Back to feeds

Sheikh Ayan

Stealth • 2d

Top Exploit Development Tools 1. Immunity Debugger Advanced debugger for analyzing vulnerabilities. #!mona seh (SEH exploit analysis with Mona plugin) 2. Metasploit Comprehensive exploitation toolkit. #msfvenom -p windows/meterpreter/reverse_tcp LHOST= LPORT= -f exe -o exploit.exe 3. Ghidra Open-source reverse engineering tool. Import a binary and press Ctrl+E to decompile. 4. pwntools CTF exploitation library for Python. #from pwn import * r = remote('target_ip', 1337) r.sendline(payload) 5. Radare2 Lightweight reverse engineering framework. #r2 -A binary (auto-analyze a binary) 6. IDA Pro Industry-leading disassembler and debugger. Press Shift+F5 to view function pseudocode. 7. Binary Ninja User-friendly binary analysis platform. Navigate through disassembly with Space for cross-references. 8. ROPgadget ROP chain generation. #ROPgadget --binary ./vulnerable_bin

0 replies3 likes

More like this

Recommendations from Medial

Saksham

 • 

Bebyond • 6m

📃Reverse Engineering Clauses: Navigating the Legal Landscape in Tech The Ola Electric-MapMyIndia dispute highlights the critical role of reverse engineering clauses in tech agreements. These provisions protect intellectual property by prohibiting a

See More
0 replies4 likes
1

Download the medial app to read full posts, comements and news.