Skip to content

Instantly share code, notes, and snippets.

@bryceandress
Created August 31, 2016 15:43
Show Gist options
  • Save bryceandress/ca4139de2ed0e2a4b52c19d37e67a57c to your computer and use it in GitHub Desktop.
Save bryceandress/ca4139de2ed0e2a4b52c19d37e67a57c to your computer and use it in GitHub Desktop.
Archive Link 8/31/16
1375421247 | So, you want to work in security? – Free Code Camp | https://medium.freecodecamp.com/so-you-want-to-work-in-security-bc6c10157d23?gi=3319f2f9d171
1392467994 | HackedThat: Breaking in to a hardened server via the back door | http://polynome.co/infosec/inversoft/elasticsearch/linode/penetration-testing/2016/08/16/hack-that-inversoft.html
1394166342 | So you want to work in security (but are too lazy to read Parisa's excellent essay) | https://lcamtuf.blogspot.ch/2016/08/so-you-want-to-work-in-security-but-are.html?m=1
1386106165 | Reverse Engineering x86 101 | http://howto.hackallthethings.com/2016/08/reverse-engineering-x86-101.html
1387765922 | | http://darksim905.com/~sim/reverse-engineering-notes.txt
1390056017 | | https://theitgeekchronicles.files.wordpress.com/2012/05/scapyguide1.pdf
112767402 | Security News | http://www.morningstarsecurity.com/news
1390252630 | "A small summary about the @SpamAndHex @defcon CTF adventure. Man vs. machine in security. https | https://twitter.com/defcon/status/768162736878424064
20194766 | Debugging with GDB | http://www.delorie.com/gnu/docs/gdb/gdb_toc.html#SEC_Contents
1274483056 | Campfire Talks – How to get your start in information security part 2 | https://blindseeker.com/blahg/?p=809
1200717299 | Campfire Talks – How to get your start in information security – part 1 | https://blindseeker.com/blahg/?p=692
1385172281 | Organize your brain. | https://workflowy.com/s/s3nGwu0UHV
1385362201 | RS_101: Penetration Testing Part 2 | https://rallysecurity.com/rs_101-penetration-testing-part-2/
1385374354 | RS_101: Penetration Testing Part 1 | http://rallysecurity.com/rs_101-penetration-testing-part-1/
1384769121 | How I Hacked an Android App to Get Free Beer | https://breakdev.org/how-i-hacked-an-android-app-to-get-free-beer/
1147041347 | DEF CON 23 - Jason Haddix - How to Shot Web: Web and mobile hacking in 2015 | https://www.youtube.com/watch?v=-FAjxUOKbdI
1381191512 | Gynvael from DragonSector talking about DEF CON CTF and showing off some of the CGC challenges | https://www.reddit.com/r/LiveOverflow/comments/4xfmbk/gynvael_from_dragonsector_talking_about_def_con/
611448412 | Batman: Arkham Asylum & Arkham City Guide | http://www.gamersonlinux.com/forum/threads/batman-arkham-asylum-arkham-city-guide.420/
1382929068 | Curated list of public penetration test reports released by several consulting firms and academic security groups | https://github.com/juliocesarfort/public-pentesting-reports
1377243780 | A Defcon 2016 Retrospective — Down to the Wire | https://dttw.tech/posts/r1rHSpdY
1348810724 | | https://www.cs.umd.edu/~meesh/cmsc311/lab2_tutorial.txt
1381957200 | JetBrains IDE Remote Code Execution and Local File Disclosure | http://blog.saynotolinux.com/blog/2016/08/15/jetbrains-ide-remote-code-execution-and-local-file-disclosure-vulnerability-analysis/
1379336826 | DEF CON 23 - Lock Picking Village - Preston Thomas - Intro to Lockpicking 1 | https://www.youtube.com/watch?v=fU7-r83Nx3Y&index=24&list=PL9fPq3eQfaaCeyIK5I1qRoAU_b-Fep_dC
1379336886 | DEF CON 23 - Packet Capture Village - Lokesh Pidawekar - Hackers Practice Ground | https://www.youtube.com/watch?v=W7gSE7msPiU&index=11&list=PL9fPq3eQfaaCeyIK5I1qRoAU_b-Fep_dC
1366753584 | Ask HN: What's on your RSS reader? | http://news.ycombinator.com/item?id=12194875
1379348162 | DEF CON 23 - Brent White - Hacking Web Apps | https://www.youtube.com/watch?v=I8AhfDEKUQ4&index=79&list=PL9fPq3eQfaaBuHqVvDzPoWxznYYmyx5UX
1367651501 | Screetsec/TheFatRat : Easy tool for generate backdoor with msfvenom ( part of metasploit framework ) and program compiles a C program with a meterpreter reverse_tcp payload In it that can then be executed on a windows host Program to create a C program after it is compiled that will bypass most AV ( Antivirus ) | https://github.com/Screetsec/TheFatRat
1216452938 | CCNA Summary | https://haroen.me/ccna/
1378262635 | Council of Nine — DEFCON 24 Badge Challenge | http://co9.io/post/148716614744/defcon-24-badge-challenge
1376967863 | [5e] New DM sharing some hopefully useful resources. | https://www.reddit.com/r/DnD/comments/4x22v3/5e_new_dm_sharing_some_hopefully_useful_resources/
843320718 | Cisco CCNA Routing and Switching Training Notes | https://gumroad.com/l/ccnanotes
549270114 | CCNA Training Series (200-120 CCNA, 100-101 ICND1, 200-101 ICND2) | http://www.youtube.com/playlist?list=PLmdYg02XJt6QRQfYjyQcMPfS3mrSnFbRC
1374632414 | OpenCTF 2016: tyro_rop2 | https://bannsecurity.com/index.php/home/10-ctf-writeups/34-openctf-2016-tyro-rop2
1377378641 | OpenCTF 2016: neophyte_reversing | https://bannsecurity.com/index.php/home/10-ctf-writeups/36-openctf-2016-neophyte-reversing
1348600038 | | http://scottgriffy.com/blogs/rat-in-the-shellcode.html
1167092 | Shellcoding for Linux and Windows Tutorial | http://www.vividmachines.com/shellcode/shellcode.html
1348811725 | | http://uninformed.org/?v=all&a=8&t=txt
642084803 | All && Everything | http://mammon.github.io/tales/
44804428 | Web Application Exploits and Defenses | http://google-gruyere.appspot.com/part1#1__using_gruyere
1376085006 | Security Research | https://forum.bugcrowd.com/t/researcher-resources-how-to-become-a-bug-bounty-hunter/1102?utm_campaign=Researcher Marketing&utm_content=38799105&utm_medium=social&utm_source=twitter
24042896 | Just Another Hacker | http://www.justanotherhacker.com/
1366606839 | Scrutiny on the bug bounty - Google Slides | https://docs.google.com/presentation/d/1PCnjzCeklOeGMoWiE2IUzlRGOBxNp8K5hLQuvBNzrFY/
1341723014 | Windows 10 x86/wow64 Userland heap | https://www.corelan.be/index.php/2016/07/05/windows-10-x86wow64-userland-heap/
906379901 | Bucket Finder | https://digi.ninja/projects/bucket_finder.php
935517045 | Researcher Resources - Tutorials | https://forum.bugcrowd.com/t/researcher-resources-tutorials/370
921709568 | Researcher Resources - Tools | https://forum.bugcrowd.com/t/researcher-resources-tools/167
898056210 | How do you approach a target? | https://forum.bugcrowd.com/t/how-do-you-approach-a-target/293
1369513137 | How To SSH Tunnels and Stuff | https://n0where.net/how-to-ssh-tunnels-and-stuff/
1343419170 | Building A C Compiler Type System - Part 1: The Formidable Declarator | http://blog.robertelder.org/building-a-c-compiler-type-system-the-formidable-declarator/
1368748436 | | https://na-production.s3.amazonaws.com/documents/Bugs-in-the-System-Final.pdf
1278947343 | Security Research | https://forum.bugcrowd.com/t/researcher-resources-how-to-become-a-bug-bounty-hunter/1102
1368344015 | How to steal $2,999.99 in less than 2 minutes with Venmo and Siri | http://www.martinvigo.com/steal-2999-99-minute-venmo-siri/
1321491302 | Bug Bounty 5 years in | https://medium.com/@collingreene/bug-bounty-5-years-in-c95cda604365
1363898226 | it subreddits curated by /u/HydrA- | https://www.reddit.com/user/HydrA-/m/it
1365625127 | High frequency security bug hunting: 120 days, 120 bugs | https://shubs.io/high-frequency-security-bug-hunting-120-days-120-bugs/
1367362698 | How To Tcpdump | https://n0where.net/how-to-tcpdump/
1365470240 | Hacking Imgur for Fun and Profit | https://medium.com/@nmalcolm/hacking-imgur-for-fun-and-profit-3b2ec30c9463#.aomqq759a
1321458441 | Bruteforce BitCoin Wallet | https://n0where.net/bruteforce-bitcoin-wallet/
1218444917 | Exercises | https://www.hacksplaining.com/exercises
1363448710 | How I made LastPass give me all your passwords | https://labs.detectify.com/2016/07/27/how-i-made-lastpass-give-me-all-your-passwords/
1358857712 | Shut up snitch! – reverse engineering and exploiting a critical Little Snitch vulnerability | https://reverse.put.as/2016/07/22/shut-up-snitch-reverse-engineering-and-exploiting-a-critical-little-snitch-vulnerability/
1355084206 | How Netflix gives all its engineers SSH access | https://www.oreilly.com/learning/how-netflix-gives-all-its-engineers-ssh-access
1329300468 | Create Your Own Pirate Bay: OpenBay | https://n0where.net/create-your-own-pirate-bay-openbay/
1235322629 | Web Hacking 101 | https://leanpub.com/web-hacking-101
1351557169 | “Give me 15 minutes and I'll change your view of GDB” [video] | https://news.ycombinator.com/item?id=12101347
1359417882 | How we broke PHP, hacked Pornhub and earned $20,000 | https://www.evonide.com/how-we-broke-php-hacked-pornhub-and-earned-20000-dollar/
1359231712 | Learning Exploitation with Offensive Computer Security 2.0 | http://howto.hackallthethings.com/2016/07/learning-exploitation-with-offensive.html
843762495 | Learning About Digital Forensics | http://cheeky4n6monkey.blogspot.com/2015/02/reversing-monkey.html
69405577 | Debugging Fundamentals for Exploit Development | http://resources.infosecinstitute.com/debugging-fundamentals-for-exploit-development/
1214465238 | Reverse engineering LucasArts Outlaws | http://glampert.com/2015/10-10/reverse-engineering-lucasarts-outlaws/
1353252667 | Unbundling Pokémon Go — Applidium | https://applidium.com/en/news/unbundling_pokemon_go/
1354533444 | Vimgifs | https://vimgifs.com/
1351846433 | GynvaelEN | https://www.youtube.com/user/GynvaelEN
1348631375 | Ask HN: What's your favorite way to save money? | https://news.ycombinator.com/item?id=12082078
1343334922 | Why we use the Linux kernel's TCP stack | https://blog.cloudflare.com/why-we-use-the-linux-kernels-tcp-stack/
1345182646 | Linux Signals - Internals | http://sklinuxblog.blogspot.com/2015/05/linux-signals-internals.html
1348465456 | SYN Flood Mitigation with synsanity | http://githubengineering.com/syn-flood-mitigation-with-synsanity/
1346591544 | How I setup a Raspberry Pi 3 Cluster Using The New Docker Swarm Mode In 29 Minutes | https://medium.com/@bossjones/how-i-setup-a-raspberry-pi-3-cluster-using-the-new-docker-swarm-mode-in-29-minutes-aa0e4f3b1768#.q85p03kl4
1345674271 | Introducing Contemporary Reverse Engineering Techniques to Real World Use · x64dbg | http://x64dbg.com/blog/2016/07/09/introducing-contemporary-reverse-engineering-technique-to-real-world-use.html
1352113396 | Bosch Motronic ME7.1 | https://web.archive.org/web/20121226064103/http://www.andywhittaker.com/ECU/BoschMotronicME71.aspx
1352462423 | Reversing an ELF from the ground up | http://anee.me/reversing-an-elf/
1344911168 | Linux debugging tools I love | http://jvns.ca/blog/2016/07/03/debugging-tools-i-love/
1347479760 | Allocation on the JVM: Down the rabbit hole | http://jcdav.is/2016/07/11/JVM-allocation-secrets/
1214465138 | Reverse engineering Dungeon Siege | http://glampert.com/2015/09-16/reverse-engineering-dungeon-siege/
1216467733 | Segfaulting Python with afl-fuzz | http://tomforb.es/segfaulting-python-with-afl-fuzz
1344597024 | Vulnerabilities I Have Known and Loved #1: Symantec's Bad Week | http://blog.appcanary.com/2016/vikhal-symantec.html
1346709233 | How I Got 5000+ Stars on Github · GitHub | https://gist.github.com/eliangcs/464a05ab75ac2a44d2e3dc0ac141cbc6
1349348261 | My First 10 Seconds On A Server | http://jerrygamblin.com/2016/07/13/my-first-10-seconds-on-a-server/
1340276647 | SSD Advisory – Wget Arbitrary Commands Execution | https://blogs.securiteam.com/index.php/archives/2701
1342670052 | Create Your Own Shell in Python : Part II | https://hackercollider.com/articles/2016/07/06/create-your-own-shell-in-python-part-2/
1347477808 | KeeThief – A Case Study in Attacking KeePass Part 2 – harmj0y | http://www.harmj0y.net/blog/redteaming/keethief-a-case-study-in-attacking-keepass-part-2/
1344651231 | The History of the URL: Domain, Protocol, and Port | https://eager.io/blog/the-history-of-the-url-domain-and-protocol/
1336701686 | A Case Study in Attacking KeePass – harmj0y | http://www.harmj0y.net/blog/redteaming/a-case-study-in-attacking-keepass/
1342059543 | Create Your Own Shell in Python : Part I | https://hackercollider.com/articles/2016/07/05/create-your-own-shell-in-python-part-1/
357888875 | Deep Wizardry: Stack Unwinding | http://blog.reverberate.org/2013/05/deep-wizardry-stack-unwinding.html
70480251 | Assembly Primer For Hackers (Part 1) System Organization | http://www.securitytube.net/video/208
1323241529 | X86 Shellcode Obfuscation - Part 1 | https://breakdev.org/x86-shellcode-obfuscation-part-1
1313234547 | Writing your own shellcode. | https://paraschetal.in/writing-your-own-shellcode/
1307618464 | An in depth tutorial on how to do binary exploitation | https://github.com/bert88sta/how2exploit_binary
1309153177 | 2000 cuts with Binary Ninja | https://blog.trailofbits.com/2016/06/03/2000-cuts-with-binary-ninja/
1258236788 | PoliCTF 2015 - John's Shuffle | http://ctfhacker.com/ctf/pwnable/2015/08/05/polictf-johns-shuffle.html
1292305183 | Python 3: An Intro to Encryption | http://www.blog.pythonlibrary.org/2016/05/18/python-3-an-intro-to-encryption/
1306324402 | “Super Mario Brothers” is hard | http://news.mit.edu/2016/mario-brothers-hard-complexity-class-pspace-0601
1302801147 | How (and Why) to Log Your Entire Bash History | https://spin.atomicobject.com/2016/05/28/log-bash-history/
1302698677 | Writing my first shellcode - iptables -P INPUT ACCEPT | https://0day.work/writing-my-first-shellcode-iptables-p-input-accept/
1300794964 | Docker IDA | http://blog.intezer.com/docker-ida/
1298515935 | Defusing a binary bomb with gdb | http://blog.carlosgaldino.com/2016/05/24/defusing-a-binary-bomb-with-gdb-part-7.html
1269518071 | I built a personal chat bot | https://medium.com/chat-bots/i-built-a-personal-chat-bot-why-i-love-it-and-youll-love-yours-too-6c2d019f3725#.w1hdlfmnj
1287479473 | Hackfu 2016 Writeup – Securifera | https://www.securifera.com/blog/2016/05/13/hackfu-2016-writeup/
1296331654 | An Introduction to Sorting Algorithms | http://classycode.org/2016/05/22/sortingalgorithmsintro/
1297312320 | Memory leak or just calculus? | https://improbable.io/2016/05/23/memory-leak-just-calculus
1296766384 | Quals Wrapup | https://blog.legitbs.net/2016/05/quals-wrapup.html
1296708567 | DEF CON QUALS 2016 - crippled [Coding Challenges] | https://thegoonies.rocks/def-con-quals-2016-crippled-coding-challenges/
1293151561 | X86 Shellcode Obfuscation - Part 2 | https://breakdev.org/x86-shellcode-obfuscation-part-2/
581207247 | Using Vim as a password manager | https://invert.svbtle.com/using-vim-as-a-password-manager
1295301468 | Reverse Engineering A Mysterious UDP Stream in My Hotel | http://wiki.gkbrk.com/Hotel_Music.html
376536162 | Reversing Basics Part 1: Understanding the C Code | http://blog.opensecurityresearch.com/2013/06/reversing-basics-part-1-understanding-c.html
1293839697 | | http://cybersmash.io/reversing-c-pt-1-function-overloading-and-function-templates/
1278328815 | thejameskyle/the-super-tiny-compiler | https://github.com/thejameskyle/the-super-tiny-compiler/blob/8466b6a67df9d815f1b7a8b5d4eec5abca0aea44/super-tiny-compiler.js?utm_source=ponyfoo+weekly&utm_medium=email
1285947879 | X86 Shellcode Obfuscation - Part 1 | https://breakdev.org/x86-shellcode-obfuscation-part-1
1285785294 | In-depth Machine Learning Course w/ Python [x-post /r/machinelearning] | https://www.reddit.com/r/Python/comments/4j0xhf/indepth_machine_learning_course_w_python_xpost/
1286626005 | CTF Writeup: Brain Repl | https://travisf.net/brain-repl-writeup
1018010574 | My First DEF CON | http://www.devdungeon.com/content/my-first-def-con
1263552374 | | https://www.cs.ucsb.edu/~vigna/publications/2016_SP_angrSoK.pdf
673857 | Smashing the Stack for Fun and Profit by Aleph One | http://insecure.org/stf/smashstack.html
1210731821 | Vim Configuration From Scratch in 2016 | https://marcgg.com/blog/2016/03/01/vimrc-example
1272549740 | GitHub README Analyzer | http://demos.algorithmia.com/github-readme-analyzer/
1268206105 | How to Loop With Indexes in Python | https://treyhunner.com/2016/04/how-to-loop-with-indexes-in-python
1274570369 | tetrakai | https://karla.io/2016/04/30/ssh-for-fun-and-profit.html
1269490561 | Have Software Developers Given Up? | http://blog.dantup.com/2016/04/have-software-developers-given-up/
1274716336 | Can’t Hack a Hacker: Reverse Engineering a Discovered ATM Skimmer | https://trustfoundry.net/reverse-engineering-a-discovered-atm-skimmer/
1273606271 | Do Experienced Programmers Use Google Frequently? | http://codeahoy.com/2016/04/30/do-experienced-programmers-use-google-frequently/
1216485029 | An Elegant Fizzbuzz | http://www.parsonsmatt.org/2016/02/27/an_elegant_fizzbuzz.html
1272263929 | Using RAsm · The Official Radare Blog | http://radare.today/posts/rasm/
1101909295 | Defusing a binary bomb with gdb - Part 1 | http://blog.carlosgaldino.com/2015/11/12/defusing-a-binary-bomb-with-gdb-part-1.html
1260563707 | How I Defeated an Obfuscated and Anti-Tamper APK With Some Python and a Home-Made Smali Emulator. | https://www.evilsocket.net/2016/04/18/how-i-defeated-an-obfuscated-and-anti-tamper-apk-with-some-python-and-a-home-made-smali-emulator/
1261684605 | Veil-Evasion Vulnerability Discovered by Cylance | https://blog.cylance.com/veil-evasion-vulnerability-discovered-by-cylance
977188992 | NSEarch - Nmap Script Engine Search | http://www.kitploit.com/2015/02/nsearch-nmap-script-engine-search.html
1267335200 | Various interview questions I have been asked while applying for security consultant jobs this year | https://www.reddit.com/r/netsecstudents/comments/4g9k93/various_interview_questions_i_have_been_asked/
1260447001 | CTFtime.org / sCTF 2016 Q1 tasks and writeups | https://ctftime.org/event/309/tasks/
1262091528 | Detecting the use of "curl | bash" server side | https://www.idontplaydarts.com/2016/04/detecting-curl-pipe-bash-server-side/
1264029009 | How I Hacked Facebook, and Found Someone's Backdoor Script | http://devco.re/blog/2016/04/21/how-I-hacked-facebook-and-found-someones-backdoor-script-eng-ver/
1262412450 | 52-technologies-in-2016/README.md at master · shekhargulati/52-technologies-in-2016 · GitHub | https://github.com/shekhargulati/52-technologies-in-2016/blob/master/16-newspaper/README.md
1264391482 | Teaching an old RAT new tricks | https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
1260842006 | Game Boy Zero Guide Part 1 | http://sudomod.com/game-boy-zero-guide-part-1/
244723365 | Packets, pcaps, Python and Maltego | http://itgeekchronicles.co.uk/
1249366316 | Veil Evasion: Payloads Made Easy | http://hack-ed.net/2016/04/04/veil-evasion-payloads-made-easy/
1259674284 | | http://pastebin.com/raw/0SNSvyjJ
1258976996 | Addition_by_subtraction - Google Slides | https://docs.google.com/presentation/d/1-mtBSka1ktdh8RHxo2Ft0oNNlIp7WmDA2z9zzHpon8A/edit#slide=id.p16
361030202 | List of file signatures | http://en.m.wikipedia.org/wiki/List_of_file_signatures
1259225523 | sCTF 2016 (incomplete) write-up | http://boredhackerblog.blogspot.com/2016/04/sctf-2016-incomplete-write-up.html
1253700174 | Is there a rider on the policy to cover ransomware or "cyber extortion"[38]? | http://blog.talosintel.com/2016/04/ransomware.html#ch2
1260001901 | Phineas Fisher's Account of How He Broke Into Hacking Team Servers | http://news.softpedia.com/news/finfisher-s-account-of-how-he-broke-into-hackingteam-servers-503078.shtml
1256253954 | Setting up your first Virtual Environment | http://hack-ed.net/2016/04/13/setting-up-your-first-virtual-environment/
1259241762 | Universal Install Script by XKCD – Combat test | http://www.ocsmag.com/2016/04/16/universal-install-script-by-xkcd-combat-test/
1258072364 | Beginners Guide to OSINT – Chapter 1 | https://itgeekchronicles.co.uk/2016/04/15/beginners-guide-to-osint-chapter-1/
786676128 | | https://ctf-team.vulnhub.com/picoctf-2014-overflow1/
1217494704 | How MAC Address Randomization Works on Windows 10 | http://www.mathyvanhoef.com/2016/03/how-mac-address-randomization-works-on.html
960225061 | The Malware Lab : Virtual Network Configuration – VirtualBox | https://blindseeker.com/blahg/?p=375
1256361255 | exploit to solve pwn1 in the sctf challenge · GitHub | https://gist.github.com/charles-l/d4757ee03f4f3e4fd6a84730dc49c004
1248591082 | Building a Home Lab to Become a Malware Hunter - A Beginner’s Guide | https://www.alienvault.com/blogs/security-essentials/building-a-home-lab-to-become-a-malware-hunter-a-beginners-guide
1254341889 | Ghost in the Shellcode 2014 - Pwn Adventure 2 writeups | http://balidani.blogspot.com/2014/01/ghost-in-shellcode-2014-pwn-adventure-2.html
463529184 | stephenturner/oneliners | https://github.com/stephenturner/oneliners
1124001546 | DevopsWiki/README.md at master · Leo-G/DevopsWiki · GitHub | https://github.com/Leo-G/DevopsWiki/blob/master/README.md
1254291562 | Words With Friends Trusts The Clients A Little Too Much | https://littlemaninmyhead.wordpress.com/2016/04/09/words-with-friends-trusts-the-clients-a-little-too-much/
1253968770 | MongoDB Injection - How To Hack MongoDB | http://www.technopy.com/mongodb-injection---how-to-hack-mongodb.html
553788030 | | http://nongnu.askapache.com//pgubook/ProgrammingGroundUp-1-0-lettersize.pdf
822046665 | ant4g0nist/lisa.py | https://github.com/ant4g0nist/lisa.py
1254289489 | epicleet/write-ups-2016 forked from ctfs/write-ups-2016 | https://github.com/epicleet/write-ups-2016/tree/pwn2win-ctf-2016/pwn2win-ctf-2016/reverse/Auswahlen-120
1252984224 | BOX-256 | http://box-256.com
1216434794 | Boston Key Party CTF 2016 writeups | https://0day.work/boston-key-party-ctf-2016-writeups/
458701 | What is linux-gate.so.1? | http://www.trilithium.com/johan/2005/08/linux-gate/
1227289934 | Reverse engineering Kirby's Dreamland 2, for Game Boy | http://ecc-comp.blogspot.com/2016/03/reverse-engineering-kirbys-dreamland-2.html?m=1
717062073 | I was just asked to crack a program in a job interview ! | http://erenyagdiran.github.io/I-was-just-asked-to-crack-a-program-Part-1/
1246774019 | SmashTheTux VulnHub Writeup | https://research.g0blin.co.uk/smashthetux-vulnhub-writeup/
625117117 | .:: Basic Integer Overflows ::. | http://www.phrack.org/issues/60/10.html#article
1225435091 | Diving Into Other People's Code | http://www.lihaoyi.com/post/DivingIntoOtherPeoplesCode.html
256910183 | Top 30 Nmap Command Examples For Sys/Network Admins | http://www.cyberciti.biz/networking/nmap-command-examples-tutorials/
885795659 | Nmap Cheat Sheet ∞ | https://highon.coffee/blog/nmap-cheat-sheet/
1231292829 | PRIMER VulnHub Writeup | https://research.g0blin.co.uk/primer-vulnhub-writeup/
965604627 | Linux (x86) Exploit Development Series | https://sploitfun.wordpress.com/2015/06/26/linux-x86-exploit-development-tutorial-series/
1049375886 | Tools and Resources to Prepare for a Hacker CTF Competition or Challenge | http://resources.infosecinstitute.com/tools-of-trade-and-resources-to-prepare-in-a-hacker-ctf-competition-or-challenge/
385129465 | 7 Silly Programming Challenges to Do for Fun | http://blog.smartbear.com/programming/7-silly-programming-challenges-to-do-for-fun/
1231982618 | Let's Analyze: Dridex (Part 1) | http://www.malwaretech.com/2016/03/lets-analyze-dridex-part-1.html
1214545547 | A Beginner-Friendly Introduction to Containers, VMs and Docker — Free Code Camp — Medium | https://medium.freecodecamp.com/a-beginner-friendly-introduction-to-containers-vms-and-docker-79a9e3e119b?gi=d0fc7519b9ca
1177646344 | as painless as possible — Miasm's blog | http://www.miasm.re/blog/2016/01/27/re150.html
1247352106 | Rebuilding a cleaned & working binary (Re150 part 2) — Miasm's blog | http://www.miasm.re/blog/2016/03/24/re150_rebuild.html
1249716536 | SNES Code Injection -- Flappy Bird in SMW | https://www.youtube.com/watch?v=hB6eY73sLV0
1247113824 | PowerWare or PoshCoder? Comparison and Decryption | https://www.alienvault.com/open-threat-exchange/blog/powerware-or-poshcoder-comparison-and-decryption
1163404808 | Artificial truth | https://dustri.org/b/how-to-radare2-a-fake-openssh-exploit.html
1247490738 | A Tale of Security Gone Wrong | http://gavinmiller.io/2016/a-tale-of-security-gone-wrong/
1248119158 | CTF Writeup - Nuit du Hack CTF Quals 2016 - Matryoshka (50+100+300+500) | http://vulnerablespace.blogspot.co.uk/2016/04/ctf-writeup-nuit-du-hack-ctf-quals-2016.html?m=1
1248123794 | Nuit du Hack - Secure File Reader | https://0xabe.io/ctf/exploit/2016/04/03/Nuit-du-Hack-pwn-Secure-File-Reader.html
531150219 | Ghost in the Shellcode: TI-1337 (Pwnable 100) | https://blog.skullsecurity.org/2014/ghost-in-the-shellcode-ti-1337-pwnable-100
92527451 | Adventures with Radare2 #1: A Simple Shellcode Analysis | http://canthack.org/2011/07/adventures-with-radare-1-a-simple-shellcode-analysis/
1224661973 | Documents with malicious macros deliver fileless malware | http://www.computerworld.com/article/3043570/security/documents-with-malicious-macros-deliver-fileless-malware.html
863923539 | Modern Binary Exploitation | http://security.cs.rpi.edu/courses/binexp-spring2015/
1241219243 | zbetcheckin/Security_list | https://github.com/zbetcheckin/Security_list
539962725 | theZoo aka Malware DB | http://ytisf.github.io/theZoo
1244692585 | I’m a boring programmer (and proud of it) — Signal v. Noise — Medium | https://m.signalvnoise.com/i-m-a-boring-programmer-and-proud-of-it-d4ac3dd2defe?gi=bb136f2dc796
1218976113 | Radare 2 in 0x1E minutes – Techorganic – Musings from the brainpan | http://blog.techorganic.com/2016/03/08/radare-2-in-0x1e-minutes/
973740512 | Reverse Engineering With Radare2, Part 1 | https://samsymons.com/blog/reverse-engineering-with-radare2-part-1/
1240263842 | Reverse Engineering Sublime Text’s Fuzzy Match — Dev Curious — Medium | https://blog.forrestthewoods.com/reverse-engineering-sublime-text-s-fuzzy-match-4cffeed33fdb?gi=9cd7f4c39d71
695046174 | 7 Harmless (But Slightly Evil) Back-to-School Pranks for Your Gullible Dorm Mates | http://practical-jokes.wonderhowto.com/how-to/7-harmless-but-slightly-evil-back-school-pranks-for-your-gullible-dorm-mates-0156931/
1245762036 | Post Your Decrypted 3DS Saves Here! (40+ Saves so Far!) | http://www.reddit.com/r/3dshacks/comments/4d842q/post_your_decrypted_3ds_saves_here_40_saves_so_far/
117613166 | Give me that one command you wish you knew years ago. I'll start. | https://www.reddit.com/r/linux/comments/mi80x/give_me_that_one_command_you_wish_you_knew_years/
1234542278 | NPM & left-pad: Have We Forgotten How To Program? | http://www.haneycodes.net/npm-left-pad-have-we-forgotten-how-to-program/
1232603148 | Reflections on Programming | http://sam-koblenski.blogspot.com/2016/03/reflections-on-programming.html
1240637060 | The Future is Without Apps | https://medium.com/fwd-thoughts/the-future-is-without-apps-ddf43ec52aab#.y3mnajpn3
1238104924 | Open Source Weekly #05 — open source weekly — Medium | https://medium.com/p/237c0d70585f
1236205432 | [Updated Tools] Easy to follow beginner's guide for DeDRMing amazon trial, rental, and purchased ebooks | https://www.reddit.com/r/Piracy/comments/4bvsnz/updated_tools_easy_to_follow_beginners_guide_for/
1003836686 | How to mine Ethereum on a Windows PC? | https://www.cryptocompare.com/mining/guides/how-to-mine-ethereum/
1134631863 | Breaking and evading Linux with a new novel technique | https://www.sentinelone.com/blog/breaking-and-evading/
1239486008 | Developer Mentality — Medium | https://medium.com/@KarlSolgard/developer-mentality-1d266fdc4097
1233623442 | How to not break the internet with this one weird trick | https://medium.com/@Rich_Harris/how-to-not-break-the-internet-with-this-one-weird-trick-e3e2d57fee28#.mwgm03fwd
1235486261 | There is no “my” in open source — Medium | https://medium.com/@nayafia/there-is-no-my-in-open-source-c3e5555390fa#.unbp9ug76
1229400859 | Terminal Essentials: Advanced Command Line Tools For Devs and Sysadmins | http://thenewstack.io/terminal-essentials-command-line-tools-devs-sysadmins/
803202482 | NSA has VPNs in Vulcan death grip—no, really, that’s what they call it | http://arstechnica.com/tech-policy/2014/12/nsa-has-vpns-in-vulcan-death-grip-no-really-thats-what-they-call-it/
1240582798 | Home · Plailect/Guide Wiki · GitHub | https://github.com/Plailect/Guide/wiki
1239993377 | What do cryptic Github comments mean? — Medium | https://medium.com/p/9c1912bcc0a4
747085484 | Want a security starter pack? | https://ssd.eff.org/en/playlist/want-security-starter-pack#creating-strong-passwords
176786836 | Seamlessly Extending IRC to Mobile Devices | http://m.linuxjournal.com/content/seamlessly-extending-irc-mobile-devices
1233308607 | Why I switched to Android after 7 years of iOS | https://joreteg.com/blog/why-i-switched-to-android
1232375756 | 4 Quick Takeaways From Today’s Apple Keynote — Medium | https://medium.com/@iamtimbaker/4-quick-takeaways-from-today-s-apple-keynote-e10355e987f
1232102371 | Extracting image metadata at scale | http://techblog.netflix.com/2016/03/extracting-image-metadata-at-scale.html?m=1
1236702144 | The Chrome Distortion: how Chrome negatively alters our expectations. | https://blog.runspired.com/2016/03/25/the-chrome-distortion-chrome-alters-our-expectations-in-highly-negative-ways/
1237225058 | What is Capture the Flag? — Medium | https://medium.com/@WesternCyberSecurity/what-is-capture-the-flag-f498097f6478
1237386245 | What if the NPM left-pad fiasco had happened on PyPi? | https://www.reddit.com/r/Python/comments/4booff/what_if_the_npm_leftpad_fiasco_had_happened_on/
1235099015 | Timeless Programming Tools | http://www.flyingmachinestudios.com/programming/timeless-tools/
1224860099 | Journey to becoming a better software developer — Part 1 — Medium | https://medium.com/@betkom/journey-to-becoming-a-better-software-developer-part-1-e69cf8dc2571#.91hxqac5x
1236702470 | Benchmarking Python vs. C performance with a simple program — Medium | https://medium.com/p/c268677912d3
1222403254 | | http://beginners.re/RE4B-EN.pdf
1219384046 | How We Build Code at Netflix | http://techblog.netflix.com/2016/03/how-we-build-code-at-netflix.html
1211771583 | Go - Making a program 70% faster, by avoiding common mistakes. | http://blog.fmpwizard.com/blog/go_making_a_program_70_faster_by_avoiding_common_mistakes
1235132678 | Why systemd is *Great* for Configuration Management — Treehouse Engineering — Medium | https://medium.com/treehouse-engineering/why-systemd-is-great-for-configuration-management-cb3172e0a1d1#.rwtnty3gx
1232587111 | How a TV Sitcom Triggered the Downfall of Western Civilization | https://medium.com/@thatdavidhopkins/how-a-tv-sitcom-triggered-the-downfall-of-western-civilization-336e8ccf7dd0
1233727848 | d’Oh My Zsh | https://medium.com/@robbyrussell/d-oh-my-zsh-af99ca54212c
1233028571 | Command Line Magic on Twitter : " : %s/wlan0/eth3/gc # In vim this will search all lines (%s) for wlan0 and replace all the instances per line (g) with eth3 and confirm (c)" | https://twitter.com/climagic/status/712287216668696578
1219885117 | Geek’s Guide to Feels | https://www.facebook.com/notes/kent-beck/geeks-guide-to-feels/1118073741558822/
1233950291 | npm's single point of failure | https://resir014.github.io/blog/2016/03/23/npms-single-point-of-failure/
1218553990 | Defensive programming in Python | http://tutorials.pluralsight.com/review/defensive-programming-in-python
1219586217 | 5 ways to upgrade your Terminal — Medium | https://medium.com/@sahanarajasekar/5-ways-to-upgrade-your-terminal-2fb8ab447949
1216867595 | Who Needs GitHub? Run GitLab on a USB Stick with Docker : Elton Stoneman | https://blog.sixeyed.com/run-gitlab-on-a-usb-stick-with-docker/
1227813611 | Best Python Libraries | https://www.caktusgroup.com/blog/2016/03/17/best-python-libraries/
1227482210 | tcpdump is amazing | http://jvns.ca/blog/2016/03/16/tcpdump-is-amazing/
1222352376 | A millennial and a baby boomer trade places: ‘I can’t help but feel a stab of envy’ | http://www.theguardian.com/world/2016/mar/12/millennial-baby-boomer-trade-places-stab-envy
1226812537 | Scipy Lecture Notes - One document to learn numerics, science, and data with Python | https://www.reddit.com/r/Python/comments/4ao6nn/rafs_redditasfilestorage/
1231056581 | How the demonization of emulation devalues gaming’s heritage | http://arstechnica.com/gaming/2016/03/how-the-demonization-of-emulation-devalues-gamings-heritage/
1218333969 | Ungit: The Easiest Way to Use Git | http://blog.goguardian.com/nerds/ungit-the-easiest-way-to-use-git
1218408753 | Rise of The Docker Pattern | http://redmonk.com/jgovernor/2016/03/08/rise-of-the-docker-pattern/
99640904 | What every computer science major should know | http://matt.might.net/articles/what-cs-majors-should-know/
1202952956 | The Difference Between Excellent, Good and Bad JavaScript Developers | http://thefullstack.xyz/excellent-javascript-developer/
1220473293 | | http://wesbos.com/git-hot-tips/
1214583941 | Things I Wish Someone Had Told Me When I Was Learning How to Code — Free Code Camp — Medium | https://medium.freecodecamp.com/things-i-wish-someone-had-told-me-when-i-was-learning-how-to-code-565fc9dcb329?gi=72e41ad08d7a
1204566093 | How Can I Get Better at Programming? | https://medium.com/life-learning/how-can-i-get-better-at-programming-dab9644a3b9f#.ks9lg8x82
1164722462 | Hot Potato – Windows Privilege Escalation | https://foxglovesecurity.com/2016/01/16/hot-potato/
1211011267 | How to Level up as a Developer — Medium | https://medium.com/@willh/how-to-level-up-as-a-developer-87344584777c
1211118199 | How to Deploy Software | https://zachholman.com/posts/deploying-software
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment