Skip to content

Instantly share code, notes, and snippets.

@rava-dosa
Created June 3, 2018 14:35
Show Gist options
  • Save rava-dosa/48c4bcc28d6470de9959087fb20a5f4f to your computer and use it in GitHub Desktop.
Save rava-dosa/48c4bcc28d6470de9959087fb20a5f4f to your computer and use it in GitHub Desktop.

01000011x10001000x000100000100x010000010010 ShellScript https://www.shellscript.sh/

Acl http://www.gsp.com/cgi-bin/mdroid.cgi?topic=extattrctl http://www.onlamp.com/pub/a/bsd/2003/08/14/freebsd_acls.html https://linux.die.net/man/1/setfacl https://www.bing.com/search?q=ACLs+with+Samba+andWindows&src=IE-TopResult&FORM=IETR02&conversationid= https://en.wikipedia.org/wiki/Chmod See references https://en.wikipedia.org/wiki/Access_control_list See see also https://en.wikipedia.org/wiki/Discretionary_access_control https://security.stackexchange.com/questions/63518/mac-vs-dac-vs-rbac Difference b/w mac and dac With MAC, admins creates a set of levels and each user is linked with a specific access level. He can access all the resources that are not greater than his access level. In contrast, each resource in DAC has a list of users who can access it. DAC provides access by identity of the user and not by permission level. Rbac

Canaries http://antoniobarresi.com/security/exploitdev/2014/05/03/64bitexploitation/ https://stackoverflow.com/questions/24465014/gcc-generate-canary-or-not

Authentication and Access control in linux os (Awesome)https://courses.cs.washington.edu/courses/cse484/11au/sections/section6.pdf http://www.tenouk.com/linuxunixsecurityfeatures.html https://link.springer.com/chapter/10.1007/978-3-642-23312-8_28 https://www.safaribooksonline.com/library/view/linux-server-hacks/0596100825/ch01.html (Awesome)https://pdfs.semanticscholar.org/presentation/89f5/513e99544345cd86dfd7ef8ab386459cdd25.pdf Book https://www.amazon.com/Foundations-Security-Every-Programmer-Experts/dp/1590597842 College https://courses.cs.washington.edu/courses/cse484/17au/schedule.html https://courses.cs.washington.edu/courses/cse484/11au/sections/

In above college in different year course is totally different.

Buffer-overflow http://www.cse.scu.edu/~tschwarz/coen152_05/ Howard and LeBlanc: Writing Secure Code, 2nd edition https://web.archive.org/web/20050325202927/http://www.nextgenss.com/papers/advanced_sql_injection.pdf

Dangling pointer https://developers.slashdot.org/story/10/04/13/1951246/how-to-exploit-null-pointers https://security.stackexchange.com/questions/61948/how-do-i-make-a-working-example-of-a-dangling-pointers-exploit-or-where-do-i https://blogs.oracle.com/linux/much-ado-about-null%3a-exploiting-a-kernel-null-dereference-v2 Causes of dangling pointer 1.when global variable points the some variable in function or local block. 2.initialize ptr=NULL immediate after block completion Solution: After deallocation of memory, immediate initialize pointer to NULL http://codingstreet.com/what-is-dangling-pointer/ (Awesome)http://www.cs.virginia.edu/~ww6r/CS4630/syllabus.html

linux filesystem http://www.tldp.org/LDP/intro-linux/html/index.html

Format String http://www.cs.virginia.edu/~ww6r/CS4630/

tocttou https://www.cl.cam.ac.uk/~rja14/Papers/SE-06.pdf https://www.bing.com/search?q=tocttou&src=IE-TopResult&FORM=IETR02&conversationid= https://github.com/tocttou http://users.cis.fiu.edu/~weijp/Jinpeng_Homepage_files/toctou-fast05.pdf https://www.usenix.org/sites/default/files/conference/protected-files/michele_woot12_slides.pdf http://www.sis.pitt.edu/jjoshi/courses/IS2620/Fall17/Lectures.html http://www.sis.pitt.edu/jjoshi/courses/IS2620/Fall17/Lecture6.pdf Ropfttw http://shell-storm.org/talks/ROP_course_lecture_jonathan_salwan_2014.pdf https://www.youtube.com/watch?v=5FJxC59hMRY https://drive.google.com/file/d/0B3U0fxyeeTTdcDJhbm5DcU1OQU0/view https://drive.google.com/file/d/0B3U0fxyeeTTdaGdQWGFvUFg5czQ/view https://en.wikipedia.org/wiki/Address_space_layout_randomization

Bypassing sehop https://repo.zenk-security.com/Reversing%20.%20cracking/Bypassing%20SEHOP.pdf

Heap_spray https://en.wikipedia.org/wiki/Heap_spraying (Awesome)http://security.cs.rpi.edu/courses/binexp-spring2015/

Integer overflow https://phoenhex.re/2017-06-02/arrayspread

X86-architecture https://stackoverflow.com/questions/18417849/difference-between-flat-memory-model-and-protected-memory-model https://en.wikipedia.org/wiki/Flat_memory_model Linux uses flat memory model. http://www.cs.virginia.edu/~evans/cs216/guides/x86.html https://gotocon.com/dl/goto-chicago-2014/slides/MattGodbolt_X86InternalsForFunAndProfit.pdf http://asmtutor.com/#lesson1 https://software.intel.com/en-us/articles/intel-sdm https://stackoverflow.com/questions/1023593/how-to-write-hello-world-in-assembler-under-windows#answer-20032763 https://software.intel.com/sites/default/files/m/d/4/1/d/8/Introduction_to_x64_Assembly.pdf https://aaronbloomfield.github.io/pdr/book/x86-64bit-asm-chapter.pdf http://aaronbloomfield.github.io/pdr/book/x86-64bit-ccc-chapter.pdf http://asmtutor.com/#lesson1 https://www.informatik.htw-dresden.de/~beck/ASM/syscall_list.html https://web.archive.org/web/20041010205615/http://docs.cs.up.ac.za/programming/asm/derick_tut#syscalls https://www.informatik.htw-dresden.de/~beck/ASM/syscall_list.html https://stackoverflow.com/questions/9601427/is-inline-assembly-language-slower-than-native-c-code http://www.agner.org/optimize/

Elf format(Executable and linkable format) https://www.linuxjournal.com/article/1060

Calling convention https://en.wikipedia.org/wiki/Calling_convention https://stackoverflow.com/questions/41231637/how-does-a-function-call-work https://eli.thegreenplace.net/2011/02/04/where-the-top-of-the-stack-is-on-x86/ https://en.wikipedia.org/wiki/Executable_and_Linkable_Format#Specifications http://www.agner.org/optimize/ Kernel and boot processes http://duartes.org/gustavo/blog/post/ http://www.tldp.org/LDP/intro-linux/html/index.html http://www.science.unitn.it/~fiorella/guidelinux/tlk/node5.html http://en.wikipedia.org/wiki/Reset_vector https://www.cs.cmu.edu/~410-s07/p4/p4-boot.pdf

Tmap,smap,smep, virtualisation and hypervisor For smep http://j00ru.vexillium.org/?p=783 For smap https://en.wikipedia.org/wiki/Supervisor_Mode_Access_Prevention For tpm https://en.wikipedia.org/wiki/Trusted_Platform_Module https://en.wikipedia.org/wiki/Address_space_layout_randomization

Side channel attack https://en.wikipedia.org/wiki/Side-channel_attack https://www.peerlyst.com/posts/a-collection-of-links-to-pdfs-of-papers-on-micro-architectural-side-channel-attacks-sorted-by-date-paul-harvey Cache attack https://en.wikipedia.org/wiki/CPU_cache https://www.youtube.com/watch?v=vpGI1ggKzC4 https://www.youtube.com/channel/UCG1HuJcwjA0Cp7a2-iGfWug http://palms.ee.princeton.edu/system/files/SP_vfinal.pdf https://github.com/defuse/flush-reload-attacks https://gruss.cc/files/cache_and_rowhammer_ruhrsec.pdf https://www.blackhat.com/docs/us-16/materials/us-16-Hornby-Side-Channel-Attacks-On-Everyday-Applications.pdf https://www.youtube.com/watch?v=DkWqLDSqHm8&list=PLH15HpR5qRsWx4qw9ZlgmisHOcKG4ZcRS&index=18 http://web.cse.ohio-state.edu/~zhang.834/slides/tutorial17.pdf https://conference.hitb.org/hitbsecconf2016ams/materials/D2T1%20-%20Anders%20Fogh%20-%20Cache%20Side%20Channel%20Attacks.pdf http://www.cryptofails.com/post/70097430253/crypto-noobs-2-side-channel-attacks Timing attack https://www.youtube.com/watch?v=3v5Von-oNUg https://jochen-hoenicke.de/trezor-power-analysis/ Acoustic attack https://www.cs.tau.ac.il/~tromer/acoustic/ Search for lev pachnov Daniel gruss iaik graz university of technology https://www.youtube.com/user/BlackHatOfficialYT/playlists?disable_polymer=1 https://rd.springer.com/chapter/10.1007/978-1-4419-1530-6_8 https://www.usenix.org/node/184416 https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-yarom.pdf https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-gruss.pdf https://www.blackhat.com/docs/us-16/materials/us-16-Hornby-Side-Channel-Attacks-On-Everyday-Applications.pdf https://www.cs.unc.edu/~reiter/papers/2014/CCS1.pdf https://github.com/IAIK/rowhammerjs https://www.blackhat.com/presentations/bh-usa-07/De_Haas/Presentation/bh-usa-07-de_haas.pdf https://en.wikipedia.org/wiki/Shared_memory Evict and time https://www.youtube.com/watch?v=ewe3-mUku94 https://eprint.iacr.org/2005/271.pdf RowHammer https://www.blackhat.com/docs/us-15/materials/us-15-Seaborn-Exploiting-The-DRAM-Rowhammer-Bug-To-Gain-Kernel-Privileges-wp.pdf https://www.youtube.com/watch?v=1iBpLhFN_OA https://www.blackhat.com/docs/us-15/materials/us-15-Seaborn-Exploiting-The-DRAM-Rowhammer-Bug-To-Gain-Kernel-Privileges.pdf https://www.blackhat.com/docs/eu-16/materials/eu-16-Lipp-ARMageddon-How-Your-Smartphone-CPU-Breaks-Software-Level-Security-And-Privacy-wp.pdf (Awesome) https://www.vusec.net/projects/glitch/ Rowhammer on Armageddon https://github.com/iaik/armageddon https://mlq.me/ Moritz lipp AES http://www.moserware.com/2009/09/stick-figure-guide-to-advanced.html https://en.wikipedia.org/wiki/Rijndael_S-box https://shanetully.com/2012/06/openssl-rsa-aes-and-c/ https://googleprojectzero.blogspot.co.uk/2015/03/exploiting-dram-rowhammer-bug-to-gain.html

Javascript Internals spidermonkey http://www.phrack.org/issues/69/14.html#article

Computer organization http://pages.cs.wisc.edu/~arch/www/books.html https://www.quora.com/What-is-a-good-book-to-learn-computer-architecture http://williams.comp.ncat.edu/comp375/CacheSim.pdf (Awesome )http://www.cs.uni.edu/~diesburg/courses/cs3430_sp14/sessions/s14/s14_caching_and_tlbs.pdf (Awesome cache and tlb)http://inst.eecs.berkeley.edu/~cs162/sp11/sections/cs162-sp11-section6-answers.pdf https://www.quora.com/What-is-the-difference-between-TLB-and-MMU-in-OS http://www.agner.org/optimize/

Hardware reverse engineering http://security.cs.rpi.edu/courses/hwre-spring2014/

Malware analysis http://security.cs.rpi.edu/courses/malware-spring2013/ Misc https://events.static.linuxfound.org/sites/events/files/slides/AFL%20filesystem%20fuzzing,%20Vault%202016_0.pdf (Awesome list of links in last) https://dyjak.me/wp-content/uploads/2018/05/WarCon-2017-Interpreters-Under-Pressure.pdf (Awesome)https://www.nds.rub.de/media/nds/arbeiten/2015/10/30/Tim_Guenther-EsPReSSO-BA.pdf (Awesome book)https://download-mirror.savannah.gnu.org/releases/pgubook/ProgrammingGroundUp-1-0-booksize.pdf https://archive.org/details/ToorconArchiveInfocon https://techbeacon.com/best-security-conferences-2018 http://mirror.easyname.at/nongnu/pgubook/ProgrammingGroundUp-1-0-booksize.pdf http://www.agner.org/optimize/ https://digteam.github.io/assets/tocttou.pdf (Don't know what that is) https://www.youtube.com/user/SourcefireInc/playlists?disable_polymer=1 https://www.youtube.com/channel/UCSii2fuiLLlGqaR6sR_y0rA https://www.youtube.com/channel/UCDNzNvZlYK8jZLsUbdiGrsQ ●[1] http://cseweb.ucsd.edu/~hovav/talks/blackhat08.html ● [2] http://cseweb.ucsd.edu/~hovav/dist/sparc.pdf ● [3] https://github.com/0vercl0k/rp ● [4] http://ropshell.com/ropeme/ ● [5] https://github.com/pakt/ropc ● [6] https://github.com/awailly/nrop ● [7] http://shell-storm.org/project/ROPgadget/ ● [8] https://www.comp.nus.edu.sg/~liangzk/papers/asiaccs11.pdf ● [9] https://www.lst.inf.ethz.ch/research/publications/PPREW_2013/PPREW_2013.pdf ● [10] http://www.scs.stanford.edu/brop/bittau-brop.pdf ● [11] https://labs.portcullis.co.uk/blog/ohm-2013-review-of-returning-signals-for-fun-and-profit/ ● [12] http://shell-storm.org/repo/Notepad/ROP-chain-generation-via-backtracking-and-state-machine.txt http://www.tenouk.com/cncplusplusbufferoverflow.html https://www.sei.cmu.edu/research-capabilities/all-work/display.cfm?customel_datapageid_4050=21274 https://www.youtube.com/channel/UCkysTPyA_48174c80rcITmA https://www.youtube.com/channel/UCMNvAtT4ak2azKNk6UlB1QQ https://github.com/vitalysim/Awesome-Hacking-Resources#reverse-engineering-buffer-overflow-and-exploit-development https://software.intel.com/en-us/articles/intel-sdm#combined http://www.tenouk.com/Bufferoverflowc/stackbasedbufferoverflow.html https://www.sei.cmu.edu/research-capabilities/all-work/display.cfm?customel_datapageid_4050=21274 https://www.youtube.com/channel/UCkysTPyA_48174c80rcITmA https://www.youtube.com/channel/UCMNvAtT4ak2azKNk6UlB1QQ https://github.com/vitalysim/Awesome-Hacking-Resources#reverse-engineering-buffer-overflow-and-exploit-development https://software.intel.com/en-us/articles/intel-sdm#combined http://www.tenouk.com/Bufferoverflowc/stackbasedbufferoverflow.html (Awesome )http://www.cs.virginia.edu/~evans/cs216/ https://github.com/offensive-security https://www.corelan.be/index.php/2009/09/21/exploit-writing-tutorial-part-6-bypassing-stack-cookies-safeseh-hw-dep-and-aslr/ (primary) http://security.cs.rpi.edu/courses/binexp-spring2015/lectures/1/01_lecture.pdf https://kitctf.de/writeups/0ctf2015/freenote/ https://sploitfun.wordpress.com/2015/03/04/heap-overflowusing-malloc-maleficarum/ http://acez.re/ctf-writeup-hitcon-ctf-2014-stkof-or-modernheap-overflow/ http://wapiflapi.github.io/2014/11/17/hacklu-oreo-withret2dl-resolve/ http://phrack.org/issues/66/10.html http://dl.packetstormsecurity.net/papers/attack/MallocMaleficarum.txt (Awesome)https://samsclass.info/127/127_F15.shtml (Awesome codes)pip install -r requirements.txt --no-index --find-links file:///tmp/packages Compiler intrinsics https://www.linuxjournal.com/content/introduction-gcc-compiler-intrinsics-vector-processing https://stackoverflow.com/questions/7156908/sse-intrinsic-functions-reference https://msdn.microsoft.com/en-us/library/hh977022.aspx (Awesome list of vulnerablilities) https://www.cvedetails.com/ Misc2 https://dzone.com/articles/how-to-check-linux-process-deeply-with-common-sens https://doc.lagout.org/programmation/ (Triple awesome) https://renenyffenegger.ch/notes/development/languages/C-C-plus-plus/GCC/create-libraries/index https://gms.tf/ld_library_path-considered-harmful.html (Awesome book resources) https://www.linuxtopia.org/online_books/ https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Rants%26Writeups/Hacking%20Team%20Writeup.md https://www.mwrinfosecurity.com/events/past-events/ (Awesome)https://www.cs.bgu.ac.il/~mahlert/TCPIP_Implementation/TCPIP_Implementation.pdf (Awesome)https://www.wiley.com/en-gb/Efficient+Algorithms+for+MPEG+Video+Compression-p-9780471379423 (Awesome Alternatives of exploit db)https://security.stackexchange.com/questions/2715/exploit-db-like-websites-where-people-can-search-for-security-bugs https://leotindall.com/tutorial/an-intro-to-x86_64-reverse-engineering/ http://resources.infosecinstitute.com/x86-assembly-reverse-engineering-part-2/ https://smtebooks.com/book/602/practical-reverse-engineering-x86-x64-pdf http://overthewire.org/wargames/bandit/bandit0.html https://github.com/RPISEC/MBE https://jochen-hoenicke.de/trezor-power-analysis/ https://eprint.iacr.org/2017/1169.pdf http://media.ntu.edu.sg/NewsReleases/Pages/newsdetail.aspx?news=e57faffc-24ea-4034-9181-f5fea9850690 https://github.com/mseaborn https://github.com/HackathonHackers/groups https://github.com/HackathonHackers/personal-sites https://blog.feedspot.com/hacker_blogs/ https://github.com/FabioBaroni/awesome-chinese-infosec-websites https://github.com/spacehackersclub/awesome-spacehackers https://heimdalsecurity.com/blog/best-twitter-cybersec-accounts/#cybersec specialists (makefile)https://gist.github.com/hallettj/29b8e7815b264c88a0a0ee9dcddb6210 (makefile awesome)http://www.cs.colby.edu/maxwell/courses/tutorials/maketutor/ (MMDense LSTM)https://scirate.com/arxiv/1805.02410 https://github.com/pettarin/awesome-python-audio-research https://github.com/ganny26/awesome-audioqr https://github.com/ybayle/awesome-deep-learning-music https://github.com/sbrugman/deep-learning-papers#visual https://sisec.inria.fr/ http://www.brendangregg.com/perf.html https://github.com/RRZE-HPC/likwid (Awesome)https://sourceware.org/glibc/wiki/AgnerWishlist (Awesome)https://wiki.osdev.org/Books (Awesome os list)http://pages.cs.wisc.edu/~remzi/OSTEP/ (Awesome Aweome)https://wiki.osdev.org/Expanded_Main_Page (Awesome Linux os)http://man7.org/tlpi/ (Awesome linux)http://people.ds.cam.ac.uk/pmb39/Linux/ https://totalhash.cymru.com/ (Awesome)http://thestarman.pcministry.com/asm/ http://thestarman.pcministry.com/asm/debug/Segments.html https://web.archive.org/web/20130511233621/http://www.asmcommunity.net:80/book/ https://alicebob.cryptoland.net/understanding-the-montgomery-reduction-algorithm/ (Awesome) https://doc.lagout.org/security/ http://timetobleed.com/ (Awesome Awesome lots and lots of kernel video)https://www.youtube.com/user/hupstream/playlists https://softwareengineering.stackexchange.com/questions/200214/cross-compile-arm-program-to-intel (Elf format)https://www.youtube.com/watch?v=t09LFtfy4JU OS security https://github.com/maxking/linux-security-papers http://namei.org/presentations/linux-kernel-security-kca09.pdf http://namei.org/presentations/ http://kernsec.org/wiki/index.php/Main_Page https://medium.com/@XiaohanZeng/i-interviewed-at-five-top-companies-in-silicon-valley-in-five-days-and-luckily-got-five-job-offers-25178cf74e0f https://medium.com/@zainrehmani/how-i-got-interviews-and-job-offers-from-companies-like-facebook-google-microsoft-amazon-dd4080b218d4 Arm Security https://github.com/IAIK https://www.blackhat.com/docs/eu-16/materials/eu-16-Lipp-ARMageddon-How-Your-Smartphone-CPU-Breaks-Software-Level-Security-And-Privacy-wp.pdf https://doc.lagout.org/security/XXXX_ARM_exploitation.pdf http://mazsola.iit.uni-miskolc.hu/~drdani/docs_arm/ (Tells about gcc arm)http://thehackerworkshop.com/?p=391 https://www.youtube.com/watch?v=eM6TKcIwqI4 https://azeria-labs.com/ (Awesome Combining c and c++) https://stackoverflow.com/questions/3789340/combining-c-and-c-how-does-ifdef-cplusplus-work https://blahcat.github.io/2017/06/25/qemu-images-to-play-with/ http://www.toves.org/books/arm/ Shared Memory https://www.dfrws.org/sites/default/files/session-files/paper-monitoring_access_to_shared_memory-mapped_files.pdf

Android https://www.dei.unipd.it/~fantozzi/esp1617/files/Android%20NDK.pdf https://blog.xamarin.com/preparing-for-native-library-linking-changes-in-android-n/ https://link.springer.com/content/pdf/10.1007/978-1-4302-6131-5_7.pdf https://rathodpratik.wordpress.com/2013/03/24/build-cc-executables-for-android-using-ndk/ https://groups.google.com/forum/#!topic/android-ndk/8oq_QcNtuOY http://www.ikerhurtado.com/android-ndk-build-system (Awesome) http://android.mk/ http://technologeeks.com/course.jl?course=AIRE http://androiddoc.qiniudn.com/tools/help/shell.html http://newandroidbook.com/code/android-6.0.0_r1/ndk/docs/Programmers_Guide/html/md_1__concepts__concepts.html#nstl http://web.guohuiwang.com/technical-notes/nativelauncher https://biblioteka.awf.katowice.pl/docs/lfi0d3o.php?cesy=android-run-adb-in-code http://grokbase.com/t/gg/android-ndk/123tfxvqyb/how-can-i-run-c-binary-executable-file-in-android-from-android-shell http://gimite.net/en/index.php?Run%20native%20executable%20in%20Android%20App https://www.arc4dia.com/blog/building-and-debugging-command-line-programs-on-android/ https://source.android.com/devices/architecture/hidl/ https://developers.google.com/training/android/ https://www.anysoftwaretools.com/best-android-development-resources/ Best forums to discuss android https://android-developers.googleblog.com/2016/06/android-changes-for-ndk-developers.html https://www.all-things-android.com/content/understanding-android-file-hierarchy https://code.tutsplus.com/tutorials/advanced-android-getting-started-with-the-ndk--mobile-2152 (Awesome)http://betelco.blogspot.co.uk/2010/01/buildingdebugging-android-native-c.html https://stackoverflow.com/questions/12995030/how-to-use-adb-pull-command https://stackoverflow.com/questions/8650407/how-to-copy-selected-files-from-android-with-adb-pull https://stackoverflow.com/questions/9868309/how-to-compile-c-into-an-executable-binary-file-and-run-it-in-android-from-andro https://www.quora.com/What-is-the-best-book-for-understanding-the-Android-operating-system https://stackoverflow.com/questions/48069141/android-shell-command-options-explained (Awesome and Simple)ftp://ftp.wayne.edu/ldp/en/Linux-Android-HOWTO/ (Awesome)https://hub.packtpub.com/creating-compiling-and-deploying-native-projects-android-ndk/ https://stackoverflow.com/questions/1636901/can-linux-apps-be-run-in-android http://wyatt8740.no-ip.org/android.html https://stackoverflow.com/questions/4703131/is-it-possible-to-run-a-native-arm-binary-on-a-non-rooted-android-phone https://www.slideshare.net/kost/android-porting-47896523 Good books https://nostarch.com/tlpi https://lwn.net/Kernel/Index/

TLB attacks https://www.ieee-security.org/TC/SP2013/papers/4977a191.pdf

Cache https://www.linuxjournal.com/article/7105 https://en.wikipedia.org/wiki/Cache_(computing) https://www.thomas-krenn.com/en/wiki/Linux_Page_Cache_Basics https://www.thegeekstuff.com/2012/02/linux-memory-swap-cache-shared-vm/ https://www.google.co.uk/search?q=cache+management+in+linux&oq=cache+management+in+linux&aqs=chrome..69i57.7055j0j1&sourceid=chrome&ie=UTF-8 https://www.youtube.com/channel/UCzf_XjIoKSf4Ve2fH7xn-3A https://www.youtube.com/watch?v=SfPlpvtZ53o http://www.informit.com/articles/article.aspx?p=29961&seqNum=4 https://www.usenix.org/legacy/event/usenix01/freenix01/full_papers/riel/riel_html/ http://www.infradead.org/~mchehab/kernel_docs/unsorted/cachetlb.html https://stackoverflow.com/questions/4812137/does-the-mmu-mediate-everything-between-the-operating-system-and-physical-memory (Awesome) https://pdfs.semanticscholar.org/presentation/afe5/e48e9a61a804dd39d3c2f69b834a4d14d9c3.pdf (Awesome)http://www.stillhq.com/pdfdb/000446/data.pdf https://www.tomshardware.com/reviews/Intel-i7-nehalem-cpu,2041-2.html http://cseweb.ucsd.edu/classes/su09/cse120/lectures/Lecture7.pdf (Awesome)https://www.youtube.com/user/NmeictEnggTechnology/playlists (Application binary inteface)https://www.youtube.com/watch?v=g8A0Wa7REZI (Awesome Awesome Awesome) https://stackoverflow.com/questions/2171177/what-is-an-application-binary-interface-abi https://www.everything2.com/index.pl?node=iBCS (cache Linux kernel awesome)https://www.kernel.org/doc/gorman/html/understand/understand006.html (Umass os)https://www.youtube.com/user/UMassOS/playlists http://www.rfwireless-world.com/Tutorials/ARM-tutorial.html https://www.youtube.com/watch?v=c9rQmBcJpfk http://events17.linuxfoundation.org/sites/events/files/slides/slides_10.pdf https://en.wikipedia.org/wiki/Cache_coherence (Awesome os notes)https://cseweb.ucsd.edu/classes/su09/cse120/schedule.html (Awesome cache notes)https://courses.cs.washington.edu/courses/cse378/09wi/lectures/lec15.pdf http://snir.cs.illinois.edu/PDF/Temporal%20and%20Spatial%20Locality.pdf https://cmaurice.fr/pdf/raid15_maurice.pdf (Awesome Cache) https://eprint.iacr.org/2015/905.pdf https://wiki.debian.org/Hugepages

Linux system calls https://blog.packagecloud.io/eng/2016/04/05/the-definitive-guide-to-linux-system-calls/

Arm asm http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.dui0205j/Cihccdja.html http://www.ic.unicamp.br/~celio/mc404-s2-2015/docs/ARM-GCC-Inline-Assembler-Cookbook.pdf (Most Awesome inline)http://www.ethernut.de/en/documents/arm-inline-asm.html http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.100748_0606_00_en/ddx1471430827125.html (Most Awesome)http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.dui0056d/BABIJCGF.html (Awesome arm commands reference)http://www.keil.com/support/man/docs/armasm/armasm_dom1361289850039.htm https://github.com/kevinhooke/learning-arm-asm http://alanclements.org/ARMgradedExamples.pdf https://github.com/Croydon/assembler-arm

Arm cache architecture https://community.arm.com/processors/b/blog/posts/caches-and-self-modifying-code http://infocenter.arm.com/help/topic/com.arm.doc.ddi0201d/DDI0201D_arm946es_r1p1_trm.pdf http://events17.linuxfoundation.org/sites/events/files/slides/slides_10.pdf http://www.ee.ncu.edu.tw/~jfli/soc/lecture/ARM9.pdf https://www.nxp.com/files-static/training_pdf/WBT_27182_IMX31_CPU.pdf

Inline assembly https://www.cs.virginia.edu/~clc5q/gcc-inline-asm.pdf https://gcc.gnu.org/onlinedocs/gcc-4.3.0/gcc/Extended-Asm.html#Extended-Asm https://sourceware.org/binutils/docs-2.18/as/index.html (Most Awesome best)http://www.ibiblio.org/gferg/ldp/GCC-Inline-Assembly-HOWTO.html (Short and concise, derived form other two)https://www.codeproject.com/Articles/15971/Using-Inline-Assembly-in-C-C (Something something)https://www.codeproject.com/Articles/5318/Extended-Inline-Assembly-in-GCC http://cholla.mmto.org/computers/gcc_inline.html https://locklessinc.com/articles/gcc_asm/ https://forum.osdev.org/viewtopic.php?f=1&t=26751

Security https://github.com/cryptax/confsec https://copperhead.co/blog/2015/05/11/aslr-android-zygote https://grsecurity.net/ http://www.blackhat.com/presentations/bh-usa-07/Maynor_and_Graham/Whitepaper/bh-usa-07-maynor_and_graham-WP.pdf https://www.rapid7.com/db/search?utf8=%E2%9C%93&q=android&t=v https://www.cvedetails.com/ http://www.securityfocus.com/bid/102976 https://twitter.com/mingjian_zhou?lang=en http://c0reteam.org/2016/01/06/cve-20153865 https://source.android.com/security/overview/acknowledgements https://www.youtube.com/user/mediacccde/playlists https://defuse.ca/

Makefile https://news.ycombinator.com/item?id=15041986 https://gist.github.com/isaacs/62a2d1825d04437c6f08

Bash shell https://google.github.io/styleguide/shell.xml

Cmake https://github.com/onqtam/awesome-cmake

Finding size of cache https://stackoverflow.com/questions/794632/programmatically-get-the-cache-line-size https://community.arm.com/processors/f/discussions/5807/how-get-armv7-cache-size

Android vulnerability https://github.com/vusec/drammer Searching in android vulnerability list, they give full twitter info of hacker then find them find their website find blogs etc. https://www.slideshare.net/jiahongfang5/qualcomm2015-jfang-nforest https://www.blackhat.com/docs/us-15/materials/us-15-Xu-Ah-Universal-Android-Rooting-Is-Back-wp.pdf https://www.google.com/search?client=firefox-b-ab&ei=lc0PW4TXH4i4swG1zYZA&q=Find+your+own+Androidkernel+bug+pdf&oq=Find+your+own+Androidkernel+bug+pdf&gs_l=psy-ab.3...9041.12780.0.13195.8.7.1.0.0.0.358.1444.2-4j1.5.0....0...1c.1.64.psy-ab..3.1.264...33i160k1.0.sjMy_Nr7Qcw https://www.blackhat.com/docs/eu-17/materials/eu-17-Corina-Difuzzing-Android-Kernel-Drivers.pdf Mobile Application Penetration Testing http://cloak-and-dagger.org/ http://events17.linuxfoundation.org/sites/events/files/slides/LSS%20-%20Treble%20%27n%27%20SELinux_0.pdf https://alephsecurity.com/ https://github.com/dweinstein/android_notes/wiki/AndroidApplicationStartup https://census-labs.com/media/shadow-infiltrate-2017.pdf https://www.blackhat.com/docs/eu-16/materials/eu-16-Shen-Rooting-Every-Android-From-Extension-To-Exploitation.pdf (Awesome)https://github.com/jacobsoo/AndroidSlides, http://www.droidsec.org/wiki/#miscellaneous, https://github.com/SecWiki/android-kernel-exploits (Very Very awesome)https://www.sudo.ws/ (Awesome) https://reverseengineering.stackexchange.com/questions/206/where-can-i-as-an-individual-get-malware-samples-to-analyze https://mobilesecuritywiki.com/ https://github.com/xtiankisutsa/awesome-mobile-CTF https://github.com/ashishb/android-security-awesome https://abuse.ch/ https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Exploit%20Development.md#expapers https://github.com/ele7enxxh/android_vuln_poc-exp https://ruxcon.org.au/ https://ruxcon.org.au/assets/2017/slides/A_Whole_New_Efficient_Fuzzing_Strategy_for_Stagefright_Porting_and_Optimisations.pptx https://github.com/jiayy/android_vuln_poc-exp/ https://www.youtube.com/watch?v=q_HibdrbIxo&index=8&list=PLtPrYlwXDImiO_hzK7npBi4eKQQBgygLD https://github.com/Screetsec/TheFatRat https://gist.github.com/MattKetmo/96d703bc23ce432d4591 https://joshuawise.com/projects https://github.com/linkedin/qark https://blog.zimperium.com/the-latest-on-stagefright-cve-2015-1538-exploit-is-now-available-for-testing-purposes/ https://security.stackexchange.com/questions/40012/writing-android-exploits http://www.xipiter.com/practical-android-exploitation.html https://github.com/xairy/linux-kernel-exploitation http://bits-please.blogspot.co.uk/2015/08/android-linux-kernel-privilege.html https://www.securityfocus.com/news/11189 http://analysis.seclab.tuwien.ac.at/projects/vifuzz/docs/exploit.pdf (Awesome Step by step) https://ionize.com.au/android-exploit-development-android-open-source-project-toolchain/ https://www.exploit-db.com/platform/?p=Android https://github.com/SecWiki/android-kernel-exploits http://analysis.seclab.tuwien.ac.at/projects/vifuzz/docs/exploit.pdf key Search term = Writing exploits for device drivers Key Search term = how to write exploit for android , Fuzzing drivers https://www.vulnhub.com/ https://github.com/smeso/MTPwn https://mobile-security.zeef.com/oguzhan.topgul https://www.hackers-arise.com/single-post/2017/09/20/Exploiting-Nearly-Any-Windows-System-Using-CVE-2017-8759 https://github.com/FabioBaroni/awesome-exploit-development writing security tools and exploits https://conference.hitb.org/hitbsecconf2018ams/materials/D1T2%20-%20Yong%20Wang%20&%20Yang%20Song%20-%20Rooting%20Android%208%20with%20a%20Kernel%20Space%20Mirroring%20Attack.pdf Android hacker's handbook learn pentesting on android Android internals jonathan Levin http://conference.hitb.org/hitbsecconf2017ams/materials/ https://www.blackhat.com/docs/us-16/materials/us-16-Zhang-Dangerous-Hare-Hanging-Attribute-References-Hazards-Due-To-Vendor-Customization.pdf https://www.blackhat.com/us-17/briefings.html#avpass-leaking-and-bypassing-antivirus-detection-model-automatically https://www.blackhat.com/us-17/briefings.html#broadpwn-remotely-compromising-android-and-ios-via-a-bug-in-broadcoms-wi-fi-chipsets https://www.blackhat.com/us-17/briefings.html#cloak-and-dagger-from-two-permissions-to-complete-control-of-the-ui-feedback-loop https://www.blackhat.com/us-17/briefings.html#defeating-samsung-knox-with-zero-privilege https://www.blackhat.com/us-17/briefings.html#many-birds-one-stone-exploiting-a-single-sqlite-vulnerability-across-multiple-software https://www.blackhat.com/docs/us-17/thursday/us-17-Jung-AVPASS-Leaking-And-Bypassing-Anitvirus-Detection-Model-Automatically.pdf https://www.blackhat.com/docs/us-16/materials/us-16-Zhang-Dangerous-Hare-Hanging-Attribute-References-Hazards-Due-To-Vendor-Customization.pdf https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/liu https://www.rsaconference.com/writable/presentations/file_upload/mbs-f03-android-serialization-vulnerabilities-revisited.pdf https://www.rsaconference.com/writable/presentations/file_upload/hta-r10-hey-android-where-is-my-car.pdf https://www.rsaconference.com/writable/presentations/file_upload/mbs-r14-how-automated-vulnerability-analysis-discovered-hundreds-of-android-0-days.pdf https://www.rsaconference.com/writable/presentations/file_upload/mbs-r14-how-automated-vulnerability-analysis-discovered-hundreds-of-android-0-days.pdf https://www.ruhrsec.de/2018/#talks https://www.slideshare.net/CanSecWest/csw2017-geshevmiller-logic-bug-hunting-in-chrome-on-android (Awesome Might be on android as well) https://labs.mwrinfosecurity.com/assets/BlogFiles/apple-safari-wasm-section-vuln-write-up-2018-04-16.pdf (It might help awesome)https://www.blackhat.com/us-17/training/schedule/index.html#android-application-hacking----penetration-and-reversing-mobile-apps-5628 https://github.com/hackedteam?tab=repositories

Deepfakes https://github.com/goberoi/faceit https://github.com/alew3/faceit_live https://github.com/deepfakes/faceswap https://medium.com/huia/live-deep-fakes-you-can-now-change-your-face-to-someone-elses-in-real-time-video-applications-a4727e06612f

Writing Cache friendly code (Awesome search term)Writing cache friendly code

Linux MMu https://events.static.linuxfound.org/sites/events/files/slides/elc_2016_mem.pdf

Chip https://en.wikichip.org/wiki/mediatek/helio/mt6755 https://www.mediatek.com/products/smartphones/mt6755-helio-p10#

Virtual memory https://blog.jeffli.me/blog/2014/11/08/pagemap-interface-of-linux-explained/ https://www.kernel.org/doc/Documentation/vm/pagemap.txt https://www.youtube.com/watch?v=qcBIvnQt0Bw&list=PLiwt1iVUib9s2Uo5BeYmwkDFUh70fJPxX https://events.static.linuxfound.org/sites/events/files/slides/elc_2016_mem.pdf https://www.bottomupcs.com/virtual_addresses.xhtml https://stackoverflow.com/questions/44520047/what-is-the-page-size-for-32-and-64-bit-versions-of-windows-os https://stackoverflow.com/questions/33722205/how-many-page-tables-do-intel-x86-64-cpus-access-to-translate-virtual-memory (Awesome)http://www.cirosantilli.com/x86-paging/ http://www.ic.unicamp.br/~celio/mc404-2013/arm-manuals/Paging%20Systems.pdf http://lackingrhoticity.blogspot.co.uk/2015/05/how-physical-addresses-map-to-rows-and-banks.html

Awesome kali and exploit https://github.com/secfigo/Awesome-Fuzzing https://gist.github.com/natesubra/5117959c660296e12d3ac5df491da395 http://www.fuzzysecurity.com/links.html https://github.com/FabioBaroni/awesome-exploit-development https://www.corelan.be/ https://null-byte.wonderhowto.com/how-to/exploit-development-everything-you-need-know-0167801/ https://www.hackers-arise.com/single-post/2017/06/21/Exploit-Development-Part-3-Finding-Vulnerabilities-by-Fuzzing-with-Spike https://uk.sans.org/course/advanced-exploit-development-penetration-testers https://en.wikipedia.org/wiki/Fravia http://www.ctyme.com/rbrown.htm https://news.ycombinator.com/item?id=4121062 https://github.com/Hack-with-Github https://github.com/yeyintminthuhtut/Awesome-Study-Resources-for-Kernel-Hacking awesome exploit development https://github.com/apsdehal/awesome-ctf (Awesome)https://github.com/gregkh/kernel-development (Awesome)https://github.com/fffaraz/kernel https://github.com/aleksandar-todorovic/awesome-linux#learning-resources https://github.com/aleksandar-todorovic/awesome-linux#useful-websites A guide to kernel exploitation https://securityonline.info/awesome-hacking-collection-awesome-lists-hackers-pentesters-security-researchers/ https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0ahUKEwi5qNeKqpbbAhVPC-wKHQz9APQQFggnMAA&url=http%3A%2F%2Fwww.piotrbania.com%2Fall%2Farticles%2Fewdd.pdf&usg=AOvVaw3g5NjK-ghejApSApADwa65 https://www.blackhat.com/presentations/bh-usa-07/Bulygin/Presentation/bh-usa-07-bulygin.pdf

Awesome hardware https://github.com/openmotics/hardware Search high speed circuit design vhdl https://blog.hackster.io/student-creates-first-homebrew-dual-differential-amplifier-ic-8535af115d7e?gi=4334ecb2fcdd https://blog.hackster.io/how-to-embed-nfc-chips-into-your-acrylic-fingernails-dor-unlocking-your-phone-and-much-more-51ea87d6a169 https://en.wikipedia.org/wiki/List_of_open-source_hardware_projects https://en.wikipedia.org/wiki/Open-source_hardware https://en.wikipedia.org/wiki/Open-Source_Lab_(book) http://apt.cs.manchester.ac.uk/ftp/pub/apt/papers/LEMB_ToE09_O.pdf Search term : Design system on chip https://en.wikibooks.org/wiki/Chip_Design_Made_Easy http://users.ece.utexas.edu/~gerstl/publications/TR-02-28.tutorial.pdf http://www.cl.cam.ac.uk/teaching/1011/SysOnChip/socdam-notes1011.pdf https://www.quora.com/Which-is-the-best-online-ARM-processor-course https://github.com/monostable/awesome-electronics

Android terminal ftp://ftp.wayne.edu/ldp/en/Linux-Android-HOWTO/Linux-Android-HOWTO-6.html

Processor know how https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-823-computer-system-architecture-fall-2005/lecture-notes/

Iot sec (Awesome)http://jcjc-dev.com/2016/06/08/reversing-huawei-4-dumping-flash/ https://security.electronicsforu.com/wp-content/uploads/2017/06/RISC_IoT_101.pdf https://www.owasp.org/images/2/29/AppSecIL2016_HackingTheIoT-PenTestingRFDevices_ErezMetula.pdf https://s3.us-east-2.amazonaws.com/attify-iot-hosting/Hacking+IoT+for+Bug+Bounties.pdf https://sector.ca/wp-content/uploads/presentations17/Aditya-Gupta-Pwning-Smart-Homes-SecTor.pdf http://www.cs.bham.ac.uk/~tpc/Edu/Pentesting/files/penEdu.pdf

Makefile https://eigenstate.org/notes/makefiles http://docs.yottabuild.org/tutorial/tutorial.html https://www3.ntu.edu.sg/home/ehchua/programming/cpp/gcc_make.html Managing large projects with make http://doc.cat-v.org/bell_labs/mk/ https://github.com/oridb/mk https://eli.thegreenplace.net/2013/07/09/library-order-in-static-linking

Good android books Embedded Android: Porting, Extending Android internals Jonathan Levin Learning pentesting for android http://www.opersys.com/training/embedded-android https://stackoverflow.com/questions/11262817/learn-about-android-internalsdive-deep-into-the-system Xda developers android hacker's toolkit

Embedded Linux https://github.com/embedded-boston/awesome-embedded-systems https://github.com/ysh329/awesome-embedded-ai https://www.quora.com/What-are-the-best-lectures-for-learning-Embeded-systems-in-YouTube https://hackr.io/tutorials/learn-android-development https://github.com/JStumpp/awesome-android#resources

Compilers https://insights.dice.com/2015/12/04/developing-in-cc-consider-clang/ https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=15&ved=0ahUKEwjZvOfP7ZjbAhXC2aQKHSjcCxoQFgiaATAO&url=https%3A%2F%2Fraw.githubusercontent.com%2Fnamin%2Finc%2Fmaster%2Fdocs%2Ftutorial.pdf&usg=AOvVaw05R_CrVMx8P0t7nmVmnLwa https://steveire.wordpress.com/ http://webpages.charter.net/ppluzhnikov/linker.html

Awesome Slam https://github.com/kanster/awesome-slam#courses-lectures-and-workshops https://github.com/liulinbo/slam https://blog.csdn.net/renye_lpl/article/details/79225423

Gcc cross http://preshing.com/20141119/how-to-build-a-gcc-cross-compiler/ https://github.com/landley/toybox http://web.guohuiwang.com/technical-notes/androidndk2 http://www.linfo.org/main_index.html

Linux kernel http://fxr.watson.org/

Write an mp3 filter http://book.realworldhaskell.org/read/ http://blog.bjrn.se/2008/10/lets-build-mp3-decoder.html https://multimedia.cx/eggs/learn-multimedia-with-jpeg/ http://www.opennet.ru/docs/formats/jpeg.txt http://parsingintro.sourceforge.net/ http://wiki.c2.com/?TipsForReadingCode

Programme and their memory https://www.usna.edu/Users/cs/aviv/classes/ic221/s16/lec/11/lec.html https://stackoverflow.com/questions/15638105/accessing-specific-memory-locations-in-c https://www.kernel.org/doc/gorman/html/understand/understand007.html https://www.google.com/search?q=how+memory+address+is+assigned+to+process&ie=utf-8&oe=utf-8&client=firefox-b-ab http://www.informit.com/articles/article.aspx?p=29961&seqNum=2 https://www.google.com/search?q=how+os+gives+address+to+user+spce+prograzmme&ie=utf-8&oe=utf-8&client=firefox-b-ab https://security.stackexchange.com/questions/18556/how-do-aslr-and-dep-work https://www.blackhat.com/docs/eu-16/materials/eu-16-Schwarz-How-Your-DRAM-Becomes-A-Security-Problem-wp.pdf

dope links https://fail0verflow.com/blog/ https://www.w3.org/TR/workers/ http://www.hotchips.org/archives/2010s/hc29/ http://linux-test-project.github.io/ https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Embedded%20Device%20%26%20Hardware%20Hacking%20-.md https://www.google.com/search?client=firefox-b-ab&ei=1a4PW4z9FcaB6ATgy57oBw&q=awesome+hardware+hacking&oq=awesome+hardware+hacking&gs_l=psy-ab.3..33i160k1.5710.6089.0.6337.3.3.0.0.0.0.245.245.2-1.1.0....0...1c.1.64.psy-ab..2.1.244....0.OcRoyVos8Z0 Black Hat: Top 20 hack-attack tools https://www.blackhat.com/us-17/training/applied-hardware-attacks-embedded-systems.html https://www.google.com/search?client=firefox-b&ei=HLcPW6wnyImbBd6ekoAF&q=Dumping+Firmware+from+Software+pdf&oq=Dumping+Firmware+from+Software+pdf&gs_l=psy-ab.3...1367.2806.0.2965.4.4.0.0.0.0.265.265.2-1.1.0....0...1c.1.64.psy-ab..3.1.264...33i160k1.0.WHT9xo50-gU https://www.google.com/search?client=firefox-b&ei=LrcPW6-GC8rN6QSAkpawBg&q=Manipulating+firmware+images+pdf&oq=Manipulating+firmware+images+pdf&gs_l=psy-ab.3..33i21k1.3130.4518.0.4688.4.4.0.0.0.0.262.508.2-2.2.0....0...1c.1.64.psy-ab..2.2.507...33i160k1.0.ZNykmY9pJT8 https://www.google.com/search?client=firefox-b&ei=Q7cPW-rRBsOF6ASL0Z_wDQ&q=Finding+software+bugs+in+firmware+pdf&oq=Finding+software+bugs+in+firmware+pdf&gs_l=psy-ab.3...6317.8320.0.8453.6.6.0.0.0.0.279.765.2-3.3.0....0...1c.1.64.psy-ab..3.3.764...33i160k1j33i21k1.0.H5R8teKf0as http://hexblog.com/files/recon%202010%20Skochinsky.pdf https://reverseengineering.stackexchange.com/questions/3526/how-do-i-extract-a-copy-of-an-unknown-firmware-from-a-hardware-device https://reverseengineering.stackexchange.com/questions/2337/how-to-dump-flash-memory-with-spi http://chdk.wikia.com/wiki/Obtaining_a_firmware_dump https://www.blackhat.com/docs/us-16/materials/us-16-FitzPatrick-The-Tao-Of-Hardware-The-Te-Of-Implants.pdf https://www.blackhat.com/us-16/training/applied-physical-attacks-on-x86-systems.html http://www.nsaplayset.org/ https://en.wikipedia.org/wiki/NSA_ANT_catalog https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=4&ved=0ahUKEwjO2Jrl0K_bAhWjQJoKHV9kBWkQFghDMAM&url=http%3A%2F%2Fwww.jsums.edu%2Fnmeghanathan%2Ffiles%2F2015%2F05%2FCSC437-Fall2013-Module-5-Buffer-Overflow-Attacks.pdf%3Fx61976&usg=AOvVaw2lP003SqchXxcuGyhb4vFZ https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=3&ved=0ahUKEwjO2Jrl0K_bAhWjQJoKHV9kBWkQFgg2MAI&url=http%3A%2F%2Fforristal.com%2Fmaterial%2FForristal_Hardware_Involved_Software_Attacks.pdf&usg=AOvVaw3fiH_8AIm8RnTgqhBcfnlm https://www.blackhat.com/presentations/bh-usa-04/bh-us-04-tsyrklevich.pdf https://www.blackhat.com/docs/asia-18/asia-18-Ding-New-Compat-Vulnerabilities-In-Linux-Device-Drivers.pdf https://security.stackexchange.com/questions/119712/methods-root-can-use-to-elevate-itself-to-kernel-mode https://www.giac.org/paper/gsec/2235/quest-root-hacker-techniques-unix-security/103808 https://thehackernews.com/2017/05/linux-sudo-root-hack.html https://hackmag.com/security/reach-the-root/ https://payatu.com/guide-linux-privilege-escalation/ https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Privilege%20Escalation%20%26%20Post-Exploitation.md http://0x00sec.org/t/enumeration-for-linux-privilege-escalation/1959 https://thehackernews.com/2017/06/linux-root-privilege-escalation.html https://resources.infosecinstitute.com/privilege-escalation-linux-live-examples/#gref https://uwnthesis.wordpress.com/2016/12/26/basics-of-making-a-rootkit-from-syscall-to-hook/ http://se7so.blogspot.com/2012/07/hijacking-linux-system-calls-rootkit.html http://timetobleed.com/detailed-explanation-of-a-recent-privilege-escalation-bug-in-linux-cve-2010-3301/ https://www.google.com/search?client=firefox-b-ab&biw=1468&bih=937&ei=BMYPW8iaM8yusAGcvYm4CQ&q=privelege+escalation+using+syscalls&oq=privelege+escalation+using+syscalls&gs_l=psy-ab.3..33i21k1.252575.260038.0.260160.36.26.0.0.0.0.466.3636.2-3j4j3.11.0....0...1c.1.64.psy-ab..25.11.3924.6..0j35i39k1j0i131k1j0i10k1j0i13k1j0i22i30k1.296.3ay4O3XzcSI http://bits-please.blogspot.com/2016/06/trustzone-kernel-privilege-escalation.html https://www.exploit-db.com/exploits/44205/ https://perso.univ-st-etienne.fr/maf13892/Docs/Publications/JTAG.FIA.pdf https://perso.univ-st-etienne.fr/maf13892/Docs/Presentations/TRUDEVICE2015_JTAGCombinedAttacks.pdf https://hakin9.org/download/hacking-android-80-pages-of-experts-tutorials/ (Awesome hardware concise)https://media.blackhat.com/us-13/US-13-Zaddach-Workshop-on-Embedded-Devices-Security-and-Firmware-Reverse-Engineering-WP.pdf https://www.google.com/search?client=firefox-b-ab&ei=O-YQW6OHJqKHmwXht5y4Bg&q=awesome+embeded+hacking+&oq=awesome+embeded+hacking+&gs_l=psy-ab.3...7740132.7748464.0.7748615.25.21.0.0.0.0.532.2820.3-4j2j1.8.0....0...1c.1.64.psy-ab..20.2.875.0..0j0i67k1.298.3F7kxDoweak (Awesome)https://www.kb.cert.org/vuls/id/649219 https://en.wikipedia.org/wiki/DMA_attack https://github.com/ufrisk/pcileech https://www.blackhat.com/docs/us-17/wednesday/us-17-Trikalinou-Taking-DMA-Attacks-To-The-Next-Level-How-To-Do-Arbitrary-Memory-Reads-Writes-In-A-Live-And-Unmodified-System-Using-A-Rogue-Memory-Controller.pdf https://github.com/torvalds/linux/blob/master/Documentation/DMA-API-HOWTO.txt (Awesome resource hidden)https://cturt.github.io/ps4.html https://fail0verflow.com/blog/2017/ps4-crashdump-dump/ https://www.psxhax.com/threads/dualshock-4-ds4-ps4-firmware-dump-reversing-tools-by-ds4user.1159/?utm_source=dlvr.it&utm_medium=facebook https://www.reddit.com/r/ps4homebrew/comments/8amgmz/the_nor_chip/ https://www.3dbrew.org/wiki/Homebrew_Exploits https://github.com/Cryptogenic/Exploit-Writeups/blob/master/FreeBSD/PS4%204.55%20BPF%20Race%20Condition%20Kernel%20Exploit%20Writeup.md https://github.com/whnunlife/ps3publictools http://www2.lauterbach.com/pdf/debugger_arm.pdf https://news.ycombinator.com/item?id=7015082 https://comma.ai/ https://github.com/geohot/qira https://pure.tue.nl/ws/files/46956556/770549-1.pdf https://sharedmemorydump.net/building-a-mining-stack-of-raspberry-pis

Awesome kernel https://resources.infosecinstitute.com/privilege-escalation-linux-live-examples/#gref http://www.vantagepoint.sg/blog/82-hooking-android-system-calls-for-pleasure-and-benefit https://jvns.ca/blog/2014/09/18/you-can-be-a-kernel-hacker/ https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0ahUKEwjz2tf216_bAhVDkywKHVwHCvsQFggsMAA&url=http%3A%2F%2Fevents17.linuxfoundation.org%2Fsites%2Fevents%2Ffiles%2Fslides%2Fnakamura_20170831_1.pdf&usg=AOvVaw1_1D1ZF-BJIF89_233pECT Hacker playbook http://delta-course.org/docs/delta4/day2/D4T2L5.pdf http://www.cs.swan.ac.uk/~csmarkus/15_project/15_10_sample1_InitialDocument.pdf http://wpage.unina.it/roberto.natella/papers/natella_androidfuzzing_issre2017.pdf http://aitel.hist.no/fag/lan/lek02/dln02-en.pdf https://www.usenix.org/legacy/events/hotsec11/tech/final_files/Cai.pdf http://www.makelinux.net/kernel_map/#sd http://chdk.wikia.com/wiki/Obtaining_a_firmware_dump A guide to kernel exploitation https://raw.githubusercontent.com/liulinbo/slam/master/Linux%E5%B0%B1%E8%AF%A5%E8%BF%99%E4%B9%88%E5%AD%A6.pdf https://raw.githubusercontent.com/jacobsoo/AndroidSlides/master/%E5%8C%97%E4%BA%AC-GDG-Android-root-%E6%8A%80%E6%9C%AF%E6%B2%99%E9%BE%99-2014/Find%20your%20own%20Android%20kernel%20bug.pdf http://www.xml.com/ldd/chapter/book/ch13.html https://github.com/torvalds/linux/blob/master/Documentation/DMA-API-HOWTO.txt https://www.linuxjournal.com/article/4378

Search for debug mode in processor http://www.msn.com/en-gb/money/companies/google-used-to-ask-these-interview-questions-but-theyre-so-tricky-they-were-banned/ss-AAy3kE0?ocid=ientp#image=6

Fpga based security https://github.com/ufrisk/pcileech https://mirror.netcologne.de/CCC/congress/2017/slides-pdf/34c3-9111-public_fpga_based_dma_attacking.pdf https://github.com/matthiasbock/JTAG-Sniffer https://recon.cx/2013/trainingsynple.html https://www.eetimes.com/document.asp?doc_id=1274593

PS# https://www2.cs.arizona.edu/~collberg/Teaching/466-566/2012/Resources/presentations/2012/topic1-final/report.pdf https://www2.cs.arizona.edu/~collberg/Teaching/466-566/2012/Resources/presentations/2012/topic1-final/slides.pdf https://www.riscure.com/uploads/2017/09/Controlling-PC-on-ARM-using-Fault-Injection.pdf https://events.ccc.de/congress/2010/Fahrplan/attachments/1780_27c3_console_hacking_2010.pdf https://rdist.root.org/2010/01/27/how-the-ps3-hypervisor-was-hacked/ http://www.blackhat.com/docs/eu-15/materials/eu-15-Giller-Implementing-Electrical-Glitching-Attacks.pdf http://mastersicurezza.di.uniroma1.it/mastersicurezza/images/materiali/Convegni/cbepas2012.pdf http://ids.cs.columbia.edu/sites/default/files/ndss-2013.pdf https://web.archive.org/web/20100409023327/http://geohotps3.blogspot.com/ https://web.archive.org/web/20100410060251/http://pastie.org:80/795944 https://web.archive.org/web/20100704075741/http://hackmii.com:80/2009/01/25c3-presentation/ https://web.archive.org/web/20100723083756/http://www.ibm.com:80/developerworks/power/library/pa-cellsecurity/ https://news.ycombinator.com/item?id=1079251 https://web.archive.org/web/20100404062009/http://rdist.root.org:80/2007/05/07/glitch-attacks-revealed/ https://web.archive.org/web/20100412055807/http://xorloser.com:80/?p=162#more-162 https://web.archive.org/web/20100220214115/http://ps3hvdoc.wikispaces.com:80/Hypervisor+RE https://web.archive.org/web/20100410060005/http://pastie.org:80/795371 http://www.edepot.com/playstation3.html#PS3_Security https://web.archive.org/web/20110110121139/http://wiki.ps2dev.org/

Ram dump https://resources.infosecinstitute.com/obtaining-information-dumping-memory/#gref https://rc2014.co.uk/modules/sd-memory-dump/ http://jcjc-dev.com/2016/12/14/reversing-huawei-5-reversing-firmware/ https://madiba.encs.concordia.ca/~x_decarn/papers/verifiable-build-acsac2014.pdf Methods of capturing a memory dump Mobile forensics Capturing a live ram https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=5&ved=0ahUKEwibyLjXrLLbAhXID8AKHbqCBjYQFghKMAQ&url=http%3A%2F%2Fwww.indjst.org%2Findex.php%2Findjst%2Farticle%2Fdownload%2F105851%2F77226&usg=AOvVaw1xksKEcSYyOXuHFbx_qeuw https://www.sans.org/reading-room/whitepapers/forensics/techniques-tools-recovering-analyzing-data-volatile-memory-33049 Kernel panic https://www.blackhat.com/presentations/bh-usa-06/BH-US-06-Burdach.pdf https://www.forensicswiki.org/wiki/Memory_Imaging (aWESOME)http://eh2008.koeln.ccc.de/fahrplan/attachments/1067_SEAT1394-svn-r432-paper.pdf https://eprint.iacr.org/2011/221.pdf http://www.stoned-vienna.com https://privatecore.com/resources-overview/physical-memory-attacks/index.html Attacks on physical memory https://www.defcon.org/html/links/dc-archives/dc-20-archive.html DIY electric car File dump attack Access ramd irectly https://www.youtube.com/watch?v=Zp8dVq5ZvKY https://cturt.github.io/ps4.html https://opensourceforu.com/2011/02/debug-kernel-panics-with-crash/ https://cryptome.org/0003/RAMisKey.pdf

Security Awesome https://www.sec.in.tum.de/i20/teaching

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment