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.dui0205j/Cihccdja.html
http://www.ic.unicamp.br/~celio/mc404-s2-2015/docs/ARM-GCC-Inline-Assembler-Cookbook.pdf
(Most Awesome inline)http://www.ethernut.de/en/documents/arm-inline-asm.html
http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.100748_0606_00_en/ddx1471430827125.html
(Most Awesome)http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.dui0056d/BABIJCGF.html
(Awesome arm commands reference)http://www.keil.com/support/man/docs/armasm/armasm_dom1361289850039.htm
https://github.com/kevinhooke/learning-arm-asm
http://alanclements.org/ARMgradedExamples.pdf
https://github.com/Croydon/assembler-arm
Arm cache architecture
https://community.arm.com/processors/b/blog/posts/caches-and-self-modifying-code
http://infocenter.arm.com/help/topic/com.arm.doc.ddi0201d/DDI0201D_arm946es_r1p1_trm.pdf
http://events17.linuxfoundation.org/sites/events/files/slides/slides_10.pdf
http://www.ee.ncu.edu.tw/~jfli/soc/lecture/ARM9.pdf
https://www.nxp.com/files-static/training_pdf/WBT_27182_IMX31_CPU.pdf
Inline assembly
https://www.cs.virginia.edu/~clc5q/gcc-inline-asm.pdf
https://gcc.gnu.org/onlinedocs/gcc-4.3.0/gcc/Extended-Asm.html#Extended-Asm
https://sourceware.org/binutils/docs-2.18/as/index.html
(Most Awesome best)http://www.ibiblio.org/gferg/ldp/GCC-Inline-Assembly-HOWTO.html
(Short and concise, derived form other two)https://www.codeproject.com/Articles/15971/Using-Inline-Assembly-in-C-C
(Something something)https://www.codeproject.com/Articles/5318/Extended-Inline-Assembly-in-GCC
http://cholla.mmto.org/computers/gcc_inline.html
https://locklessinc.com/articles/gcc_asm/
https://forum.osdev.org/viewtopic.php?f=1&t=26751
Security
https://github.com/cryptax/confsec
https://copperhead.co/blog/2015/05/11/aslr-android-zygote
https://grsecurity.net/
http://www.blackhat.com/presentations/bh-usa-07/Maynor_and_Graham/Whitepaper/bh-usa-07-maynor_and_graham-WP.pdf
https://www.rapid7.com/db/search?utf8=%E2%9C%93&q=android&t=v
https://www.cvedetails.com/
http://www.securityfocus.com/bid/102976
https://twitter.com/mingjian_zhou?lang=en
http://c0reteam.org/2016/01/06/cve-20153865
https://source.android.com/security/overview/acknowledgements
https://www.youtube.com/user/mediacccde/playlists
https://defuse.ca/
Makefile
https://news.ycombinator.com/item?id=15041986
https://gist.github.com/isaacs/62a2d1825d04437c6f08
Bash shell
https://google.github.io/styleguide/shell.xml
Cmake
https://github.com/onqtam/awesome-cmake
Finding size of cache
https://stackoverflow.com/questions/794632/programmatically-get-the-cache-line-size
https://community.arm.com/processors/f/discussions/5807/how-get-armv7-cache-size
Android vulnerability
https://github.com/vusec/drammer
Searching in android vulnerability list, they give full twitter info of hacker then find them find their website find blogs etc.
https://www.slideshare.net/jiahongfang5/qualcomm2015-jfang-nforest
https://www.blackhat.com/docs/us-15/materials/us-15-Xu-Ah-Universal-Android-Rooting-Is-Back-wp.pdf
https://www.google.com/search?client=firefox-b-ab&ei=lc0PW4TXH4i4swG1zYZA&q=Find+your+own+Androidkernel+bug+pdf&oq=Find+your+own+Androidkernel+bug+pdf&gs_l=psy-ab.3...9041.12780.0.13195.8.7.1.0.0.0.358.1444.2-4j1.5.0....0...1c.1.64.psy-ab..3.1.264...33i160k1.0.sjMy_Nr7Qcw
https://www.blackhat.com/docs/eu-17/materials/eu-17-Corina-Difuzzing-Android-Kernel-Drivers.pdf
Mobile Application Penetration Testing
http://cloak-and-dagger.org/
http://events17.linuxfoundation.org/sites/events/files/slides/LSS%20-%20Treble%20%27n%27%20SELinux_0.pdf
https://alephsecurity.com/
https://github.com/dweinstein/android_notes/wiki/AndroidApplicationStartup
https://census-labs.com/media/shadow-infiltrate-2017.pdf
https://www.blackhat.com/docs/eu-16/materials/eu-16-Shen-Rooting-Every-Android-From-Extension-To-Exploitation.pdf
(Awesome)https://github.com/jacobsoo/AndroidSlides, http://www.droidsec.org/wiki/#miscellaneous, https://github.com/SecWiki/android-kernel-exploits
(Very Very awesome)https://www.sudo.ws/
(Awesome) https://reverseengineering.stackexchange.com/questions/206/where-can-i-as-an-individual-get-malware-samples-to-analyze
https://mobilesecuritywiki.com/
https://github.com/xtiankisutsa/awesome-mobile-CTF
https://github.com/ashishb/android-security-awesome
https://abuse.ch/
https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Exploit%20Development.md#expapers
https://github.com/ele7enxxh/android_vuln_poc-exp
https://ruxcon.org.au/
https://ruxcon.org.au/assets/2017/slides/A_Whole_New_Efficient_Fuzzing_Strategy_for_Stagefright_Porting_and_Optimisations.pptx
https://github.com/jiayy/android_vuln_poc-exp/
https://www.youtube.com/watch?v=q_HibdrbIxo&index=8&list=PLtPrYlwXDImiO_hzK7npBi4eKQQBgygLD
https://github.com/Screetsec/TheFatRat
https://gist.github.com/MattKetmo/96d703bc23ce432d4591
https://joshuawise.com/projects
https://github.com/linkedin/qark
https://blog.zimperium.com/the-latest-on-stagefright-cve-2015-1538-exploit-is-now-available-for-testing-purposes/
https://security.stackexchange.com/questions/40012/writing-android-exploits
http://www.xipiter.com/practical-android-exploitation.html
https://github.com/xairy/linux-kernel-exploitation
http://bits-please.blogspot.co.uk/2015/08/android-linux-kernel-privilege.html
https://www.securityfocus.com/news/11189
http://analysis.seclab.tuwien.ac.at/projects/vifuzz/docs/exploit.pdf
(Awesome Step by step) https://ionize.com.au/android-exploit-development-android-open-source-project-toolchain/
https://www.exploit-db.com/platform/?p=Android
https://github.com/SecWiki/android-kernel-exploits
http://analysis.seclab.tuwien.ac.at/projects/vifuzz/docs/exploit.pdf
key Search term = Writing exploits for device drivers
Key Search term = how to write exploit for android , Fuzzing drivers
https://www.vulnhub.com/
https://github.com/smeso/MTPwn
https://mobile-security.zeef.com/oguzhan.topgul
https://www.hackers-arise.com/single-post/2017/09/20/Exploiting-Nearly-Any-Windows-System-Using-CVE-2017-8759
https://github.com/FabioBaroni/awesome-exploit-development
writing security tools and exploits
https://conference.hitb.org/hitbsecconf2018ams/materials/D1T2%20-%20Yong%20Wang%20&%20Yang%20Song%20-%20Rooting%20Android%208%20with%20a%20Kernel%20Space%20Mirroring%20Attack.pdf
Android hacker's handbook
learn pentesting on android
Android internals jonathan Levin
http://conference.hitb.org/hitbsecconf2017ams/materials/
https://www.blackhat.com/docs/us-16/materials/us-16-Zhang-Dangerous-Hare-Hanging-Attribute-References-Hazards-Due-To-Vendor-Customization.pdf
https://www.blackhat.com/us-17/briefings.html#avpass-leaking-and-bypassing-antivirus-detection-model-automatically
https://www.blackhat.com/us-17/briefings.html#broadpwn-remotely-compromising-android-and-ios-via-a-bug-in-broadcoms-wi-fi-chipsets
https://www.blackhat.com/us-17/briefings.html#cloak-and-dagger-from-two-permissions-to-complete-control-of-the-ui-feedback-loop
https://www.blackhat.com/us-17/briefings.html#defeating-samsung-knox-with-zero-privilege
https://www.blackhat.com/us-17/briefings.html#many-birds-one-stone-exploiting-a-single-sqlite-vulnerability-across-multiple-software
https://www.blackhat.com/docs/us-17/thursday/us-17-Jung-AVPASS-Leaking-And-Bypassing-Anitvirus-Detection-Model-Automatically.pdf
https://www.blackhat.com/docs/us-16/materials/us-16-Zhang-Dangerous-Hare-Hanging-Attribute-References-Hazards-Due-To-Vendor-Customization.pdf
https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/liu
https://www.rsaconference.com/writable/presentations/file_upload/mbs-f03-android-serialization-vulnerabilities-revisited.pdf
https://www.rsaconference.com/writable/presentations/file_upload/hta-r10-hey-android-where-is-my-car.pdf
https://www.rsaconference.com/writable/presentations/file_upload/mbs-r14-how-automated-vulnerability-analysis-discovered-hundreds-of-android-0-days.pdf
https://www.rsaconference.com/writable/presentations/file_upload/mbs-r14-how-automated-vulnerability-analysis-discovered-hundreds-of-android-0-days.pdf
https://www.ruhrsec.de/2018/#talks
https://www.slideshare.net/CanSecWest/csw2017-geshevmiller-logic-bug-hunting-in-chrome-on-android
(Awesome Might be on android as well) https://labs.mwrinfosecurity.com/assets/BlogFiles/apple-safari-wasm-section-vuln-write-up-2018-04-16.pdf
(It might help awesome)https://www.blackhat.com/us-17/training/schedule/index.html#android-application-hacking----penetration-and-reversing-mobile-apps-5628
https://github.com/hackedteam?tab=repositories
Deepfakes
https://github.com/goberoi/faceit
https://github.com/alew3/faceit_live
https://github.com/deepfakes/faceswap
https://medium.com/huia/live-deep-fakes-you-can-now-change-your-face-to-someone-elses-in-real-time-video-applications-a4727e06612f
Writing Cache friendly code
(Awesome search term)Writing cache friendly code
Linux MMu
https://events.static.linuxfound.org/sites/events/files/slides/elc_2016_mem.pdf
Chip
https://en.wikichip.org/wiki/mediatek/helio/mt6755
https://www.mediatek.com/products/smartphones/mt6755-helio-p10#
Virtual memory
https://blog.jeffli.me/blog/2014/11/08/pagemap-interface-of-linux-explained/
https://www.kernel.org/doc/Documentation/vm/pagemap.txt
https://www.youtube.com/watch?v=qcBIvnQt0Bw&list=PLiwt1iVUib9s2Uo5BeYmwkDFUh70fJPxX
https://events.static.linuxfound.org/sites/events/files/slides/elc_2016_mem.pdf
https://www.bottomupcs.com/virtual_addresses.xhtml
https://stackoverflow.com/questions/44520047/what-is-the-page-size-for-32-and-64-bit-versions-of-windows-os
https://stackoverflow.com/questions/33722205/how-many-page-tables-do-intel-x86-64-cpus-access-to-translate-virtual-memory
(Awesome)http://www.cirosantilli.com/x86-paging/
http://www.ic.unicamp.br/~celio/mc404-2013/arm-manuals/Paging%20Systems.pdf
http://lackingrhoticity.blogspot.co.uk/2015/05/how-physical-addresses-map-to-rows-and-banks.html
Awesome kali and exploit
https://github.com/secfigo/Awesome-Fuzzing
https://gist.github.com/natesubra/5117959c660296e12d3ac5df491da395
http://www.fuzzysecurity.com/links.html
https://github.com/FabioBaroni/awesome-exploit-development
https://www.corelan.be/
https://null-byte.wonderhowto.com/how-to/exploit-development-everything-you-need-know-0167801/
https://www.hackers-arise.com/single-post/2017/06/21/Exploit-Development-Part-3-Finding-Vulnerabilities-by-Fuzzing-with-Spike
https://uk.sans.org/course/advanced-exploit-development-penetration-testers
https://en.wikipedia.org/wiki/Fravia
http://www.ctyme.com/rbrown.htm
https://news.ycombinator.com/item?id=4121062
https://github.com/Hack-with-Github
https://github.com/yeyintminthuhtut/Awesome-Study-Resources-for-Kernel-Hacking
awesome exploit development
https://github.com/apsdehal/awesome-ctf
(Awesome)https://github.com/gregkh/kernel-development
(Awesome)https://github.com/fffaraz/kernel
https://github.com/aleksandar-todorovic/awesome-linux#learning-resources
https://github.com/aleksandar-todorovic/awesome-linux#useful-websites
A guide to kernel exploitation
https://securityonline.info/awesome-hacking-collection-awesome-lists-hackers-pentesters-security-researchers/
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0ahUKEwi5qNeKqpbbAhVPC-wKHQz9APQQFggnMAA&url=http%3A%2F%2Fwww.piotrbania.com%2Fall%2Farticles%2Fewdd.pdf&usg=AOvVaw3g5NjK-ghejApSApADwa65
https://www.blackhat.com/presentations/bh-usa-07/Bulygin/Presentation/bh-usa-07-bulygin.pdf
Awesome hardware
https://github.com/openmotics/hardware
Search high speed circuit design
vhdl
https://blog.hackster.io/student-creates-first-homebrew-dual-differential-amplifier-ic-8535af115d7e?gi=4334ecb2fcdd
https://blog.hackster.io/how-to-embed-nfc-chips-into-your-acrylic-fingernails-dor-unlocking-your-phone-and-much-more-51ea87d6a169
https://en.wikipedia.org/wiki/List_of_open-source_hardware_projects
https://en.wikipedia.org/wiki/Open-source_hardware
https://en.wikipedia.org/wiki/Open-Source_Lab_(book)
http://apt.cs.manchester.ac.uk/ftp/pub/apt/papers/LEMB_ToE09_O.pdf
Search term : Design system on chip
https://en.wikibooks.org/wiki/Chip_Design_Made_Easy
http://users.ece.utexas.edu/~gerstl/publications/TR-02-28.tutorial.pdf
http://www.cl.cam.ac.uk/teaching/1011/SysOnChip/socdam-notes1011.pdf
https://www.quora.com/Which-is-the-best-online-ARM-processor-course
https://github.com/monostable/awesome-electronics
Android terminal
ftp://ftp.wayne.edu/ldp/en/Linux-Android-HOWTO/Linux-Android-HOWTO-6.html
Processor know how
https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-823-computer-system-architecture-fall-2005/lecture-notes/
Iot sec
(Awesome)http://jcjc-dev.com/2016/06/08/reversing-huawei-4-dumping-flash/
https://security.electronicsforu.com/wp-content/uploads/2017/06/RISC_IoT_101.pdf
https://www.owasp.org/images/2/29/AppSecIL2016_HackingTheIoT-PenTestingRFDevices_ErezMetula.pdf
https://s3.us-east-2.amazonaws.com/attify-iot-hosting/Hacking+IoT+for+Bug+Bounties.pdf
https://sector.ca/wp-content/uploads/presentations17/Aditya-Gupta-Pwning-Smart-Homes-SecTor.pdf
http://www.cs.bham.ac.uk/~tpc/Edu/Pentesting/files/penEdu.pdf
Makefile
https://eigenstate.org/notes/makefiles
http://docs.yottabuild.org/tutorial/tutorial.html
https://www3.ntu.edu.sg/home/ehchua/programming/cpp/gcc_make.html
Managing large projects with make
http://doc.cat-v.org/bell_labs/mk/
https://github.com/oridb/mk
https://eli.thegreenplace.net/2013/07/09/library-order-in-static-linking
Good android books
Embedded Android: Porting, Extending
Android internals Jonathan Levin
Learning pentesting for android
http://www.opersys.com/training/embedded-android
https://stackoverflow.com/questions/11262817/learn-about-android-internalsdive-deep-into-the-system
Xda developers android hacker's toolkit
Embedded Linux
https://github.com/embedded-boston/awesome-embedded-systems
https://github.com/ysh329/awesome-embedded-ai
https://www.quora.com/What-are-the-best-lectures-for-learning-Embeded-systems-in-YouTube
https://hackr.io/tutorials/learn-android-development
https://github.com/JStumpp/awesome-android#resources
Compilers
https://insights.dice.com/2015/12/04/developing-in-cc-consider-clang/
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=15&ved=0ahUKEwjZvOfP7ZjbAhXC2aQKHSjcCxoQFgiaATAO&url=https%3A%2F%2Fraw.githubusercontent.com%2Fnamin%2Finc%2Fmaster%2Fdocs%2Ftutorial.pdf&usg=AOvVaw05R_CrVMx8P0t7nmVmnLwa
https://steveire.wordpress.com/
http://webpages.charter.net/ppluzhnikov/linker.html
Awesome Slam
https://github.com/kanster/awesome-slam#courses-lectures-and-workshops
https://github.com/liulinbo/slam
https://blog.csdn.net/renye_lpl/article/details/79225423
Gcc cross
http://preshing.com/20141119/how-to-build-a-gcc-cross-compiler/
https://github.com/landley/toybox
http://web.guohuiwang.com/technical-notes/androidndk2
http://www.linfo.org/main_index.html
Linux kernel
http://fxr.watson.org/
Write an mp3 filter
http://book.realworldhaskell.org/read/
http://blog.bjrn.se/2008/10/lets-build-mp3-decoder.html
https://multimedia.cx/eggs/learn-multimedia-with-jpeg/
http://www.opennet.ru/docs/formats/jpeg.txt
http://parsingintro.sourceforge.net/
http://wiki.c2.com/?TipsForReadingCode
Programme and their memory
https://www.usna.edu/Users/cs/aviv/classes/ic221/s16/lec/11/lec.html
https://stackoverflow.com/questions/15638105/accessing-specific-memory-locations-in-c
https://www.kernel.org/doc/gorman/html/understand/understand007.html
https://www.google.com/search?q=how+memory+address+is+assigned+to+process&ie=utf-8&oe=utf-8&client=firefox-b-ab
http://www.informit.com/articles/article.aspx?p=29961&seqNum=2
https://www.google.com/search?q=how+os+gives+address+to+user+spce+prograzmme&ie=utf-8&oe=utf-8&client=firefox-b-ab
https://security.stackexchange.com/questions/18556/how-do-aslr-and-dep-work
https://www.blackhat.com/docs/eu-16/materials/eu-16-Schwarz-How-Your-DRAM-Becomes-A-Security-Problem-wp.pdf
dope links
https://fail0verflow.com/blog/
https://www.w3.org/TR/workers/
http://www.hotchips.org/archives/2010s/hc29/
http://linux-test-project.github.io/
https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Embedded%20Device%20%26%20Hardware%20Hacking%20-.md
https://www.google.com/search?client=firefox-b-ab&ei=1a4PW4z9FcaB6ATgy57oBw&q=awesome+hardware+hacking&oq=awesome+hardware+hacking&gs_l=psy-ab.3..33i160k1.5710.6089.0.6337.3.3.0.0.0.0.245.245.2-1.1.0....0...1c.1.64.psy-ab..2.1.244....0.OcRoyVos8Z0
Black Hat: Top 20 hack-attack tools
https://www.blackhat.com/us-17/training/applied-hardware-attacks-embedded-systems.html
https://www.google.com/search?client=firefox-b&ei=HLcPW6wnyImbBd6ekoAF&q=Dumping+Firmware+from+Software+pdf&oq=Dumping+Firmware+from+Software+pdf&gs_l=psy-ab.3...1367.2806.0.2965.4.4.0.0.0.0.265.265.2-1.1.0....0...1c.1.64.psy-ab..3.1.264...33i160k1.0.WHT9xo50-gU
https://www.google.com/search?client=firefox-b&ei=LrcPW6-GC8rN6QSAkpawBg&q=Manipulating+firmware+images+pdf&oq=Manipulating+firmware+images+pdf&gs_l=psy-ab.3..33i21k1.3130.4518.0.4688.4.4.0.0.0.0.262.508.2-2.2.0....0...1c.1.64.psy-ab..2.2.507...33i160k1.0.ZNykmY9pJT8
https://www.google.com/search?client=firefox-b&ei=Q7cPW-rRBsOF6ASL0Z_wDQ&q=Finding+software+bugs+in+firmware+pdf&oq=Finding+software+bugs+in+firmware+pdf&gs_l=psy-ab.3...6317.8320.0.8453.6.6.0.0.0.0.279.765.2-3.3.0....0...1c.1.64.psy-ab..3.3.764...33i160k1j33i21k1.0.H5R8teKf0as
http://hexblog.com/files/recon%202010%20Skochinsky.pdf
https://reverseengineering.stackexchange.com/questions/3526/how-do-i-extract-a-copy-of-an-unknown-firmware-from-a-hardware-device
https://reverseengineering.stackexchange.com/questions/2337/how-to-dump-flash-memory-with-spi
http://chdk.wikia.com/wiki/Obtaining_a_firmware_dump
https://www.blackhat.com/docs/us-16/materials/us-16-FitzPatrick-The-Tao-Of-Hardware-The-Te-Of-Implants.pdf
https://www.blackhat.com/us-16/training/applied-physical-attacks-on-x86-systems.html
http://www.nsaplayset.org/
https://en.wikipedia.org/wiki/NSA_ANT_catalog
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=4&ved=0ahUKEwjO2Jrl0K_bAhWjQJoKHV9kBWkQFghDMAM&url=http%3A%2F%2Fwww.jsums.edu%2Fnmeghanathan%2Ffiles%2F2015%2F05%2FCSC437-Fall2013-Module-5-Buffer-Overflow-Attacks.pdf%3Fx61976&usg=AOvVaw2lP003SqchXxcuGyhb4vFZ
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=3&ved=0ahUKEwjO2Jrl0K_bAhWjQJoKHV9kBWkQFgg2MAI&url=http%3A%2F%2Fforristal.com%2Fmaterial%2FForristal_Hardware_Involved_Software_Attacks.pdf&usg=AOvVaw3fiH_8AIm8RnTgqhBcfnlm
https://www.blackhat.com/presentations/bh-usa-04/bh-us-04-tsyrklevich.pdf
https://www.blackhat.com/docs/asia-18/asia-18-Ding-New-Compat-Vulnerabilities-In-Linux-Device-Drivers.pdf
https://security.stackexchange.com/questions/119712/methods-root-can-use-to-elevate-itself-to-kernel-mode
https://www.giac.org/paper/gsec/2235/quest-root-hacker-techniques-unix-security/103808
https://thehackernews.com/2017/05/linux-sudo-root-hack.html
https://hackmag.com/security/reach-the-root/
https://payatu.com/guide-linux-privilege-escalation/
https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Privilege%20Escalation%20%26%20Post-Exploitation.md
http://0x00sec.org/t/enumeration-for-linux-privilege-escalation/1959
https://thehackernews.com/2017/06/linux-root-privilege-escalation.html
https://resources.infosecinstitute.com/privilege-escalation-linux-live-examples/#gref
https://uwnthesis.wordpress.com/2016/12/26/basics-of-making-a-rootkit-from-syscall-to-hook/
http://se7so.blogspot.com/2012/07/hijacking-linux-system-calls-rootkit.html
http://timetobleed.com/detailed-explanation-of-a-recent-privilege-escalation-bug-in-linux-cve-2010-3301/
https://www.google.com/search?client=firefox-b-ab&biw=1468&bih=937&ei=BMYPW8iaM8yusAGcvYm4CQ&q=privelege+escalation+using+syscalls&oq=privelege+escalation+using+syscalls&gs_l=psy-ab.3..33i21k1.252575.260038.0.260160.36.26.0.0.0.0.466.3636.2-3j4j3.11.0....0...1c.1.64.psy-ab..25.11.3924.6..0j35i39k1j0i131k1j0i10k1j0i13k1j0i22i30k1.296.3ay4O3XzcSI
http://bits-please.blogspot.com/2016/06/trustzone-kernel-privilege-escalation.html
https://www.exploit-db.com/exploits/44205/
https://perso.univ-st-etienne.fr/maf13892/Docs/Publications/JTAG.FIA.pdf
https://perso.univ-st-etienne.fr/maf13892/Docs/Presentations/TRUDEVICE2015_JTAGCombinedAttacks.pdf
https://hakin9.org/download/hacking-android-80-pages-of-experts-tutorials/
(Awesome hardware concise)https://media.blackhat.com/us-13/US-13-Zaddach-Workshop-on-Embedded-Devices-Security-and-Firmware-Reverse-Engineering-WP.pdf
https://www.google.com/search?client=firefox-b-ab&ei=O-YQW6OHJqKHmwXht5y4Bg&q=awesome+embeded+hacking+&oq=awesome+embeded+hacking+&gs_l=psy-ab.3...7740132.7748464.0.7748615.25.21.0.0.0.0.532.2820.3-4j2j1.8.0....0...1c.1.64.psy-ab..20.2.875.0..0j0i67k1.298.3F7kxDoweak
(Awesome)https://www.kb.cert.org/vuls/id/649219
https://en.wikipedia.org/wiki/DMA_attack
https://github.com/ufrisk/pcileech
https://www.blackhat.com/docs/us-17/wednesday/us-17-Trikalinou-Taking-DMA-Attacks-To-The-Next-Level-How-To-Do-Arbitrary-Memory-Reads-Writes-In-A-Live-And-Unmodified-System-Using-A-Rogue-Memory-Controller.pdf
https://github.com/torvalds/linux/blob/master/Documentation/DMA-API-HOWTO.txt
(Awesome resource hidden)https://cturt.github.io/ps4.html
https://fail0verflow.com/blog/2017/ps4-crashdump-dump/
https://www.psxhax.com/threads/dualshock-4-ds4-ps4-firmware-dump-reversing-tools-by-ds4user.1159/?utm_source=dlvr.it&utm_medium=facebook
https://www.reddit.com/r/ps4homebrew/comments/8amgmz/the_nor_chip/
https://www.3dbrew.org/wiki/Homebrew_Exploits
https://github.com/Cryptogenic/Exploit-Writeups/blob/master/FreeBSD/PS4%204.55%20BPF%20Race%20Condition%20Kernel%20Exploit%20Writeup.md
https://github.com/whnunlife/ps3publictools
http://www2.lauterbach.com/pdf/debugger_arm.pdf
https://news.ycombinator.com/item?id=7015082
https://comma.ai/
https://github.com/geohot/qira
https://pure.tue.nl/ws/files/46956556/770549-1.pdf
https://sharedmemorydump.net/building-a-mining-stack-of-raspberry-pis
Awesome kernel
https://resources.infosecinstitute.com/privilege-escalation-linux-live-examples/#gref
http://www.vantagepoint.sg/blog/82-hooking-android-system-calls-for-pleasure-and-benefit
https://jvns.ca/blog/2014/09/18/you-can-be-a-kernel-hacker/
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0ahUKEwjz2tf216_bAhVDkywKHVwHCvsQFggsMAA&url=http%3A%2F%2Fevents17.linuxfoundation.org%2Fsites%2Fevents%2Ffiles%2Fslides%2Fnakamura_20170831_1.pdf&usg=AOvVaw1_1D1ZF-BJIF89_233pECT
Hacker playbook
http://delta-course.org/docs/delta4/day2/D4T2L5.pdf
http://www.cs.swan.ac.uk/~csmarkus/15_project/15_10_sample1_InitialDocument.pdf
http://wpage.unina.it/roberto.natella/papers/natella_androidfuzzing_issre2017.pdf
http://aitel.hist.no/fag/lan/lek02/dln02-en.pdf
https://www.usenix.org/legacy/events/hotsec11/tech/final_files/Cai.pdf
http://www.makelinux.net/kernel_map/#sd
http://chdk.wikia.com/wiki/Obtaining_a_firmware_dump
A guide to kernel exploitation
https://raw.githubusercontent.com/liulinbo/slam/master/Linux%E5%B0%B1%E8%AF%A5%E8%BF%99%E4%B9%88%E5%AD%A6.pdf
https://raw.githubusercontent.com/jacobsoo/AndroidSlides/master/%E5%8C%97%E4%BA%AC-GDG-Android-root-%E6%8A%80%E6%9C%AF%E6%B2%99%E9%BE%99-2014/Find%20your%20own%20Android%20kernel%20bug.pdf
http://www.xml.com/ldd/chapter/book/ch13.html
https://github.com/torvalds/linux/blob/master/Documentation/DMA-API-HOWTO.txt
https://www.linuxjournal.com/article/4378
Search for debug mode in processor
http://www.msn.com/en-gb/money/companies/google-used-to-ask-these-interview-questions-but-theyre-so-tricky-they-were-banned/ss-AAy3kE0?ocid=ientp#image=6
Fpga based security
https://github.com/ufrisk/pcileech
https://mirror.netcologne.de/CCC/congress/2017/slides-pdf/34c3-9111-public_fpga_based_dma_attacking.pdf
https://github.com/matthiasbock/JTAG-Sniffer
https://recon.cx/2013/trainingsynple.html
https://www.eetimes.com/document.asp?doc_id=1274593
PS#
https://www2.cs.arizona.edu/~collberg/Teaching/466-566/2012/Resources/presentations/2012/topic1-final/report.pdf
https://www2.cs.arizona.edu/~collberg/Teaching/466-566/2012/Resources/presentations/2012/topic1-final/slides.pdf
https://www.riscure.com/uploads/2017/09/Controlling-PC-on-ARM-using-Fault-Injection.pdf
https://events.ccc.de/congress/2010/Fahrplan/attachments/1780_27c3_console_hacking_2010.pdf
https://rdist.root.org/2010/01/27/how-the-ps3-hypervisor-was-hacked/
http://www.blackhat.com/docs/eu-15/materials/eu-15-Giller-Implementing-Electrical-Glitching-Attacks.pdf
http://mastersicurezza.di.uniroma1.it/mastersicurezza/images/materiali/Convegni/cbepas2012.pdf
http://ids.cs.columbia.edu/sites/default/files/ndss-2013.pdf
https://web.archive.org/web/20100409023327/http://geohotps3.blogspot.com/
https://web.archive.org/web/20100410060251/http://pastie.org:80/795944
https://web.archive.org/web/20100704075741/http://hackmii.com:80/2009/01/25c3-presentation/
https://web.archive.org/web/20100723083756/http://www.ibm.com:80/developerworks/power/library/pa-cellsecurity/
https://news.ycombinator.com/item?id=1079251
https://web.archive.org/web/20100404062009/http://rdist.root.org:80/2007/05/07/glitch-attacks-revealed/
https://web.archive.org/web/20100412055807/http://xorloser.com:80/?p=162#more-162
https://web.archive.org/web/20100220214115/http://ps3hvdoc.wikispaces.com:80/Hypervisor+RE
https://web.archive.org/web/20100410060005/http://pastie.org:80/795371
http://www.edepot.com/playstation3.html#PS3_Security
https://web.archive.org/web/20110110121139/http://wiki.ps2dev.org/
Ram dump
https://resources.infosecinstitute.com/obtaining-information-dumping-memory/#gref
https://rc2014.co.uk/modules/sd-memory-dump/
http://jcjc-dev.com/2016/12/14/reversing-huawei-5-reversing-firmware/
https://madiba.encs.concordia.ca/~x_decarn/papers/verifiable-build-acsac2014.pdf
Methods of capturing a memory dump
Mobile forensics
Capturing a live ram
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=5&ved=0ahUKEwibyLjXrLLbAhXID8AKHbqCBjYQFghKMAQ&url=http%3A%2F%2Fwww.indjst.org%2Findex.php%2Findjst%2Farticle%2Fdownload%2F105851%2F77226&usg=AOvVaw1xksKEcSYyOXuHFbx_qeuw
https://www.sans.org/reading-room/whitepapers/forensics/techniques-tools-recovering-analyzing-data-volatile-memory-33049
Kernel panic
https://www.blackhat.com/presentations/bh-usa-06/BH-US-06-Burdach.pdf
https://www.forensicswiki.org/wiki/Memory_Imaging
(aWESOME)http://eh2008.koeln.ccc.de/fahrplan/attachments/1067_SEAT1394-svn-r432-paper.pdf
https://eprint.iacr.org/2011/221.pdf
http://www.stoned-vienna.com
https://privatecore.com/resources-overview/physical-memory-attacks/index.html
Attacks on physical memory
https://www.defcon.org/html/links/dc-archives/dc-20-archive.html
DIY electric car
File dump attack
Access ramd irectly
https://www.youtube.com/watch?v=Zp8dVq5ZvKY
https://cturt.github.io/ps4.html
https://opensourceforu.com/2011/02/debug-kernel-panics-with-crash/
https://cryptome.org/0003/RAMisKey.pdf
Security Awesome
https://www.sec.in.tum.de/i20/teaching
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment